Browse Definitions:
  • April 30, 2017 30 Apr'17

    cross-media ownership

    Media cross-ownership is a situation in which a single corporate entity owns multiple types of media companies. The types of media companies owned may include print, radio, television, movie and internet media sites.  Continue Reading

  • April 28, 2017 28 Apr'17

    frictionless commerce

    Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.  Continue Reading

  • April 28, 2017 28 Apr'17

    flipping the classroom

    Flipping the classroom is a teaching method that uses active learning techniques to engage students rather than traditional lectures alone.  Continue Reading

  • April 28, 2017 28 Apr'17

    single source of truth (SSOT)

    Single source of truth (SSOT) is a concept that an organization can apply as part of its information architecture to ensure that everyone in the organization uses the same data when making business decisions. The aim of adopting a SSOT is to provide...  Continue Reading

  • April 26, 2017 26 Apr'17

    corporate wellness coach (health coach)

    A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.  Continue Reading

  • April 26, 2017 26 Apr'17

    call to action

    A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.  Continue Reading

  • April 26, 2017 26 Apr'17

    geo-marketing

    Geo-marketing is a tool that uses geographic, or location-based, information to help companies put together marketing strategies and campaigns.  Continue Reading

  • April 26, 2017 26 Apr'17

    offline first

    Offline first is an approach to software development in which developers build an application’s core features to function with or without an internet connection.  Continue Reading

  • April 26, 2017 26 Apr'17

    DevOps

     Continue Reading

  • April 22, 2017 22 Apr'17

    end-to-end principle

    The end-to-end principle is a network design method in which application-specific features are kept at communication end points.  Continue Reading

  • April 21, 2017 21 Apr'17

    Google Free Zone

    Google Free Zone was an initiative created by Google that would allow Google members in certain parts of the world to access Gmail and other Google services for free.  Continue Reading

  • April 21, 2017 21 Apr'17

    net bias

    Net bias is discrimination of price, content quality, connection reliability and speed that Internet service providers (ISP) can enact on users based on arbitrary conditions.  Continue Reading

  • April 21, 2017 21 Apr'17

    vertical search engine

    A vertical search engine is a search engine that is dedicated to a particular area of focus.  Continue Reading

  • April 21, 2017 21 Apr'17

    Verizon Communications v. Federal Communications Commission (2014)

    Verizon Communications v. Federal Communications Commission was a 2014 case in which the court ruled that the FCC lacked the authority to regulate broadband providers as common carriers. The case was heard by the United States Court of Appeals for ...  Continue Reading

  • April 20, 2017 20 Apr'17

    IoT gateway

    An internet of things (IoT) gateway is a device which serves as the connection point between IoT devices and the cloud.  Continue Reading

  • April 20, 2017 20 Apr'17

    rolling code

    Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system.  Continue Reading

  • April 19, 2017 19 Apr'17

    owned

    Owned, in common slang, means decisively defeated, with the implication of domination and possession. The term is often used to describe the results of competition in sports and business.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close