Browse Definitions:
  • July 31, 2012 31 Jul'12

    SafeSquid

    SafeSquid is an HTTP 1.1 content filtering proxy server.  Continue Reading

  • July 31, 2012 31 Jul'12

    National Informatics Centre (NIC)

    The National Informatics Centre (NIC) is an institute set up by the Indian government in 1976 to drive its technology and e-governance initiatives.  Continue Reading

  • July 30, 2012 30 Jul'12

    sensor

    A sensor is a device that detects and responds to some type of input from the physical environment. The specific input could be light, heat, motion, moisture, pressure, or any one of a great number of other environmental phenomena.  Continue Reading

  • July 30, 2012 30 Jul'12

    discrete event simulation (DES)

    Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events. In this context, an event comprises a specific change in the system's state at a specific point in time.  Continue Reading

  • July 27, 2012 27 Jul'12

    piggybacking

    Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN. The purpose is network access, rather than any malicious intent, but it can slow down data transfer for the legitimate network users.  Continue Reading

  • July 27, 2012 27 Jul'12

    Multipath I/O (MPIO)

    Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage network devices.  Continue Reading

  • July 27, 2012 27 Jul'12

    DGS&D (DGS&D rate contracts)

    DGS&D is the central purchase organization of the Indian government, functioning under the Ministry of Commerce & Industry. Its role is to finalize the rate contracts to be used by Government departments to procure  items of general use.  Continue Reading

  • July 27, 2012 27 Jul'12

    Indian Institute of Information Technology (IIIT)

    The Indian Institute of Information Technology is a group of educational centers in India that focus on information technology and associated business requirements.  Continue Reading

  • July 27, 2012 27 Jul'12

    Reserve Bank of India (RBI)

    The Reserve Bank of India (RBI) is the central banking authority of the country and dictates its monetary policy.  Continue Reading

  • July 27, 2012 27 Jul'12

    State Bank of India (SBI)

    State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.   Continue Reading

  • July 27, 2012 27 Jul'12

    Apple Retina display

    The Apple Retina display is a backlit LCD (liquid crystal display) that provides resolution levels of 220 to 326 pixels per inch. Retina displays are included in recent models of Apple's mobile devices and the MacBook Pro notebook computer.  Continue Reading

  • July 27, 2012 27 Jul'12

    memory coherence

    Memory coherence is a desirable condition in which corresponding memory locations for each processing element in a multi-core processor always contain the same cached data. Without memory coherence, programs can be adversely affected.  Continue Reading

  • July 26, 2012 26 Jul'12

    resource-oriented architecture (ROA)

    A resource-oriented architecture (ROA) is the structural design supporting the internetworking of resources. A resource, in this context, is any entity that can be identified and assigned a uniform resource identifier (URI).  Continue Reading

  • July 23, 2012 23 Jul'12

    USART (Universal Synchronous/Asynchronous Receiver/Transmitter)

    A USART (Universal Synchronous/Asynchronous Receiver/Transmitter) is a microchip that facilitates communication through a computer's serial port using the RS-232C protocol.  Continue Reading

  • July 23, 2012 23 Jul'12

    bit slicing

    Bit slicing is a method of combining processor modules to multiply the word length. Bit slicing was common with early processors, notably the AMD (Advanced Micro Devices) 2900 series that originated in 1975.  Continue Reading

  • July 18, 2012 18 Jul'12

    Web stack

    A Web stack is the collection of software required for Web development. At a minimum, a Web stack contains an operating system, a programming language, database software and a Web server.  Continue Reading

  • July 18, 2012 18 Jul'12

    solution stack

    A solution stack is an ordered collection of software that makes it possible to complete a particular task. A server stack, for example, includes the software required for basic server functioning.  Continue Reading

  • July 17, 2012 17 Jul'12

    server stack

    A server stack is the collection of software that forms the operational infrastructure on a given machine. In a computing context, a stack is an ordered pile.  Continue Reading

  • July 17, 2012 17 Jul'12

    caching

    Caching (pronounced “cashing”) is the process of storing data in a cache. A cache is a temporary storage area.  Continue Reading

  • July 17, 2012 17 Jul'12

    voltage reference

    A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close