Browse Definitions :
  • July 31, 2013 31 Jul'13

    heads-up display (HUD)

    A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking. A HUD should not obstruct the user's view. This is typically achieved by the use of ...  Continue Reading

  • July 31, 2013 31 Jul'13

    Chinese wall

    A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information. The concept of the Chinese wall is employed in a wide variety of environments, including the financial industry, business, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    iOS 7

    iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    x86-64

    x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor. x86-64 is also known as x64 and AMD64.  Continue Reading

  • July 30, 2013 30 Jul'13

    reference data

    Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.  Continue Reading

  • July 30, 2013 30 Jul'13

    transactional data

    Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work (such as database updating) that is treated as a unit for ...  Continue Reading

  • July 30, 2013 30 Jul'13

    corporate culture

    Corporate culture is the pervasive values, beliefs and attitudes that characterize a company. An organization's corporate culture may be articulated in its mission statement or vision statement.  Continue Reading

  • July 19, 2013 19 Jul'13

    Joomla!

    Joomla! is a free open source website development and content management (CMS) platform. Like other content management systems, Joomla! removes much of the technical aspect of setting up and running a website.  Continue Reading

  • July 18, 2013 18 Jul'13

    dark data center

    A dark data center is a facility that is almost exclusively administered remotely, through lights-out management (LOM). Common tasks that would ordinarily require physical access are automated. Humans have to enter the data center only in rare or ...  Continue Reading

  • July 18, 2013 18 Jul'13

    dark storage

    Dark storage is allocated but unused storage capacity. Although configured and mapped to servers, dark storage is not presented as file systems or volumes to users and applications.  Continue Reading

  • July 18, 2013 18 Jul'13

    zettaflops

    Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS). The zetta in zettaflop represents 10 to the 21st power -- 10 multiplied by itself 21 times (which equals a septillion).  Continue Reading

  • July 18, 2013 18 Jul'13

    Encyclopedia of Ethical Failure (EEF)

    The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees. In general terms, an ethical failure is a poor decision that intentionally or unintentionally ...  Continue Reading

  • July 15, 2013 15 Jul'13

    creative destruction

    Creative destruction is a process through which something new brings about the demise of whatever existed before it.  The term is used in a variety of areas including economics, corporate governance, product development, technology and marketing.  Continue Reading

  • July 15, 2013 15 Jul'13

    business cycle

    The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy. The stage of the cycle is identified by fluctuations in gross domestic product (GDP), production, trade and activity in the ...  Continue Reading

  • July 14, 2013 14 Jul'13

    golden parachute

    A golden parachute is a severance agreement that provides an executive with a substantial package upon termination, usually in the event of a takeover or merger. Such a package might include severance pay, bonuses and stock options, among other ...  Continue Reading

  • July 11, 2013 11 Jul'13

    ITU X.225 (ISO 8327)

    ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.  The ITU X.225 protocol specification is a recommendation of the International Telecommunication Union (ITU).  Continue Reading

  • July 11, 2013 11 Jul'13

    executive sponsor

    An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.  Continue Reading

  • July 11, 2013 11 Jul'13

    lifestyle business

    A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue. The emphasis for such a business is usually on creating a sustainable and pleasant work/life balance.  Continue Reading

  • July 10, 2013 10 Jul'13

    severance package

    A severance package is the contracted pay and benefits provided to an employee whose job is terminated. Severance agreements specify what will be provided, as well as terms and conditions under which the employee might forfeit some or all of his ...  Continue Reading

  • July 10, 2013 10 Jul'13

    endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close