Browse Definitions:
  • July 29, 2016 29 Jul'16

    LinkedIn

    LinkedIn is a social networking site for the business community. The LinkedIn service allows registered members to establish and document networks of people they know and trust professionally.  Continue Reading

  • July 29, 2016 29 Jul'16

    LinkedIn Economic Graph

    The LinkedIn Economic Graph is a digital map of the global economy that seeks to include every member of the global workforce and their skills, as well as all open jobs, all employers and all educational institutions.  Continue Reading

  • July 29, 2016 29 Jul'16

    glue code (glue code language)

    Glue code is custom-written programming that connects incompatible software components. It's sometimes looked upon as a necessary evil because it can easily become excessively complicated spaghetti code that negatively affects performance.  Continue Reading

  • July 27, 2016 27 Jul'16

    data shadow

    A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and ...  Continue Reading

  • July 27, 2016 27 Jul'16

    chief data officer (CDO)

    A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but separate from, the job of the chief information officer (CIO).  Continue Reading

  • July 27, 2016 27 Jul'16

    Producer Price Index (PPI)

    The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.  Continue Reading

  • July 26, 2016 26 Jul'16

    narrow AI (weak AI)

    Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates – and perhaps surpasses -- human intelligence for a dedicated purpose.  Continue Reading

  • July 26, 2016 26 Jul'16

    body area network (BAN)

    A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body. A BAN typically includes a smartphone in a pocket or bag that serves as a mobile data hub, acquiring user data and ...  Continue Reading

  • July 26, 2016 26 Jul'16

    exception

    An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions. Exception is a short way of saying exceptional event.  Continue Reading

  • July 25, 2016 25 Jul'16

    empiricism

    Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses. In empiricism, concepts are spoken of as a posteriori or “from the latter” meaning from the experiences.  Continue Reading

  • July 25, 2016 25 Jul'16

    green screen (blue screen)

    Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.  Continue Reading

  • July 22, 2016 22 Jul'16

    CGI (computer-generated imagery)

    CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (...  Continue Reading

  • July 21, 2016 21 Jul'16

    Enterprise Integration Patterns (EIP)

    "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration. The book, sometimes referred to as EIP, was written by Gregor Hohpe and Bobby Woolf and ...  Continue Reading

  • July 21, 2016 21 Jul'16

    blacklist

    A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user IDs, domains, email addresses, MAC addresses or ...  Continue Reading

  • July 15, 2016 15 Jul'16

    machine vision (computer vision)

    Machine vision, which is the ability of a computer to see, employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP). The resulting data goes to a computer or robot controller. Machine vision is ...  Continue Reading

  • July 13, 2016 13 Jul'16

    Pokémon GO

    Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems. The game is considered a breakthrough for augmented reality gaming, as it is the first AR game to achieve widespread consumer use....  Continue Reading

  • July 08, 2016 08 Jul'16

    bitwise

    Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common. Most operators work with either single or multiple bytes, which in most systems contain eight bits  Continue Reading

  • July 06, 2016 06 Jul'16

    SS7 attack

    While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer ...  Continue Reading

  • July 06, 2016 06 Jul'16

    mobile spyware

    Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.  Continue Reading

  • July 06, 2016 06 Jul'16

    slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close