Browse Definitions:
  • October 31, 2012 31 Oct'12

    likebaiting

    Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content. The practice is similar to linkbaiting, in which content producers craft content with the intent of getting people to link to...  Continue Reading

  • October 31, 2012 31 Oct'12

    network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the ...  Continue Reading

  • October 31, 2012 31 Oct'12

    crawl depth

    Crawl depth is the extent to which a search engine indexes pages within a website. Most sites contain multiple pages, which in turn can contain subpages. The pages and subpages grow deeper in a manner similar to the way folders and subfolders (or ...  Continue Reading

  • October 31, 2012 31 Oct'12

    alt text (alternative text)

    Alt text (alternative text) is a word or phrase that can be inserted as an attribute in an HTML (Hypertext Markup Language) document to tell Web site viewers the nature or contents of an image. The alt text appears in a blank box that would normally...  Continue Reading

  • October 31, 2012 31 Oct'12

    search engine results page (SERP)

    A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.  Continue Reading

  • October 30, 2012 30 Oct'12

    SEO poisoning (search poisoning)

    Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently ...  Continue Reading

  • October 29, 2012 29 Oct'12

    Baxter industrial robot

    Baxter is an industrial robot produced by Rethink Robotics of Boston, Massachusetts. It contains cameras, sensors, and software that allow nontechnical people to operate it with ease. Baxter is a so-called "intelligent robot" that exhibits a ...  Continue Reading

  • October 29, 2012 29 Oct'12

    BYOD (bring your own device)

    BYOD (bring your own device) is the increasing trend of employees bringing their own devices to work. Smartphones are the most common example but employees also take tablets, laptops and USB drives into the workplace. BYOD is part of the larger ...  Continue Reading

  • October 26, 2012 26 Oct'12

    phablet

    A phablet is a computing device with a screen size between five and seven inches long. As the name implies, the device is essentially a tablet that also functions as a phone.  Continue Reading

  • October 24, 2012 24 Oct'12

    live USB (operating system on a stick)

    Windows To Go is a feature of Windows 8 Enterprise edition that allows administrators to put a full blown copy of Windows 8 on an external USB 3.0 storage device.  Continue Reading

  • October 23, 2012 23 Oct'12

    Windows To Go

    Windows To Go is a feature of the Windows 8 Enterprise operating system that allows it to be copied to a portable USB storage device. Microsoft promotes the feature as a useful tool for mobile employees and disaster recovery.  Continue Reading

  • October 23, 2012 23 Oct'12

    Oracle Unlimited License Agreement (ULA)

    An Oracle Unlimited License Agreement (ULA) is an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.  Continue Reading

  • October 23, 2012 23 Oct'12

    controller

    A controller, in a computing context, is a hardware device or a software program that manages or directs the flow of data between two entities. In a general sense, a controller is just something or someone that interfaces between two systems and ...  Continue Reading

  • October 22, 2012 22 Oct'12

    linkbaiting

    Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it. The purpose is increasing the number of inbound links to content and, as a result, improving the content's performance in search engine ...  Continue Reading

  • October 22, 2012 22 Oct'12

    Open Networking Foundation (ONF)

    The Open Networking Foundation (ONF) is a consortium dedicated to the development and standardization of software-defined networking (SDN).  Continue Reading

  • October 22, 2012 22 Oct'12

    brownout reset

    A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.  Continue Reading

  • October 22, 2012 22 Oct'12

    Intel 4004

    The Intel 4004 was one of the first microprocessors ever produced, released in 1971. The 4004 was designed by Federico Faggin, Masatoshi Shima and others.  Continue Reading

  • October 18, 2012 18 Oct'12

    VXLAN (Virtual Extensible LAN)

    Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants. Technically, VXLAN works by ...  Continue Reading

  • October 18, 2012 18 Oct'12

    sea change

    A sea change is a significant and/or systemic transformation. The term is frequently used in business and IT (information technology) contexts as an alternative to the less current buzzword, paradigm shift.  Continue Reading

  • October 12, 2012 12 Oct'12

    social task management

    Social task management (STM) is a real-time, collaborative software-based approach to business activities that have traditionally been conducted through sequential processes such as document sharing and status updates.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close