Browse Definitions:
  • November 30, 2016 30 Nov'16

    cybersecurity

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.  Continue Reading

  • November 29, 2016 29 Nov'16

    API management platform

    An API management platform is a tool that acts as a proxy for customer requests to protect the back ends of online services from being brought down from too many queries.  Continue Reading

  • November 29, 2016 29 Nov'16

    Semios mesh network

    Semios mesh network is the communications backbone of the Semios orchard farming automation platform.  Continue Reading

  • November 29, 2016 29 Nov'16

    software engineering

    Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.  Continue Reading

  • November 29, 2016 29 Nov'16

    Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.  Continue Reading

  • November 28, 2016 28 Nov'16

    Moral Machine

    The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI). Initially, the system targets AI for autonomous cars.  Continue Reading

  • November 28, 2016 28 Nov'16

    roboethics (robot ethics)

    Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.  Continue Reading

  • November 28, 2016 28 Nov'16

    software robot

    A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.  Continue Reading

  • November 28, 2016 28 Nov'16

    neurosynaptic chip (cognitive chip)

    A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.  Continue Reading

  • November 25, 2016 25 Nov'16

    Khan Academy

    The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.  Continue Reading

  • November 24, 2016 24 Nov'16

    cognitive computing

    Cognitive computing is the simulation of human thought processes in a computerized model. The goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.  Continue Reading

  • November 24, 2016 24 Nov'16

    security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.  Continue Reading

  • November 23, 2016 23 Nov'16

    von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.  Continue Reading

  • November 21, 2016 21 Nov'16

    learning curve

    Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning. The learning curve provides a way to show a subject’s learnability.  Continue Reading

  • November 21, 2016 21 Nov'16

    screencast

    A screencast is a digital video recording that captures actions taking place on a computer desktop.  Continue Reading

  • November 21, 2016 21 Nov'16

    canary (canary test, canary deployment)

    In software testing, a canary (also called a canary test) is a push of code changes to a small number of users who have not volunteered or opted-in for testing. Because the canary is only pushed to a small number of users, its impact is relatively ...  Continue Reading

  • November 18, 2016 18 Nov'16

    causation

    Causation, or causality, is the capacity of one variable to influence another. The first variable may bring the second into existence or may cause the incidence of the second variable to fluctuate.  Continue Reading

  • November 18, 2016 18 Nov'16

    correlation

    Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in tandem.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.  Continue Reading

  • November 18, 2016 18 Nov'16

    Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close