Browse Definitions :
  • December 24, 2006 24 Dec'06

    serendipity

    In general, serendipity is the act of finding something valuable or delightful when you are not looking for it.  Continue Reading

  • December 21, 2006 21 Dec'06

    Podcast: True IT Bloopers

    These podcasts feature short stories, jokes and IT humor from inside of the server room, behind the help desk and around the Net, all submitted by the audience.  Continue Reading

  • December 20, 2006 20 Dec'06

    Podcast: What is a web content management system?

    In this podcast from WhatIs.com, Assistant Site Editor Alex Howard interviews Erik Aeyelts Averink, the Executive Vice President of Corporate Development for Tridion, a leading global provider of web content management solutions. What is web content...  Continue Reading

  • December 15, 2006 15 Dec'06

    virtual keyboard

    A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.  Continue Reading

  • December 07, 2006 07 Dec'06

    googol and googolplex

    A googol is 10 to the 100th power (which is 1 followed by 100 zeros). The term was invented by Milton Sirotta, the 9-year nephew of mathematician Edward Kasner, who had asked his nephew what he thought such a large number should be called... (...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close