Browse Definitions :
  • October 31, 2012 31 Oct'12

    likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to...  Continue Reading

  • October 31, 2012 31 Oct'12

    network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the ...  Continue Reading

  • October 31, 2012 31 Oct'12

    crawl depth

    Crawl depth is the extent to which a search engine indexes pages within a website. Most sites contain multiple pages, which in turn can contain subpages. The pages and subpages grow deeper in a manner similar to the way folders and subfolders (or ...  Continue Reading

  • October 31, 2012 31 Oct'12

    alt text (alternative text)

    Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image. The alt text appears in a blank box that would normally...  Continue Reading

  • October 31, 2012 31 Oct'12

    search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.  Continue Reading

  • October 30, 2012 30 Oct'12

    SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently ...  Continue Reading

  • October 29, 2012 29 Oct'12

    Baxter industrial robot

    Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts. It contains cameras, sensors, and software that allow nontechnical people to operate it with ease. Baxter is a so-called "intelligent robot" that exhibits a ...  Continue Reading

  • October 29, 2012 29 Oct'12

    BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tablets, laptops and USB drives into the workplace.  Continue Reading

  • October 26, 2012 26 Oct'12

    phablet

    A phablet is a computing device with a screen size between five and seven inches long. As the name implies, the device is essentially a tablet that also functions as a phone.  Continue Reading

  • October 24, 2012 24 Oct'12

    live USB (operating system on a stick)

    Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.0 storage device.  Continue Reading

  • October 23, 2012 23 Oct'12

    Windows To Go

    Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device. Microsoft promotes the feature as a useful tool for mobile employees and disaster recovery.  Continue Reading

  • October 23, 2012 23 Oct'12

    Oracle Unlimited License Agreement (ULA)

    An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.  Continue Reading

  • October 23, 2012 23 Oct'12

    controller

    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In a general sense, a controller is just something or someone that interfaces between two systems and ...  Continue Reading

  • October 22, 2012 22 Oct'12

    linkbaiting

    Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it. The purpose is increasing the number of inbound links to content and, as a result, improving the content's performance in search engine ...  Continue Reading

  • October 22, 2012 22 Oct'12

    Open Networking Foundation (ONF)

    The Open Networking Foundation (ONF) is a consortium dedicated to the development and standardization of software-defined networking (SDN).  Continue Reading

  • October 22, 2012 22 Oct'12

    brownout reset

    A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.  Continue Reading

  • October 22, 2012 22 Oct'12

    Intel 4004

    The Intel 4004 was one of the first microprocessors ever produced, released in 1971. The 4004 was designed by Federico Faggin, Masatoshi Shima and others.  Continue Reading

  • October 18, 2012 18 Oct'12

    VXLAN (Virtual Extensible LAN)

    Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants. Technically, VXLAN works by ...  Continue Reading

  • October 18, 2012 18 Oct'12

    sea change

    A sea change is a significant and/or systemic transformation. The term is frequently used in business and IT (information technology) contexts as an alternative to the less current buzzword, paradigm shift.  Continue Reading

  • October 12, 2012 12 Oct'12

    social task management

    Social task management (STM) is a real-time, collaborative software-based approach to business activities that have traditionally been conducted through sequential processes such as document sharing and status updates.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close