Browse Definitions :
  • July 25, 2011 25 Jul'11

    open source hardware (open hardware)

    Open source hardware, also called open hardware, is electronic or computer hardware built from design information that could be copyrighted or licensed but has instead been made available for public use at no charge.  Continue Reading

  • July 20, 2011 20 Jul'11

    EBIF (Enhanced TV Binary Interchange Format)

    EBIF (Enhanced TV Binary Interchange Format) is a collection of signaling and messaging specifications that makes it possible for television program producers and advertisers to create and serve interactive multimedia content through a television's ...  Continue Reading

  • July 20, 2011 20 Jul'11

    fever chart

    A fever chart is a graphical representation showing change of a variable over time.  Continue Reading

  • July 19, 2011 19 Jul'11

    auto 3-D (autostereoscopic imaging)

    Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.  Continue Reading

  • July 19, 2011 19 Jul'11

    business process transformation

    Business process transformation (BPT) is an effort to significantly improve the actions required to accomplish an organizational goal.  Continue Reading

  • July 15, 2011 15 Jul'11

    pastebin

    A pastebin is a Web application that allows users to upload and share text online.  Continue Reading

  • July 15, 2011 15 Jul'11

    interactive TV (interactive television)

    Interactive TV (ITV or iTV) is an approach to television advertising and programming that creates the opportunity for viewers to communicate with advertisers and programming executives by responding to a call to action.  Continue Reading

  • July 14, 2011 14 Jul'11

    federated cloud (cloud federation)

    A federated cloud (also called cloud federation) is the deployment and management of multiple external and internal cloud computing services to match business needs.  Continue Reading

  • July 13, 2011 13 Jul'11

    coworking

    Coworking is a business services provision model that involves individuals working independently or collaboratively in shared office space.  Continue Reading

  • July 12, 2011 12 Jul'11

    counterthreat operations team (CTOps team)

    A counterthreat operations team (CT Ops team) is a group of security information specialists who pro-actively monitor an information technology network for external and internal threats and respond to threats with both immediate actions and ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close