Browse Definitions :
  • May 31, 2011 31 May'11

    hard copy (printout)

    A hard copy (or "hardcopy") is a printed copy of information from a computer.  Continue Reading

  • May 27, 2011 27 May'11

    kill switch

    A kill switch is a mechanism used to shut down or disable machinery or a device or program.  Continue Reading

  • May 24, 2011 24 May'11

    electrical estimating software

    Electrical estimating software is a collection of programs, processes and information that provides electrical contractors with the tools necessary to create accurate and consistent bids.  Continue Reading

  • May 23, 2011 23 May'11

    teach box

    A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system.  Continue Reading

  • May 16, 2011 16 May'11

    discussion board (discussion group, message board, online forum)

    A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have...  Continue Reading

  • May 06, 2011 06 May'11

    Big Mother

    Big Mother is the concept of pervasive parenting, in which parents use modern geolocation, wireless and video technologies to constantly track the activities of a child.  Continue Reading

  • May 06, 2011 06 May'11

    NetMagic Solutions

    NetMagic Solutions is an India-based IT hosting and services provider whose specializations include cloud computing, infrastructure management, disaster recovery and application hosting.  Continue Reading

  • May 06, 2011 06 May'11

    mission mode project (MMP)

    A mission mode project (MMP) is an individual project within the National e-Governance Plan (NeGP) that focuses on one aspect of electronic governance, like banking, land records or commercial taxes.   Continue Reading

  • May 04, 2011 04 May'11

    National eGovernance Plan (NeGP)

    National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.  Continue Reading

  • May 03, 2011 03 May'11

    MIEL e-Security

    MIEL e-Security is a Mumbai-based organization that provides information security services and solutions to organizations worldwide.  Continue Reading

  • May 03, 2011 03 May'11

    National eGovernance Service Delivery Gateway (NSDG)

    National eGovernance Service Delivery Gateway (NSDG) is a mission mode project (MMP) under the National e-Governance Plan (NeGP) that acts as a central repository for government data. It facilitates interoperability and exchange of data throughout ...  Continue Reading

  • May 03, 2011 03 May'11

    tarpitting

    Tarpitting is the practice of slowing the transmission of e-mail messages sent in bulk, as a means of thwarting spammers. The intent is to maintain a high quality of service for legitimate users while making the sending process impractical for ...  Continue Reading

  • May 02, 2011 02 May'11

    Wolfram Alpha

    Wolfram Alpha is a computational search engine (sometimes referred to as an "answer engine").  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close