Browse Definitions :
  • May 31, 2013 31 May'13

    product placement

    Product placement is the inclusion of a branded product in media, usually without explicit reference to the product. Most commonly, branded products are featured in movies, television shows and videos. The practice is considered a type of pull ...  Continue Reading

  • May 31, 2013 31 May'13

    pull marketing

    Pull marketing is an approach designed to draw customers to a brand through search engine optimization (SEO) and other non-intrusive methods. The ultimate goal is to strengthen consumer awareness of a brand and products and foster demand.    Continue Reading

  • May 31, 2013 31 May'13

    electronic disposal efficiency (EDE) metric

    Electronic disposal efficiency (EDE) is the percentage of decommissioned information technology electronics and electrical equipment that is disposed of through known responsible entities.  Continue Reading

  • May 30, 2013 30 May'13

    inductive reasoning

    Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion. Inductive reasoning is often used in applications that involve prediction, ...  Continue Reading

  • May 30, 2013 30 May'13

    deductive reasoning

    Deductive reasoning is a logical process in which a conclusion is based on the accordance of multiple premises that are generally assumed to be true.  Continue Reading

  • May 30, 2013 30 May'13

    data virtualization software

    Data virtualization software is application programming that facilitates querying data distributed across multiple internal and/or external storage systems.  Continue Reading

  • May 30, 2013 30 May'13

    Hot Spot 2.0 (HS 2.0)

    Hot Spot 2.0 (HS 2.0), also called Wi-Fi Certified Passpoint, is a new standard for public-access Wi-Fi that enables seamless roaming between WiFi and cellular networks. HS 2.0 is based on a set of protocols called 802.11u, which facilitates ...  Continue Reading

  • May 28, 2013 28 May'13

    engine-level encryption

    Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.  Continue Reading

  • May 28, 2013 28 May'13


    MyDiamo is database encryption software for MySQL that runs on virtually all platforms that MySQL supports, including Linux, UNIX and Windows.    Continue Reading

  • May 23, 2013 23 May'13

    flat address space

    1. A flat address space is a set of addresses arranged on a single level. It contrasts with a hierarchical address space, which is organized in subgroups. 2. In computer memory, a flat address space refers to a method of allocation in which each ...  Continue Reading

  • May 22, 2013 22 May'13

    push advertising

    Push advertising is the traditional marketing approach, in which promotional material is presented to large groups of people through channels including flyers, magazines, television, radio and billboards. Online examples of push advertising include ...  Continue Reading

  • May 21, 2013 21 May'13

    storage container

    A storage container is a defined, specific location in high-volume storage. It resembles a folder (or directory) in a computer's file system, although there are some differences in the way files are handled.  Continue Reading

  • May 16, 2013 16 May'13

    native advertising

    Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement. Although native content is often informational rather than...  Continue Reading

  • May 16, 2013 16 May'13

    dot com disclosures (.com disclosures)

    The dot com disclosures are the Federal Trade Commission's guidelines for applying its regulations to online marketing activities. The FTC's original document "Dot Com Disclosures: Information About Online Advertising," issued in May 2000, dealt ...  Continue Reading

  • May 14, 2013 14 May'13

    four eyes principle

    The four eyes principle is a requirement that two individuals review and approve some action before it can be taken. In a business context, the two individuals are often the CEO and the CFO. However, the principle can be applied to decisions at all ...  Continue Reading

  • May 10, 2013 10 May'13

    passive cooling

    Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating. That approach contrasts with active cooling, which involves using fans in preference to slowing the ...  Continue Reading

  • May 10, 2013 10 May'13

    active cooling

    Active cooling is the use of fans to reduce the heat of computer components. Active cooling contrasts with passive cooling, which involves reducing the speed at which a component is running to reduce its heat.  Continue Reading

  • May 10, 2013 10 May'13


    ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.  Continue Reading

  • May 08, 2013 08 May'13

    FedRAMP 3PAO (third-party assessment organization)

    A 3PAO is an organization that has been certified to help cloud service providers and government agencies meet FedRAMP compliance regulations. 3PAO stands for Third Party Assessment Organization.  Continue Reading

  • May 08, 2013 08 May'13

    golden record

    A golden record is a single, well-defined version of all the data entities in an organizational ecosystem. Sometimes it's called the "single version of the truth," where "truth" is understood to mean the reference to which data users can turn when ...  Continue Reading




  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.