Browse Definitions:
  • July 29, 2016 29 Jul'16

    LinkedIn

    LinkedIn is a social networking site for the business community. The LinkedIn service allows registered members to establish and document networks of people they know and trust professionally.  Continue Reading

  • July 29, 2016 29 Jul'16

    LinkedIn Economic Graph

    The LinkedIn Economic Graph is a digital map of the global economy that seeks to include every member of the global workforce and their skills, as well as all open jobs, all employers and all educational institutions.  Continue Reading

  • July 29, 2016 29 Jul'16

    glue code (glue code language)

    Glue code is custom-written programming that connects incompatible software components. It's sometimes looked upon as a necessary evil because it can easily become excessively complicated spaghetti code that negatively affects performance.  Continue Reading

  • July 27, 2016 27 Jul'16

    data shadow

    A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and ...  Continue Reading

  • July 27, 2016 27 Jul'16

    chief data officer (CDO)

    A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but separate from, the job of the chief information officer (CIO).  Continue Reading

  • July 27, 2016 27 Jul'16

    Producer Price Index (PPI)

    The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.  Continue Reading

  • July 26, 2016 26 Jul'16

    narrow AI (weak AI)

    Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates – and perhaps surpasses -- human intelligence for a dedicated purpose.  Continue Reading

  • July 26, 2016 26 Jul'16

    body area network (BAN)

    A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body. A BAN typically includes a smartphone in a pocket or bag that serves as a mobile data hub, acquiring user data and ...  Continue Reading

  • July 26, 2016 26 Jul'16

    exception

    An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions. Exception is a short way of saying exceptional event.  Continue Reading

  • July 25, 2016 25 Jul'16

    empiricism

    Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses. In empiricism, concepts are spoken of as a posteriori or “from the latter” meaning from the experiences.  Continue Reading

  • July 25, 2016 25 Jul'16

    green screen (blue screen)

    Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.  Continue Reading

  • July 22, 2016 22 Jul'16

    CGI (computer-generated imagery)

    CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (...  Continue Reading

  • July 21, 2016 21 Jul'16

    Enterprise Integration Patterns (EIP)

    "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration. The book, sometimes referred to as EIP, was written by Gregor Hohpe and Bobby Woolf and ...  Continue Reading

  • July 21, 2016 21 Jul'16

    blacklist

    A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user IDs, domains, email addresses, MAC addresses or ...  Continue Reading

  • July 15, 2016 15 Jul'16

    machine vision (computer vision)

    Machine vision, which is the ability of a computer to see, employs one or more video cameras, analog-to-digital conversion (ADC) and digital signal processing (DSP). The resulting data goes to a computer or robot controller. Machine vision is ...  Continue Reading

  • July 13, 2016 13 Jul'16

    Pokémon GO

    Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems. The game is considered a breakthrough for augmented reality gaming, as it is the first AR game to achieve widespread consumer use....  Continue Reading

  • July 08, 2016 08 Jul'16

    bitwise

    Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common. Most operators work with either single or multiple bytes, which in most systems contain eight bits  Continue Reading

  • July 06, 2016 06 Jul'16

    SS7 attack

    While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer ...  Continue Reading

  • July 06, 2016 06 Jul'16

    mobile spyware

    Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.  Continue Reading

  • July 06, 2016 06 Jul'16

    slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close