Browse Definitions :
  • November 27, 2008 27 Nov'08

    Quiz: Talkin' tech turkey

    A quiz full of tasty tech terms. Can you talk tech turkey?  Continue Reading

  • November 25, 2008 25 Nov'08

    petaflop

    A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS)... (Continued)  Continue Reading

  • November 24, 2008 24 Nov'08

    triple bottom line (3BL)

    The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.  Continue Reading

  • November 24, 2008 24 Nov'08

    Reduce, reuse, recycle (R3)

    Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.  Continue Reading

  • November 20, 2008 20 Nov'08

    Microsoft Operations Framework (MOF)

    Microsoft Operations Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing and managing efficient and cost-effective services.  Continue Reading

  • November 18, 2008 18 Nov'08

    white space device (WSD)

    A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space. White space spectrum was made ...  Continue Reading

  • November 13, 2008 13 Nov'08

    fast flux DNS

    Fast flux DNS is a technique that a cybercriminal can use to prevent identification of his key host server's IP address.  Continue Reading

  • November 13, 2008 13 Nov'08

    operational costs

    Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.  Continue Reading

  • November 13, 2008 13 Nov'08

    milestone

    In project management, a milestone is a synchronization point.  Continue Reading

  • November 13, 2008 13 Nov'08

    IT asset

    An IT asset is any company-owned information, system or hardware that is used in the course of business activities.  Continue Reading

  • November 13, 2008 13 Nov'08

    incident

    An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.  Continue Reading

  • November 13, 2008 13 Nov'08

    change log

    A change log is a record of requests for change (RFCs) submitted for all changes in a service.  Continue Reading

  • November 13, 2008 13 Nov'08

    bug convergence

    In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.  Continue Reading

  • November 13, 2008 13 Nov'08

    baseline

    What is a baseline?In project management, a baseline is a known state by which something is measured or compared.  Continue Reading

  • November 07, 2008 07 Nov'08

    History of the punch card

    Learn about the role of punch cards in the history of data and data management.  Continue Reading

  • November 06, 2008 06 Nov'08

    buckypaper

    Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes, which are long, cylindrical carbon structures consisting of hexagonal graphite molecules attached at the edges.  Continue Reading

  • November 06, 2008 06 Nov'08

    Mobile Telephony: Do you speak Geek on the phone?

    Vocabulary - Test your knowledge of mobile telephony by taking the following quiz.  Continue Reading

  • November 06, 2008 06 Nov'08

    SunOS

    SunOS was the UNIX-based operating system for Scalable Processor Architecture-based workstations and servers from Sun Microsystems.  Continue Reading

  • November 05, 2008 05 Nov'08

    Flexible Mandatory Access Control (FMAC)

    Flexible Mandatory Access Control (FMAC) is an ongoing project intended to enhance the Sun Microsystems OpenSolaris operating platform by adding two security technologies: Flux Advanced Security Kernel (Flask) and Type Enforcement (TE).  Continue Reading

  • November 04, 2008 04 Nov'08

    E-voting Glossary

    This glossary provides short definitions of the most common e-voting technologies, acronyms and concepts.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close