Browse Definitions :
  • December 24, 2006 24 Dec'06

    serendipity

    In general, serendipity is the act of finding something valuable or delightful when you are not looking for it.  Continue Reading

  • December 21, 2006 21 Dec'06

    Podcast: True IT Bloopers

    These podcasts feature short stories, jokes and IT humor from inside of the server room, behind the help desk and around the Net, all submitted by the audience.  Continue Reading

  • December 20, 2006 20 Dec'06

    Podcast: What is a web content management system?

    In this podcast from WhatIs.com, Assistant Site Editor Alex Howard interviews Erik Aeyelts Averink, the Executive Vice President of Corporate Development for Tridion, a leading global provider of web content management solutions. What is web content...  Continue Reading

  • December 15, 2006 15 Dec'06

    virtual keyboard

    A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.  Continue Reading

  • December 07, 2006 07 Dec'06

    googol and googolplex

    A googol is 10 to the 100th power (which is 1 followed by 100 zeros). The term was invented by Milton Sirotta, the 9-year nephew of mathematician Edward Kasner, who had asked his nephew what he thought such a large number should be called... (...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close