Browse Definitions :
  • October 31, 2014 31 Oct'14

    backup and recovery testing

    A backup and recovery test is the process of assessing the effectiveness of an organization’s software and methods of replicating data for security and its ability to reliably retrieve that data should the need arise.  Continue Reading

  • October 31, 2014 31 Oct'14

    employee advocacy

    Employee advocacy is the promotion of an organization by its staff members. A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy ...  Continue Reading

  • October 31, 2014 31 Oct'14

    Likert scale

    The Likert scale is a commonly used survey tool that requests a quantification of some variable from a range of responses. An opinion poll, for example, might provide a series of statements and five responses ranging from "I strongly agree" to "I ...  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid immersion cooling

    One of the simplest examples of liquid immersion cooling is taking a standard air-cooled computer's hardware and submerging it in mineral oil. Mineral, oil being nonconductive and noncapacitive, poses no threat to the electronics.  Continue Reading

  • October 30, 2014 30 Oct'14

    liquid cooling

    Liquid cooling is the reduction of heat in electronic and mechanical devices through exploiting the properties of liquids. Liquid cooling is a firmly established cooling method in many current technologies. Automobiles, mainframes and the systems ...  Continue Reading

  • October 30, 2014 30 Oct'14

    POODLE attack

    A POODLE attack is an exploit that takes advantage of the way some browsers deal with encryption. POODLE (Padding Oracle On Downgraded Legacy Encryption) is the name of the vulnerability that enables the exploit.  Continue Reading

  • October 30, 2014 30 Oct'14


    IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.  Continue Reading

  • October 27, 2014 27 Oct'14

    automatic backup

    Automatic backup, sometimes known as dark backup, is the replication of data through software that performs backup tasks without human interaction. Because data can be lost through equipment failure, human error and other adverse events, consistent...  Continue Reading

  • October 27, 2014 27 Oct'14

    agentless backup

    Agentless backup is the replication of data that is performed without the use of a service, daemon or process (AKA an agent) running in the background to facilitate the process. Access may be conducted through a number of different Internet ...  Continue Reading

  • October 23, 2014 23 Oct'14


    Iometer allows users to set custom input/output profiles to simulate different application workloads for testing. Iometer is also a useful benchmarking tool for storage and is often used for storage solution performance testing as well as for ...  Continue Reading

  • October 22, 2014 22 Oct'14

    Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or ...  Continue Reading

  • October 22, 2014 22 Oct'14

    business risk

    A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negative events over which the organization has no control,...  Continue Reading

  • October 22, 2014 22 Oct'14


    Counter-Googling is the use of the search engine to find information about the party that would traditionally be the searcher (such as a potential customer) by a party that would ordinarily be the subject of the search, such as a business. Common ...  Continue Reading

  • October 20, 2014 20 Oct'14

    pay for privacy

    Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy service may be the only option offered. A cloud storage ...  Continue Reading

  • October 16, 2014 16 Oct'14

    Chief Privacy Officer (CPO)

    A chief privacy officer (CPO) is a corporate executive charged with developing and implementing policies designed to protect customer data from unauthorized access. Other elements of the CPO job include maintaining a comprehensive and current ...  Continue Reading

  • October 15, 2014 15 Oct'14

    smartphone sensor

    A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.  Continue Reading

  • October 09, 2014 09 Oct'14

    Hewlett-Packard (HP)

    HP (Hewlett-Packard) is a prominent IT company based in Palo Alto, California. The company's products include PCs and other computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a ...  Continue Reading

  • October 07, 2014 07 Oct'14

    data loss prevention (DLP)

    Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control ...  Continue Reading

  • October 06, 2014 06 Oct'14

    respawning cookie

    A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again. A 2009 study,” Flash Cookies and Privacy,” showed that cookies ...  Continue Reading

  • October 06, 2014 06 Oct'14

    Flash cookie

    Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...