Browse Definitions :

Word of the Day

Ada Lovelace

Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer. She is known for writing the first algorithm for a machine, inventing the subroutine and recognizing the importance of looping.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

Analytical Engine

The Analytical Engine was, or would have been, the world's first general-purpose computer.

Read More

Essential Knowledge

Low-code tools showdown: PowerApps vs. Appian

Low-code dev products, such as PowerApps and Appian, come with benefits and tradeoffs. See which option comes out on top in this faceoff, and plan ...

The developer's crash course to the application network

Developers, we get it; you don't want to deal with the network. But hear us out, as a basic understanding of subnets, VPNs and IP addresses boost app...

What do you know about continuous software development?

What's the difference between continuous development and deployment? Take the quiz to see if you can distinguish among all the continuous software ...

8base targets blockchain for no-code app development

The popularity of blockchain and demand for blockchain applications has spurred the creation of a no-code application development platform for ...

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close