Browse Definitions :
  • May 29, 2012 29 May'12

    program counter

    A program counter is a register in a computer processor that contains the address (location) of the instruction being executed at the current time.  Continue Reading

  • May 29, 2012 29 May'12

    stack pointer

    A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. The most recently entered request always resides at the top of the stack.  Continue Reading

  • May 29, 2012 29 May'12

    pulse

    A pulse is a burst of current, voltage, or electromagnetic-field energy. In practical electronic and computer systems, a pulse may last from a fraction of a nanosecond up to several seconds or even minutes.  Continue Reading

  • May 23, 2012 23 May'12

    ROM emulation

    ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.  Continue Reading

  • May 22, 2012 22 May'12

    Cassandra (Apache Cassandra)

    Apache Cassandra is an open source distributed database system that is designed for storing and managing large amounts of data across commodity servers.  Continue Reading

  • May 22, 2012 22 May'12

    conductor

    ln electronics, a conductor is a substance in which electrical charge carriers move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.  Continue Reading

  • May 18, 2012 18 May'12

    business process professional

    A business process professional is a person whose job is involves using business process management (BPM) technologies and techniques to enable the continuous improvement, optimization and transformation of an organization’s business processes.  Continue Reading

  • May 18, 2012 18 May'12

    business rules management

    Business rules management (BRM) is the administration and automation of business rules.  Continue Reading

  • May 14, 2012 14 May'12

    CESG Good Practice Guides (GPG)

    Good Practice Guides (GPG) are documents created by the CESG, which provides guidance on aspects of information assurance (IA) to help organisations manage risk effectively.  Continue Reading

  • May 14, 2012 14 May'12

    Office of Cyber Security and Information Assurance (OCSIA)

    The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government.  Continue Reading

  • May 14, 2012 14 May'12

    CESG

    CESG is the UK government's national technical authority for information assurance (IA).  Continue Reading

  • May 08, 2012 08 May'12

    Digg

    Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.  Continue Reading

  • May 08, 2012 08 May'12

    VKontakte (VK)

    VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.  Continue Reading

  • May 03, 2012 03 May'12

    Amazon Silk

    Silk is the browser that Amazon developed for the Kindle Fire tablet computer.  Continue Reading

  • May 02, 2012 02 May'12

    XHTML Cheatsheet

    Cheat sheet quick look-up for XHTML.  Continue Reading

  • May 02, 2012 02 May'12

    Security Learning Guides

    We've gathered a collection of our learning guides and tutorials on security-related topics. You'll find learning guides about security management, threats and vulnerabilities, viruses and other malware and more.  Continue Reading

  • May 02, 2012 02 May'12

    parallax

    Parallax is the way an object�s position or direction changes, depending on viewing angle.  Continue Reading

  • May 02, 2012 02 May'12

    Quiz: OMG! Another IM Lingo Challenge 4U

    Test yourself. A WhatIs.com tech vocabulary quiz about chat and Twitter acronyms.  Continue Reading

  • May 01, 2012 01 May'12

    IT process automation

    IT Process Automation (ITPA), also known as Run Book Automation (RBA), is the ability to orchestrate and integrate tools, people and processes through workflow.  Continue Reading

  • May 01, 2012 01 May'12

    arc flash

    An arc flash is an undesired electric discharge that travels through the air between conductors or from a conductor to a ground. The discharge releases enough energy to cause an explosion.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

Close