Browse Definitions :
  • September 21, 2005 21 Sep'05

    canonicalization

    In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.  Continue Reading

  • September 21, 2005 21 Sep'05

    blackhole list (blacklist)

    A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).  Continue Reading

  • September 21, 2005 21 Sep'05

    sequential logic

    Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.  Continue Reading

  • September 21, 2005 21 Sep'05

    combinatorial logic

    Combinatorial logic is a concept in which two or more input states define one or more output states, where the resulting state or states are related by defined rules that are independent of previous states.  Continue Reading

  • September 21, 2005 21 Sep'05

    Panther

    Panther was the code name for Mac OS version 10.  Continue Reading

  • September 21, 2005 21 Sep'05

    SeniorNet

    SeniorNet is a non-profit organization that provides online education about technology and the Internet for people who are 50 or older.  Continue Reading

  • September 21, 2005 21 Sep'05

    most significant bit or byte

    The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value.  Continue Reading

  • September 21, 2005 21 Sep'05

    Single UNIX Specification

    The Single UNIX Specification is an industry standard description of the C language program and user command interfaces for a standard Unix operating system.  Continue Reading

  • September 21, 2005 21 Sep'05

    bias

    Bias is direct current (DC) deliberately made to flow, or DC voltage deliberately applied, between two points for the purpose of controlling a circuit.  Continue Reading

  • September 21, 2005 21 Sep'05

    saturation

    Saturation is the fully conducting state in a semiconductor junction.  Continue Reading

  • September 21, 2005 21 Sep'05

    joystick

    In computers, a joystick is a cursor control device used in computer games and assistive technology.  Continue Reading

  • September 21, 2005 21 Sep'05

    Extensible Name Service (XNS)

    Extensible Name Service (XNS) is an open Extensible Markup Language (XML)-based protocol that specifies a way to establish and manage a universal addressing system.  Continue Reading

  • September 21, 2005 21 Sep'05

    spamblock

    A spamblock is a text segment interjected into an e-mail address to foil a spambot (a program that a spammer uses to troll the Internet seeking e-mail addresses).  Continue Reading

  • September 21, 2005 21 Sep'05

    random numbers

    Random numbers are numbers that occur in a sequence such that two conditions are met: ( the values are uniformly distributed over a defined interval or set, and (2) it is impossible to predict future values based on past or present ones.  Continue Reading

  • September 21, 2005 21 Sep'05

    PayPal

    PayPal is a Web-based application for the secure transfer of funds between member accounts.  Continue Reading

  • September 21, 2005 21 Sep'05

    Jaguar

    Jaguar was the code name for version 10.2 of the Apple Macintosh OS X (operating system ten).  Continue Reading

  • September 21, 2005 21 Sep'05

    fan-in

    Fan-in is a term that defines the maximum number of digital inputs that a single logic gate can accept.  Continue Reading

  • September 21, 2005 21 Sep'05

    unified field theory or Theory of Everything (TOE)

    Unified field theory is sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying together all known phenomena to explain the nature and behavior of all matter and energy in existence.  Continue Reading

  • September 21, 2005 21 Sep'05

    luminous intensity

    Luminous intensity is an expression of the amount of light power emanating from a point source within a solid angle of one steradian.  Continue Reading

  • September 21, 2005 21 Sep'05

    compute-intensive

    Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close