Browse Definitions :
  • August 29, 2013 29 Aug'13


    A webinar is an educational, informative or instructional presentation that is made available online, usually as video or audio with slides. A webinar may take the form of an academic lecture or some other format, such as a business presentation. ...  Continue Reading

  • August 29, 2013 29 Aug'13

    massive open online course (MOOC)

    A massive open online course (MOOC) is a free Web-based educational offering that is designed to enable the participation of large numbers of geographically dispersed students. Although MOOCs don't always provide an academic credit, they give ...  Continue Reading

  • August 29, 2013 29 Aug'13

    digital commons

    The digital commons is the collective of discreet online resources that are collaboratively developed and overseen by a community. Examples include wikis, such as Wikipedia, open licensing organizations, such as the Creative Commons, and open ...  Continue Reading

  • August 28, 2013 28 Aug'13

    tragedy of the commons

    The tragedy of the commons is a problem that occurs when individuals exploit a shared resource to the extent that demand overwhelms supply and the resource becomes unavailable to some or all.  Continue Reading

  • August 28, 2013 28 Aug'13

    battery life

    Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful ...  Continue Reading

  • August 28, 2013 28 Aug'13

    death by PowerPoint

    Death by PowerPoint is a phenomenon caused by the poor use of presentation software.    Continue Reading

  • August 28, 2013 28 Aug'13

    PechaKucha (pecha kucha)

    PechaKucha is a presentation software format that lasts exactly six minutes and forty seconds. Each PechaKucha presentation has 20 slides and each slide is set with the software's timer to display on the screen for exactly 20 seconds before the next...  Continue Reading

  • August 28, 2013 28 Aug'13

    Apache License

    The Apache License is a free software licensing agreement from the Apache Software Foundation that stipulates terms for use, modification and distribution of the software. All ASF software is released under the Apache license. The licensing model is...  Continue Reading

  • August 28, 2013 28 Aug'13


    Photolithography is the standard method of printed circuit board (PCB) and microprocessor fabrication. The process uses light to make the conductive paths of a PCB layer and the paths and electronic components in the silicon wafer of microprocessors.  Continue Reading

  • August 27, 2013 27 Aug'13

    customer self-service (CSS)

    Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.    Continue Reading

  • August 27, 2013 27 Aug'13


    Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price. In comparison to a Web-based business, an online merchant can often offer goods for less ...  Continue Reading

  • August 26, 2013 26 Aug'13


    A storyboard is a graphic organizer that provides the viewer with a high-level view of a project.  Continue Reading

  • August 26, 2013 26 Aug'13

    Pareto efficiency

    Pareto efficiency is a balance of resource distribution such that one individual’s lot cannot be improved without impairing the lot of another individual. The principle originated in economics but has since been applied to other areas of study ...  Continue Reading

  • August 26, 2013 26 Aug'13

    Pareto principle

    The Pareto principle, also known as the 80/20 rule, is a theory maintaining that 80 percent of the output from a given situation or system is determined by 20 percent of the input.  Continue Reading

  • August 23, 2013 23 Aug'13

    information asset

    An information asset is a body of knowledge that is organized and managed as a single entity.  Continue Reading

  • August 23, 2013 23 Aug'13

    96-minute rule

    The 96-minute rule is a productivity guideline derived from the Pareto principle. According to the Pareto principle, 80% of outcomes are determined by 20% of the inputs. In this case, for example, 80% of a worker's output is accomplished in 20% of ...  Continue Reading

  • August 23, 2013 23 Aug'13


    Water-Scrum-fall is a hybrid approach to application lifecycle management that combines waterfall and Scrum development methodologies.  Continue Reading

  • August 23, 2013 23 Aug'13 is an initiative to make the Web affordable and accessible for people in developing and disadvantaged areas of the world. Mark Zucherberg, the Facebook CEO, spearheads the project, which operates as a global coalition of tech companies....  Continue Reading

  • August 22, 2013 22 Aug'13

    Chaos Monkey

    Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).  The software simulates failures of instances of services running within Auto Scaling Groups (ASG) ...  Continue Reading

  • August 22, 2013 22 Aug'13

    Simian Army

    The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix. The tools allow engineers to test the reliability, security, resiliency and recoverability of the cloud services that Netflix ...  Continue Reading



  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...


  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...



  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.


  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...