Browse Definitions:
  • February 28, 2014 28 Feb'14

    Windows 3.1

    Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993. 3.1 was a paid sub-release -- Windows 3.0 had been so popular that Microsoft decided to charge for the modified software rather than offer it as a free ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 3.0

    Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990. This version of Windows was highly successful upon initial release.  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 2.0

    Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987. Windows 2.0 was faster and more stable than Windows 1.0. This Windows version also had more in common still with both the LISA and future versions of ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 1.0

    Windows 1.0 was the first of Microsoft’s GUI-based operating systems, released in 1985. Like many early versions of Windows, the OS was essentially a program that ran on top of DOS. The product release didn’t actually occur until two years after ...  Continue Reading

  • February 26, 2014 26 Feb'14

    sub-release

    A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version. A developer or vendor may choose to do a sub-release for a number of reasons.  Continue Reading

  • February 26, 2014 26 Feb'14

    instruction set

    An instruction set is a group of commands for a CPU in machine language. The term can refer to all possible instructions for a CPU or a subset of instructions to enhance its performance in certain situations.  Continue Reading

  • February 26, 2014 26 Feb'14

    expanded memory

    Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.  Continue Reading

  • February 26, 2014 26 Feb'14

    extended memory

    Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80486

    Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor. The 80486 was capable of over 40 million instructions per second (MIPS) and offered roughly twice the performance of the 386.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80386

    Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985. The 386 followed Intel’s 8086 and 80286 processors and predated the 80486.  Continue Reading

  • February 26, 2014 26 Feb'14

    standards organization

    A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.  Continue Reading

  • February 26, 2014 26 Feb'14

    de jure standard

    A de jure standard is a technology, method or product that has been officially endorsed for a given application. De jure, from Medieval Latin, means from law. The term refers not only to legally protected or enforced standards but also to those that...  Continue Reading

  • February 26, 2014 26 Feb'14

    de facto standard

    A de facto standard is something that is used so widely that it is considered a standard for a given application although it has no official status. De facto, from Medieval Latin, means from fact.  Continue Reading

  • February 20, 2014 20 Feb'14

    ad hoc

    Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use. A Latin term that translates literally as “for this,” ad hoc implies innovation, creativity and spontaneity. The term is widely applied in ...  Continue Reading

  • February 20, 2014 20 Feb'14

    market culture

    A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees. The market model is the most aggressive and capitalistic of the four common corporate culture ...  Continue Reading

  • February 20, 2014 20 Feb'14

    clan culture

    A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values. Clan cultures are the most team-oriented and the least competitive of the four main corporate culture models.  Continue Reading

  • February 20, 2014 20 Feb'14

    hierarchical corporate culture

    A hierarchical corporate culture is an organizational model based on clearly defined corporate levels and structures. A hierarchy is an organizational structure in which items are ranked according to levels of importance. Hierarchies depend upon ...  Continue Reading

  • February 20, 2014 20 Feb'14

    autodialer

    An autodialer is a software program that automatically dials telephone numbers from a list or a database.  Continue Reading

  • February 20, 2014 20 Feb'14

    robocall

    A robocall is an automated telephone call initiated by an autodialer for delivery of a prerecorded message. Robocalls are used for a wide variety of communications including public service announcements, appointment reminders, marketing, advertising...  Continue Reading

  • February 20, 2014 20 Feb'14

    adhocracy

    Adhocracy is a business management and corporate culture model based the ability to adapt quickly to changing conditions. Ad hoc is a Latin term meaning "for this," which translates to "for this special purpose" and also, by extension, improvised or...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close