Browse Definitions:
  • October 31, 2016 31 Oct'16

    OpenConfig

    OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.  Continue Reading

  • October 30, 2016 30 Oct'16

    pervasive Wi-Fi

    Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.  Continue Reading

  • October 30, 2016 30 Oct'16

    reality computing

    Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM. This enables faster design and solutions.  Continue Reading

  • October 28, 2016 28 Oct'16

    reality capture

    Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.  Continue Reading

  • October 25, 2016 25 Oct'16

    photogrammetry

    Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.  Continue Reading

  • October 22, 2016 22 Oct'16

    Vblock (VCE Vblock)

    Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines.  Continue Reading

  • October 21, 2016 21 Oct'16

    point cloud

    A point cloud is a collection of data points defined by a given coordinates system. In a 3D coordinates system, for example, a point cloud may define the shape of some real or created physical system.  Continue Reading

  • October 21, 2016 21 Oct'16

    3D mesh

    A 3D mesh is the structural build of a 3D model consisting of polygons. 3D meshes use reference points in X, Y and Z axes to define shapes with height, width and depth.  Continue Reading

  • October 21, 2016 21 Oct'16

    access recertification

    Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.  Continue Reading

  • October 20, 2016 20 Oct'16

    access governance (AG)

    Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.  Continue Reading

  • October 19, 2016 19 Oct'16

    golden ratio (golden mean)

    The golden ratio is a proportion (roughly 1:1.6) that occurs frequently throughout the natural world and is broadly applied across many areas of human endeavor including engineering, architecture, art, interface design and music.  Continue Reading

  • October 18, 2016 18 Oct'16

    Network Node Manager i (NNMi)

    The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.  Continue Reading

  • October 18, 2016 18 Oct'16

    huddle room

    A huddle room is a small conference area, typically seating 3-6 people and equipped with conferencing and collaboration technologies.  Continue Reading

  • October 18, 2016 18 Oct'16

    network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  Continue Reading

  • October 17, 2016 17 Oct'16

    Hofstadter's law

    Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.”  Continue Reading

  • October 17, 2016 17 Oct'16

    walking skeleton

    A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.  Continue Reading

  • October 14, 2016 14 Oct'16

    software development

    Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).  Continue Reading

  • October 13, 2016 13 Oct'16

    Conway's law

    Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.  Continue Reading

  • October 12, 2016 12 Oct'16

    rack unit

    A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.75") applied to hardware racks and the devices that they contain.  Continue Reading

  • October 11, 2016 11 Oct'16

    Dell EMC

    Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close