Browse Definitions :
  • April 30, 2012 30 Apr'12

    Jericho Forum

    The Jericho Forum is a global organization formed to help members deal the challenges of information security in an increasingly complex environment. (Continued)  Continue Reading

  • April 28, 2012 28 Apr'12

    CDAC

    The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.  Continue Reading

  • April 28, 2012 28 Apr'12

    cramming

    Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.  Continue Reading

  • April 26, 2012 26 Apr'12

    CCTV (closed circuit television)

    CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the camera's...  Continue Reading

  • April 26, 2012 26 Apr'12

    memory map

    A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.  Continue Reading

  • April 25, 2012 25 Apr'12

    Learn IT: Instant Messaging in the Enterprise

    Learn about the role of instant messaging in the enterprise in ten easy steps.  Continue Reading

  • April 25, 2012 25 Apr'12

    PIC microcontrollers

    PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.  Continue Reading

  • April 25, 2012 25 Apr'12

    glue logic

    Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.  Continue Reading

  • April 24, 2012 24 Apr'12

    Cyber Security Challenge UK

    Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry.  Continue Reading

  • April 23, 2012 23 Apr'12

    seven-segment display

    A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.  Continue Reading

  • April 20, 2012 20 Apr'12

    mickey

    The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.  Continue Reading

  • April 19, 2012 19 Apr'12

    Node.js

    Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.  Continue Reading

  • April 18, 2012 18 Apr'12

    monostable circuit

    A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).  Continue Reading

  • April 18, 2012 18 Apr'12

    context switch

    A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.  Continue Reading

  • April 18, 2012 18 Apr'12

    power-on reset (PoR)

    A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.  Continue Reading

  • April 17, 2012 17 Apr'12

    passive reconnaissance

    Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.  Continue Reading

  • April 17, 2012 17 Apr'12

    active reconnaissance

    Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.  Continue Reading

  • April 17, 2012 17 Apr'12

    six thinking hats retrospective

    Six thinking hats is a tool for structuring a discussion.�  Continue Reading

  • April 13, 2012 13 Apr'12

    holographic print

    A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.  Continue Reading

  • April 13, 2012 13 Apr'12

    Privacy and Electronic Communications Regulations (PECR)

    The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close