Browse Definitions:
  • July 31, 2017 31 Jul'17

    data context

    Data context is the network of connections among data points. Those connections may be created as metadata or simply identified and correlated.  Continue Reading

  • July 31, 2017 31 Jul'17

    Schrodinger's cat

    Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory. The virtual experiment was proposed by Nobel Prize-winning Austrian physicist Erwin...  Continue Reading

  • July 31, 2017 31 Jul'17

    data integration

    Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, comprehensive, current and correct information for business reporting and analysis.  Continue Reading

  • July 31, 2017 31 Jul'17

    Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.  Continue Reading

  • July 31, 2017 31 Jul'17


    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.  Continue Reading

  • July 30, 2017 30 Jul'17

    perpetual software license

    A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.  Continue Reading

  • July 30, 2017 30 Jul'17

    Markov model

    A Markov model is a stochastic method for randomly changing systems where it is assumed that future states do not depend on past states.  Continue Reading

  • July 29, 2017 29 Jul'17

    software audit

    A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.  Continue Reading

  • July 28, 2017 28 Jul'17

    perpetual inventory system

    A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.  Continue Reading

  • July 24, 2017 24 Jul'17

    product positioning

    Product positioning is the tailored presentation of a product or brand for a specific targeted demographic. The goal of product positioning is to show the product in the best light for target consumers.  Continue Reading

  • July 22, 2017 22 Jul'17


    Semiotics is the study of the use of symbolic communication. Semiotics can include signs, logos, gestures and other linguistic and nonlinguistic communication methods.  Continue Reading

  • July 22, 2017 22 Jul'17

    secondary data

    Secondary data is research data that has previously been gathered and can be accessed by researchers. The term contrasts with primary data, which is data collected directly from its source.  Continue Reading

  • July 22, 2017 22 Jul'17

    red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group ...  Continue Reading

  • July 22, 2017 22 Jul'17

    internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand ...  Continue Reading

  • July 22, 2017 22 Jul'17

    survey research

    Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online. Conducting surveys is one form of primary research: gathering data first-hand from its source.  Continue Reading

  • July 18, 2017 18 Jul'17

    bug bounty program

    A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.  Continue Reading

  • July 18, 2017 18 Jul'17

    weak tie theory

    Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.  Continue Reading

  • July 17, 2017 17 Jul'17

    T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across ...  Continue Reading

  • July 16, 2017 16 Jul'17

    market share

    Market share is the percentage of sales in a market acquired by a particular company.  Continue Reading

  • July 16, 2017 16 Jul'17


    A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.