Browse Definitions:
  • July 29, 2016 29 Jul'16


    LinkedIn is a social networking site for the business community. The LinkedIn service allows registered members to establish and document networks of people they know and trust professionally.  Continue Reading

  • July 29, 2016 29 Jul'16

    LinkedIn Economic Graph

    The LinkedIn Economic Graph is a digital map of the global economy that seeks to include every member of the global workforce and their skills, as well as all open jobs, all employers and all educational institutions.  Continue Reading

  • July 29, 2016 29 Jul'16

    glue code (glue code language)

    Glue code is custom-written programming that connects incompatible software components. It's sometimes looked upon as a necessary evil because it can easily become excessively complicated spaghetti code that negatively affects performance.  Continue Reading

  • July 27, 2016 27 Jul'16

    data shadow

    A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and ...  Continue Reading

  • July 27, 2016 27 Jul'16

    chief data officer (CDO)

    A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but separate from, the job of the chief information officer (CIO).  Continue Reading

  • July 27, 2016 27 Jul'16

    Producer Price Index (PPI)

    The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.  Continue Reading

  • July 26, 2016 26 Jul'16

    narrow AI (weak AI)

    Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates – and perhaps surpasses -- human intelligence for a dedicated purpose.  Continue Reading

  • July 26, 2016 26 Jul'16

    body area network (BAN)

    A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body. A BAN typically includes a smartphone in a pocket or bag that serves as a mobile data hub, acquiring user data and ...  Continue Reading

  • July 26, 2016 26 Jul'16


    An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions. Exception is a short way of saying exceptional event.  Continue Reading

  • July 25, 2016 25 Jul'16


    Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses. In empiricism, concepts are spoken of as a posteriori or “from the latter” meaning from the experiences.  Continue Reading

  • July 25, 2016 25 Jul'16

    green screen (blue screen)

    Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.  Continue Reading

  • July 22, 2016 22 Jul'16

    CGI (computer-generated imagery)

    CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (...  Continue Reading

  • July 21, 2016 21 Jul'16

    Enterprise Integration Patterns (EIP)

    "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration. The book, sometimes referred to as EIP, was written by Gregor Hohpe and Bobby Woolf and ...  Continue Reading

  • July 21, 2016 21 Jul'16


    A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user IDs, domains, email addresses, MAC addresses or ...  Continue Reading

  • July 15, 2016 15 Jul'16

    machine vision (computer vision)

    Machine vision, which is the ability of a computer to see, employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP). The resulting data goes to a computer or robot controller. Machine vision is ...  Continue Reading

  • July 13, 2016 13 Jul'16

    Pokémon GO

    Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems. The game is considered a breakthrough for augmented reality gaming, as it is the first AR game to achieve widespread consumer use....  Continue Reading

  • July 08, 2016 08 Jul'16


    Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common. Most operators work with either single or multiple bytes, which in most systems contain eight bits  Continue Reading

  • July 06, 2016 06 Jul'16

    SS7 attack

    While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer ...  Continue Reading

  • July 06, 2016 06 Jul'16

    mobile spyware

    Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.  Continue Reading

  • July 06, 2016 06 Jul'16

    slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated ...  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.