Browse Definitions :
  • August 31, 2007 31 Aug'07


    A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a second.  Continue Reading

  • August 31, 2007 31 Aug'07

    Burning Man

    Burning Man is an annual week-long experiment in temporary community.  Continue Reading

  • August 30, 2007 30 Aug'07


    Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. (Continued...)  Continue Reading

  • August 28, 2007 28 Aug'07


    A norm (from norma, Latin for carpenter's square) is a model of what should exist or be followed, or an average of what currently does exist in some context, such as an average salary among members of a large group.  Continue Reading

  • August 22, 2007 22 Aug'07

    fluxgate magnetometer

    A fluxgate magnetometer is a device that measures the intensity and orientation of magnetic lines of flux.  Continue Reading

  • August 17, 2007 17 Aug'07

    Our Favorite Technology Quotations

    These are some of our favorite quotations about computers, the Internet, and technology in general.  Continue Reading

  • August 17, 2007 17 Aug'07

    How do you pronounce IT?

    How do you pronounce IT? Why, "eye-tee," of course! This page lists many of the most commonly mispronounced words in information technology.  Continue Reading

  • August 16, 2007 16 Aug'07


    Current is a flow of electrical charge carriers, usually electrons or electron-deficient atoms.  Continue Reading

  • August 14, 2007 14 Aug'07

    Robot Ethics Charter

    The Robot Ethics Charter is a proposed set of rules intended to govern the interaction between humans and robot s.  Continue Reading

  • August 10, 2007 10 Aug'07


    Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.  Continue Reading



  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...


  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...



  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...


  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.