Browse Definitions :
  • April 30, 2012 30 Apr'12

    Jericho Forum

    The Jericho Forum is a global organization formed to help members deal the challenges of information security in an increasingly complex environment. (Continued)  Continue Reading

  • April 28, 2012 28 Apr'12

    CDAC

    The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.  Continue Reading

  • April 28, 2012 28 Apr'12

    cramming

    Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.  Continue Reading

  • April 26, 2012 26 Apr'12

    CCTV (closed circuit television)

    CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the camera's...  Continue Reading

  • April 26, 2012 26 Apr'12

    memory map

    A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.  Continue Reading

  • April 25, 2012 25 Apr'12

    Learn IT: Instant Messaging in the Enterprise

    Learn about the role of instant messaging in the enterprise in ten easy steps.  Continue Reading

  • April 25, 2012 25 Apr'12

    PIC microcontrollers

    PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.  Continue Reading

  • April 25, 2012 25 Apr'12

    glue logic

    Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.  Continue Reading

  • April 24, 2012 24 Apr'12

    Cyber Security Challenge UK

    Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry.  Continue Reading

  • April 23, 2012 23 Apr'12

    seven-segment display

    A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.  Continue Reading

  • April 20, 2012 20 Apr'12

    mickey

    The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.  Continue Reading

  • April 19, 2012 19 Apr'12

    Node.js

    Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.  Continue Reading

  • April 18, 2012 18 Apr'12

    monostable circuit

    A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).  Continue Reading

  • April 18, 2012 18 Apr'12

    context switch

    A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.  Continue Reading

  • April 18, 2012 18 Apr'12

    power-on reset (PoR)

    A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.  Continue Reading

  • April 17, 2012 17 Apr'12

    passive reconnaissance

    Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.  Continue Reading

  • April 17, 2012 17 Apr'12

    active reconnaissance

    Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.  Continue Reading

  • April 17, 2012 17 Apr'12

    six thinking hats retrospective

    Six thinking hats is a tool for structuring a discussion.�  Continue Reading

  • April 13, 2012 13 Apr'12

    holographic print

    A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.  Continue Reading

  • April 13, 2012 13 Apr'12

    Privacy and Electronic Communications Regulations (PECR)

    The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • deprovisioning

    Deprovisioning is the process of removing access to a system from an end user who will no longer be utilizing that system.

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...

Close