Browse Definitions :
  • February 28, 2014 28 Feb'14

    Windows 3.1

    Windows 3.1 was the 4th version of Microsoft’s GUI-based operating system, released in 1993. 3.1 was a paid sub-release -- Windows 3.0 had been so popular that Microsoft decided to charge for the modified software rather than offer it as a free ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 3.0

    Windows 3.0 was the 3rd version of Microsoft’s GUI-based operating system, released in 1990. This version of Windows was highly successful upon initial release.  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 2.0

    Windows 2.0 was the 2nd version of Microsoft’s GUI-based operating system, released in 1987. Windows 2.0 was faster and more stable than Windows 1.0. This Windows version also had more in common still with both the LISA and future versions of ...  Continue Reading

  • February 28, 2014 28 Feb'14

    Windows 1.0

    Windows 1.0 was the first of Microsoft’s GUI-based operating systems, released in 1985. Like many early versions of Windows, the OS was essentially a program that ran on top of DOS. The product release didn’t actually occur until two years after ...  Continue Reading

  • February 26, 2014 26 Feb'14

    sub-release

    A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version. A developer or vendor may choose to do a sub-release for a number of reasons.  Continue Reading

  • February 26, 2014 26 Feb'14

    instruction set

    An instruction set is a group of commands for a CPU in machine language. The term can refer to all possible instructions for a CPU or a subset of instructions to enhance its performance in certain situations.  Continue Reading

  • February 26, 2014 26 Feb'14

    expanded memory

    Expanded memory, also know as EMS (Expanded Memory Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB using a gated memory riser card.  Continue Reading

  • February 26, 2014 26 Feb'14

    extended memory

    Extended memory, also known as XMS (eXtended Memory Specification) is a technology that enables capacity above the 640KB standard MS-DOS limit of main memory.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80486

    Intel 80486, also known as i486 or just 486, is the fourth-generation generation Intel x86 microprocessor. The 80486 was capable of over 40 million instructions per second (MIPS) and offered roughly twice the performance of the 386.  Continue Reading

  • February 26, 2014 26 Feb'14

    Intel 80386

    Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985. The 386 followed Intel’s 8086 and 80286 processors and predated the 80486.  Continue Reading

  • February 26, 2014 26 Feb'14

    standards organization

    A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.  Continue Reading

  • February 26, 2014 26 Feb'14

    de jure standard

    A de jure standard is a technology, method or product that has been officially endorsed for a given application. De jure, from Medieval Latin, means from law. The term refers not only to legally protected or enforced standards but also to those that...  Continue Reading

  • February 26, 2014 26 Feb'14

    de facto standard

    A de facto standard is something that is used so widely that it is considered a standard for a given application although it has no official status. De facto, from Medieval Latin, means from fact.  Continue Reading

  • February 20, 2014 20 Feb'14

    ad hoc

    Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use. A Latin term that translates literally as “for this,” ad hoc implies innovation, creativity and spontaneity. The term is widely applied in ...  Continue Reading

  • February 20, 2014 20 Feb'14

    market culture

    A market culture is a type of corporate culture that emphasizes competitiveness between the organization and its market competitors and between employees. The market model is the most aggressive and capitalistic of the four common corporate culture ...  Continue Reading

  • February 20, 2014 20 Feb'14

    clan culture

    A clan culture is a family-like or tribe-like type of corporate environment that emphasizes consensus and commonality of goals and values. Clan cultures are the most team-oriented and the least competitive of the four main corporate culture models.  Continue Reading

  • February 20, 2014 20 Feb'14

    hierarchical corporate culture

    A hierarchical corporate culture is an organizational model based on clearly defined corporate levels and structures. A hierarchy is an organizational structure in which items are ranked according to levels of importance. Hierarchies depend upon ...  Continue Reading

  • February 20, 2014 20 Feb'14

    autodialer

    An autodialer is a software program that automatically dials telephone numbers from a list or a database.  Continue Reading

  • February 20, 2014 20 Feb'14

    robocall

    A robocall is an automated telephone call initiated by an autodialer for delivery of a prerecorded message. Robocalls are used for a wide variety of communications including public service announcements, appointment reminders, marketing, advertising...  Continue Reading

  • February 20, 2014 20 Feb'14

    adhocracy

    Adhocracy is a business management and corporate culture model based the ability to adapt quickly to changing conditions. Ad hoc is a Latin term meaning "for this," which translates to "for this special purpose" and also, by extension, improvised or...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close