Browse Definitions:
  • January 31, 2018 31 Jan'18

    Advanced Message Queuing Protocol (AMQP)

    Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.  Continue Reading

  • January 30, 2018 30 Jan'18

    filter bubble

    A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet. The bias is caused by the weighted algorithms that search engines, social media sites and marketers use to personalize user ...  Continue Reading

  • January 30, 2018 30 Jan'18


    HubSpot is a company that sells software designed for inbound marketing, including content management, search engine optimization and other tools.  Continue Reading

  • January 29, 2018 29 Jan'18

    bag of words model (BoW model)

    The bag of words model (BoW model) is a reduced and simplified representation of a text document with selected parts of the text.  Continue Reading

  • January 28, 2018 28 Jan'18

    behavioral economics

    Behavioral economics is the study of economic decision-making by individuals and institutions.  Continue Reading

  • January 28, 2018 28 Jan'18

    part-of-speech tagger (PoS tagger)

    A part of speech (PoS) tagger is a software tool that labels words as one of several categories to identify the word's function in a given language.  Continue Reading

  • January 26, 2018 26 Jan'18


    Stemming is the process of reducing a word to its word stem that affixes to suffixes and prefixes or to the roots of words known as a lemma. Stemming is important in natural language understanding (NLU) and natural language processing (NLP).  Continue Reading

  • January 24, 2018 24 Jan'18

    sock puppet marketing

    Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service. The false identity is known as a sock puppet.  Continue Reading

  • January 22, 2018 22 Jan'18

    website security question

    An internet security question is a backup measure used to authenticate the user of a website or an application in the event that they have forgotten their user name and/or password.  Continue Reading

  • January 18, 2018 18 Jan'18

    browser extension malware

    Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been compromised by an attacker to do so.  Continue Reading

  • January 17, 2018 17 Jan'18

    Zipf's Law

    Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.  Continue Reading

  • January 16, 2018 16 Jan'18

    corporate culture model

    A corporate culture model is the organizing principle behind the values, beliefs and attitudes that characterize a company and guide its practices.clans and market-based models.  Continue Reading

  • January 16, 2018 16 Jan'18


    Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.