Browse Definitions :
  • November 29, 2014 29 Nov'14

    agentless

    Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.  Continue Reading

  • November 29, 2014 29 Nov'14

    Ethernet hard drive

    An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.  Continue Reading

  • November 29, 2014 29 Nov'14

    XKeyscore

    XKeyscore (XKS) is the front end search engine interface that interacts with all NSA  federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens.  Continue Reading

  • November 28, 2014 28 Nov'14

    Unified Functioning Testing Certification

    Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.  Continue Reading

  • November 28, 2014 28 Nov'14

    long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as ...  Continue Reading

  • November 28, 2014 28 Nov'14

    bioprinting

    Although bioprinting is still in the experimental stage and is currently used primarily in scientific study rather than applied science, the possibility of creating functional replacement tissues or organs could one day transform medical treatment.  Continue Reading

  • November 28, 2014 28 Nov'14

    breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, ...  Continue Reading

  • November 27, 2014 27 Nov'14

    transparency

    Transparency, in the context of governance, means being open and honest in all official activities. The implication is that all activities are scrupulous enough that they could bear public scrutiny.  Continue Reading

  • November 27, 2014 27 Nov'14

    accountability

    Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken). Accountability and transparency are generally considered the two main pillars of good corporate governance.  Continue Reading

  • November 27, 2014 27 Nov'14

    Cyber Monday

    Cyber Monday is a marketing event created to promote online sales. The day falls on the Monday after Black Friday, which directly follows American Thanksgiving Day.  Continue Reading

  • November 25, 2014 25 Nov'14

    NCR (no country redirect)

    An explanation of the NCR (no country redirect) search parameter. This definition of NCR explains how Google search redirect works and how you can prevent the search engine from redirecting to your country.  Continue Reading

  • November 24, 2014 24 Nov'14

    burnout

    Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.  Continue Reading

  • November 20, 2014 20 Nov'14

    micromanagement

    Micromanagement is an approach to overseeing staff that is characterized by a need to control the actions of employees beyond what is useful or effective.  Continue Reading

  • November 20, 2014 20 Nov'14

    semi-structured data

    Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw ...  Continue Reading

  • November 18, 2014 18 Nov'14

    recommendation engine

    Recommendation engines are common among online retail websites, such as Amazon. Also known as recommender systems, these applications suggest products (or something else a visitor might search for, like books or videos) based on data gathered about ...  Continue Reading

  • November 17, 2014 17 Nov'14

    Twitter essay

    A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets. Twitter essays are created, read and developed in real time; the accumulated tweets may be assembled on a site ...  Continue Reading

  • November 11, 2014 11 Nov'14

    third party

    A third party is an entity that is involved in some way in an interaction that is primarily between two other entities. The third party may or may not be officially a part of the transaction between the two primary entities (known as the first party...  Continue Reading

  • November 07, 2014 07 Nov'14

    Remote Access server role

    Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.  Continue Reading

  • November 05, 2014 05 Nov'14

    log (log file)

    A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system. Virtually all software applications and systems produce log files.  Continue Reading

  • November 05, 2014 05 Nov'14

    virtual browser

    A virtual browser is a browser that is logically isolated from the underlying computer's operating system (OS). Virtual browsers can protect a computer's underlying operating system from Web-based malware.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close