Browse Definitions :
  • June 29, 2012 29 Jun'12

    light field

    The light field is the totality of photons (light particles) traveling in all directions throughout all points in space in a given area. Specifics within the light field can be determined according to the plenoptic function, which can identify any ...  Continue Reading

  • June 28, 2012 28 Jun'12

    light field camera

    A light field camera (also called a plenoptic camera) is an imaging device that creates images that can be readjusted after the picture has been taken, for example, to alter the focus or the depth of field.  Continue Reading

  • June 28, 2012 28 Jun'12

    light field photography

    Light-field photography (also known as plenoptic photography) is an imaging technology that makes it possible to adjust the focus in an existing picture. Unlike conventional images, any area in an image taken with a light-field camera can be brought...  Continue Reading

  • June 27, 2012 27 Jun'12

    microfinance

    Microfinance is the provision of savings accounts, loans, insurance, money transfers and other banking services to customers that lack access to traditional financial services, usually because of poverty.  Continue Reading

  • June 27, 2012 27 Jun'12

    microcredit

    Microcredit is a variation on traditional credit service that involves providing small loans to people who would otherwise be unable to secure credit, typically because of poverty. Related barriers may include unemployment or underemployment and a ...  Continue Reading

  • June 27, 2012 27 Jun'12

    emerging growth company

    An emerging growth company is a business with total annual gross revenues under $1 billion for the most recently ended fiscal year, as indicated on the business income statement presentation according to U.S. GAAP (generally accepted accounting ...  Continue Reading

  • June 26, 2012 26 Jun'12

    JOBS Act (Jumpstart Our Business Startups Act)

    The JOBS Act (Jumpstart Our Business Startups Act) is legislation that eases regulatory restrictions for new businesses to make it easier for startups to get established. The intention of the Act is to encourage more business startups, foster their ...  Continue Reading

  • June 26, 2012 26 Jun'12

    IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ...  Continue Reading

  • June 25, 2012 25 Jun'12

    unique device identifier (UDID)

    A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch. Each UDID character is a numeral or a letter of the alphabet. Using the UDID, third parties, particularly app ...  Continue Reading

  • June 25, 2012 25 Jun'12

    Windows RT

    Windows RT (for "Runtime") is a version of Microsoft's Windows 8 operating system (OS) designed for mobile devices, particularly tablet PCs. The first installations of RT will be on the lower-end version of Microsoft's Surface tablet; the higher end...  Continue Reading

  • June 24, 2012 24 Jun'12

    crowdfunding

    Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals. Similarly to crowdsourcing, the concept from which it developed, crowdfunding's success relies upon the ability to canvass a ...  Continue Reading

  • June 21, 2012 21 Jun'12

    social coding

    Social coding is an approach to software development that places an emphasis on formal and informal collaboration.  Continue Reading

  • June 20, 2012 20 Jun'12

    Internet porn

    Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult ...  Continue Reading

  • June 19, 2012 19 Jun'12

    Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.   Continue Reading

  • June 19, 2012 19 Jun'12

    OpenFlow

    OpenFlow is a protocol that allows a server to tell network switches where to send packets. The packet-moving decisions are centralized, so that the network can be programmed independently of the individual switches and data center gear.  Continue Reading

  • June 18, 2012 18 Jun'12

    wipe

    Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.  Continue Reading

  • June 12, 2012 12 Jun'12

    Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.  Continue Reading

  • June 11, 2012 11 Jun'12

    descriptive modeling

    Descriptive modeling is a mathematical process that describes real-world events and the relationships between factors responsible for them.  Continue Reading

  • June 08, 2012 08 Jun'12

    electrical pollution (dirty electricity)

    Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting ...  Continue Reading

  • June 06, 2012 06 Jun'12

    Google Fiber

    Google Fiber is a project whose goal is to build a fiber optic communications infrastructure.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close