Browse Definitions :
  • May 29, 2012 29 May'12

    program counter

    A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.  Continue Reading

  • May 29, 2012 29 May'12

    stack pointer

    A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. The most recently entered request always resides at the top of the stack.  Continue Reading

  • May 29, 2012 29 May'12

    pulse

    A pulse is a burst of current, voltage, or electromagnetic-field energy. In practical electronic and computer systems, a pulse may last from a fraction of a nanosecond up to several seconds or even minutes.  Continue Reading

  • May 23, 2012 23 May'12

    ROM emulation

    ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.  Continue Reading

  • May 22, 2012 22 May'12

    Cassandra (Apache Cassandra)

    Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.  Continue Reading

  • May 22, 2012 22 May'12

    conductor

    ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.  Continue Reading

  • May 18, 2012 18 May'12

    business process professional

    A business process professional is a person whose job is involves using business process management (BPM) technologies and techniques to enable the continuous improvement, optimization and transformation of an organization’s business processes.  Continue Reading

  • May 18, 2012 18 May'12

    business rules management

    Business rules management (BRM) is the administration and automation of business rules.  Continue Reading

  • May 14, 2012 14 May'12

    CESG Good Practice Guides (GPG)

    Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.  Continue Reading

  • May 14, 2012 14 May'12

    Office of Cyber Security and Information Assurance (OCSIA)

    The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government.  Continue Reading

  • May 14, 2012 14 May'12

    CESG

    CESG is the UK government's national technical authority for information assurance (IA).  Continue Reading

  • May 08, 2012 08 May'12

    Digg

    Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.  Continue Reading

  • May 08, 2012 08 May'12

    VKontakte (VK)

    VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.  Continue Reading

  • May 03, 2012 03 May'12

    Amazon Silk

    Silk is the browser that Amazon developed for the Kindle Fire tablet computer.  Continue Reading

  • May 02, 2012 02 May'12

    XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.  Continue Reading

  • May 02, 2012 02 May'12

    Security Learning Guides

    We've gathered a collection of our learning guides and tutorials on security-related topics. You'll find learning guides about security management, threats and vulnerabilities, viruses and other malware and more.  Continue Reading

  • May 02, 2012 02 May'12

    parallax

    Parallax is the way an object�s position or direction changes, depending on viewing angle.  Continue Reading

  • May 02, 2012 02 May'12

    Quiz: OMG! Another IM Lingo Challenge 4U

    Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms.  Continue Reading

  • May 01, 2012 01 May'12

    IT process automation

    IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.  Continue Reading

  • May 01, 2012 01 May'12

    arc flash

    An arc flash is an undesired electric discharge that travels through the air between conductors or from a conductor to a ground. The discharge releases enough energy to cause an explosion.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close