Browse Definitions :
  • April 30, 2012 30 Apr'12

    Jericho Forum

    The Jericho Forum is a global organization formed to help members deal the challenges of information security in an increasingly complex environment. (Continued)  Continue Reading

  • April 28, 2012 28 Apr'12

    CDAC

    The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.  Continue Reading

  • April 28, 2012 28 Apr'12

    cramming

    Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.  Continue Reading

  • April 26, 2012 26 Apr'12

    CCTV (closed circuit television)

    CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the camera's...  Continue Reading

  • April 26, 2012 26 Apr'12

    memory map

    A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.  Continue Reading

  • April 25, 2012 25 Apr'12

    Learn IT: Instant Messaging in the Enterprise

    Learn about the role of instant messaging in the enterprise in ten easy steps.  Continue Reading

  • April 25, 2012 25 Apr'12

    PIC microcontrollers

    PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.  Continue Reading

  • April 25, 2012 25 Apr'12

    glue logic

    Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.  Continue Reading

  • April 24, 2012 24 Apr'12

    Cyber Security Challenge UK

    Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry.  Continue Reading

  • April 23, 2012 23 Apr'12

    seven-segment display

    A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.  Continue Reading

  • April 20, 2012 20 Apr'12

    mickey

    The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.  Continue Reading

  • April 19, 2012 19 Apr'12

    Node.js

    Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.  Continue Reading

  • April 18, 2012 18 Apr'12

    monostable circuit

    A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).  Continue Reading

  • April 18, 2012 18 Apr'12

    context switch

    A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.  Continue Reading

  • April 18, 2012 18 Apr'12

    power-on reset (PoR)

    A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.  Continue Reading

  • April 17, 2012 17 Apr'12

    passive reconnaissance

    Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.  Continue Reading

  • April 17, 2012 17 Apr'12

    active reconnaissance

    Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.  Continue Reading

  • April 17, 2012 17 Apr'12

    six thinking hats retrospective

    Six thinking hats is a tool for structuring a discussion.�  Continue Reading

  • April 13, 2012 13 Apr'12

    holographic print

    A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.  Continue Reading

  • April 13, 2012 13 Apr'12

    Privacy and Electronic Communications Regulations (PECR)

    The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close