Browse Definitions:
  • February 27, 2013 27 Feb'13

    Sage CRM

    Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.  Continue Reading

  • February 27, 2013 27 Feb'13

    interrupt marketing

    Interrupt marketing is the traditional model of product promotion, in which people have to stop what they're doing to pay attention to the marketing message or deal with it in some other way.  Continue Reading

  • February 27, 2013 27 Feb'13

    discoverability marketing

    Discoverability marketing is the practice of making it easier for customers or potential customers to find products when they are actively looking for them or have demonstrated a need for them.  Continue Reading

  • February 27, 2013 27 Feb'13

    digital CRM

    Digital customer relationship management is the use of Internet communications channels and technologies to enhance customer relationship management (CRM) and customer experience management (CEM ) initiatives.  Continue Reading

  • February 26, 2013 26 Feb'13

    Shamoon

    Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector.  Continue Reading

  • February 22, 2013 22 Feb'13

    Google Knowledge Graph

    Google Knowledge Graph is a knowledge base integrated with the Google search engine for a visually appealing and intuitive presentation of information related to queries. .  Continue Reading

  • February 21, 2013 21 Feb'13

    Thunderbolt

    Thunderbolt (code named "Light Peak") is a high-speed, bidirectional input/output (I/O) technology that can transfer data of all types on a single cable at speeds of up to 10 Gbps (billions of bits per second).  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Maps

    Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world. In addition to conventional road maps, Google Maps offers aerial and satellite views of many places.  Continue Reading

  • February 20, 2013 20 Feb'13

    Google Now

    Google Now is a Web-based service provided by Google that serves as a day planner. It works on tablet devices and smartphones that run Google's Android OS.  Continue Reading

  • February 20, 2013 20 Feb'13

    3Vs (volume, variety and velocity)

    3Vs (volume, variety and velocity) are three defining properties of big data. Volume refers to the sheer amount of data, variety refers to the number of types of data and velocity refers to the speed of processing.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic attack

    A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.  Continue Reading

  • February 19, 2013 19 Feb'13

    business logic

    Business logic is the programming that manages communication between an end user application and a database. The main components of business logic are business rules and workflows.  Continue Reading

  • February 12, 2013 12 Feb'13

    Android 4.2 Jelly Bean

    Android 4.2 Jelly Bean is the version of Google's mobile operating system that follows Android 4.0 Ice Cream Sandwich (ICS). Android 4.2 Jelly Bean will run on tablet computers and smartphones.  Continue Reading

  • February 12, 2013 12 Feb'13

    correlation coefficient

    A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another. In positively correlated variables, the value increases or decreases in tandem. In negatively ...  Continue Reading

  • February 12, 2013 12 Feb'13

    positive correlation

    A positive correlation is a relationship between two variables such that their values increase or decrease together. Correlations are ranked on a scale from +1 to -1. In a perfect positive correlation, ranked as +1, an increase or decrease in one ...  Continue Reading

  • February 11, 2013 11 Feb'13

    Five Steps to Incident Management in a Virtualized Environment

    Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective...  Continue Reading

  • February 07, 2013 07 Feb'13

    CES (Consumer Electronics Show)

    CES (International Consumer Electronics Show) is an annual technology conference for the consumer electronics industry.   Continue Reading

  • February 05, 2013 05 Feb'13

    spaghetti diagram

    A spaghetti diagram is a graphic representation of the flow of some entity, such as a person, a product or a piece of information, as it goes through some process.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close