Browse Definitions:
  • April 24, 2006 24 Apr'06

    SOAP fault

    A SOAP fault is an error in a SOAP (Simple Object Access Protocol) communication resulting from incorrect message format, header-processing problems, or incompatibility between applications.  Continue Reading

  • April 20, 2006 20 Apr'06

    interface

    As a noun, an interface is either:A user interface, consisting of the set of dials, knobs, operating system commands, graphical display formats, and other devices provided by a computer or a program to allow the user to communicate and use the ...  Continue Reading

  • April 20, 2006 20 Apr'06

    architecture

    In information technology, especially computers and more recently networks, architecture is a term applied to both the process and the outcome of thinking out and specifying the overall structure, logical components, and the logical ...  Continue Reading

  • April 20, 2006 20 Apr'06

    microprocessor (logic chip)

    A microprocessor is a computer processor on a microchip.  Continue Reading

  • April 20, 2006 20 Apr'06

    performance

    Performance seems to have two meanings: The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions ...  Continue Reading

  • April 20, 2006 20 Apr'06

    real time

    Real time is a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process (for example, to present visualizations of the weather as it constantly changes).  Continue Reading

  • April 20, 2006 20 Apr'06

    autonomic computing

    Autonomic computing is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system. An autonomic computing system would control the functioning of computer applications and systems without input from the ...  Continue Reading

  • April 18, 2006 18 Apr'06

    pink noise

    Pink noise is acoustical energy distributed uniformly by octave throughout the audio spectrum (the range of human hearing, approximately 20 Hz to 20 kHz).  Continue Reading

  • April 17, 2006 17 Apr'06

    white noise

    White noise is a sound that contains every frequency within the range of human hearing (generally from 20 hertz to 20 kHz) in equal amounts.  Continue Reading

  • April 10, 2006 10 Apr'06

    online mapping

    Online mapping is the compilation and publication of Web sites that provide exhaustive graphical and text information in the form of maps and databases.  Continue Reading

  • April 07, 2006 07 Apr'06

    vlog (video blog)

    A vlog (or video blog) is a blog that contains video content.  Continue Reading

  • April 07, 2006 07 Apr'06

    exploratory model

    The exploratory model is a systems development method (SDM) occasionally used to design and develop a computer system or product and basically consists of planning and trying different designs until one of them seems to be the right one to develop.  Continue Reading

  • April 07, 2006 07 Apr'06

    querystring

    A querystring is a set of characters input to a computer or Web browser and sent to a query program to recover specific information from a database.  Continue Reading

  • April 05, 2006 05 Apr'06

    DidTheyReadIt

    DidTheyReadIt is an e-mail nonrepudiation program that uses a Web bug to determine whether the recipient of an HTML e-mail message has viewed it and report information back to the sender, typically without the recipient's knowledge.  Continue Reading

  • April 05, 2006 05 Apr'06

    email retention

    An e-mail retention policy is list of parameters created by an organization to determine what e-mail and instant messaging records need to be kept for compliance or other business reasons.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close