Browse Definitions :
  • June 19, 2013 19 Jun'13

    wireless substitution

    Wireless substitution is the process of canceling landline phone service and relying solely upon cellular service. The trend toward wireless substitution is known as fixed-mobile substitution (FMS).  Continue Reading

  • June 18, 2013 18 Jun'13


    Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts. The ratings company created the category in 2013 as part of the effort to...  Continue Reading

  • June 18, 2013 18 Jun'13

    silicon photonics

    Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays. The technology uses lasers to transfer data into light pulses.  Continue Reading

  • June 17, 2013 17 Jun'13

    SCSI Express (SCSIe)

    SCSI Express (SCSIe) is an emerging industry standard for a storage interface that runs Small Computer System Interface (SCSI) commands over a PCI Express (PCIe)link.  Continue Reading

  • June 17, 2013 17 Jun'13


    A selfie is a self-portrait, typically a photograph, that is posted online. The most common places for selfies are blogs, social networking sites, such as Facebook, and photo-sharing websites, such as Instagram.  Continue Reading

  • June 13, 2013 13 Jun'13

    flat design

    Flat design is a simple, graphic style common in user interface (UI), software and Web design. The flat style contrasts with skeuomorphism, an approach that seeks to bring real-world effects to the items designed.  Continue Reading

  • June 13, 2013 13 Jun'13


    Skeuomorphism is the design concept of making items represented resemble their real-world counterparts. For example, an icon on a smartphone screen representing the phone function is designed to look as much like a telephone (or handset) as is ...  Continue Reading

  • June 13, 2013 13 Jun'13


    OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a security framework for determining risk level and planning defenses against cyber assaults. The framework defines a methodology to help organizations minimize exposure ...  Continue Reading

  • June 11, 2013 11 Jun'13

    Apple Passbook

    Apple Passbook is a mobile application on an  iPhone or iPod Touch that allows users to store .pkpass files called passes.  Apple allows vendors to easily build passes that can be used as coupons, boarding passes, tickets, loyalty cards or gift ...  Continue Reading

  • June 11, 2013 11 Jun'13


    Bitcoin is a digital currency (also called crypto-currency) that is not backed by any country's central bank or government. Bitcoins can be traded for goods or services with vendors who accept Bitcoins as payment.  Continue Reading

  • June 07, 2013 07 Jun'13

    unique selling point (USP)

    A unique selling proposition (USP, also seen as unique selling point) is a factor that differentiates a product from its competitors, such as the lowest cost, the highest quality or the first-ever product of its kind. A USP could be thought of as “...  Continue Reading

  • June 07, 2013 07 Jun'13

    positioning statement

    A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’t. Positioning is the process of identifying an appropriate market niche for a product (or service ...  Continue Reading

  • June 07, 2013 07 Jun'13


    Positioning, in a marketing context, is the process of identifying an appropriate market niche for a product, service or brand and getting it established it in that area. The endeavor is further broken down into those three categories. Product ...  Continue Reading

  • June 03, 2013 03 Jun'13

    cord cutting

    Cord cutting, in a telecommunications context, is the practice of stopping a cable or  satellite television service in favor of less expensive options, or getting rid of your landline phone and relying solely on cellular or VoIP (voice over IP) ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.