Browse Definitions :
  • May 31, 2013 31 May'13

    product placement

    Product placement is the inclusion of a branded product in media, usually without explicit reference to the product. Most commonly, branded products are featured in movies, television shows and videos. The practice is considered a type of pull ...  Continue Reading

  • May 31, 2013 31 May'13

    pull marketing

    Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods. The ultimate goal is to strengthen consumer awareness of a brand and products and foster demand.    Continue Reading

  • May 31, 2013 31 May'13

    electronic disposal efficiency (EDE) metric

    Electronic disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities.  Continue Reading

  • May 30, 2013 30 May'13

    inductive reasoning

    Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion. Inductive reasoning is often used in applications that involve prediction, ...  Continue Reading

  • May 30, 2013 30 May'13

    data virtualization software

    Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage systems.  Continue Reading

  • May 30, 2013 30 May'13

    Hot Spot 2.0 (HS 2.0)

    Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming between WiFi and cellular networks. HS 2.0 is based on a set of protocols called 802.11u, which facilitates ...  Continue Reading

  • May 28, 2013 28 May'13

    engine-level encryption

    Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.  Continue Reading

  • May 28, 2013 28 May'13


    MyDiamo is database encryption software for MySQL that runs on virtually all platforms that MySQL supports, including Linux, UNIX and Windows.    Continue Reading

  • May 23, 2013 23 May'13

    flat address space

    1. A flat address space is a set of addresses arranged on a single level. It contrasts with a hierarchical address space, which is organized in subgroups. 2. In computer memory, a flat address space refers to a method of allocation in which each ...  Continue Reading

  • May 22, 2013 22 May'13

    push advertising

    Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards. Online examples of push advertising include ...  Continue Reading

  • May 21, 2013 21 May'13

    storage container

    A storage container is a defined, specific location in high-volume storage. It resembles a folder (or directory) in a computer's file system, although there are some differences in the way files are handled.  Continue Reading

  • May 16, 2013 16 May'13

    native advertising

    Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement. Although native content is often informational rather than...  Continue Reading

  • May 16, 2013 16 May'13

    dot com disclosures (.com disclosures)

    The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original document "Dot Com Disclosures: Information About Online Advertising," issued in May 2000, dealt ...  Continue Reading

  • May 14, 2013 14 May'13

    four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all ...  Continue Reading

  • May 10, 2013 10 May'13

    passive cooling

    Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating. That approach contrasts with active cooling, which involves using fans in preference to slowing the ...  Continue Reading

  • May 10, 2013 10 May'13

    active cooling

    Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat.  Continue Reading

  • May 10, 2013 10 May'13


    ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.  Continue Reading

  • May 08, 2013 08 May'13

    FedRAMP 3PAO (third-party assessment organization)

    A 3PAO is an organization that has been certified to help cloud service providers and government agencies meet FedRAMP compliance regulations. 3PAO stands for Third Party Assessment Organization.  Continue Reading

  • May 08, 2013 08 May'13

    golden record

    A golden record is a single, well-defined version of all the data entities in an organizational ecosystem. Sometimes it's called the "single version of the truth," where "truth" is understood to mean the reference to which data users can turn when ...  Continue Reading

  • May 03, 2013 03 May'13

    ambient air cooling

    Ambient air cooling is the use of naturally cool air surrounding a building, such as a data center, to reduce heat inside the facility. The use of ambient air and/or nearby water sources to maintain appropriate ambient temperatures in a data center ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...