Browse Definitions:
  • May 29, 2012 29 May'12

    program counter

    A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.  Continue Reading

  • May 29, 2012 29 May'12

    stack pointer

    A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. The most recently entered request always resides at the top of the stack.  Continue Reading

  • May 29, 2012 29 May'12

    pulse

    A pulse is a burst of current, voltage, or electromagnetic-field energy. In practical electronic and computer systems, a pulse may last from a fraction of a nanosecond up to several seconds or even minutes.  Continue Reading

  • May 23, 2012 23 May'12

    ROM emulation

    ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.  Continue Reading

  • May 22, 2012 22 May'12

    Cassandra (Apache Cassandra)

    Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.  Continue Reading

  • May 22, 2012 22 May'12

    conductor

    ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.  Continue Reading

  • May 18, 2012 18 May'12

    business process professional

    A business process professional is a person whose job is involves using business process management (BPM) technologies and techniques to enable the continuous improvement, optimization and transformation of an organization’s business processes.  Continue Reading

  • May 18, 2012 18 May'12

    business rules management

    Business rules management (BRM) is the administration and automation of business rules.  Continue Reading

  • May 14, 2012 14 May'12

    CESG Good Practice Guides (GPG)

    Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.  Continue Reading

  • May 14, 2012 14 May'12

    Office of Cyber Security and Information Assurance (OCSIA)

    The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government.  Continue Reading

  • May 14, 2012 14 May'12

    CESG

    CESG is the UK government's national technical authority for information assurance (IA).  Continue Reading

  • May 08, 2012 08 May'12

    Digg

    Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.  Continue Reading

  • May 08, 2012 08 May'12

    VKontakte (VK)

    VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.  Continue Reading

  • May 03, 2012 03 May'12

    Amazon Silk

    Silk is the browser that Amazon developed for the Kindle Fire tablet computer.  Continue Reading

  • May 02, 2012 02 May'12

    XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.  Continue Reading

  • May 02, 2012 02 May'12

    Security Learning Guides

    We've gathered a collection of our learning guides and tutorials on security-related topics. You'll find learning guides about security management, threats and vulnerabilities, viruses and other malware and more.  Continue Reading

  • May 02, 2012 02 May'12

    parallax

    Parallax is the way an object�s position or direction changes, depending on viewing angle.  Continue Reading

  • May 02, 2012 02 May'12

    Quiz: OMG! Another IM Lingo Challenge 4U

    Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms.  Continue Reading

  • May 01, 2012 01 May'12

    IT process automation

    IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.  Continue Reading

  • May 01, 2012 01 May'12

    arc flash

    An arc flash is an undesired electric discharge that travels through the air between conductors or from a conductor to a ground. The discharge releases enough energy to cause an explosion.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close