Browse Definitions :
  • August 31, 2007 31 Aug'07

    microsecond

    A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a second.  Continue Reading

  • August 31, 2007 31 Aug'07

    Burning Man

    Burning Man is an annual week-long experiment in temporary community.  Continue Reading

  • August 30, 2007 30 Aug'07

    bacn

    Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. (Continued...)  Continue Reading

  • August 28, 2007 28 Aug'07

    norm

    A norm (from norma, Latin for carpenter's square) is a model of what should exist or be followed, or an average of what currently does exist in some context, such as an average salary among members of a large group.  Continue Reading

  • August 22, 2007 22 Aug'07

    fluxgate magnetometer

    A fluxgate magnetometer is a device that measures the intensity and orientation of magnetic lines of flux.  Continue Reading

  • August 17, 2007 17 Aug'07

    Our Favorite Technology Quotations

    These are some of our favorite quotations about computers, the Internet, and technology in general.  Continue Reading

  • August 17, 2007 17 Aug'07

    How do you pronounce IT?

    How do you pronounce IT? Why, "eye-tee," of course! This page lists many of the most commonly mispronounced words in information technology.  Continue Reading

  • August 16, 2007 16 Aug'07

    current

    Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.  Continue Reading

  • August 14, 2007 14 Aug'07

    Robot Ethics Charter

    The Robot Ethics Charter is a proposed set of rules intended to govern the interaction between humans and robot s.  Continue Reading

  • August 10, 2007 10 Aug'07

    Wiegand

    Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close