Browse Definitions :
  • October 20, 2008 20 Oct'08

    Drizzle

    Drizzle is a lightweight open source database management system in development based on MySQL 6.  Continue Reading

  • October 15, 2008 15 Oct'08

    selenium

    What is selenium?Selenium is a non-metallic element that is often used as a semiconductor material, as a rectifier or in xerography.  Continue Reading

  • October 15, 2008 15 Oct'08

    burn-in

    Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.  Continue Reading

  • October 14, 2008 14 Oct'08

    return on marketing investment (ROMI)

    Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.  Continue Reading

  • October 13, 2008 13 Oct'08

    spaghetti code

    Spaghetti code is a derogatory term for computer programming that is unnecessarily convoluted, and particularly programming code that uses frequent branching from one section of code to another.  Continue Reading

  • October 10, 2008 10 Oct'08

    capitulation

    In finance, capitulation is the process of selling equity and giving up or surrendering any promise of monetary gain in an effort to get out of a particular market and into a less risky investment.  Continue Reading

  • October 01, 2008 01 Oct'08

    snoopware

    In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close