Browse Definitions :
  • September 26, 2007 26 Sep'07

    nanolithography

    Nanolithography is the art and science of etching, writing, or printing at the microscopic level, where the dimensions of characters are on the order of nanometers (units of 10 -9 meter, or millionths of a millimeter).  Continue Reading

  • September 24, 2007 24 Sep'07

    Erlang programming language

    Erlang is a programming language designed for developing robust systems of programs that can be distributed among different computers in a network.  Continue Reading

  • September 19, 2007 19 Sep'07

    greenwashing

    Greenwashing is the practice of making an unsubstantiated or misleading claim about the environmental benefits of a product, service, technology or company practice. (Continued...)  Continue Reading

  • September 18, 2007 18 Sep'07

    Installfest

    An Installfest is a special occasion when computer users get together to help each other install new programming, usually the Linux operating system and related programs, often together with experts and the resources to download programming from the...  Continue Reading

  • September 16, 2007 16 Sep'07

    circuit bending

    Circuit bending is the practice of modifying existing electronics items, most often toys, to create other items, usually musical instruments.  Continue Reading

  • September 06, 2007 06 Sep'07

    forensic

    Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion.  Continue Reading

  • September 03, 2007 03 Sep'07

    ergonomics

    Ergonomics (from the Greek word "ergon" meaning work, and "nomoi" meaning natural laws), is the science of refining the design of products to optimize them for human use. Human characteristics, such as height, weight, and proportions are considered,...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close