Browse Definitions :
  • November 29, 2013 29 Nov'13

    insider trading

    Insider trading is the buying and selling of securities based on information that has not been made available to the general public. Because insider information gives an investor an advantage over others, it is illegal and punishable by law.  Continue Reading

  • November 29, 2013 29 Nov'13

    earnings season

    Earnings season is the period following a fiscal quarter or fiscal year, when most publicly-traded companies report their financial results. The fiscal year of most corporations follows the calendar year so, for the common first quarter, which runs ...  Continue Reading

  • November 29, 2013 29 Nov'13

    blackout period

    A blackout period is a duration of time when access to something usually available is prohibited. In a financial context, it often means that a company's executives and/or employees who are privy to inside information are restricted from buying or ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind farm

    A wind farm or wind park is a grouping of wind turbines in an area. Wind farms are placed in areas of consistent and less turbulent airflow. They may be land-based (on-shore) or out at sea (off shore), either on platforms or on pillars coming from ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind power

    Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power. Sailing and similar activities are among the simplest, oldest and most direct applications of wind power. Mechanical ...  Continue Reading

  • November 27, 2013 27 Nov'13

    security (finance)

    A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded. The most common examples of securities are stocks and bonds. Securities are generally classified as either equity or debt ...  Continue Reading

  • November 27, 2013 27 Nov'13

    quiet period

    A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public. Quiet periods are mandated in ...  Continue Reading

  • November 25, 2013 25 Nov'13

    Happy Hour Virus

    Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working. As the name implies, the software is designed to allow the user to leave work early. The fake virus doesn't do any harm ...  Continue Reading

  • November 24, 2013 24 Nov'13

    bait and switch

    Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase. When a customer tries, unsuccessfully, to buy the item that was advertised, the seller tries...  Continue Reading

  • November 22, 2013 22 Nov'13

    waste heat recovery

    Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere. Waste heat recouping methods range from the simple to the complex. A common ...  Continue Reading

  • November 21, 2013 21 Nov'13

    rabbit hole

    A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots. The term comes from Lewis Carroll's "Alice's Adventures in Wonderland." The protagonist in that book, Alice, falls down a rabbit hole...  Continue Reading

  • November 21, 2013 21 Nov'13

    non-renewable resource

    A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way. The most common examples of non-renewable resources are fossil fuels, such as coal, oil and ...  Continue Reading

  • November 21, 2013 21 Nov'13

    Kyoto Protocol

    The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.  Continue Reading

  • November 21, 2013 21 Nov'13

    business sustainability

    Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.  Continue Reading

  • November 20, 2013 20 Nov'13

    DNS amplification attack

    A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ...  Continue Reading

  • November 20, 2013 20 Nov'13

    skin effect

    Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.  Continue Reading

  • November 20, 2013 20 Nov'13

    CRUSH (Controlled Replication Under Scalable Hashing)

    CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.  Continue Reading

  • November 20, 2013 20 Nov'13

    MiFi

    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.  Continue Reading

  • November 19, 2013 19 Nov'13

    LED light bulb

    An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light. LED light bulbs are a more environmentally-friendly alternative to incandescent bulbs.  Continue Reading

  • November 15, 2013 15 Nov'13

    stacked ranking

    Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several  levels of performance.  Because the ranking is inherently somewhat arbitrary, the model is also sometimes referred to as a forced ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close