Browse Definitions :
  • May 29, 2012 29 May'12

    program counter

    A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.  Continue Reading

  • May 29, 2012 29 May'12

    stack pointer

    A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. The most recently entered request always resides at the top of the stack.  Continue Reading

  • May 29, 2012 29 May'12

    pulse

    A pulse is a burst of current, voltage, or electromagnetic-field energy. In practical electronic and computer systems, a pulse may last from a fraction of a nanosecond up to several seconds or even minutes.  Continue Reading

  • May 23, 2012 23 May'12

    ROM emulation

    ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.  Continue Reading

  • May 22, 2012 22 May'12

    Cassandra (Apache Cassandra)

    Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.  Continue Reading

  • May 22, 2012 22 May'12

    conductor

    ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.  Continue Reading

  • May 18, 2012 18 May'12

    business process professional

    A business process professional is a person whose job is involves using business process management (BPM) technologies and techniques to enable the continuous improvement, optimization and transformation of an organization’s business processes.  Continue Reading

  • May 18, 2012 18 May'12

    business rules management

    Business rules management (BRM) is the administration and automation of business rules.  Continue Reading

  • May 14, 2012 14 May'12

    CESG Good Practice Guides (GPG)

    Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.  Continue Reading

  • May 14, 2012 14 May'12

    Office of Cyber Security and Information Assurance (OCSIA)

    The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government.  Continue Reading

  • May 14, 2012 14 May'12

    CESG

    CESG is the UK government's national technical authority for information assurance (IA).  Continue Reading

  • May 08, 2012 08 May'12

    Digg

    Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.  Continue Reading

  • May 08, 2012 08 May'12

    VKontakte (VK)

    VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.  Continue Reading

  • May 03, 2012 03 May'12

    Amazon Silk

    Silk is the browser that Amazon developed for the Kindle Fire tablet computer.  Continue Reading

  • May 02, 2012 02 May'12

    XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.  Continue Reading

  • May 02, 2012 02 May'12

    Security Learning Guides

    We've gathered a collection of our learning guides and tutorials on security-related topics. You'll find learning guides about security management, threats and vulnerabilities, viruses and other malware and more.  Continue Reading

  • May 02, 2012 02 May'12

    parallax

    Parallax is the way an object�s position or direction changes, depending on viewing angle.  Continue Reading

  • May 02, 2012 02 May'12

    Quiz: OMG! Another IM Lingo Challenge 4U

    Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms.  Continue Reading

  • May 01, 2012 01 May'12

    IT process automation

    IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.  Continue Reading

  • May 01, 2012 01 May'12

    arc flash

    An arc flash is an undesired electric discharge that travels through the air between conductors or from a conductor to a ground. The discharge releases enough energy to cause an explosion.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close