Electric power is the rate at which electric energy is transferred. Electric power is measured by capacity and is commonly expressed in megawatts (MW). A megawatt (MW) is one million watts.
- The Internet of Things (IoT) is an environment in which objects, animals or people are assigned unique identifiers and given the ability to transfer data over a network without requiring human-to-h... (IoT Agenda)
- A wireless regional area network (WRAN) is techology based on IEEE 802.22 to take advantage of underused white space spectrum and bring high-speed wireless connectivity to rural areas. (WhatIs.com)
- An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions. (WhatIs.com)
- Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.
- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...
Get answers from your peers on your most technical challenges
Flip-flops, also called bistable gates, are digital logic circuits that can be in one of two states.
When different systems or procedures come together into one device or form factor, it's known as technology convergence.
VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world.
Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB drives, smartphones and solid-state drives.
A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.
Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
A hypervisor is a function which abstracts -- isolates -- operating systems and applications from the underlying computer hardware.
Containerization is a virtualization method that uses a single operating system's kernel to run multiple isolated VMs.
Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.
The AWS Certificate Manager allows an IT team to create and renew free SSL and TSL certificates to create secure connections over the internet.
The AWS Mobile Hub provides a console of features for developers to build, test, configure and manage mobile applications.
Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.
A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or logical operations can be applied to it without causing an error.
A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network. There are two types of URIs, Uniform Resource Identifiers (URLs) and Uniform Resource Names (URNs).
In information technology, the user interface (UI) is everything designed into an information device with which a person may interact.
An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.
IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.
Systems management is the administration of the information technology systems in an enterprise data center. An effective systems management plan facilitates the delivery of IT as a service (ITaaS) and allows the organization's employees to respond to changing business requirements in an agile manner.
Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent rows of memory reverse their binary state: ones turn into zeros and vice versa.
FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet.
Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to code for the Salesforce platform.
Salesforce Commerce Cloud, formerly called Demandware, is a cloud-based service for unifying the way businesses engage with customers over any channel or device.
Salesforce Einstein is an artificial intelligence technology that has been developed for the Sales, Service and Marketing Clouds. Einstein aims to bring intelligence to these systems through machine learning.