Browse Definitions:
  • May 31, 2013 31 May'13

    product placement

    Product placement is the inclusion of a branded product in media, usually without explicit reference to the product. Most commonly, branded products are featured in movies, television shows and videos. The practice is considered a type of pull ...  Continue Reading

  • May 31, 2013 31 May'13

    pull marketing

    Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods. The ultimate goal is to strengthen consumer awareness of a brand and products and foster demand.    Continue Reading

  • May 31, 2013 31 May'13

    electronic disposal efficiency (EDE) metric

    Electronic disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities.  Continue Reading

  • May 30, 2013 30 May'13

    inductive reasoning

    Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion. Inductive reasoning is often used in applications that involve prediction, ...  Continue Reading

  • May 30, 2013 30 May'13

    deductive reasoning

    Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.  Continue Reading

  • May 30, 2013 30 May'13

    data virtualization software

    Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage systems.  Continue Reading

  • May 30, 2013 30 May'13

    Hot Spot 2.0 (HS 2.0)

    Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming between WiFi and cellular networks. HS 2.0 is based on a set of protocols called 802.11u, which facilitates ...  Continue Reading

  • May 28, 2013 28 May'13

    engine-level encryption

    Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.  Continue Reading

  • May 28, 2013 28 May'13


    MyDiamo is database encryption software for MySQL that runs on virtually all platforms that MySQL supports, including Linux, UNIX and Windows.    Continue Reading

  • May 23, 2013 23 May'13

    flat address space

    1. A flat address space is a set of addresses arranged on a single level. It contrasts with a hierarchical address space, which is organized in subgroups. 2. In computer memory, a flat address space refers to a method of allocation in which each ...  Continue Reading

  • May 22, 2013 22 May'13

    push advertising

    Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards. Online examples of push advertising include ...  Continue Reading

  • May 21, 2013 21 May'13

    storage container

    A storage container is a defined, specific location in high-volume storage. It resembles a folder (or directory) in a computer's file system, although there are some differences in the way files are handled.  Continue Reading

  • May 16, 2013 16 May'13

    native advertising

    Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement. Although native content is often informational rather than...  Continue Reading

  • May 16, 2013 16 May'13

    dot com disclosures (.com disclosures)

    The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original document "Dot Com Disclosures: Information About Online Advertising," issued in May 2000, dealt ...  Continue Reading

  • May 14, 2013 14 May'13

    four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all ...  Continue Reading

  • May 10, 2013 10 May'13

    passive cooling

    Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating. That approach contrasts with active cooling, which involves using fans in preference to slowing the ...  Continue Reading

  • May 10, 2013 10 May'13

    active cooling

    Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat.  Continue Reading

  • May 10, 2013 10 May'13


    ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.  Continue Reading

  • May 08, 2013 08 May'13

    FedRAMP 3PAO (third-party assessment organization)

    A 3PAO is an organization that has been certified to help cloud service providers and government agencies meet FedRAMP compliance regulations. 3PAO stands for Third Party Assessment Organization.  Continue Reading

  • May 08, 2013 08 May'13

    golden record

    A golden record is a single, well-defined version of all the data entities in an organizational ecosystem. Sometimes it's called the "single version of the truth," where "truth" is understood to mean the reference to which data users can turn when ...  Continue Reading



  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...




  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...


  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.