Browse Definitions :
  • September 28, 2012 28 Sep'12


    MicroBlaze is the trade name for a soft processor core designed for Xilinx FPGAs (field-programmable gate arrays). An FPGA is an IC (integrated circuit) designed for configuration "in the field" by the user.  Continue Reading

  • September 28, 2012 28 Sep'12

    virtual address

    A virtual address is a binary number in virtual memory that enables a process to use a location in primary storage (also called main memory) independently of other processes, and to use more space than actually exists in primary storage  Continue Reading

  • September 27, 2012 27 Sep'12

    Plutchik's wheel of emotions

    Plutchik's wheel of emotions is a model of human emotions that uses overlaying colors to portray combinations of affect.  Continue Reading

  • September 26, 2012 26 Sep'12

    rollover ad

    A rollover ad is an online advertisement that appears to be a static image until rollover activates it. Activation usually occurs as an expansion of the ad, often as video, or the launch of a pop-up window.  Continue Reading

  • September 25, 2012 25 Sep'12


    A hierarchy is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical.  Continue Reading

  • September 25, 2012 25 Sep'12

    gray market

    The gray market (sometimes spelled as "grey market") is the collective system of unauthorized sales channels for products. Gray market products may be less expensive than those bought through official distribution channels but are typically inferior.  Continue Reading

  • September 24, 2012 24 Sep'12

    memory management unit (MMU)

    A memory management unit (MMU) is a computer hardware component that handles all memory and caching operations associated with the processor.  Continue Reading

  • September 24, 2012 24 Sep'12

    base address

    A base address is a unique location in primary storage (or main memory) that serves as a reference point for other memory locations called absolute addresses.  Continue Reading

  • September 24, 2012 24 Sep'12

    physical address

    A physical address is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory), or to a particular register in a memory-mapped I/O (input/output) ...  Continue Reading

  • September 21, 2012 21 Sep'12


    The backslash ( \ ) is a typographic and/or keyboard mark that is widely used in programming languages and other computing contexts. The backslash is represented as a keyboard character that is the mirror image of the forward slash ( / ), which is ...  Continue Reading

  • September 19, 2012 19 Sep'12


    A tumblelog is a blog that supports short-form mixed media content. Tumblelog posts are brief comments that may contain audio, quotes, links, images or video.  Continue Reading

  • September 19, 2012 19 Sep'12


    Tumblr is a free microblogging site. According to Tumblr, as of July 2012, the platform boasts more than 70 million blogs, 30 billion posts and 16 billion monthly page views. More than 50% of Tumblr visitors are under the age of 35.  Continue Reading

  • September 18, 2012 18 Sep'12

    registry key

    In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry. To a lay person, a registry key looks just like any other Windows folder.  Continue Reading

  • September 18, 2012 18 Sep'12

    interrupt vector

    An interrupt vector is the memory location of an interrupt handler, which prioritizes interrupts and saves them in a queue if more than one interrupt is waiting to be handled.  Continue Reading

  • September 18, 2012 18 Sep'12


    Paging is a method of writing data to, and reading it from, secondary storage for use in primary storage, also known as main memory. Paging plays a role in memory management for a computer's OS (operating system).  Continue Reading

  • September 18, 2012 18 Sep'12

    memory management

    Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance.  Continue Reading

  • September 18, 2012 18 Sep'12

    menu bar

    The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.  Continue Reading

  • September 18, 2012 18 Sep'12

    Do Not Track (DNT)

    Do Not Track (DNT) is a browser setting that sends a message to websites and advertising networks requesting that they don't track the user. Firefox, Internet Explorer and Safari provide DNT settings; Google's Chrome browser does not.  Continue Reading

  • September 18, 2012 18 Sep'12

    TrueView ad

    TrueView is a video ad format that gives the viewer options, typically the ability to skip the advertisement after five seconds. Sponsors only pay for ads that are viewed to completion (or for 30 seconds, whichever comes first), or for those that ...  Continue Reading

  • September 17, 2012 17 Sep'12

    5 Whys

    Five Whys is a guided, team exercise for identifying the root cause of a problem. 5 Whys is used in the “analyze” phase of the Six Sigma DMAIC (define, measure, analyze, improve, control) methodology. It is also a useful tool for agile development ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...