Browse Definitions :
  • September 21, 2005 21 Sep'05

    Wien's constant

    Wien's constant is a physical constant that defines the relationship between the thermodynamic temperature of a black body (an object that radiates electromagnetic energy perfectly) and the wavelength at which the intensity of the radiation is the ...  Continue Reading

  • September 21, 2005 21 Sep'05

    Stefan-Boltzmann constant

    The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.  Continue Reading

  • September 21, 2005 21 Sep'05

    Mini-ITX

    Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices.  Continue Reading

  • September 21, 2005 21 Sep'05

    Sun ONE (Sun Open Net Environment)

    Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.  Continue Reading

  • September 21, 2005 21 Sep'05

    MultiMediaCard (MMC)

    A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video camcorders,...  Continue Reading

  • September 21, 2005 21 Sep'05

    internalnet

    An internalnet is a network that transmits information between computing devices located inside (and perhaps on) a living body.  Continue Reading

  • September 21, 2005 21 Sep'05

    Web-Braille

    Web-Braille is a delivery system that allows content to be read on a Braille display or transmitted to a Braille embosser.  Continue Reading

  • September 21, 2005 21 Sep'05

    self-sending spam

    Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.  Continue Reading

  • September 21, 2005 21 Sep'05

    continuation symbol

    The continuation symbol is used to indicate extension of a sequence or set, or to imply the existence of intermediate elements in a sequence or set.  Continue Reading

  • September 21, 2005 21 Sep'05

    tap

    On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.  Continue Reading

  • September 21, 2005 21 Sep'05

    first-order logic

    First-order logic is symbolized reasoning in which each sentence, or statement, is broken down into a subject and a predicate.  Continue Reading

  • September 21, 2005 21 Sep'05

    Greeking

    Greeking is the use of unreadable dummy text in places reserved for text when prototyping the design or general layout of pages in magazines, books, brochures, advertisements, Web pages, and other visual media.  Continue Reading

  • September 21, 2005 21 Sep'05

    Bohr radius

    The Bohr radius, symbolized as 0, is the mean radius of the orbit of an electron around the nucleus of a hydrogen atom at its ground state (lowest-energy level).  Continue Reading

  • September 21, 2005 21 Sep'05

    file format

    In a computer, a file format is the layout of a file in terms of how the data within the file is organized.  Continue Reading

  • September 21, 2005 21 Sep'05

    Googling

    Googling is using the popular search engine Google.  Continue Reading

  • September 21, 2005 21 Sep'05

    breadcrumb trail

    On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.  Continue Reading

  • September 21, 2005 21 Sep'05

    heatsink

    A heatsink is a device that is attached to a microprocessor chip to keep it from overheating by absorbing its heat and dissipating it into the air.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close