Browse Definitions :
  • March 31, 2006 31 Mar'06

    event sink (listener)

    An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events... (Continued)  Continue Reading

  • March 29, 2006 29 Mar'06

    Flock

    Flock is an open source Web browser with advanced features, based on the Firefox code and released for preview in October 2005 by a group of developers in Palo Alto, California.  Continue Reading

  • March 24, 2006 24 Mar'06

    QWERTY keyboard

    The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.  Continue Reading

  • March 23, 2006 23 Mar'06

    Linux Standard Base (LSB)

    The Linux Standard Base (LSB), also called the LSB project, is an ongoing effort to standardize the structure of Linux and related operating systems, with the intention of increasing compatibility among systems that use different versions (also ...  Continue Reading

  • March 20, 2006 20 Mar'06

    transparent semiconductor

    A transparent semiconductor is a substance that can be used to manufacture see-through electronic components and circuits.  Continue Reading

  • March 08, 2006 08 Mar'06

    Tux

    Tux, the penguin, is the generally accepted official logo for the Linux operating system.  Continue Reading

  • March 08, 2006 08 Mar'06

    crash

    A crash is the sudden failure of a software application or operating system or of a hardware device such as a hard disk.  Continue Reading

  • March 03, 2006 03 Mar'06

    blogosphere

    Blogosphere is a term some writers have used to describe the grassroots and interactive journalism made possible by participants in blogs (logs or journals maintained on the Internet) and the symbiotic relationship between bloggers and traditional ...  Continue Reading

  • March 03, 2006 03 Mar'06

    Vim (Vi improved)

    Vim is an open-source text editor designed for working with programming code in Unix. Vim is an enhanced version of the text editor Vi... (Continued)  Continue Reading

  • March 01, 2006 01 Mar'06

    Vendor Independent Messaging (VIM)

    VIM (Vendor Independent Messaging) is an application program interface (API) that facilitates the exchange of e-mail and attachments among programs from different vendors. VIM makes it possible to send e-mail from within an application program... (...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close