Browse Definitions:
  • February 29, 2016 29 Feb'16

    B2B2C (business-to-business-to-consumer)

    B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling ...  Continue Reading

  • February 26, 2016 26 Feb'16

    carbon-negative data center

    A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.  Continue Reading

  • February 25, 2016 25 Feb'16

    direct air capture (DAC)

    Direct air capture has historically been used in closed, manned environments where oxygen is not available from the outside world, such as submarines and space craft, to remove CO2 from the air before concentrations become too high for humans. ...  Continue Reading

  • February 25, 2016 25 Feb'16

    clock gating

    Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power ...  Continue Reading

  • February 25, 2016 25 Feb'16

    gold plating

    Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope. The practice is very similar to feature creep, which involves enhancements tacked onto a project at the request of the client. In the ...  Continue Reading

  • February 25, 2016 25 Feb'16

    risk-reward ratio

    Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss. The risk-reward ratio is typically expressed as a figure for the assessed risk separated by a colon from the figure for the prospective...  Continue Reading

  • February 23, 2016 23 Feb'16

    deception technology

    Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ...  Continue Reading

  • February 23, 2016 23 Feb'16

    Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.  Continue Reading

  • February 22, 2016 22 Feb'16

    augmented reality (AR)

    Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.  Continue Reading

  • February 22, 2016 22 Feb'16

    design-centric culture

    A design-thinking culture is responsive to customer's needs. The culture is more people-centric than data-centric and uses design thinking to maintain competitive advantage and create new revenue streams.  Continue Reading

  • February 21, 2016 21 Feb'16

    continuum

    A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.  Continue Reading

  • February 20, 2016 20 Feb'16

    law of unintended consequences

    The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose. The superfluous consequences may or may not be foreseeable or even observable and they may be beneficial...  Continue Reading

  • February 19, 2016 19 Feb'16

    3-D (three dimensions or three-dimensional)

    In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.  Continue Reading

  • February 19, 2016 19 Feb'16

    collaboration

    Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability to communicate, view and contribute to documents or other content over a ...  Continue Reading

  • February 19, 2016 19 Feb'16

    design thinking

    Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem. The ...  Continue Reading

  • February 18, 2016 18 Feb'16

    mobile collaboration

    Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.  Continue Reading

  • February 17, 2016 17 Feb'16

    precision agriculture

    Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.  Continue Reading

  • February 15, 2016 15 Feb'16

    scale-out storage

    Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays. If and when a given array reaches its storage limit,...  Continue Reading

  • February 12, 2016 12 Feb'16

    gravity wave (or gravitational wave)

    A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.  Continue Reading

  • February 12, 2016 12 Feb'16

    Disaster recovery

     Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SAS SSD (Serial-Attached SCSI solid-state drive)

    A SAS SSD (Serial-Attached SCSI solid-state drive) is a NAND flash-based storage or caching device designed to fit in the same ...

  • MTTR (mean time to repair)

    MTTR (mean time to repair) is the average time required to fix a failed component or device and return it to production status.

  • OpenStack Swift

    OpenStack Swift, also known as OpenStack Object Storage, is an open source object storage system that is licensed under the ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close