Browse Definitions :
  • November 27, 2008 27 Nov'08

    Quiz: Talkin' tech turkey

    A quiz full of tasty tech terms. Can you talk tech turkey?  Continue Reading

  • November 25, 2008 25 Nov'08

    petaflop

    A petaflop is a measure of a computer's processing speed and can be expressed as a quadrillion (thousand trillion) floating point operations per second (FLOPS)... (Continued)  Continue Reading

  • November 24, 2008 24 Nov'08

    triple bottom line (3BL)

    The triple bottom line (3BL) is an expanded version of the business concept of the bottom line that includes social and environmental results as well as financial results.  Continue Reading

  • November 24, 2008 24 Nov'08

    Reduce, reuse, recycle (R3)

    Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.  Continue Reading

  • November 20, 2008 20 Nov'08

    Microsoft Operations Framework (MOF)

    Microsoft Operations Framework (MOF) is a series of 23 documents that guide IT professionals through the processes of creating, implementing and managing efficient and cost-effective services.  Continue Reading

  • November 18, 2008 18 Nov'08

    white space device (WSD)

    A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space. White space spectrum was made ...  Continue Reading

  • November 13, 2008 13 Nov'08

    fast flux DNS

    Fast flux DNS is a technique that a cybercriminal can use to prevent identification of his key host server's IP address.  Continue Reading

  • November 13, 2008 13 Nov'08

    operational costs

    Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.  Continue Reading

  • November 13, 2008 13 Nov'08

    milestone

    In project management, a milestone is a synchronization point.  Continue Reading

  • November 13, 2008 13 Nov'08

    IT asset

    An IT asset is any company-owned information, system or hardware that is used in the course of business activities.  Continue Reading

  • November 13, 2008 13 Nov'08

    incident

    An incident is an occurrence where a service or component fails to provide a feature or service that it was designed to deliver.  Continue Reading

  • November 13, 2008 13 Nov'08

    change log

    A change log is a record of requests for change (RFCs) submitted for all changes in a service.  Continue Reading

  • November 13, 2008 13 Nov'08

    bug convergence

    In a software development project, bug convergence is the point at which the number of bugs fixed exceeds the number of bugs reported.  Continue Reading

  • November 13, 2008 13 Nov'08

    baseline

    What is a baseline?In project management, a baseline is a known state by which something is measured or compared.  Continue Reading

  • November 07, 2008 07 Nov'08

    History of the punch card

    Learn about the role of punch cards in the history of data and data management.  Continue Reading

  • November 06, 2008 06 Nov'08

    buckypaper

    Buckypaper is a strong and lightweight substance manufactured from compressed carbon nanotubes, which are long, cylindrical carbon structures consisting of hexagonal graphite molecules attached at the edges.  Continue Reading

  • November 06, 2008 06 Nov'08

    Mobile Telephony: Do you speak Geek on the phone?

    Vocabulary - Test your knowledge of mobile telephony by taking the following quiz.  Continue Reading

  • November 06, 2008 06 Nov'08

    SunOS

    SunOS was the UNIX-based operating system for Scalable Processor Architecture-based workstations and servers from Sun Microsystems.  Continue Reading

  • November 05, 2008 05 Nov'08

    Flexible Mandatory Access Control (FMAC)

    Flexible Mandatory Access Control (FMAC) is an ongoing project intended to enhance the Sun Microsystems OpenSolaris operating platform by adding two security technologies: Flux Advanced Security Kernel (Flask) and Type Enforcement (TE).  Continue Reading

  • November 04, 2008 04 Nov'08

    E-voting Glossary

    This glossary provides short definitions of the most common e-voting technologies, acronyms and concepts.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close