Browse Definitions :
  • September 21, 2005 21 Sep'05

    reboot (warm boot, cold boot)

    To reboot is to restart a computer and reload the operating system.  Continue Reading

  • September 21, 2005 21 Sep'05

    E2K (Exchange 2000)

    E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.  Continue Reading

  • September 21, 2005 21 Sep'05

    Foo Camp

    Foo Camp was a gathering of about 200 computer and Internet thinkers and inventors who were invited by publisher O'Reilly and Associates to spend a week-end brainstorming, collaborating, and otherwise advancing progress in information technology.  Continue Reading

  • September 21, 2005 21 Sep'05


    XMLNews is a set of specifications for exchanging news objects such as stories, images, or audio clips in a standard format across different applications and operating systems.  Continue Reading

  • September 21, 2005 21 Sep'05


    On the Web, a portlet is a component of a portal Web site that provides access to some specific information source or application, such as news updates, technical support, or an e-mail program among many other possibilities.  Continue Reading

  • September 21, 2005 21 Sep'05


    In computer architecture, a word is a unit of data of a defined bitlength that can be addressed and moved between storageand the computer processor.  Continue Reading

  • September 21, 2005 21 Sep'05

    mentoring service

    A mentoring service is a company that provides professional counseling and advice for individuals and businesses for a fee.  Continue Reading

  • September 21, 2005 21 Sep'05

    silicon cockroach

    Silicon cockroach is a term invented by networking expert John Sidgmore to describe the tiny portable electronic devices that are expected to become popular in the next few years, creating new behavior patterns while putting new demands on network ...  Continue Reading

  • September 21, 2005 21 Sep'05

    exponential function

    An exponential function is a mathematical function of the following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the function.  Continue Reading

  • September 21, 2005 21 Sep'05


    A harmonic is a signal or wave whose frequency is an integral (whole-number) multiple of the frequency of some reference signal or wave.  Continue Reading

  • September 21, 2005 21 Sep'05

    genetic programming

    Genetic programming is a model of programming which uses the ideas (and some of the terminology) of biological evolution to handle a complex problem.  Continue Reading

  • September 21, 2005 21 Sep'05

    permeability (magnetic permeability)

    Permeability, also called magnetic permeability, is a constant of proportionality that exists between magnetic induction and magnetic field intensity.  Continue Reading

  • September 21, 2005 21 Sep'05


    The lumen (symbolized lm) is the International Unit of luminous flux.  Continue Reading

  • September 21, 2005 21 Sep'05

    Remote Installation Service (RIS)

    Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time ...  Continue Reading

  • September 21, 2005 21 Sep'05

    user session (visit)

    In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).  Continue Reading

  • September 21, 2005 21 Sep'05

    pascal (unit of pressure or stress)

    The pascal (pronounced pass-KAL and abbreviated Pa) is the unit of pressure or stress in the International System of Units (SI).  Continue Reading

  • September 21, 2005 21 Sep'05

    3-D browser

    A 3-D browser is a Web browser that allows the viewer to view and interact with six Web pages at a time by creating a virtual room on the viewer's screen.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.