Browse Definitions:
  • November 30, 2016 30 Nov'16

    cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.  Continue Reading

  • November 29, 2016 29 Nov'16

    API management platform

    An API management platform is a tool that acts as a proxy for customer requests to protect the back ends of online services from being brought down from too many queries.  Continue Reading

  • November 29, 2016 29 Nov'16

    Semios mesh network

    Semios mesh network is the communications backbone of the Semios orchard farming automation platform.  Continue Reading

  • November 29, 2016 29 Nov'16

    software engineering

    Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.  Continue Reading

  • November 29, 2016 29 Nov'16

    Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.  Continue Reading

  • November 28, 2016 28 Nov'16

    Moral Machine

    The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI). Initially, the system targets AI for autonomous cars.  Continue Reading

  • November 28, 2016 28 Nov'16

    roboethics (robot ethics)

    Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.  Continue Reading

  • November 28, 2016 28 Nov'16

    software robot

    A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.  Continue Reading

  • November 28, 2016 28 Nov'16

    neurosynaptic chip (cognitive chip)

    A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.  Continue Reading

  • November 25, 2016 25 Nov'16

    Khan Academy

    The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.  Continue Reading

  • November 24, 2016 24 Nov'16

    cognitive computing

    Cognitive computing is the simulation of human thought processes in a computerized model. The goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.  Continue Reading

  • November 24, 2016 24 Nov'16

    security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.  Continue Reading

  • November 23, 2016 23 Nov'16

    von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.  Continue Reading

  • November 21, 2016 21 Nov'16

    learning curve

    Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning. The learning curve provides a way to show a subject’s learnability.  Continue Reading

  • November 21, 2016 21 Nov'16

    screencast

    A screencast is a digital video recording that captures actions taking place on a computer desktop.  Continue Reading

  • November 21, 2016 21 Nov'16

    canary (canary test, canary deployment)

    In software testing, a canary (also called a canary test) is a push of code changes to a small number of users who have not volunteered or opted-in for testing. Because the canary is only pushed to a small number of users, its impact is relatively ...  Continue Reading

  • November 18, 2016 18 Nov'16

    causation

    Causation, or causality, is the capacity of one variable to influence another. The first variable may bring the second into existence or may cause the incidence of the second variable to fluctuate.  Continue Reading

  • November 18, 2016 18 Nov'16

    correlation

    Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in tandem.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.  Continue Reading

  • November 18, 2016 18 Nov'16

    Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close