Browse Definitions :
  • June 28, 2013 28 Jun'13

    social entrepreneur

    A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.   Continue Reading

  • June 27, 2013 27 Jun'13

    mathematical induction

    Mathematical induction is a a specialized form of deductive reasoning used to prove a fact about all the elements in an infinite set by performing a finite number of steps.   Continue Reading

  • June 27, 2013 27 Jun'13

    object storage device (OSD)

    An object-based storage device or object storage device (OBSD or OSD) is a computer storage system that organizes data into containers called objects that a user or application determines are related. The objects reside in a flat address space where...  Continue Reading

  • June 27, 2013 27 Jun'13

    object ID (OID)

    An object identifier (OID) is an unambiguous, long-term name for any type of object or entity. The OID mechanism finds application in diverse scenarios, particularly in security.  Continue Reading

  • June 27, 2013 27 Jun'13

    cloud cost analysis tool

    A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations. The tool provides valuable insight into how a business uses its cloud computing resources in general.  Continue Reading

  • June 27, 2013 27 Jun'13

    Access Network Query Protocol (ANQP)

    The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot. The ANQP communicates metadata that is useful in a mobile device's network selection ...  Continue Reading

  • June 27, 2013 27 Jun'13

    802.11u

    802.11u is an amendment to the IEEE 802.11 WLAN standards that provides for connection to external networks using common wireless devices such as smartphones and tablet PCs. An 802.11u-capable device can take advantage of Hot Spot 2.0, also called ...  Continue Reading

  • June 27, 2013 27 Jun'13

    follow-the-sun data center

    A follow-the-sun data center is a data center that moves workloads to different geographic locations to more efficiently balance resources and demand. One method of implementing follow-the-sun computing involves constantly moving virtual machines (...  Continue Reading

  • June 27, 2013 27 Jun'13

    locked down device (LDD)

    A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.  Continue Reading

  • June 27, 2013 27 Jun'13

    data store

    A data store is a repository for persistently storing collections of data, such as a database, a file system or a directory.  Continue Reading

  • June 27, 2013 27 Jun'13

    Word of the Day RSS feed is moving!

    As of July 1, the Word of the Day RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/Word-of-the-Day.xml  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT news roundup RSS feed is moving!

    As of July 1, the Enterprise IT news roundup RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT tips and expert advice RSS feed is moving!

    As of July 1, the Enterprise IT tips and expert advice RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel network

    An angel network is a group of angel investors who have organized to invest collectively, operate more effectively and provide mutual support.  Continue Reading

  • June 26, 2013 26 Jun'13

    seed capital

    Seed capital is the funding required to get a new business started. The first funding, which usually comes from the business owner(s) and perhaps friends and family, supports preliminary activities such as market research and business plan ...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel investor

    An angel investor, sometimes just referred to as an angel, is an individual with private resources who invests in a company or product for personal reasons.  Continue Reading

  • June 26, 2013 26 Jun'13

    compatibility

    Compatibility is the capacity for two systems to work together without having to be altered to do so. Compatible software applications use the same data formats. For example, if word processor applications are compatible, users should be able to ...  Continue Reading

  • June 21, 2013 21 Jun'13

    FatDB

    FatDB is a .Net NoSQL database that can integrates Map Reduce, a work queue, a file management system, high-speed cache and application services within a single implementation.  Continue Reading

  • June 20, 2013 20 Jun'13

    solid oxide fuel cell (SOFC)

    A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte. Ordinarily, fuel cells are powered by substances that are gases or liquids at room temperature, ...  Continue Reading

  • June 19, 2013 19 Jun'13

    Internet TV

    Internet TV (ITV) is generally-available content distributed over the Internet. Unlike IPTV (Internet Protocol television), which is distributed over proprietary networks, ITV is available wherever a broadband connection exists.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close