Browse Definitions:
  • July 31, 2017 31 Jul'17

    data context

    Data context is the network of connections among data points. Those connections may be created as metadata or simply identified and correlated.  Continue Reading

  • July 31, 2017 31 Jul'17

    Schrodinger's cat

    Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory. The virtual experiment was proposed by Nobel Prize-winning Austrian physicist Erwin...  Continue Reading

  • July 31, 2017 31 Jul'17

    data integration

    Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, comprehensive, current and correct information for business reporting and analysis.  Continue Reading

  • July 31, 2017 31 Jul'17

    Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.  Continue Reading

  • July 31, 2017 31 Jul'17

    PredictionIO

    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.  Continue Reading

  • July 30, 2017 30 Jul'17

    perpetual software license

    A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.  Continue Reading

  • July 30, 2017 30 Jul'17

    Markov model

    A Markov model is a stochastic method for randomly changing systems where it is assumed that future states do not depend on past states.  Continue Reading

  • July 29, 2017 29 Jul'17

    software audit

    A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.  Continue Reading

  • July 28, 2017 28 Jul'17

    perpetual inventory system

    A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.  Continue Reading

  • July 24, 2017 24 Jul'17

    product positioning

    Product positioning is the tailored presentation of a product or brand for a specific targeted demographic. The goal of product positioning is to show the product in the best light for target consumers.  Continue Reading

  • July 22, 2017 22 Jul'17

    semiotics

    Semiotics is the study of the use of symbolic communication. Semiotics can include signs, logos, gestures and other linguistic and nonlinguistic communication methods.  Continue Reading

  • July 22, 2017 22 Jul'17

    secondary data

    Secondary data is research data that has previously been gathered and can be accessed by researchers. The term contrasts with primary data, which is data collected directly from its source.  Continue Reading

  • July 22, 2017 22 Jul'17

    red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group ...  Continue Reading

  • July 22, 2017 22 Jul'17

    internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand ...  Continue Reading

  • July 22, 2017 22 Jul'17

    survey research

    Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online. Conducting surveys is one form of primary research: gathering data first-hand from its source.  Continue Reading

  • July 18, 2017 18 Jul'17

    bug bounty program

    A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.  Continue Reading

  • July 18, 2017 18 Jul'17

    weak tie theory

    Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.  Continue Reading

  • July 17, 2017 17 Jul'17

    T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across ...  Continue Reading

  • July 16, 2017 16 Jul'17

    market share

    Market share is the percentage of sales in a market acquired by a particular company.  Continue Reading

  • July 16, 2017 16 Jul'17

    logo

    A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close