Browse Definitions:
  • February 26, 2016 26 Feb'16

    carbon-negative data center

    A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.  Continue Reading

  • February 25, 2016 25 Feb'16

    direct air capture (DAC)

    Direct air capture has historically been used in closed, manned environments where oxygen is not available from the outside world, such as submarines and space craft, to remove CO2 from the air before concentrations become too high for humans. ...  Continue Reading

  • February 25, 2016 25 Feb'16

    clock gating

    Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power ...  Continue Reading

  • February 25, 2016 25 Feb'16

    gold plating

    Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope. The practice is very similar to feature creep, which involves enhancements tacked onto a project at the request of the client. In the ...  Continue Reading

  • February 25, 2016 25 Feb'16

    risk-reward ratio

    Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss. The risk-reward ratio is typically expressed as a figure for the assessed risk separated by a colon from the figure for the prospective...  Continue Reading

  • February 23, 2016 23 Feb'16

    deception technology

    Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ...  Continue Reading

  • February 23, 2016 23 Feb'16

    Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.  Continue Reading

  • February 22, 2016 22 Feb'16

    augmented reality (AR)

    Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.  Continue Reading

  • February 22, 2016 22 Feb'16

    design-centric culture

    A design-thinking culture is responsive to customer's needs. The culture is more people-centric than data-centric and uses design thinking to maintain competitive advantage and create new revenue streams.  Continue Reading

  • February 21, 2016 21 Feb'16

    continuum

    A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.  Continue Reading

  • February 20, 2016 20 Feb'16

    law of unintended consequences

    The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose. The superfluous consequences may or may not be foreseeable or even observable and they may be beneficial...  Continue Reading

  • February 19, 2016 19 Feb'16

    3-D (three dimensions or three-dimensional)

    In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.  Continue Reading

  • February 19, 2016 19 Feb'16

    collaboration

    Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability to communicate, view and contribute to documents or other content over a ...  Continue Reading

  • February 19, 2016 19 Feb'16

    design thinking

    Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem. The ...  Continue Reading

  • February 18, 2016 18 Feb'16

    mobile collaboration

    Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.  Continue Reading

  • February 17, 2016 17 Feb'16

    precision agriculture

    Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.  Continue Reading

  • February 15, 2016 15 Feb'16

    scale-out storage

    Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays. If and when a given array reaches its storage limit,...  Continue Reading

  • February 12, 2016 12 Feb'16

    gravity wave (or gravitational wave)

    A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.  Continue Reading

  • February 12, 2016 12 Feb'16

    Disaster recovery

     Continue Reading

  • February 11, 2016 11 Feb'16

    Singularity (the)

    The Singularity is the hypothetical future creation of superintelligent machines. Superintelligence is defined as a technologically-created cognitive capacity far beyond that possible for humans.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close