Browse Definitions :
  • October 31, 2012 31 Oct'12

    likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to...  Continue Reading

  • October 31, 2012 31 Oct'12

    network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the ...  Continue Reading

  • October 31, 2012 31 Oct'12

    crawl depth

    Crawl depth is the extent to which a search engine indexes pages within a website. Most sites contain multiple pages, which in turn can contain subpages. The pages and subpages grow deeper in a manner similar to the way folders and subfolders (or ...  Continue Reading

  • October 31, 2012 31 Oct'12

    alt text (alternative text)

    Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image. The alt text appears in a blank box that would normally...  Continue Reading

  • October 31, 2012 31 Oct'12

    search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.  Continue Reading

  • October 30, 2012 30 Oct'12

    SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently ...  Continue Reading

  • October 29, 2012 29 Oct'12

    Baxter industrial robot

    Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts. It contains cameras, sensors, and software that allow nontechnical people to operate it with ease. Baxter is a so-called "intelligent robot" that exhibits a ...  Continue Reading

  • October 29, 2012 29 Oct'12

    BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tablets, laptops and USB drives into the workplace.  Continue Reading

  • October 26, 2012 26 Oct'12

    phablet

    A phablet is a computing device with a screen size between five and seven inches long. As the name implies, the device is essentially a tablet that also functions as a phone.  Continue Reading

  • October 24, 2012 24 Oct'12

    live USB (operating system on a stick)

    Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.0 storage device.  Continue Reading

  • October 23, 2012 23 Oct'12

    Windows To Go

    Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device. Microsoft promotes the feature as a useful tool for mobile employees and disaster recovery.  Continue Reading

  • October 23, 2012 23 Oct'12

    Oracle Unlimited License Agreement (ULA)

    An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.  Continue Reading

  • October 23, 2012 23 Oct'12

    controller

    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In a general sense, a controller is just something or someone that interfaces between two systems and ...  Continue Reading

  • October 22, 2012 22 Oct'12

    linkbaiting

    Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it. The purpose is increasing the number of inbound links to content and, as a result, improving the content's performance in search engine ...  Continue Reading

  • October 22, 2012 22 Oct'12

    Open Networking Foundation (ONF)

    The Open Networking Foundation (ONF) is a consortium dedicated to the development and standardization of software-defined networking (SDN).  Continue Reading

  • October 22, 2012 22 Oct'12

    brownout reset

    A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.  Continue Reading

  • October 22, 2012 22 Oct'12

    Intel 4004

    The Intel 4004 was one of the first microprocessors ever produced, released in 1971. The 4004 was designed by Federico Faggin, Masatoshi Shima and others.  Continue Reading

  • October 18, 2012 18 Oct'12

    VXLAN (Virtual Extensible LAN)

    Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants. Technically, VXLAN works by ...  Continue Reading

  • October 18, 2012 18 Oct'12

    sea change

    A sea change is a significant and/or systemic transformation. The term is frequently used in business and IT (information technology) contexts as an alternative to the less current buzzword, paradigm shift.  Continue Reading

  • October 12, 2012 12 Oct'12

    social task management

    Social task management (STM) is a real-time, collaborative software-based approach to business activities that have traditionally been conducted through sequential processes such as document sharing and status updates.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close