Browse Definitions:
  • August 31, 2016 31 Aug'16

    leet speak (leet)

    Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resemble the letters they replace so the resulting word ...  Continue Reading

  • August 26, 2016 26 Aug'16

    fuzzy logic

    Fuzzy logic is an attempt to use more human-like reasoning and better reflect reality through employing"degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.  Continue Reading

  • August 26, 2016 26 Aug'16

    rebranding

    Rebranding is an update of the materials and presentation used to represent a business. A company may rebrand to appear more modern or to distance itself from past issues, among other possibilities.  Continue Reading

  • August 26, 2016 26 Aug'16

    app monetization

    App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.  Continue Reading

  • August 25, 2016 25 Aug'16

    default password

    Default passwords are commonly used for routers, access points, switches and firewalls.Left unchanged, they present a serious security risk.  Continue Reading

  • August 25, 2016 25 Aug'16

    unique default password

    Unique default passwords can provide more security, although that depends on what type of system is used. Passwords generated from the device's MAC address are easily accessed.  Continue Reading

  • August 25, 2016 25 Aug'16

    perishable data

    Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.  Continue Reading

  • August 24, 2016 24 Aug'16

    micro-datacenter

    Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management.  Continue Reading

  • August 23, 2016 23 Aug'16

    haptics

    Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.  Continue Reading

  • August 23, 2016 23 Aug'16

    immersive virtual reality (immersive VR)

    Immersiveness, in a virtual reality environment, is usually considered on a scale or along a continuum, from least immersive to fully immersive. Tyically, user engagement will vary accordingly, to some extent dependent on individual differences.  Continue Reading

  • August 22, 2016 22 Aug'16

    Zadara Storage

    Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS). Services can be deployed in the cloud, on-premises or in hybrid-cloud configurations.  Continue Reading

  • August 22, 2016 22 Aug'16

    workload automation

    Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. A workload, in this context, can be thought of as the total amount of processing that a computer or a ...  Continue Reading

  • August 19, 2016 19 Aug'16

    The Phoenix Project

    The Phoenix Project is a novel about the recovery of a late and over-budget IT project by Gene Kim, George Spafford, and Kevin Behr. The novel was published in 2013 by IT Revolution Press.  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality therapy (VR therapy)

    Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications. VR therapy has become more practical and affordable since the advent of virtual ...  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality gaming (VR gaming)

    At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen. More sophisticated and immersive examples include VR headsets, wrap-around display screens and ...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality app (AR app)

    An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment. AR software is used for training, work and consumer applications in many...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality gaming (AR gaming)

    Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it. AR games are typically played on ...  Continue Reading

  • August 19, 2016 19 Aug'16

    VR room (virtual reality room)

    Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.  Continue Reading

  • August 19, 2016 19 Aug'16

    room-scale VR (room-scale virtual reality)

    Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming. The term room-scale distinguishes that type of setup from the self-contained environment of a...  Continue Reading

  • August 18, 2016 18 Aug'16

    CAVE (Cave Automatic Virtual Environment)

    CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens. The user typically wears a VR headset.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close