Browse Definitions :
  • September 21, 2005 21 Sep'05

    Wien's constant

    Wien's constant is a physical constant that defines the relationship between the thermodynamic temperature of a black body (an object that radiates electromagnetic energy perfectly) and the wavelength at which the intensity of the radiation is the ...  Continue Reading

  • September 21, 2005 21 Sep'05

    Stefan-Boltzmann constant

    The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.  Continue Reading

  • September 21, 2005 21 Sep'05


    Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices.  Continue Reading

  • September 21, 2005 21 Sep'05

    Sun ONE (Sun Open Net Environment)

    Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.  Continue Reading

  • September 21, 2005 21 Sep'05

    MultiMediaCard (MMC)

    A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make storage portable among various devices, such as car navigation systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video camcorders,...  Continue Reading

  • September 21, 2005 21 Sep'05


    An internalnet is a network that transmits information between computing devices located inside (and perhaps on) a living body.  Continue Reading

  • September 21, 2005 21 Sep'05


    Web-Braille is a delivery system that allows content to be read on a Braille display or transmitted to a Braille embosser.  Continue Reading

  • September 21, 2005 21 Sep'05

    self-sending spam

    Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.  Continue Reading

  • September 21, 2005 21 Sep'05

    continuation symbol

    The continuation symbol is used to indicate extension of a sequence or set, or to imply the existence of intermediate elements in a sequence or set.  Continue Reading

  • September 21, 2005 21 Sep'05


    On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.  Continue Reading

  • September 21, 2005 21 Sep'05

    first-order logic

    First-order logic is symbolized reasoning in which each sentence, or statement, is broken down into a subject and a predicate.  Continue Reading

  • September 21, 2005 21 Sep'05


    Greeking is the use of unreadable dummy text in places reserved for text when prototyping the design or general layout of pages in magazines, books, brochures, advertisements, Web pages, and other visual media.  Continue Reading

  • September 21, 2005 21 Sep'05

    Bohr radius

    The Bohr radius, symbolized as 0, is the mean radius of the orbit of an electron around the nucleus of a hydrogen atom at its ground state (lowest-energy level).  Continue Reading

  • September 21, 2005 21 Sep'05

    file format

    In a computer, a file format is the layout of a file in terms of how the data within the file is organized.  Continue Reading

  • September 21, 2005 21 Sep'05


    Googling is using the popular search engine Google.  Continue Reading

  • September 21, 2005 21 Sep'05

    breadcrumb trail

    On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.  Continue Reading

  • September 21, 2005 21 Sep'05


    A heatsink is a device that is attached to a microprocessor chip to keep it from overheating by absorbing its heat and dissipating it into the air.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.