Browse Definitions:
  • April 29, 2016 29 Apr'16

    invoice

    An invoice is a document listing billed goods and/or services that a provider presents to a customer. Invoices provide customers with the amount of the total billing and itemize the details that make up the final charge.  Continue Reading

  • April 29, 2016 29 Apr'16

    bill of lading (BoL, B/L)

    A bill of lading (also seen as B/L and BoL) is a document given to a shipper by the carrier that details the shipment and serves as a means of transferring the title of goods.  Continue Reading

  • April 29, 2016 29 Apr'16

    solar panel

    A solar panel is a flat construction resembling a window, built with technology that allows it to passively harvest the heat of the sun or create electricity from its energy through photovoltaics.  Continue Reading

  • April 28, 2016 28 Apr'16

    3D modeling

    3-D modeling is the use of software to create a virtual three-dimensional model of some physical object. 3-D modeling is used in many different industries, including virtual reality, video games, marketing, TV and motion pictures, scientific and ...  Continue Reading

  • April 28, 2016 28 Apr'16

    venture capital (VC)

    Venture capital (VC) is funding invested, or available for investment, in an enterprise that offers the probability of profit along with the possibility of loss.  Continue Reading

  • April 28, 2016 28 Apr'16

    invitation to tender (ITT)

    An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.  Continue Reading

  • April 28, 2016 28 Apr'16

    IT procurement software

    IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.  Continue Reading

  • April 27, 2016 27 Apr'16

    equity crowdfunding

    Equity crowdfunding is a variation on the crowdsource model that offers contributors the ability to purchase stock in a business. The model is typically used to launch a startup or to provide funds for a new business venture.  Continue Reading

  • April 26, 2016 26 Apr'16

    purchase order

    A purchase order is a buyer's request to a seller to order goods. A purchase order is not an active order upon creation but upon acceptance from the seller.  Continue Reading

  • April 26, 2016 26 Apr'16

    lead time (in purchasing/procurement)

    In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival. Procurement lead time includes identifying of a need, selection of a good or service, sourcing vendors, as well as ...  Continue Reading

  • April 26, 2016 26 Apr'16

    warranty

    Warranties provide customers with legally-ensured service replacement or correction of issues insofar as the warranty stipulates in its conditions, for the duration of its term.  Continue Reading

  • April 26, 2016 26 Apr'16

    liquidity event

    Liquidity events are considered exit strategies in which owners and investors terminate some endeavor to cash in shares and other illiquid investments. Common examples of liquidity events include IPOs (initial public offerings) and acquisition of a ...  Continue Reading

  • April 26, 2016 26 Apr'16

    vulture capital

    Vulture capital is funds invested to profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success. The term is derogatory wordplay referencing venture capitalism (VC), which is not by definition ...  Continue Reading

  • April 25, 2016 25 Apr'16

    GPU supercomputer

    A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.  Continue Reading

  • April 25, 2016 25 Apr'16

    data-driven decision management (DDDM)

    Data-driven decision management (DDDM) is an approach to business governance that values actions that can be backed up with verifiable data. The success of a data-driven approach is reliant upon the quality of the data gathered and the effectiveness...  Continue Reading

  • April 25, 2016 25 Apr'16

    baklava code

    Baklava code is programming that is unnecessarily complicated by the inclusion of too many layers. The term is a reference to the flaky and extravagantly layered Middle-Eastern pastry.  Continue Reading

  • April 22, 2016 22 Apr'16

    fixed price contract

    A fixed-price contract, also known as a lump sum contract, is an agreement between a vendor or seller and a client that stipulates goods and/or services that will be provided and the price that will be paid for them.  Continue Reading

  • April 22, 2016 22 Apr'16

    private equity

    Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).  Continue Reading

  • April 22, 2016 22 Apr'16

    risk capital

    Risk capital is funds invested speculatively in a business, typically a startup. Risk capital comes from private equity: Funds belonging to high net-worth individuals and institutions that are amassed for the purpose of making investments and ...  Continue Reading

  • April 21, 2016 21 Apr'16

    fixed price

    A fixed price is a non-negotiable sum charged for a product, service or piece of work. The most common reason for a fixed price for a product is control or mandate by some external entity.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close