Browse Definitions :
  • June 28, 2013 28 Jun'13

    social entrepreneur

    A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.   Continue Reading

  • June 27, 2013 27 Jun'13

    mathematical induction

    Mathematical induction is a a specialized form of deductive reasoning used to prove a fact about all the elements in an infinite set by performing a finite number of steps.   Continue Reading

  • June 27, 2013 27 Jun'13

    object storage device (OSD)

    An object-based storage device or object storage device (OBSD or OSD) is a computer storage system that organizes data into containers called objects that a user or application determines are related. The objects reside in a flat address space where...  Continue Reading

  • June 27, 2013 27 Jun'13

    object ID (OID)

    An object identifier (OID) is an unambiguous, long-term name for any type of object or entity. The OID mechanism finds application in diverse scenarios, particularly in security.  Continue Reading

  • June 27, 2013 27 Jun'13

    cloud cost analysis tool

    A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations. The tool provides valuable insight into how a business uses its cloud computing resources in general.  Continue Reading

  • June 27, 2013 27 Jun'13

    Access Network Query Protocol (ANQP)

    The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot. The ANQP communicates metadata that is useful in a mobile device's network selection ...  Continue Reading

  • June 27, 2013 27 Jun'13

    802.11u

    802.11u is an amendment to the IEEE 802.11 WLAN standards that provides for connection to external networks using common wireless devices such as smartphones and tablet PCs. An 802.11u-capable device can take advantage of Hot Spot 2.0, also called ...  Continue Reading

  • June 27, 2013 27 Jun'13

    follow-the-sun data center

    A follow-the-sun data center is a data center that moves workloads to different geographic locations to more efficiently balance resources and demand. One method of implementing follow-the-sun computing involves constantly moving virtual machines (...  Continue Reading

  • June 27, 2013 27 Jun'13

    locked down device (LDD)

    A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.  Continue Reading

  • June 27, 2013 27 Jun'13

    data store

    A data store is a repository for persistently storing collections of data, such as a database, a file system or a directory.  Continue Reading

  • June 27, 2013 27 Jun'13

    Word of the Day RSS feed is moving!

    As of July 1, the Word of the Day RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/Word-of-the-Day.xml  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT news roundup RSS feed is moving!

    As of July 1, the Enterprise IT news roundup RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT tips and expert advice RSS feed is moving!

    As of July 1, the Enterprise IT tips and expert advice RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel network

    An angel network is a group of angel investors who have organized to invest collectively, operate more effectively and provide mutual support.  Continue Reading

  • June 26, 2013 26 Jun'13

    seed capital

    Seed capital is the funding required to get a new business started. The first funding, which usually comes from the business owner(s) and perhaps friends and family, supports preliminary activities such as market research and business plan ...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel investor

    An angel investor, sometimes just referred to as an angel, is an individual with private resources who invests in a company or product for personal reasons.  Continue Reading

  • June 26, 2013 26 Jun'13

    compatibility

    Compatibility is the capacity for two systems to work together without having to be altered to do so. Compatible software applications use the same data formats. For example, if word processor applications are compatible, users should be able to ...  Continue Reading

  • June 21, 2013 21 Jun'13

    FatDB

    FatDB is a .Net NoSQL database that can integrates Map Reduce, a work queue, a file management system, high-speed cache and application services within a single implementation.  Continue Reading

  • June 20, 2013 20 Jun'13

    solid oxide fuel cell (SOFC)

    A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte. Ordinarily, fuel cells are powered by substances that are gases or liquids at room temperature, ...  Continue Reading

  • June 19, 2013 19 Jun'13

    Internet TV

    Internet TV (ITV) is generally-available content distributed over the Internet. Unlike IPTV (Internet Protocol television), which is distributed over proprietary networks, ITV is available wherever a broadband connection exists.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close