Browse Definitions :
  • May 29, 2012 29 May'12

    program counter

    A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.  Continue Reading

  • May 29, 2012 29 May'12

    stack pointer

    A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. The most recently entered request always resides at the top of the stack.  Continue Reading

  • May 29, 2012 29 May'12

    pulse

    A pulse is a burst of current, voltage, or electromagnetic-field energy. In practical electronic and computer systems, a pulse may last from a fraction of a nanosecond up to several seconds or even minutes.  Continue Reading

  • May 23, 2012 23 May'12

    ROM emulation

    ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.  Continue Reading

  • May 22, 2012 22 May'12

    Cassandra (Apache Cassandra)

    Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.  Continue Reading

  • May 22, 2012 22 May'12

    conductor

    ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.  Continue Reading

  • May 18, 2012 18 May'12

    business process professional

    A business process professional is a person whose job is involves using business process management (BPM) technologies and techniques to enable the continuous improvement, optimization and transformation of an organization’s business processes.  Continue Reading

  • May 18, 2012 18 May'12

    business rules management

    Business rules management (BRM) is the administration and automation of business rules.  Continue Reading

  • May 14, 2012 14 May'12

    CESG Good Practice Guides (GPG)

    Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.  Continue Reading

  • May 14, 2012 14 May'12

    Office of Cyber Security and Information Assurance (OCSIA)

    The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government.  Continue Reading

  • May 14, 2012 14 May'12

    CESG

    CESG is the UK government's national technical authority for information assurance (IA).  Continue Reading

  • May 08, 2012 08 May'12

    Digg

    Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.  Continue Reading

  • May 08, 2012 08 May'12

    VKontakte (VK)

    VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.  Continue Reading

  • May 03, 2012 03 May'12

    Amazon Silk

    Silk is the browser that Amazon developed for the Kindle Fire tablet computer.  Continue Reading

  • May 02, 2012 02 May'12

    XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.  Continue Reading

  • May 02, 2012 02 May'12

    Security Learning Guides

    We've gathered a collection of our learning guides and tutorials on security-related topics. You'll find learning guides about security management, threats and vulnerabilities, viruses and other malware and more.  Continue Reading

  • May 02, 2012 02 May'12

    parallax

    Parallax is the way an object�s position or direction changes, depending on viewing angle.  Continue Reading

  • May 02, 2012 02 May'12

    Quiz: OMG! Another IM Lingo Challenge 4U

    Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms.  Continue Reading

  • May 01, 2012 01 May'12

    IT process automation

    IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.  Continue Reading

  • May 01, 2012 01 May'12

    arc flash

    An arc flash is an undesired electric discharge that travels through the air between conductors or from a conductor to a ground. The discharge releases enough energy to cause an explosion.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close