Browse Definitions:
  • January 31, 2017 31 Jan'17

    alphanumeric (alphameric)

    In computers designed for English language users, alphanumeric (sometimes seen as alphameric) characters are those comprised by the combined set of the 26 alphabetic characters, A to Z, and the 10 Arabic numerals, 0 to 9.  Continue Reading

  • January 31, 2017 31 Jan'17

    millimeter (mm, millimetre)

    A millimeter (abbreviated as mm and sometimes spelled as millimetre) is a small unit of length/distance in the metric system, one-thousandth of a meter (which is similar in length to a yard in the Imperial system of measurement).  Continue Reading

  • January 30, 2017 30 Jan'17

    hacking as a service (HaaS)

    Hacking as a service (HaaS) is the commercialization of hacking skills, in which the hacker serves as a contractor. HaaS makes advanced code-breaking skills available to anyone with a web browser and a credit card.  Continue Reading

  • January 30, 2017 30 Jan'17

    tailgating (piggybacking)

    Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.  Continue Reading

  • January 30, 2017 30 Jan'17

    valve

    A valve is a mechanism that opens and closes to control the flow of fluids. In a scientific context, fluids include both liquids and gases – anything that can flow freely – and valves may use either.  Continue Reading

  • January 28, 2017 28 Jan'17

    social proof

    Social proof is a psychological phenomenon in which the actions and attitudes of the people around us (either in real life or online) are considered support to guide our own behavior.  Continue Reading

  • January 27, 2017 27 Jan'17

    falsifiability

    Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong. That capacity is an essential component of the scientific method and hypothesis testing.  Continue Reading

  • January 27, 2017 27 Jan'17

    metric system

    The metric system is considered almost synonymous with the Standard International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS or mks) system.  Continue Reading

  • January 27, 2017 27 Jan'17

    Bootstrap

    Bootstrap is a free and open source front-end development framework for the creation of websites and web apps.  Continue Reading

  • January 27, 2017 27 Jan'17

    hypothesis

    A hypothesis (plural: hypotheses) is a statement that may be tested and proven to be either true or false. The hypothesis maintains the statement is true. however falsifiability -- the ability to be disproven -- is also essential to testing ...  Continue Reading

  • January 26, 2017 26 Jan'17

    AWS Snowmobile

    AWS Snowmobile is an Amazon Web Services (AWS) cloud storage service designed to transfer huge amounts of data by truck.  Continue Reading

  • January 26, 2017 26 Jan'17

    line of sight (LOS)

    The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.  Continue Reading

  • January 26, 2017 26 Jan'17

    conversion rate

    The conversion rate is the rate at which website visitors or potential customers take a specific desirable action.  Continue Reading

  • January 26, 2017 26 Jan'17

    card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).  Continue Reading

  • January 26, 2017 26 Jan'17

    predictive maintenance (PdM)

    Predictive maintenance (PdM) is the servicing of equipment when it is estimated that service is required, within a certain tolerance. PdM is used in railroads, industrial equipment, manufacturing plants and oil and gas processing.  Continue Reading

  • January 25, 2017 25 Jan'17

    ad fraud botnet

    An ad fraud botnet is a distributed network of computers controlled by a botmaster to defraud advertisers.  Continue Reading

  • January 25, 2017 25 Jan'17

    centimeter (cm)

    The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.  Continue Reading

  • January 25, 2017 25 Jan'17

    Alphanumerish

    Alphanumerish is a term coined to define the shorthand typing language that has developed from computer users' habit of substituting numerals for letters and substituting both letters and numerals for words or word parts.  Continue Reading

  • January 25, 2017 25 Jan'17

    scientific method

    Scientific method is a logical approach to seeking knowledge that involves forming and testing a hypothesis. This methodology is used to answer questions in a wide variety of disciplines outside of science, including business. Scientific method ...  Continue Reading

  • January 25, 2017 25 Jan'17

    ad fraud

    Ad fraud is a type of scam in which the perpetrator fools advertisers into paying for something useless to them, such as fake traffic, fake leads or ineffective and misrepresented ad placement.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close