Browse Definitions:
  • September 28, 2012 28 Sep'12


    MicroBlaze is the trade name for a soft processor core designed for Xilinx FPGAs (field-programmable gate arrays). An FPGA is an IC (integrated circuit) designed for configuration "in the field" by the user.  Continue Reading

  • September 28, 2012 28 Sep'12

    virtual address

    A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage  Continue Reading

  • September 27, 2012 27 Sep'12

    Plutchik's wheel of emotions

    Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.  Continue Reading

  • September 26, 2012 26 Sep'12

    rollover ad

    A rollover ad is an online advertisement that appears to be a static image until rollover activates it. Activation usually occurs as an expansion of the ad, often as video, or the launch of a pop-up window.  Continue Reading

  • September 25, 2012 25 Sep'12


    A hierarchy is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical.  Continue Reading

  • September 25, 2012 25 Sep'12

    gray market

    The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products. Gray market products may be less expensive than those bought through official distribution channels but are typically inferior.  Continue Reading

  • September 24, 2012 24 Sep'12

    memory management unit (MMU)

    A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.  Continue Reading

  • September 24, 2012 24 Sep'12

    base address

    A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.  Continue Reading

  • September 24, 2012 24 Sep'12

    physical address

    A physical address is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory), or to a particular register in a memory-mapped I/O (input/output) ...  Continue Reading

  • September 21, 2012 21 Sep'12


    The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts. The backslash is represented as a keyboard character that is the mirror image of the forward slash ( / ), which is ...  Continue Reading

  • September 19, 2012 19 Sep'12


    A tumblelog is a blog that supports short-form mixed media content. Tumblelog posts are brief comments that may contain audio, quotes, links, images or video.  Continue Reading

  • September 19, 2012 19 Sep'12


    Tumblr is a free microblogging site. According to Tumblr, as of July 2012, the platform boasts more than 70 million blogs, 30 billion posts and 16 billion monthly page views. More than 50% of Tumblr visitors are under the age of 35.  Continue Reading

  • September 18, 2012 18 Sep'12

    registry key

    In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry. To a lay person, a registry key looks just like any other Windows folder.  Continue Reading

  • September 18, 2012 18 Sep'12

    interrupt vector

    An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.  Continue Reading

  • September 18, 2012 18 Sep'12


    Paging is a method of writing data to, and reading it from, secondary storage for use in primary storage, also known as main memory. Paging plays a role in memory management for a computer's OS (operating system).  Continue Reading

  • September 18, 2012 18 Sep'12

    memory management

    Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.  Continue Reading

  • September 18, 2012 18 Sep'12

    menu bar

    The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.  Continue Reading

  • September 18, 2012 18 Sep'12

    Do Not Track (DNT)

    Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user. Firefox, Internet Explorer and Safari provide DNT settings; Google's Chrome browser does not.  Continue Reading

  • September 18, 2012 18 Sep'12

    TrueView ad

    TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds. Sponsors only pay for ads that are viewed to completion (or for 30 seconds, whichever comes first), or for those that ...  Continue Reading

  • September 17, 2012 17 Sep'12

    5 Whys

    Five Whys is a guided, team exercise for identifying the root cause of a problem. 5 Whys is used in the “analyze” phase of the Six Sigma DMAIC (define, measure, analyze, improve, control) methodology. It is also a useful tool for agile development ...  Continue Reading



  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...


  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...



  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.