Browse Definitions :
  • November 29, 2013 29 Nov'13

    insider trading

    Insider trading is the buying and selling of securities based on information that has not been made available to the general public. Because insider information gives an investor an advantage over others, it is illegal and punishable by law.  Continue Reading

  • November 29, 2013 29 Nov'13

    earnings season

    Earnings season is the period following a fiscal quarter or fiscal year, when most publicly-traded companies report their financial results. The fiscal year of most corporations follows the calendar year so, for the common first quarter, which runs ...  Continue Reading

  • November 29, 2013 29 Nov'13

    blackout period

    A blackout period is a duration of time when access to something usually available is prohibited. In a financial context, it often means that a company's executives and/or employees who are privy to inside information are restricted from buying or ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind farm

    A wind farm or wind park is a grouping of wind turbines in an area. Wind farms are placed in areas of consistent and less turbulent airflow. They may be land-based (on-shore) or out at sea (off shore), either on platforms or on pillars coming from ...  Continue Reading

  • November 29, 2013 29 Nov'13

    wind power

    Wind power is the kinetic energy of wind, harnessed and redirected to perform a task mechanically or to generate electrical power. Sailing and similar activities are among the simplest, oldest and most direct applications of wind power. Mechanical ...  Continue Reading

  • November 27, 2013 27 Nov'13

    security (finance)

    A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded. The most common examples of securities are stocks and bonds. Securities are generally classified as either equity or debt ...  Continue Reading

  • November 27, 2013 27 Nov'13

    quiet period

    A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public. Quiet periods are mandated in ...  Continue Reading

  • November 25, 2013 25 Nov'13

    Happy Hour Virus

    Happy Hour Virus is a web app that makes the user's computer appear to be compromised by malware and, as a result, not working. As the name implies, the software is designed to allow the user to leave work early. The fake virus doesn't do any harm ...  Continue Reading

  • November 24, 2013 24 Nov'13

    bait and switch

    Bait and switch is a fraudulent practice in which a seller advertises a special deal but makes only a very small number of the items available for purchase. When a customer tries, unsuccessfully, to buy the item that was advertised, the seller tries...  Continue Reading

  • November 22, 2013 22 Nov'13

    waste heat recovery

    Waste heat recovery is the collection of heat created as an undesired by-product of the operation of a piece of equipment or machinery to fill a desired purpose elsewhere. Waste heat recouping methods range from the simple to the complex. A common ...  Continue Reading

  • November 21, 2013 21 Nov'13

    rabbit hole

    A rabbit hole, in a metaphorical sense, is a long and winding exploratory path with many connections and offshoots. The term comes from Lewis Carroll's "Alice's Adventures in Wonderland." The protagonist in that book, Alice, falls down a rabbit hole...  Continue Reading

  • November 21, 2013 21 Nov'13

    non-renewable resource

    A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way. The most common examples of non-renewable resources are fossil fuels, such as coal, oil and ...  Continue Reading

  • November 21, 2013 21 Nov'13

    Kyoto Protocol

    The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.  Continue Reading

  • November 21, 2013 21 Nov'13

    business sustainability

    Business sustainability is the management and coordination of environmental, social and financial demands and concerns to ensure responsible, ethical and ongoing success.  Continue Reading

  • November 20, 2013 20 Nov'13

    DNS amplification attack

    A DNS amplification attack is a reflection-based distributed denial of service (DDos) attack. The attacker spoofs look-up requests to DNS servers to hide the source of the exploit and direct the response to the target. Through various techniques, ...  Continue Reading

  • November 20, 2013 20 Nov'13

    skin effect

    Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.  Continue Reading

  • November 20, 2013 20 Nov'13

    CRUSH (Controlled Replication Under Scalable Hashing)

    CRUSH (Controlled Replication Under Scalable Hashing) is a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object –based storage cluster.  Continue Reading

  • November 20, 2013 20 Nov'13


    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.  Continue Reading

  • November 19, 2013 19 Nov'13

    LED light bulb

    An LED light bulb is a solid-state lighting (SSL) device that fits in standard screw-in connections but uses LEDs (light-emitting diodes) to produce light. LED light bulbs are a more environmentally-friendly alternative to incandescent bulbs.  Continue Reading

  • November 15, 2013 15 Nov'13

    stacked ranking

    Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several  levels of performance.  Because the ranking is inherently somewhat arbitrary, the model is also sometimes referred to as a forced ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...