Browse Definitions :
  • September 28, 2012 28 Sep'12


    MicroBlaze is the trade name for a soft processor core designed for Xilinx FPGAs (field-programmable gate arrays). An FPGA is an IC (integrated circuit) designed for configuration "in the field" by the user.  Continue Reading

  • September 28, 2012 28 Sep'12

    virtual address

    A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage  Continue Reading

  • September 27, 2012 27 Sep'12

    Plutchik's wheel of emotions

    Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.  Continue Reading

  • September 26, 2012 26 Sep'12

    rollover ad

    A rollover ad is an online advertisement that appears to be a static image until rollover activates it. Activation usually occurs as an expansion of the ad, often as video, or the launch of a pop-up window.  Continue Reading

  • September 25, 2012 25 Sep'12


    A hierarchy is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical.  Continue Reading

  • September 25, 2012 25 Sep'12

    gray market

    The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products. Gray market products may be less expensive than those bought through official distribution channels but are typically inferior.  Continue Reading

  • September 24, 2012 24 Sep'12

    memory management unit (MMU)

    A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.  Continue Reading

  • September 24, 2012 24 Sep'12

    base address

    A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.  Continue Reading

  • September 24, 2012 24 Sep'12

    physical address

    A physical address is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory), or to a particular register in a memory-mapped I/O (input/output) ...  Continue Reading

  • September 21, 2012 21 Sep'12


    The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts. The backslash is represented as a keyboard character that is the mirror image of the forward slash ( / ), which is ...  Continue Reading

  • September 19, 2012 19 Sep'12


    A tumblelog is a blog that supports short-form mixed media content. Tumblelog posts are brief comments that may contain audio, quotes, links, images or video.  Continue Reading

  • September 19, 2012 19 Sep'12


    Tumblr is a free microblogging site. According to Tumblr, as of July 2012, the platform boasts more than 70 million blogs, 30 billion posts and 16 billion monthly page views. More than 50% of Tumblr visitors are under the age of 35.  Continue Reading

  • September 18, 2012 18 Sep'12

    registry key

    In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry. To a lay person, a registry key looks just like any other Windows folder.  Continue Reading

  • September 18, 2012 18 Sep'12

    interrupt vector

    An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.  Continue Reading

  • September 18, 2012 18 Sep'12


    Paging is a method of writing data to, and reading it from, secondary storage for use in primary storage, also known as main memory. Paging plays a role in memory management for a computer's OS (operating system).  Continue Reading

  • September 18, 2012 18 Sep'12

    memory management

    Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.  Continue Reading

  • September 18, 2012 18 Sep'12

    menu bar

    The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.  Continue Reading

  • September 18, 2012 18 Sep'12

    Do Not Track (DNT)

    Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user. Firefox, Internet Explorer and Safari provide DNT settings; Google's Chrome browser does not.  Continue Reading

  • September 18, 2012 18 Sep'12

    TrueView ad

    TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds. Sponsors only pay for ads that are viewed to completion (or for 30 seconds, whichever comes first), or for those that ...  Continue Reading

  • September 17, 2012 17 Sep'12

    5 Whys

    Five Whys is a guided, team exercise for identifying the root cause of a problem. 5 Whys is used in the “analyze” phase of the Six Sigma DMAIC (define, measure, analyze, improve, control) methodology. It is also a useful tool for agile development ...  Continue Reading



  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...


  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...


  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...