Browse Definitions :
  • July 31, 2013 31 Jul'13

    heads-up display (HUD)

    A heads-up display (HUD) is a transparent or miniaturized display technology that does not require users to shift their gaze from where they are naturally looking. A HUD should not obstruct the user's view. This is typically achieved by the use of ...  Continue Reading

  • July 31, 2013 31 Jul'13

    Chinese wall

    A Chinese wall is a barrier that separates two or more groups, usually as a means of restricting the flow of information. The concept of the Chinese wall is employed in a wide variety of environments, including the financial industry, business, ...  Continue Reading

  • July 30, 2013 30 Jul'13

    iOS 7

    iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, ...  Continue Reading

  • July 30, 2013 30 Jul'13


    x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor. x86-64 is also known as x64 and AMD64.  Continue Reading

  • July 30, 2013 30 Jul'13

    reference data

    Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.  Continue Reading

  • July 30, 2013 30 Jul'13

    transactional data

    Transactional data, in the context of data management, is the information recorded from transactions. A transaction, in this context, is a sequence of information exchange and related work (such as database updating) that is treated as a unit for ...  Continue Reading

  • July 30, 2013 30 Jul'13

    corporate culture

    Corporate culture is the pervasive values, beliefs and attitudes that characterize a company. An organization's corporate culture may be articulated in its mission statement or vision statement.  Continue Reading

  • July 19, 2013 19 Jul'13


    Joomla! is a free open source website development and content management (CMS) platform. Like other content management systems, Joomla! removes much of the technical aspect of setting up and running a website.  Continue Reading

  • July 18, 2013 18 Jul'13

    dark data center

    A dark data center is a facility that is almost exclusively administered remotely, through lights-out management (LOM). Common tasks that would ordinarily require physical access are automated. Humans have to enter the data center only in rare or ...  Continue Reading

  • July 18, 2013 18 Jul'13

    dark storage

    Dark storage is allocated but unused storage capacity. Although configured and mapped to servers, dark storage is not presented as file systems or volumes to users and applications.  Continue Reading

  • July 18, 2013 18 Jul'13


    Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS). The zetta in zettaflop represents 10 to the 21st power -- 10 multiplied by itself 21 times (which equals a septillion).  Continue Reading

  • July 18, 2013 18 Jul'13

    Encyclopedia of Ethical Failure (EEF)

    The Encyclopedia of Ethical Failure (EEF) is a series of case studies that illustrates poor judgement on the part of United States federal employees. In general terms, an ethical failure is a poor decision that intentionally or unintentionally ...  Continue Reading

  • July 15, 2013 15 Jul'13

    creative destruction

    Creative destruction is a process through which something new brings about the demise of whatever existed before it.  The term is used in a variety of areas including economics, corporate governance, product development, technology and marketing.  Continue Reading

  • July 15, 2013 15 Jul'13

    business cycle

    The business cycle is a repeated four-stage sequence of growth, stagnation and decline in a free-enterprise economy. The stage of the cycle is identified by fluctuations in gross domestic product (GDP), production, trade and activity in the ...  Continue Reading

  • July 14, 2013 14 Jul'13

    golden parachute

    A golden parachute is a severance agreement that provides an executive with a substantial package upon termination, usually in the event of a takeover or merger. Such a package might include severance pay, bonuses and stock options, among other ...  Continue Reading

  • July 11, 2013 11 Jul'13

    ITU X.225 (ISO 8327)

    ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.  The ITU X.225 protocol specification is a recommendation of the International Telecommunication Union (ITU).  Continue Reading

  • July 11, 2013 11 Jul'13

    executive sponsor

    An executive sponsor is a C-level administrator who has a vested interest in seeing a project to completion.  Continue Reading

  • July 11, 2013 11 Jul'13

    lifestyle business

    A lifestyle business is one that is geared toward supporting the owner’s income and personal requirements rather than maximizing revenue. The emphasis for such a business is usually on creating a sustainable and pleasant work/life balance.  Continue Reading

  • July 10, 2013 10 Jul'13

    severance package

    A severance package is the contracted pay and benefits provided to an employee whose job is terminated. Severance agreements specify what will be provided, as well as terms and conditions under which the employee might forfeit some or all of his ...  Continue Reading

  • July 10, 2013 10 Jul'13

    endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...