Browse Definitions:
  • June 30, 2016 30 Jun'16

    Raspberry Pi ($35 computer)

    Raspberry Pi is a small, single-board computer that costs $35. It is is essentially a wireless system-on-a-chip (SoC) with 1 GB RAM, connection ports, a Micro SD card slot, camera and display interfaces and an audio/video jack.  Continue Reading

  • June 30, 2016 30 Jun'16

    smarketing (sales and marketing alignment)

    Smarketing is an alignment of a company's sales and marketing departments for better communication, more collaborative efforts, greater efficiency and, as a result, enhanced profitability.  Continue Reading

  • June 27, 2016 27 Jun'16

    contract theory

    Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry.  Continue Reading

  • June 27, 2016 27 Jun'16

    graph database

    A graph database, also called a graph-oriented database, is a type of NoSQL database that uses graph theory to store, map and query relationships.  Continue Reading

  • June 24, 2016 24 Jun'16

    Cray Inc.

    Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.  Continue Reading

  • June 24, 2016 24 Jun'16

    influencer marketing

    Influence marketing can be broken down into a few stages. The first step is identifying influencers. To be effective, an influencer should have relevance for your brand or product.  Continue Reading

  • June 24, 2016 24 Jun'16

    influencer (social influencer)

    An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have. Influencers include subject experts, celebrities and other individuals with large followings.  Continue Reading

  • June 23, 2016 23 Jun'16

    data cap (broadband cap)

    A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month. Because data caps are uniformly unpopular with customers, carriers often refer to them as fair usage or fair ...  Continue Reading

  • June 23, 2016 23 Jun'16

    mobile data

    Mobile data is Internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection rather than Wi-Fi or a wired connection.  Continue Reading

  • June 23, 2016 23 Jun'16

    data plan (mobile data plan)

    Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.  Continue Reading

  • June 23, 2016 23 Jun'16

    WRAN (wireless regional area network)

    A wireless regional area network (WRAN) is techology based on IEEE 802.22 to take advantage of underused white space spectrum and bring high-speed wireless connectivity to rural areas.  Continue Reading

  • June 22, 2016 22 Jun'16

    manipulative design

    Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.  Continue Reading

  • June 20, 2016 20 Jun'16

    supercomputer

    The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray. Released in 1964, the CDC 6600 had a single CPU and cost $8 million — the equivalent of $60 million today. Cray went on to found a...  Continue Reading

  • June 20, 2016 20 Jun'16

    proactive / reactive chat

    Proactive chat is initiated by a website according to business rules that are triggered by user behavior; reactive chat is user-initiated.  Continue Reading

  • June 17, 2016 17 Jun'16

    buzzword

    A buzzword is a term or phrase that becomes very popular in some specific context, usually for a limited period of time before becoming outdated. Buzzwords are typically either newly coined words -- often acronyms or portmanteaus -- or existing ...  Continue Reading

  • June 17, 2016 17 Jun'16

    buzzword bingo

    Buzzword bingo is a game played during meetings with cards featuring buzzwords such as "incentivize," "outside the box," "push the envelope," and "wave a dead chicken") in place of the numbers of traditional bingo cards.  Continue Reading

  • June 17, 2016 17 Jun'16

    tethering

    Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.  Continue Reading

  • June 16, 2016 16 Jun'16

    IBM Watson supercomputer

    Watson is an IBM supercomputer that combines artificial intelligence (AI) and sophisticated analytical software for optimal performance as a question answering machine. Watson's AI platform is being adopted for big data analytics, expert systems and...  Continue Reading

  • June 16, 2016 16 Jun'16

    White Space Wi-Fi (White-Fi)

    White space Wi-Fi, also known as White-Fi, specified in IEEE 802.11af: The use of frequencies made available by the absence of analog-to-air TV signals to create Wi-Fi networks with greater range, speed and penetration of obstacles.  Continue Reading

  • June 15, 2016 15 Jun'16

    backdoor selling

    Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close