Browse Definitions :
  • February 27, 2013 27 Feb'13

    Sage CRM

    Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.  Continue Reading

  • February 27, 2013 27 Feb'13

    interrupt marketing

    Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.  Continue Reading

  • February 27, 2013 27 Feb'13

    discoverability marketing

    Discoverability marketing is the practice of making it easier for customers or potential customers to find products when they are actively looking for them or have demonstrated a need for them.  Continue Reading

  • February 27, 2013 27 Feb'13

    digital CRM

    Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.  Continue Reading

  • February 26, 2013 26 Feb'13

    Shamoon

    Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector.  Continue Reading

  • February 25, 2013 25 Feb'13

    unified messaging server (UM server)

    The unified messaging server is a server role in Exchange Server 2007 and Exchange Server 2010 that integrates users' voice mail with Exchange email.  Continue Reading

  • February 22, 2013 22 Feb'13

    Google Knowledge Graph

    Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries. .  Continue Reading

  • February 21, 2013 21 Feb'13

    Thunderbolt

    Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Maps

    Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world. In addition to conventional road maps, Google Maps offers aerial and satellite views of many places.  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Now

    Google Now is a Web-based service provided by Google that serves as a day planner. It works on tablet devices and smartphones that run Google's Android OS.  Continue Reading

  • February 20, 2013 20 Feb'13

    3Vs (volume, variety and velocity)

    3Vs (volume, variety and velocity) are three defining properties of big data. Volume refers to the sheer amount of data, variety refers to the number of types of data and velocity refers to the speed of processing.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic attack

    A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic

    Business logic is the programming that manages communication between an end user application and a database. The main components of business logic are business rules and workflows.  Continue Reading

  • February 12, 2013 12 Feb'13

    Android 4.2 Jelly Bean

    Android 4.2 Jelly Bean is the version of Google's mobile operating system that follows Android 4.0 Ice Cream Sandwich (ICS). Android 4.2 Jelly Bean will run on tablet computers and smartphones.  Continue Reading

  • February 12, 2013 12 Feb'13

    correlation coefficient

    A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another. In positively correlated variables, the value increases or decreases in tandem. In negatively ...  Continue Reading

  • February 12, 2013 12 Feb'13

    positive correlation

    A positive correlation is a relationship between two variables such that their values increase or decrease together. Correlations are ranked on a scale from +1 to -1. In a perfect positive correlation, ranked as +1, an increase or decrease in one ...  Continue Reading

  • February 11, 2013 11 Feb'13

    Five Steps to Incident Management in a Virtualized Environment

    Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective...  Continue Reading

  • February 07, 2013 07 Feb'13

    CES (Consumer Electronics Show)

    CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.   Continue Reading

  • February 05, 2013 05 Feb'13

    spaghetti diagram

    A spaghetti diagram is a graphic representation of the flow of some entity, such as a person, a product or a piece of information, as it goes through some process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close