Browse Definitions :
  • August 31, 2007 31 Aug'07


    A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a second.  Continue Reading

  • August 31, 2007 31 Aug'07

    Burning Man

    Burning Man is an annual week-long experiment in temporary community.  Continue Reading

  • August 30, 2007 30 Aug'07


    Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. (Continued...)  Continue Reading

  • August 28, 2007 28 Aug'07


    A norm (from norma, Latin for carpenter's square) is a model of what should exist or be followed, or an average of what currently does exist in some context, such as an average salary among members of a large group.  Continue Reading

  • August 22, 2007 22 Aug'07

    fluxgate magnetometer

    A fluxgate magnetometer is a device that measures the intensity and orientation of magnetic lines of flux.  Continue Reading

  • August 17, 2007 17 Aug'07

    Our Favorite Technology Quotations

    These are some of our favorite quotations about computers, the Internet, and technology in general.  Continue Reading

  • August 17, 2007 17 Aug'07

    How do you pronounce IT?

    How do you pronounce IT? Why, "eye-tee," of course! This page lists many of the most commonly mispronounced words in information technology.  Continue Reading

  • August 16, 2007 16 Aug'07


    Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.  Continue Reading

  • August 14, 2007 14 Aug'07

    Robot Ethics Charter

    The Robot Ethics Charter is a proposed set of rules intended to govern the interaction between humans and robot s.  Continue Reading

  • August 10, 2007 10 Aug'07


    Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...