Browse Definitions:
  • February 26, 2016 26 Feb'16

    carbon-negative data center

    A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.  Continue Reading

  • February 25, 2016 25 Feb'16

    direct air capture (DAC)

    Direct air capture has historically been used in closed, manned environments where oxygen is not available from the outside world, such as submarines and space craft, to remove CO2 from the air before concentrations become too high for humans. ...  Continue Reading

  • February 25, 2016 25 Feb'16

    clock gating

    Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power ...  Continue Reading

  • February 25, 2016 25 Feb'16

    gold plating

    Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope. The practice is very similar to feature creep, which involves enhancements tacked onto a project at the request of the client. In the ...  Continue Reading

  • February 25, 2016 25 Feb'16

    risk-reward ratio

    Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss. The risk-reward ratio is typically expressed as a figure for the assessed risk separated by a colon from the figure for the prospective...  Continue Reading

  • February 23, 2016 23 Feb'16

    deception technology

    Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ...  Continue Reading

  • February 23, 2016 23 Feb'16

    Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.  Continue Reading

  • February 22, 2016 22 Feb'16

    augmented reality (AR)

    Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.  Continue Reading

  • February 22, 2016 22 Feb'16

    design-centric culture

    A design-thinking culture is responsive to customer's needs. The culture is more people-centric than data-centric and uses design thinking to maintain competitive advantage and create new revenue streams.  Continue Reading

  • February 21, 2016 21 Feb'16

    continuum

    A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.  Continue Reading

  • February 20, 2016 20 Feb'16

    law of unintended consequences

    The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose. The superfluous consequences may or may not be foreseeable or even observable and they may be beneficial...  Continue Reading

  • February 19, 2016 19 Feb'16

    machine learning

    Machine learning is a type of artificial intelligence (AI) that provides computers with the ability to learn without being explicitly programmed. Machine learning focuses on the development of computer programs that can adjust when exposed to new ...  Continue Reading

  • February 19, 2016 19 Feb'16

    3-D (three dimensions or three-dimensional)

    In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.  Continue Reading

  • February 19, 2016 19 Feb'16

    collaboration

    Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability to communicate, view and contribute to documents or other content over a ...  Continue Reading

  • February 19, 2016 19 Feb'16

    design thinking

    Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem. The ...  Continue Reading

  • February 18, 2016 18 Feb'16

    mobile collaboration

    Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.  Continue Reading

  • February 17, 2016 17 Feb'16

    precision agriculture

    Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.  Continue Reading

  • February 15, 2016 15 Feb'16

    scale-out storage

    Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays. If and when a given array reaches its storage limit,...  Continue Reading

  • February 12, 2016 12 Feb'16

    gravity wave (or gravitational wave)

    A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.  Continue Reading

  • February 12, 2016 12 Feb'16

    Disaster recovery

     Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close