Browse Definitions :
  • July 31, 2013 31 Jul'13

    heads-up display (HUD)

    A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking. A HUD should not obstruct the user's view. This is typically achieved by the use of ...  Continue Reading

  • July 31, 2013 31 Jul'13

    Chinese wall

    A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information. The concept of the Chinese wall is employed in a wide variety of environments, including the financial industry, business, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    iOS 7

    iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, ...  Continue Reading

  • July 30, 2013 30 Jul'13


    x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor. x86-64 is also known as x64 and AMD64.  Continue Reading

  • July 30, 2013 30 Jul'13

    reference data

    Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.  Continue Reading

  • July 30, 2013 30 Jul'13

    transactional data

    Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work (such as database updating) that is treated as a unit for ...  Continue Reading

  • July 30, 2013 30 Jul'13

    corporate culture

    Corporate culture is the pervasive values, beliefs and attitudes that characterize a company. An organization's corporate culture may be articulated in its mission statement or vision statement.  Continue Reading

  • July 19, 2013 19 Jul'13


    Joomla! is a free open source website development and content management (CMS) platform. Like other content management systems, Joomla! removes much of the technical aspect of setting up and running a website.  Continue Reading

  • July 18, 2013 18 Jul'13

    dark data center

    A dark data center is a facility that is almost exclusively administered remotely, through lights-out management (LOM). Common tasks that would ordinarily require physical access are automated. Humans have to enter the data center only in rare or ...  Continue Reading

  • July 18, 2013 18 Jul'13

    dark storage

    Dark storage is allocated but unused storage capacity. Although configured and mapped to servers, dark storage is not presented as file systems or volumes to users and applications.  Continue Reading

  • July 18, 2013 18 Jul'13


    Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS). The zetta in zettaflop represents 10 to the 21st power -- 10 multiplied by itself 21 times (which equals a septillion).  Continue Reading

  • July 18, 2013 18 Jul'13

    Encyclopedia of Ethical Failure (EEF)

    The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees. In general terms, an ethical failure is a poor decision that intentionally or unintentionally ...  Continue Reading

  • July 15, 2013 15 Jul'13

    creative destruction

    Creative destruction is a process through which something new brings about the demise of whatever existed before it.  The term is used in a variety of areas including economics, corporate governance, product development, technology and marketing.  Continue Reading

  • July 15, 2013 15 Jul'13

    business cycle

    The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy. The stage of the cycle is identified by fluctuations in gross domestic product (GDP), production, trade and activity in the ...  Continue Reading

  • July 14, 2013 14 Jul'13

    golden parachute

    A golden parachute is a severance agreement that provides an executive with a substantial package upon termination, usually in the event of a takeover or merger. Such a package might include severance pay, bonuses and stock options, among other ...  Continue Reading

  • July 11, 2013 11 Jul'13

    ITU X.225 (ISO 8327)

    ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.  The ITU X.225 protocol specification is a recommendation of the International Telecommunication Union (ITU).  Continue Reading

  • July 11, 2013 11 Jul'13

    executive sponsor

    An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.  Continue Reading

  • July 11, 2013 11 Jul'13

    lifestyle business

    A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue. The emphasis for such a business is usually on creating a sustainable and pleasant work/life balance.  Continue Reading

  • July 10, 2013 10 Jul'13

    severance package

    A severance package is the contracted pay and benefits provided to an employee whose job is terminated. Severance agreements specify what will be provided, as well as terms and conditions under which the employee might forfeit some or all of his ...  Continue Reading

  • July 10, 2013 10 Jul'13

    endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.  Continue Reading



  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...


  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.


  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...



  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...