Browse Definitions :
  • June 29, 2012 29 Jun'12

    light field

    The light field is the totality of photons (light particles) traveling in all directions throughout all points in space in a given area. Specifics within the light field can be determined according to the plenoptic function, which can identify any ...  Continue Reading

  • June 28, 2012 28 Jun'12

    light field camera

    A light field camera (also called a plenoptic camera) is an imaging device that creates images that can be readjusted after the picture has been taken, for example, to alter the focus or the depth of field.  Continue Reading

  • June 28, 2012 28 Jun'12

    light field photography

    Light-field photography (also known as plenoptic photography) is an imaging technology that makes it possible to adjust the focus in an existing picture. Unlike conventional images, any area in an image taken with a light-field camera can be brought...  Continue Reading

  • June 27, 2012 27 Jun'12

    microfinance

    Microfinance is the provision of savings accounts, loans, insurance, money transfers and other banking services to customers that lack access to traditional financial services, usually because of poverty.  Continue Reading

  • June 27, 2012 27 Jun'12

    microcredit

    Microcredit is a variation on traditional credit service that involves providing small loans to people who would otherwise be unable to secure credit, typically because of poverty. Related barriers may include unemployment or underemployment and a ...  Continue Reading

  • June 27, 2012 27 Jun'12

    emerging growth company

    An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.S. GAAP (generally accepted accounting ...  Continue Reading

  • June 26, 2012 26 Jun'12

    JOBS Act (Jumpstart Our Business Startups Act)

    The JOBS Act (Jumpstart Our Business Startups Act) is legislation that eases regulatory restrictions for new businesses to make it easier for startups to get established. The intention of the Act is to encourage more business startups, foster their ...  Continue Reading

  • June 26, 2012 26 Jun'12

    IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ...  Continue Reading

  • June 25, 2012 25 Jun'12

    unique device identifier (UDID)

    A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch. Each UDID character is a numeral or a letter of the alphabet. Using the UDID, third parties, particularly app ...  Continue Reading

  • June 25, 2012 25 Jun'12

    Windows RT

    Windows RT (for "Runtime") is a version of Microsoft's Windows 8 operating system (OS) designed for mobile devices, particularly tablet PCs. The first installations of RT will be on the lower-end version of Microsoft's Surface tablet; the higher end...  Continue Reading

  • June 24, 2012 24 Jun'12

    crowdfunding

    Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals. Similarly to crowdsourcing, the concept from which it developed, crowdfunding's success relies upon the ability to canvass a ...  Continue Reading

  • June 21, 2012 21 Jun'12

    social coding

    Social coding is an approach to software development that places an emphasis on formal and informal collaboration.  Continue Reading

  • June 20, 2012 20 Jun'12

    Internet porn

    Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult ...  Continue Reading

  • June 19, 2012 19 Jun'12

    Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.   Continue Reading

  • June 19, 2012 19 Jun'12

    OpenFlow

    OpenFlow is a protocol that allows a server to tell network switches where to send packets. The packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear.  Continue Reading

  • June 18, 2012 18 Jun'12

    wipe

    Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.  Continue Reading

  • June 12, 2012 12 Jun'12

    Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.  Continue Reading

  • June 11, 2012 11 Jun'12

    descriptive modeling

    Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.  Continue Reading

  • June 08, 2012 08 Jun'12

    electrical pollution (dirty electricity)

    Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting ...  Continue Reading

  • June 06, 2012 06 Jun'12

    Google Fiber

    Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close