Browse Definitions :
  • October 31, 2014 31 Oct'14

    backup and recovery testing

    A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.  Continue Reading

  • October 31, 2014 31 Oct'14

    employee advocacy

    Employee advocacy is the promotion of an organization by its staff members. A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy ...  Continue Reading

  • October 31, 2014 31 Oct'14

    Likert scale

    The Likert scale is a commonly used survey tool that requests a quantification of some variable from a range of responses. An opinion poll, for example, might provide a series of statements and five responses ranging from "I strongly agree" to "I ...  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid immersion cooling

    One of the simplest examples of liquid immersion cooling is taking a standard air-cooled computer's hardware and submerging it in mineral oil. Mineral, oil being nonconductive and noncapacitive, poses no threat to the electronics.  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid cooling

    Liquid cooling is the reduction of heat in electronic and mechanical devices through exploiting the properties of liquids. Liquid cooling is a firmly established cooling method in many current technologies. Automobiles, mainframes and the systems ...  Continue Reading

  • October 30, 2014 30 Oct'14

    POODLE attack

    A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit.  Continue Reading

  • October 30, 2014 30 Oct'14


    IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.  Continue Reading

  • October 27, 2014 27 Oct'14

    automatic backup

    Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction. Because data can be lost through equipment failure, human error and other adverse events, consistent...  Continue Reading

  • October 27, 2014 27 Oct'14

    agentless backup

    Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process. Access may be conducted through a number of different Internet ...  Continue Reading

  • October 23, 2014 23 Oct'14


    Iometer allows users to set custom input/output profiles to simulate different application workloads for testing. Iometer is also a useful benchmarking tool for storage and is often used for storage solution performance testing as well as for ...  Continue Reading

  • October 22, 2014 22 Oct'14

    Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ...  Continue Reading

  • October 22, 2014 22 Oct'14

    business risk

    A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control,...  Continue Reading

  • October 22, 2014 22 Oct'14


    Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common ...  Continue Reading

  • October 20, 2014 20 Oct'14

    pay for privacy

    Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy service may be the only option offered. A cloud storage ...  Continue Reading

  • October 16, 2014 16 Oct'14

    Chief Privacy Officer (CPO)

    A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current ...  Continue Reading

  • October 15, 2014 15 Oct'14

    smartphone sensor

    A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.  Continue Reading

  • October 09, 2014 09 Oct'14

    Hewlett-Packard (HP)

    HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California. The company's products include PCs and other computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a ...  Continue Reading

  • October 07, 2014 07 Oct'14

    data loss prevention (DLP)

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control ...  Continue Reading

  • October 06, 2014 06 Oct'14

    respawning cookie

    A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again. A 2009 study,” Flash Cookies and Privacy,” showed that cookies ...  Continue Reading

  • October 06, 2014 06 Oct'14

    Flash cookie

    Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.  Continue Reading



  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...


  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...




  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...