Browse Definitions :

Word of the Day

Section 508

Section 508, an amendment to the United States Workforce Rehabilitation Act of 1973, is a federal law mandating that all electronic and information technology developed, procured, maintained, or used by the federal government be accessible to people with disabilities.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

accessibility testing

Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.

Read More

Essential Knowledge

What happens when acceptance criteria in software testing is missing?

You can't test something if you don't know what it's supposed to do. Often, testers have a very incomplete understanding of what they're testing. ...

Why you need to start thinking about accessibility testing today

With 19% of Americans reporting some kind of disability, accessibility testing is increasingly important. Expert Gerie Owen explains how to get ...

Design for yourself, really: Wise words from UX experts

Not only do you have to design quickly, you have to design well. Enter UX experts who can help you design the perfect app for any user. It starts by ...

Drunk user testing changed HubSpot's approach to UX research

Giving a drunken UI designer a user test changed HubSpot's UX research and UI design practices. The results were stunning, said UX designer Austin ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

Close