Browse Definitions:
  • November 30, 2017 30 Nov'17

    off-page SEO (off-site SEO)

    Off-page SEO, also known as off-site SEO, is the efforts taken to boost a website's position in search engine results beyond the usual optimization strategies applied to the site itself.  Continue Reading

  • November 30, 2017 30 Nov'17

    business case

    A business case is a written or verbal value proposition that is intended to educate a decision maker and convince them to take some kind of action. When written, the document itself is sometimes referred to as a business case.  Continue Reading

  • November 30, 2017 30 Nov'17

    Yoda conditions (Yoda notation)

    Yoda conditions, also known as Yoda notation, is a programming variation that reverses the standard order of a conditional statement.  Continue Reading

  • November 30, 2017 30 Nov'17

    red team-blue team

    Red team-blue team is a simulation and training exercise where members of an organization are divided into teams to compete in combative exercises. In information security (infosec), the exercise is designed to identify vulnerabilities and find ...  Continue Reading

  • November 30, 2017 30 Nov'17


    Undercapitalization is a situation when an organization lacks the availability of funds needed to conduct regular business.  Continue Reading

  • November 30, 2017 30 Nov'17

    operational excellence

    Operational excellence is a methodology of striving for efficacy throughout an organization’s processes. Operational excellence is part of organizational leadership and organizational intelligence.  Continue Reading

  • November 29, 2017 29 Nov'17

    synchronous/asynchronous API

    Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.  Continue Reading

  • November 29, 2017 29 Nov'17

    support vector machine (SVM)

    A support vector machine (SVM) is a type of deep learning algorithm that performs supervised learning for classification or regression of data groups.  Continue Reading

  • November 29, 2017 29 Nov'17

    microphone hacking

    Microphone hacking is the unauthorized interception of audio data captured through the microphone on a computer, smartphone or other device.  Continue Reading

  • November 29, 2017 29 Nov'17

    Domain-based Message Authentication, Reporting and Conformance (DMARC)

    Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.  Continue Reading

  • November 28, 2017 28 Nov'17

    programmable automation controller (PAC)

    Programmable automation controller (PAC) is a term that is loosely used to describe any type of automation controller that incorporates higher-level instructions.  Continue Reading

  • November 28, 2017 28 Nov'17

    Wide Area Augmentation System (WAAS)

    Wide Area Augmentation System (WAAS) is a navigation assistance system used to improve the accuracy and precision of global positioning system (GPS).  Continue Reading

  • November 28, 2017 28 Nov'17


    pharmacovigilance  Continue Reading

  • November 28, 2017 28 Nov'17

    virtual reality-based training (VRBT)

    Virtual reality-based training (VRBT) is an interactive and immersive teaching method that employs technology to provide virtual scenarios to simulate situations that might occur in actual settings. VRBT simulates on-the-job style training in a safe...  Continue Reading

  • November 28, 2017 28 Nov'17


    An agribusiness is a line of business (LOB) that focuses on the processing, warehousing, distribution, marketing and retailing of products used in farming.  Continue Reading

  • November 28, 2017 28 Nov'17

    Universal Powerline Bus (UPB)

    Universal Powerline Bus (UPB) is a communication methodology for home automation device control, allowing devices to communicate with pulse-position modulation through power lines.  Continue Reading

  • November 27, 2017 27 Nov'17

    consumer surveillance

    Consumer surveillance is the monitoring and recording of people’s activities and data, either online or in the physical environment, for commercial purposes.  Continue Reading

  • November 27, 2017 27 Nov'17

    impostor syndrome

    Impostor syndrome is a psychological phenomenon that causes sufferers to attribute their successes and accomplishments to external factors rather than to personal merit, hard work or ability.  Continue Reading

  • November 27, 2017 27 Nov'17

    Google Clips

    Google Clips is an AI-driven camera that learns to recognize familiar faces over time and automatically and autonomously take pictures of those people when in they're in the camera's field of view.  Continue Reading

  • November 27, 2017 27 Nov'17

    electrical power management system (EPMS)

    An electrical power management system (EPMS) is an electronic system that provides fine grained information about the flow of power in an electrical power generation system or power substation.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.