Browse Definitions :
  • October 12, 2012 12 Oct'12

    elevator pitch

    An elevator pitch is a brief, prepared statement that defines a product, service or the value of an organization or individual in as little as 15 seconds, the length of time of a typical elevator ride.  Continue Reading

  • October 10, 2012 10 Oct'12

    octal latch

    An octal latch is an integrated circuit (IC) that contains eight binary digital circuits called latches. A latch is a form of sequential logic circuit.  Continue Reading

  • October 10, 2012 10 Oct'12

    logic level

    A logic level is one of several states that a digital signal can possess, expressed as a DC (direct-current) voltage with respect to electrical ground. Usually, the term refers to binary logic in which two levels, or states, can exist: logic 1 (also...  Continue Reading

  • October 10, 2012 10 Oct'12

    board support package

    A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system). The BSP contains a small program called a boot loader or boot manager that places ...  Continue Reading

  • October 10, 2012 10 Oct'12

    likejacking

    Likejacking is a variation on clickjacking in which malicious coding is associated with a Facebook Like button. The most common purposes of likejacking include identity theft and the dissemination of viruses, social spam and hoaxes.  Continue Reading

  • October 05, 2012 05 Oct'12

    Sina Weibo

    Sina Weibo is a social networking and microblogging service based in China with more than 368 million registered users.  Continue Reading

  • October 05, 2012 05 Oct'12

    targeted attack

    A targeted attack is one that seeks to breach the security measures of a specific individual or organization. Usually the initial attack is conducted to gain access to a computer or network and is followed by a further exploit designed to cause harm...  Continue Reading

  • October 05, 2012 05 Oct'12

    Qzone

    Qzone is a Chinese social networking site and blogging platform for self-expression and content sharing.  Continue Reading

  • October 05, 2012 05 Oct'12

    Mahindra Satyam

    Mahindra Satyam, formerly Satyam Computer Services, is a software services company owned by Tech Mahindra, part of India’s Mahindra Group.  Continue Reading

  • October 05, 2012 05 Oct'12

    Paladion

    Paladion Networks is a Bengaluru, India-based provider of information security products and services.  Continue Reading

  • October 04, 2012 04 Oct'12

    industrial espionage

    Industrial espionage is the covert and sometimes illegal practice of investigating competitors, usually to gain a business advantage.  Continue Reading

  • October 03, 2012 03 Oct'12

    competitive intelligence (CI)

    Competitive intelligence (CI) is the gathering of publicly-available information about an enterprise's competitors and the use of that information to gain a business advantage.  Continue Reading

  • October 03, 2012 03 Oct'12

    Allied Digital Services Ltd

    Allied Digital Services Ltd is a Mumbai-based provider of system integration and IT infrastructure support services.  Continue Reading

  • October 01, 2012 01 Oct'12

    auto-correct fail (auto-correct error)

    An auto-correct fail is an error created when the software created to detect and correct misspelled words replaces a user-generated mistake with a different, and possibly worse, error.  Continue Reading

  • October 01, 2012 01 Oct'12

    auto-correct

    Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close