Browse Definitions :
  • July 29, 2010 29 Jul'10

    Delphi Cheat Sheets

    We've gathered cheat sheets for fast reference to information about Delphi. You'll find information about variables, array types, execution and flow control and more. Need more background information before you get started? See our definitions for ...  Continue Reading

  • July 29, 2010 29 Jul'10

    National Emergency Communications Plan (NECP)

    The National Emergency Communications Plan (NECP) is a strategic plan for improving emergency response communications and efforts in the United States.  Continue Reading

  • July 28, 2010 28 Jul'10

    business method patent

    A business method patent is part of a larger family of patents known as utility patents, which protect inventions, formulas and processes.  Continue Reading

  • July 16, 2010 16 Jul'10

    digital drugs

    Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of ...  Continue Reading

  • July 14, 2010 14 Jul'10

    Microsoft TownHall

    Microsoft TownHall is a cloud-based application that can be used to build Web sites for social computing.  Continue Reading

  • July 14, 2010 14 Jul'10

    Be a Martian!

    is a government 2.0 initiative that invite citizens to participate in scientific research about the planet Mars by visiting an interactive web site and performing research tasks disguised as games.  Continue Reading

  • July 13, 2010 13 Jul'10

    fax polling

    Fax polling is a feature that allows one fax machine to send a request to another fax machine for a specific document.  Continue Reading

  • July 05, 2010 05 Jul'10

    flag

    In programming, a flag is a predefined bitor bit sequence that holds a binary value.  Continue Reading

  • June 30, 2010 30 Jun'10

    Multimedia and Graphics Learning Guides

    We've gathered a our learning resources about multimedia and graphics. You'll find information about DTV, DVD and more. Then see below, our larger collection of resources. Need more basic information before you get started? See our definitions for ...  Continue Reading

  • June 30, 2010 30 Jun'10

    Messaging and Email Learning Guides

    We've gathered a collection of our learning guides and tutorials on messaging and email-related topics. You'll find administration tips, and information about application integration, backup and recovery, and dealing with spam -- among other topics....  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close