Browse Definitions:
  • April 30, 2012 30 Apr'12

    Jericho Forum

    The Jericho Forum is a global organization formed to help members deal the challenges of information security in an increasingly complex environment. (Continued)  Continue Reading

  • April 28, 2012 28 Apr'12

    CDAC

    The Centre for Development for Advanced Computing (CDAC) is the main research and development group for the Department of Information Technology (DIT) and the Ministry of Communications and Information Technology (MCIT) in India.  Continue Reading

  • April 28, 2012 28 Apr'12

    cramming

    Cramming is the addition of unexpected or unauthorized charges to a bill for landline or mobile telephone service.  Continue Reading

  • April 26, 2012 26 Apr'12

    CCTV (closed circuit television)

    CCTV (closed-circuit television) is a television system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the ...  Continue Reading

  • April 26, 2012 26 Apr'12

    memory map

    A memory map is a massive table, in effect a database, that comprises complete information about how the memory is structured in a computer system.  Continue Reading

  • April 25, 2012 25 Apr'12

    Learn IT: Instant Messaging in the Enterprise

    Learn about the role of instant messaging in the enterprise in ten easy steps.  Continue Reading

  • April 25, 2012 25 Apr'12

    PIC microcontrollers

    PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona.  Continue Reading

  • April 25, 2012 25 Apr'12

    glue logic

    Glue logic is a special form of digital circuitry that allows different types of logic chips or circuits to work together by acting as an interface between them.  Continue Reading

  • April 24, 2012 24 Apr'12

    Cyber Security Challenge UK

    Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry.  Continue Reading

  • April 23, 2012 23 Apr'12

    seven-segment display

    A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.  Continue Reading

  • April 20, 2012 20 Apr'12

    mickey

    The mickey, in a computing context, is a unit for the smallest detectable movement of a mouse.  Continue Reading

  • April 19, 2012 19 Apr'12

    Node.js

    Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.  Continue Reading

  • April 18, 2012 18 Apr'12

    monostable circuit

    A monostable circuit is an electronic device called a multivibrator that has two distinct states, one of them stable (having a steady voltage) and the other one unstable (having an unsteady or variable voltage).  Continue Reading

  • April 18, 2012 18 Apr'12

    context switch

    A context switch is a procedure that a computer's CPU (central processing unit) follows to change from one task (or process) to another while ensuring that the tasks do not conflict.  Continue Reading

  • April 18, 2012 18 Apr'12

    power-on reset (PoR)

    A power-on reset (PoR) is a circuit that provides a predictable, regulated voltage to a microprocessor or microcontroller with the initial application of power.  Continue Reading

  • April 17, 2012 17 Apr'12

    passive reconnaissance

    Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems.  Continue Reading

  • April 17, 2012 17 Apr'12

    active reconnaissance

    Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.  Continue Reading

  • April 17, 2012 17 Apr'12

    six thinking hats retrospective

    Six thinking hats is a tool for structuring a discussion.�  Continue Reading

  • April 13, 2012 13 Apr'12

    holographic print

    A holographic print is a rendition of a hologram on a flat surface, producing 3-D (three-dimensional) effects when viewed.  Continue Reading

  • April 13, 2012 13 Apr'12

    Privacy and Electronic Communications Regulations (PECR)

    The Privacy and Electronic Communications Regulations (PECR) are the UK implementation of the European Union (EU) e-Privacy Directive.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close