Browse Definitions :
  • February 27, 2013 27 Feb'13

    Sage CRM

    Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.  Continue Reading

  • February 27, 2013 27 Feb'13

    interrupt marketing

    Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.  Continue Reading

  • February 27, 2013 27 Feb'13

    discoverability marketing

    Discoverability marketing is the practice of making it easier for customers or potential customers to find products when they are actively looking for them or have demonstrated a need for them.  Continue Reading

  • February 27, 2013 27 Feb'13

    digital CRM

    Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.  Continue Reading

  • February 26, 2013 26 Feb'13

    Shamoon

    Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector.  Continue Reading

  • February 25, 2013 25 Feb'13

    unified messaging server (UM server)

    The unified messaging server is a server role in Exchange Server 2007 and Exchange Server 2010 that integrates users' voice mail with Exchange email.  Continue Reading

  • February 22, 2013 22 Feb'13

    Google Knowledge Graph

    Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries. .  Continue Reading

  • February 21, 2013 21 Feb'13

    Thunderbolt

    Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Maps

    Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world. In addition to conventional road maps, Google Maps offers aerial and satellite views of many places.  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Now

    Google Now is a Web-based service provided by Google that serves as a day planner. It works on tablet devices and smartphones that run Google's Android OS.  Continue Reading

  • February 20, 2013 20 Feb'13

    3Vs (volume, variety and velocity)

    3Vs (volume, variety and velocity) are three defining properties of big data. Volume refers to the sheer amount of data, variety refers to the number of types of data and velocity refers to the speed of processing.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic attack

    A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic

    Business logic is the programming that manages communication between an end user application and a database. The main components of business logic are business rules and workflows.  Continue Reading

  • February 12, 2013 12 Feb'13

    Android 4.2 Jelly Bean

    Android 4.2 Jelly Bean is the version of Google's mobile operating system that follows Android 4.0 Ice Cream Sandwich (ICS). Android 4.2 Jelly Bean will run on tablet computers and smartphones.  Continue Reading

  • February 12, 2013 12 Feb'13

    correlation coefficient

    A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another. In positively correlated variables, the value increases or decreases in tandem. In negatively ...  Continue Reading

  • February 12, 2013 12 Feb'13

    positive correlation

    A positive correlation is a relationship between two variables such that their values increase or decrease together. Correlations are ranked on a scale from +1 to -1. In a perfect positive correlation, ranked as +1, an increase or decrease in one ...  Continue Reading

  • February 11, 2013 11 Feb'13

    Five Steps to Incident Management in a Virtualized Environment

    Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective...  Continue Reading

  • February 07, 2013 07 Feb'13

    CES (Consumer Electronics Show)

    CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.   Continue Reading

  • February 05, 2013 05 Feb'13

    spaghetti diagram

    A spaghetti diagram is a graphic representation of the flow of some entity, such as a person, a product or a piece of information, as it goes through some process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close