Browse Definitions :
  • November 29, 2013 29 Nov'13

    insider trading

    Insider trading is the buying and selling of securities based on information that has not been made available to the general public. Because insider information gives an investor an advantage over others, it is illegal and punishable by law.  Continue Reading

  • November 29, 2013 29 Nov'13

    earnings season

    Earnings season is the period following a fiscal quarter or fiscal year, when most publicly-traded companies report their financial results. The fiscal year of most corporations follows the calendar year so, for the common first quarter, which runs ...  Continue Reading

  • November 29, 2013 29 Nov'13

    blackout period

    A blackout period is a duration of time when access to something usually available is prohibited. In a financial context, it often means that a company's executives and/or employees who are privy to inside information are restricted from buying or ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind farm

    A wind farm or wind park is a grouping of wind turbines in an area. Wind farms are placed in areas of consistent and less turbulent airflow. They may be land-based (on-shore) or out at sea (off shore), either on platforms or on pillars coming from ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind power

    Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power. Sailing and similar activities are among the simplest, oldest and most direct applications of wind power. Mechanical ...  Continue Reading

  • November 27, 2013 27 Nov'13

    security (finance)

    A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded. The most common examples of securities are stocks and bonds. Securities are generally classified as either equity or debt ...  Continue Reading

  • November 27, 2013 27 Nov'13

    quiet period

    A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public. Quiet periods are mandated in ...  Continue Reading

  • November 25, 2013 25 Nov'13

    Happy Hour Virus

    Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working. As the name implies, the software is designed to allow the user to leave work early. The fake virus doesn't do any harm ...  Continue Reading

  • November 24, 2013 24 Nov'13

    bait and switch

    Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase. When a customer tries, unsuccessfully, to buy the item that was advertised, the seller tries...  Continue Reading

  • November 22, 2013 22 Nov'13

    waste heat recovery

    Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere. Waste heat recouping methods range from the simple to the complex. A common ...  Continue Reading

  • November 21, 2013 21 Nov'13

    rabbit hole

    A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots. The term comes from Lewis Carroll's "Alice's Adventures in Wonderland." The protagonist in that book, Alice, falls down a rabbit hole...  Continue Reading

  • November 21, 2013 21 Nov'13

    non-renewable resource

    A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way. The most common examples of non-renewable resources are fossil fuels, such as coal, oil and ...  Continue Reading

  • November 21, 2013 21 Nov'13

    Kyoto Protocol

    The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.  Continue Reading

  • November 21, 2013 21 Nov'13

    business sustainability

    Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.  Continue Reading

  • November 20, 2013 20 Nov'13

    DNS amplification attack

    A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ...  Continue Reading

  • November 20, 2013 20 Nov'13

    skin effect

    Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.  Continue Reading

  • November 20, 2013 20 Nov'13

    CRUSH (Controlled Replication Under Scalable Hashing)

    CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.  Continue Reading

  • November 20, 2013 20 Nov'13

    MiFi

    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.  Continue Reading

  • November 19, 2013 19 Nov'13

    LED light bulb

    An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light. LED light bulbs are a more environmentally-friendly alternative to incandescent bulbs.  Continue Reading

  • November 15, 2013 15 Nov'13

    stacked ranking

    Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several  levels of performance.  Because the ranking is inherently somewhat arbitrary, the model is also sometimes referred to as a forced ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close