Browse Definitions :
  • June 28, 2013 28 Jun'13

    social entrepreneur

    A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.   Continue Reading

  • June 27, 2013 27 Jun'13

    mathematical induction

    Mathematical induction is a a specialized form of deductive reasoning used to prove a fact about all the elements in an infinite set by performing a finite number of steps.   Continue Reading

  • June 27, 2013 27 Jun'13

    object storage device (OSD)

    An object-based storage device or object storage device (OBSD or OSD) is a computer storage system that organizes data into containers called objects that a user or application determines are related. The objects reside in a flat address space where...  Continue Reading

  • June 27, 2013 27 Jun'13

    object ID (OID)

    An object identifier (OID) is an unambiguous, long-term name for any type of object or entity. The OID mechanism finds application in diverse scenarios, particularly in security.  Continue Reading

  • June 27, 2013 27 Jun'13

    cloud cost analysis tool

    A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations. The tool provides valuable insight into how a business uses its cloud computing resources in general.  Continue Reading

  • June 27, 2013 27 Jun'13

    Access Network Query Protocol (ANQP)

    The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot. The ANQP communicates metadata that is useful in a mobile device's network selection ...  Continue Reading

  • June 27, 2013 27 Jun'13

    802.11u

    802.11u is an amendment to the IEEE 802.11 WLAN standards that provides for connection to external networks using common wireless devices such as smartphones and tablet PCs. An 802.11u-capable device can take advantage of Hot Spot 2.0, also called ...  Continue Reading

  • June 27, 2013 27 Jun'13

    follow-the-sun data center

    A follow-the-sun data center is a data center that moves workloads to different geographic locations to more efficiently balance resources and demand. One method of implementing follow-the-sun computing involves constantly moving virtual machines (...  Continue Reading

  • June 27, 2013 27 Jun'13

    locked down device (LDD)

    A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.  Continue Reading

  • June 27, 2013 27 Jun'13

    data store

    A data store is a repository for persistently storing collections of data, such as a database, a file system or a directory.  Continue Reading

  • June 27, 2013 27 Jun'13

    Word of the Day RSS feed is moving!

    As of July 1, the Word of the Day RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/Word-of-the-Day.xml  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT news roundup RSS feed is moving!

    As of July 1, the Enterprise IT news roundup RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT tips and expert advice RSS feed is moving!

    As of July 1, the Enterprise IT tips and expert advice RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel network

    An angel network is a group of angel investors who have organized to invest collectively, operate more effectively and provide mutual support.  Continue Reading

  • June 26, 2013 26 Jun'13

    seed capital

    Seed capital is the funding required to get a new business started. The first funding, which usually comes from the business owner(s) and perhaps friends and family, supports preliminary activities such as market research and business plan ...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel investor

    An angel investor, sometimes just referred to as an angel, is an individual with private resources who invests in a company or product for personal reasons.  Continue Reading

  • June 26, 2013 26 Jun'13

    compatibility

    Compatibility is the capacity for two systems to work together without having to be altered to do so. Compatible software applications use the same data formats. For example, if word processor applications are compatible, users should be able to ...  Continue Reading

  • June 21, 2013 21 Jun'13

    FatDB

    FatDB is a .Net NoSQL database that can integrates Map Reduce, a work queue, a file management system, high-speed cache and application services within a single implementation.  Continue Reading

  • June 20, 2013 20 Jun'13

    solid oxide fuel cell (SOFC)

    A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte. Ordinarily, fuel cells are powered by substances that are gases or liquids at room temperature, ...  Continue Reading

  • June 19, 2013 19 Jun'13

    Internet TV

    Internet TV (ITV) is generally-available content distributed over the Internet. Unlike IPTV (Internet Protocol television), which is distributed over proprietary networks, ITV is available wherever a broadband connection exists.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close