Browse Definitions :
  • October 25, 2005 25 Oct'05

    humanware

    Humanware is hardware and software that emphasizes user capability and empowerment and the design of the user interface.  Continue Reading

  • October 20, 2005 20 Oct'05

    Amdahl's law

    In computer programming, Amdahl's law is that, in a program with parallel processing, a relatively few instructions that have to be performed in sequence will have a limiting factor on program speedup such that adding more processors may not make ...  Continue Reading

  • October 20, 2005 20 Oct'05

    Ada

    Ada (pronounced AY-duh) is a programming language somewhat similar to Pascal that was selected in a competition and made a U.S. Defense Department standard.  Continue Reading

  • October 17, 2005 17 Oct'05

    fully qualified domain name (FQDN)

    A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.  Continue Reading

  • October 14, 2005 14 Oct'05

    Navy Knowledge Online

    Navy Knowledge Online (NKO) is the United States Navy intranet.  Continue Reading

  • October 14, 2005 14 Oct'05

    docking station

    A docking station is a hardware frame and set of electrical connection interfaces that enable a notebook computer to effectively serve as a desktop computer.  Continue Reading

  • October 10, 2005 10 Oct'05

    female connector

    A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors (male connector) can be inserted...  Continue Reading

  • October 05, 2005 05 Oct'05

    zsh

    Zsh is a shell (command interpreter) of the Bourne shell family, which also includes bash and the Korn shell (which zsh is said to resemble).  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close