Browse Definitions :
  • September 21, 2005 21 Sep'05

    digit

    A digit is an element of a set that, taken as a whole, comprises a system of numeration.  Continue Reading

  • September 21, 2005 21 Sep'05

    single-sourcing

    Single-sourcing is the development of information content in a form that can conveniently be the basis for other forms of content.  Continue Reading

  • September 21, 2005 21 Sep'05

    vectored interrupt

    In a computer, a vectored interrupt is an I/O interrupt that tells the part of the computer that handles I/O interrupts at the hardware level that a request for attention from an I/O device has been received and and also identifies the device that ...  Continue Reading

  • September 21, 2005 21 Sep'05

    polled interrupt

    In a computer, a polled interrupt is a specific type of I/O interrupt that notifies the part of the computer containing the I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.  Continue Reading

  • September 21, 2005 21 Sep'05

    buddy icon (buddy avatar)

    In AOL instant messaging, a buddy icon (sometimes called a buddy avatar) is a small image that a user can add to the lower left-hand corner of an instant message to represent the user or a buddy in their buddy list.  Continue Reading

  • September 21, 2005 21 Sep'05

    reload

    In computers, to reload is to start a program over again, usually because it has crashed or because it has begun to display aberrant behavior.  Continue Reading

  • September 21, 2005 21 Sep'05

    whitelist

    A whitelist is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.  Continue Reading

  • September 21, 2005 21 Sep'05

    spambot

    A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.  Continue Reading

  • September 21, 2005 21 Sep'05

    User Principal Name (UPN)

    In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.  Continue Reading

  • September 21, 2005 21 Sep'05

    IT Survival Kits

    We've gathered a collection of resources to help you explore an IT topic you might not know much about.  Continue Reading

  • September 21, 2005 21 Sep'05

    e-inclusion

    E-inclusion is a social movement whose goal is to end the digital divide, a term used to describe the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information ...  Continue Reading

  • September 21, 2005 21 Sep'05

    standby power

    Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.  Continue Reading

  • September 21, 2005 21 Sep'05

    proper subset symbol

    The proper subset symbol indicates a specific relationship between two set s.  Continue Reading

  • September 21, 2005 21 Sep'05

    forensic animation

    Forensic animation is the use of full-motion computer graphics to recreate an event such as an automobile accident, the collapse of a building, an assault, or the workings of a mechanical device from a variety of perspectives.  Continue Reading

  • September 21, 2005 21 Sep'05

    subset symbol

    The subset symbol indicates a specific relationship between two sets.  Continue Reading

  • September 21, 2005 21 Sep'05

    Maya

    Maya is an animation and modeling program used to create three-dimensional (3-D), full-motion effects.  Continue Reading

  • September 21, 2005 21 Sep'05

    censorware

    Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content.  Continue Reading

  • September 21, 2005 21 Sep'05

    XPRL (Extensible Public Relations Language)

    XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.  Continue Reading

  • September 21, 2005 21 Sep'05

    permittivity of free space

    The permittivity of free space (a vacuum) is a physical constant equal to approximately 8.85 x 10-12 farad per meter (F/m).  Continue Reading

  • September 21, 2005 21 Sep'05

    canonicalization

    In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close