Browse Definitions :
  • March 31, 2014 31 Mar'14

    PARC (Palo Alto Research Center)

    PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley. PARC was incorporated as an independent, wholly-owned subsidiary of Xerox in 2002.  Continue Reading

  • March 31, 2014 31 Mar'14

    Xerox

    Xerox is a provider of document-related technology and services. Xerox derives from xerography, more commonly known as photocopying. The company's technology was the de facto standard for many years, during which time making photocopies was usually...  Continue Reading

  • March 28, 2014 28 Mar'14

    session control protocol (SCP)

    Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection. Several such lightweight connections can be active simultaneously. SCP is a session layer protocol ...  Continue Reading

  • March 27, 2014 27 Mar'14

    tweet jam

    A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period. Tweet jams are public discussions, open to all interested Twitter users. The discussion is organized around hashtags ...  Continue Reading

  • March 27, 2014 27 Mar'14

    standard

    A standard is a generally agreed-upon technology, method or format for a given application. Official standards are overseen by one of a number of governing bodies that exist to promote their development and confirm their status. De facto standards, ...  Continue Reading

  • March 25, 2014 25 Mar'14

    Chromecast

    Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television. The adapter is a dongle that plugs into the TV's HDMI port; another cable connects to a USB port to power ...  Continue Reading

  • March 21, 2014 21 Mar'14

    Internet users' bill of rights

    The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online. The proposed bill is part of a campaign called the Web We Want, which was developed to ensure the same core principles ...  Continue Reading

  • March 21, 2014 21 Mar'14

    access network

    An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.  Continue Reading

  • March 20, 2014 20 Mar'14

    base station

    A base station is a fixed point of communication for customer cellular phones on a carrier network. The base station is connected to an antenna (or multiple antennae) that receives and transmits the signals in the cellular network to customer ...  Continue Reading

  • March 20, 2014 20 Mar'14

    PCI forensic investigator program

    A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks. PCI forensic investigator programs provide rules for ...  Continue Reading

  • March 20, 2014 20 Mar'14

    heat pump

    A heat pump is a device that takes heat from one source and moves it to another location through electric or mechanical means. Heat pumps may be used either to heat or cool. Heat pump technologies include phase change, thermoelectrics, ...  Continue Reading

  • March 18, 2014 18 Mar'14

    user engagement

    User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website. An individual's degree of engagement may be determined directly through interaction or may be assessed through ...  Continue Reading

  • March 13, 2014 13 Mar'14

    Fairphone

    Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging. The modular design means that if one component breaks down or the user wants to update it, only that element need be ...  Continue Reading

  • March 13, 2014 13 Mar'14

    dual-SIM phone

    A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards. A SIM card is a smart card that stores data for the owner, including user identity and preferences, location and phone...  Continue Reading

  • March 13, 2014 13 Mar'14

    integrated solar

    Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later. Solar energy may be gathered thermally or through the use of photovoltaic cells. Integrated solar is...  Continue Reading

  • March 11, 2014 11 Mar'14

    content gamification

    Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.  Continue Reading

  • March 07, 2014 07 Mar'14

    split brain syndrome

    Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster. Believing the other clusters ...  Continue Reading

  • March 07, 2014 07 Mar'14

    segmented memory

    Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode. The segmented memory system was used to expand the 64KB limit on first-generation flat address space.  Continue Reading

  • March 07, 2014 07 Mar'14

    Intel 8086

    The Intel 8086 was Intel’s first x86 processor. Released in 1978, the 8086 began the long line of Intel’s most successful architecture, which eventually included the 80286, 80386 and 80486.  Continue Reading

  • March 06, 2014 06 Mar'14

    Windows 95

    Windows 95 was the 5th version of Microsoft’s GUI operating system, released in 1995. A huge sales success, Windows 95 was Microsoft’s breakthrough system. It introduced huge numbers of people around the world to the Internet and computers in ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close