Browse Definitions :
  • December 21, 2012 21 Dec'12

    accessibility testing

    Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.  Continue Reading

  • December 21, 2012 21 Dec'12

    recycling

    Recycling is the practice of reusing items that would otherwise be discarded as waste. Variations of recycling include upcycling, which involves adding value to an item for reuse, and downcycling, which involves breaking down an item or substance ...  Continue Reading

  • December 21, 2012 21 Dec'12

    static testing

    Static testing is a software testing method that involves examination of the program's code and its associated documentation but does not require the program be executed.  Continue Reading

  • December 21, 2012 21 Dec'12

    software testing

    Software testing is a method of assessing the functionality of a software program. There are many different types of software testing but the two main categories are dynamic testing and static testing.  Continue Reading

  • December 21, 2012 21 Dec'12

    dynamic testing

    Dynamic testing is a method of assessing the feasibility of a software program by giving input and examining output (I/O). The dynamic method requires that the code be compiled and run.  Continue Reading

  • December 20, 2012 20 Dec'12

    destructive testing

    Destructive testing is a software assessment method used to find points of failure in a program.  Continue Reading

  • December 20, 2012 20 Dec'12

    edge transport server

    Edge transport server is an Exchange Server 2010 role that helps route Internet email as well as protect the Exchange organization from viruses and spam.  Continue Reading

  • December 20, 2012 20 Dec'12

    hub transport server (HT server)

    Hub transport server is an Exchange Server role that handles all mail flow within an Exchange organization.  Continue Reading

  • December 20, 2012 20 Dec'12

    ad hoc test

    An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product. The success of ad hoc testing relies upon the ability of the testers and their knowledge of the system.  Continue Reading

  • December 20, 2012 20 Dec'12

    ad hoc testing

    Ad hoc testing is a non-methodical approach to assessing the viability of a product. Commonly used in software development, ad hoc testing is performed without a plan of action, and actions taken are not typically documented.  Continue Reading

  • December 19, 2012 19 Dec'12

    electroluminescence

    Electroluminescence is a characteristic of a material, typically a semiconductor, that enables it to emit light in response to an electrical current or a strong electrical field.  Continue Reading

  • December 18, 2012 18 Dec'12

    General Architecture for Text Engineering (GATE)

    General Architecture for Text Engineering (GATE) is a development environment for writing software that can process human-language text. In particular, GATE is used for computational language processing and text mining.  Continue Reading

  • December 18, 2012 18 Dec'12

    voicemail preview

    Voicemail preview is a feature of unified messaging, and in particular voice-to-text messaging programs such as Microsoft Exchange. When voicemail preview is enabled, users can see a short summary of each message's contents, so that the messages can...  Continue Reading

  • December 18, 2012 18 Dec'12

    voicemail

    Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients. Callers leave short messages that are stored on digital media (or, in some older systems, on analog recording tape).  Continue Reading

  • December 18, 2012 18 Dec'12

    skewness

    Skewness is asymmetry in a statistical distribution, in which the curve appears distorted or skewed either to the left or to the right. Skewness can be quantified to define the extent to which a distribution differs from a normal distribution.  Continue Reading

  • December 18, 2012 18 Dec'12

    auto attendant (automated attendant)

    An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator. An AA may also be called a virtual receptionist. Most AAs can route calls to...  Continue Reading

  • December 18, 2012 18 Dec'12

    evolutionary robotics

    Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution. In evolutionary robotics, autonomous robots are treated as organisms ...  Continue Reading

  • December 18, 2012 18 Dec'12

    IT as a Service (ITaaS)

    IT as a Service (ITaaS) is a technology-delivery method that treats IT (information technology) as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.  Continue Reading

  • December 18, 2012 18 Dec'12

    bees algorithm

    The bees algorithm is a method of problem solving that mimics the behavior of honeybees to find the optimum solution. Based on the behaviors bees employ to search and prioritize, the algorithm is a classical example of swarm intelligence, in which ...  Continue Reading

  • December 14, 2012 14 Dec'12

    capacitive scanner

    A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and store a digital image of a human fingerprint.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close