Browse Definitions :
  • July 31, 2012 31 Jul'12

    SafeSquid

    SafeSquid is an HTTP 1.1 content filtering proxy server.  Continue Reading

  • July 31, 2012 31 Jul'12

    National Informatics Centre (NIC)

    The National Informatics Centre (NIC) is an institute set up by the Indian government in 1976 to drive its technology and e-governance initiatives.  Continue Reading

  • July 30, 2012 30 Jul'12

    sensor

    A sensor is a device that detects and responds to some type of input from the physical environment. The specific input could be light, heat, motion, moisture, pressure, or any one of a great number of other environmental phenomena.  Continue Reading

  • July 30, 2012 30 Jul'12

    discrete event simulation (DES)

    Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events. In this context, an event comprises a specific change in the system's state at a specific point in time.  Continue Reading

  • July 27, 2012 27 Jul'12

    piggybacking

    Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN. The purpose is network access, rather than any malicious intent, but it can slow down data transfer for the legitimate network users.  Continue Reading

  • July 27, 2012 27 Jul'12

    Multipath I/O (MPIO)

    Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage network devices.  Continue Reading

  • July 27, 2012 27 Jul'12

    DGS&D (DGS&D rate contracts)

    DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry. Its role is to finalize the rate contracts to be used by Government departments to procure  items of general use.  Continue Reading

  • July 27, 2012 27 Jul'12

    Indian Institute of Information Technology (IIIT)

    The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.  Continue Reading

  • July 27, 2012 27 Jul'12

    Reserve Bank of India (RBI)

    The Reserve Bank of India (RBI) is the central banking authority of the country and dictates its monetary policy.  Continue Reading

  • July 27, 2012 27 Jul'12

    State Bank of India (SBI)

    State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.   Continue Reading

  • July 27, 2012 27 Jul'12

    Apple Retina display

    The Apple Retina display is a backlit LCD (liquid crystal display) that provides resolution levels of 220 to 326 pixels per inch. Retina displays are included in recent models of Apple's mobile devices and the MacBook Pro notebook computer.  Continue Reading

  • July 27, 2012 27 Jul'12

    memory coherence

    Memory coherence is a desirable condition in which corresponding memory locations for each processing element in a multi-core processor always contain the same cached data. Without memory coherence, programs can be adversely affected.  Continue Reading

  • July 26, 2012 26 Jul'12

    resource-oriented architecture (ROA)

    A resource-oriented architecture (ROA) is the structural design supporting the internetworking of resources. A resource, in this context, is any entity that can be identified and assigned a uniform resource identifier (URI).  Continue Reading

  • July 23, 2012 23 Jul'12

    USART (Universal Synchronous/Asynchronous Receiver/Transmitter)

    A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.  Continue Reading

  • July 23, 2012 23 Jul'12

    bit slicing

    Bit slicing is a method of combining processor modules to multiply the word length. Bit slicing was common with early processors, notably the AMD (Advanced Micro Devices) 2900 series that originated in 1975.  Continue Reading

  • July 18, 2012 18 Jul'12

    Web stack

    A Web stack is the collection of software required for Web development. At a minimum, a Web stack contains an operating system, a programming language, database software and a Web server.  Continue Reading

  • July 18, 2012 18 Jul'12

    solution stack

    A solution stack is an ordered collection of software that makes it possible to complete a particular task. A server stack, for example, includes the software required for basic server functioning.  Continue Reading

  • July 17, 2012 17 Jul'12

    server stack

    A server stack is the collection of software that forms the operational infrastructure on a given machine. In a computing context, a stack is an ordered pile.  Continue Reading

  • July 17, 2012 17 Jul'12

    caching

    Caching (pronounced “cashing”) is the process of storing data in a cache. A cache is a temporary storage area.  Continue Reading

  • July 17, 2012 17 Jul'12

    voltage reference

    A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close