Browse Definitions:
  • October 31, 2016 31 Oct'16


    OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.  Continue Reading

  • October 30, 2016 30 Oct'16

    pervasive Wi-Fi

    Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.  Continue Reading

  • October 30, 2016 30 Oct'16

    reality computing

    Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM. This enables faster design and solutions.  Continue Reading

  • October 28, 2016 28 Oct'16

    reality capture

    Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.  Continue Reading

  • October 25, 2016 25 Oct'16


    Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.  Continue Reading

  • October 22, 2016 22 Oct'16

    Vblock (VCE Vblock)

    Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines.  Continue Reading

  • October 21, 2016 21 Oct'16

    point cloud

    A point cloud is a collection of data points defined by a given coordinates system. In a 3D coordinates system, for example, a point cloud may define the shape of some real or created physical system.  Continue Reading

  • October 21, 2016 21 Oct'16

    3D mesh

    A 3D mesh is the structural build of a 3D model consisting of polygons. 3D meshes use reference points in X, Y and Z axes to define shapes with height, width and depth.  Continue Reading

  • October 21, 2016 21 Oct'16

    access recertification

    Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.  Continue Reading

  • October 20, 2016 20 Oct'16

    access governance (AG)

    Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.  Continue Reading

  • October 19, 2016 19 Oct'16

    golden ratio (golden mean)

    The golden ratio is a proportion (roughly 1:1.6) that occurs frequently throughout the natural world and is broadly applied across many areas of human endeavor including engineering, architecture, art, interface design and music.  Continue Reading

  • October 18, 2016 18 Oct'16

    Network Node Manager i (NNMi)

    The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.  Continue Reading

  • October 18, 2016 18 Oct'16

    huddle room

    A huddle room is a small conference area, typically seating 3-6 people and equipped with conferencing and collaboration technologies.  Continue Reading

  • October 18, 2016 18 Oct'16

    network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  Continue Reading

  • October 17, 2016 17 Oct'16

    Hofstadter's law

    Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.”  Continue Reading

  • October 17, 2016 17 Oct'16

    walking skeleton

    A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.  Continue Reading

  • October 14, 2016 14 Oct'16

    software development

    Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).  Continue Reading

  • October 13, 2016 13 Oct'16

    Conway's law

    Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.  Continue Reading

  • October 12, 2016 12 Oct'16

    rack unit

    A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.75") applied to hardware racks and the devices that they contain.  Continue Reading

  • October 11, 2016 11 Oct'16

    Dell EMC

    Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.