Browse Definitions :
  • September 26, 2007 26 Sep'07

    nanolithography

    Nanolithography is the art and science of etching, writing, or printing at the microscopic level, where the dimensions of characters are on the order of nanometers (units of 10 -9 meter, or millionths of a millimeter).  Continue Reading

  • September 24, 2007 24 Sep'07

    Erlang programming language

    Erlang is a programming language designed for developing robust systems of programs that can be distributed among different computers in a network.  Continue Reading

  • September 18, 2007 18 Sep'07

    Installfest

    An Installfest is a special occasion when computer users get together to help each other install new programming, usually the Linux operating system and related programs, often together with experts and the resources to download programming from the...  Continue Reading

  • September 16, 2007 16 Sep'07

    circuit bending

    Circuit bending is the practice of modifying existing electronics items, most often toys, to create other items, usually musical instruments.  Continue Reading

  • September 06, 2007 06 Sep'07

    forensic

    Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion.  Continue Reading

  • September 03, 2007 03 Sep'07

    ergonomics

    Ergonomics (from the Greek word "ergon" meaning work, and "nomoi" meaning natural laws), is the science of refining the design of products to optimize them for human use. Human characteristics, such as height, weight, and proportions are considered,...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close