Browse Definitions :
  • June 28, 2013 28 Jun'13

    social entrepreneur

    A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.   Continue Reading

  • June 27, 2013 27 Jun'13

    mathematical induction

    Mathematical induction is a a specialized form of deductive reasoning used to prove a fact about all the elements in an infinite set by performing a finite number of steps.   Continue Reading

  • June 27, 2013 27 Jun'13

    object storage device (OSD)

    An object-based storage device or object storage device (OBSD or OSD) is a computer storage system that organizes data into containers called objects that a user or application determines are related. The objects reside in a flat address space where...  Continue Reading

  • June 27, 2013 27 Jun'13

    object ID (OID)

    An object identifier (OID) is an unambiguous, long-term name for any type of object or entity. The OID mechanism finds application in diverse scenarios, particularly in security.  Continue Reading

  • June 27, 2013 27 Jun'13

    cloud cost analysis tool

    A cloud cost analysis tool is a software product designed to help corporations minimize the cost of their online operations. The tool provides valuable insight into how a business uses its cloud computing resources in general.  Continue Reading

  • June 27, 2013 27 Jun'13

    Access Network Query Protocol (ANQP)

    The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot. The ANQP communicates metadata that is useful in a mobile device's network selection ...  Continue Reading

  • June 27, 2013 27 Jun'13

    802.11u

    802.11u is an amendment to the IEEE 802.11 WLAN standards that provides for connection to external networks using common wireless devices such as smartphones and tablet PCs. An 802.11u-capable device can take advantage of Hot Spot 2.0, also called ...  Continue Reading

  • June 27, 2013 27 Jun'13

    follow-the-sun data center

    A follow-the-sun data center is a data center that moves workloads to different geographic locations to more efficiently balance resources and demand. One method of implementing follow-the-sun computing involves constantly moving virtual machines (...  Continue Reading

  • June 27, 2013 27 Jun'13

    locked down device (LDD)

    A locked down device (LDD) is a mobile device, typically a smartphone, that is shipped by a vendor with the ability to accept only the SIM card that originally came with it.  Continue Reading

  • June 27, 2013 27 Jun'13

    data store

    A data store is a repository for persistently storing collections of data, such as a database, a file system or a directory.  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT tips and expert advice RSS feed is moving!

    As of July 1, the Enterprise IT tips and expert advice RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 27, 2013 27 Jun'13

    Word of the Day RSS feed is moving!

    As of July 1, the Word of the Day RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/Word-of-the-Day.xml  Continue Reading

  • June 27, 2013 27 Jun'13

    Enterprise IT news roundup RSS feed is moving!

    As of July 1, the Enterprise IT news roundup RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://whatis.techtarget.com/rss/...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel network

    An angel network is a group of angel investors who have organized to invest collectively, operate more effectively and provide mutual support.  Continue Reading

  • June 26, 2013 26 Jun'13

    seed capital

    Seed capital is the funding required to get a new business started. The first funding, which usually comes from the business owner(s) and perhaps friends and family, supports preliminary activities such as market research and business plan ...  Continue Reading

  • June 26, 2013 26 Jun'13

    angel investor

    An angel investor, sometimes just referred to as an angel, is an individual with private resources who invests in a company or product for personal reasons.  Continue Reading

  • June 26, 2013 26 Jun'13

    compatibility

    Compatibility is the capacity for two systems to work together without having to be altered to do so. Compatible software applications use the same data formats. For example, if word processor applications are compatible, users should be able to ...  Continue Reading

  • June 21, 2013 21 Jun'13

    FatDB

    FatDB is a .Net NoSQL database that can integrates Map Reduce, a work queue, a file management system, high-speed cache and application services within a single implementation.  Continue Reading

  • June 20, 2013 20 Jun'13

    solid oxide fuel cell (SOFC)

    A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte. Ordinarily, fuel cells are powered by substances that are gases or liquids at room temperature, ...  Continue Reading

  • June 19, 2013 19 Jun'13

    Internet TV

    Internet TV (ITV) is generally-available content distributed over the Internet. Unlike IPTV (Internet Protocol television), which is distributed over proprietary networks, ITV is available wherever a broadband connection exists.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

Close