Browse Definitions :
  • November 29, 2014 29 Nov'14

    agentless

    Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.  Continue Reading

  • November 29, 2014 29 Nov'14

    Ethernet hard drive

    An Ethernet hard drive is an external hard drive with a direct Ethernet interface to simplify storage networks, data centers and cloud operations.  Continue Reading

  • November 29, 2014 29 Nov'14

    XKeyscore

    XKeyscore (XKS) is the front end search engine interface that interacts with all NSA  federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens.  Continue Reading

  • November 28, 2014 28 Nov'14

    Unified Functioning Testing Certification

    Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.  Continue Reading

  • November 28, 2014 28 Nov'14

    long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as ...  Continue Reading

  • November 28, 2014 28 Nov'14

    bioprinting

    Although bioprinting is still in the experimental stage and is currently used primarily in scientific study rather than applied science, the possibility of creating functional replacement tissues or organs could one day transform medical treatment.  Continue Reading

  • November 28, 2014 28 Nov'14

    breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, ...  Continue Reading

  • November 27, 2014 27 Nov'14

    transparency

    Transparency, in the context of governance, means being open and honest in all official activities. The implication is that all activities are scrupulous enough that they could bear public scrutiny.  Continue Reading

  • November 27, 2014 27 Nov'14

    accountability

    Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken). Accountability and transparency are generally considered the two main pillars of good corporate governance.  Continue Reading

  • November 27, 2014 27 Nov'14

    Cyber Monday

    Cyber Monday is a marketing event created to promote online sales. The day falls on the Monday after Black Friday, which directly follows American Thanksgiving Day.  Continue Reading

  • November 25, 2014 25 Nov'14

    NCR (no country redirect)

    An explanation of the NCR (no country redirect) search parameter. This definition of NCR explains how Google search redirect works and how you can prevent the search engine from redirecting to your country.  Continue Reading

  • November 24, 2014 24 Nov'14

    burnout

    Burnout is persistent exhaustion and a lack of engagement caused by long-term stress, usually as a result of multiple workplace and personal responsibilities.  Continue Reading

  • November 24, 2014 24 Nov'14

    confidentiality, integrity, and availability (CIA triad)

    Confidentiality, integrity, and availability, known as the CIA triad, is a model designed to guide information security practices and policies within an organization.  Continue Reading

  • November 20, 2014 20 Nov'14

    micromanagement

    Micromanagement is an approach to overseeing staff that is characterized by a need to control the actions of employees beyond what is useful or effective.  Continue Reading

  • November 20, 2014 20 Nov'14

    semi-structured data

    Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw ...  Continue Reading

  • November 18, 2014 18 Nov'14

    recommendation engine

    Recommendation engines are common among online retail websites, such as Amazon. Also known as recommender systems, these applications suggest products (or something else a visitor might search for, like books or videos) based on data gathered about ...  Continue Reading

  • November 17, 2014 17 Nov'14

    Twitter essay

    A Twitter essay is content supporting a particular thesis or viewpoint that is written through sequential and usually numbered tweets. Twitter essays are created, read and developed in real time; the accumulated tweets may be assembled on a site ...  Continue Reading

  • November 11, 2014 11 Nov'14

    third party

    A third party is an entity that is involved in some way in an interaction that is primarily between two other entities. The third party may or may not be officially a part of the transaction between the two primary entities (known as the first party...  Continue Reading

  • November 07, 2014 07 Nov'14

    Remote Access server role

    Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.  Continue Reading

  • November 05, 2014 05 Nov'14

    log (log file)

    A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system. Virtually all software applications and systems produce log files.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close