Browse Definitions :
  • December 24, 2006 24 Dec'06

    serendipity

    In general, serendipity is the act of finding something valuable or delightful when you are not looking for it.  Continue Reading

  • December 21, 2006 21 Dec'06

    Podcast: True IT Bloopers

    These podcasts feature short stories, jokes and IT humor from inside of the server room, behind the help desk and around the Net, all submitted by the audience.  Continue Reading

  • December 20, 2006 20 Dec'06

    Podcast: What is a web content management system?

    In this podcast from WhatIs.com, Assistant Site Editor Alex Howard interviews Erik Aeyelts Averink, the Executive Vice President of Corporate Development for Tridion, a leading global provider of web content management solutions. What is web content...  Continue Reading

  • December 15, 2006 15 Dec'06

    virtual keyboard

    A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.  Continue Reading

  • December 07, 2006 07 Dec'06

    googol and googolplex

    A googol is 10 to the 100th power (which is 1 followed by 100 zeros). The term was invented by Milton Sirotta, the 9-year nephew of mathematician Edward Kasner, who had asked his nephew what he thought such a large number should be called... (...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close