Browse Definitions :
  • March 31, 2014 31 Mar'14

    PARC (Palo Alto Research Center)

    PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley. PARC was incorporated as an independent, wholly-owned subsidiary of Xerox in 2002.  Continue Reading

  • March 31, 2014 31 Mar'14


    Xerox is a provider of document-related technology and services. Xerox derives from xerography, more commonly known as photocopying. The company's technology was the de facto standard for many years, during which time making photocopies was usually...  Continue Reading

  • March 28, 2014 28 Mar'14

    session control protocol (SCP)

    Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection. Several such lightweight connections can be active simultaneously. SCP is a session layer protocol ...  Continue Reading

  • March 27, 2014 27 Mar'14

    tweet jam

    A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period. Tweet jams are public discussions, open to all interested Twitter users. The discussion is organized around hashtags ...  Continue Reading

  • March 27, 2014 27 Mar'14


    A standard is a generally agreed-upon technology, method or format for a given application. Official standards are overseen by one of a number of governing bodies that exist to promote their development and confirm their status. De facto standards, ...  Continue Reading

  • March 26, 2014 26 Mar'14


    HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages.  Continue Reading

  • March 25, 2014 25 Mar'14


    Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television. The adapter is a dongle that plugs into the TV's HDMI port; another cable connects to a USB port to power ...  Continue Reading

  • March 21, 2014 21 Mar'14

    Internet users' bill of rights

    The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online. The proposed bill is part of a campaign called the Web We Want, which was developed to ensure the same core principles ...  Continue Reading

  • March 21, 2014 21 Mar'14

    access network

    An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.  Continue Reading

  • March 20, 2014 20 Mar'14

    base station

    A base station is a fixed point of communication for customer cellular phones on a carrier network. The base station is connected to an antenna (or multiple antennae) that receives and transmits the signals in the cellular network to customer ...  Continue Reading

  • March 20, 2014 20 Mar'14

    PCI forensic investigator program

    A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks. PCI forensic investigator programs provide rules for ...  Continue Reading

  • March 20, 2014 20 Mar'14

    heat pump

    A heat pump is a device that takes heat from one source and moves it to another location through electric or mechanical means. Heat pumps may be used either to heat or cool. Heat pump technologies include phase change, thermoelectrics, ...  Continue Reading

  • March 18, 2014 18 Mar'14

    user engagement

    User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website. An individual's degree of engagement may be determined directly through interaction or may be assessed through ...  Continue Reading

  • March 13, 2014 13 Mar'14


    Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging. The modular design means that if one component breaks down or the user wants to update it, only that element need be ...  Continue Reading

  • March 13, 2014 13 Mar'14

    dual-SIM phone

    A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards. A SIM card is a smart card that stores data for the owner, including user identity and preferences, location and phone...  Continue Reading

  • March 13, 2014 13 Mar'14

    integrated solar

    Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later. Solar energy may be gathered thermally or through the use of photovoltaic cells. Integrated solar is...  Continue Reading

  • March 11, 2014 11 Mar'14

    content gamification

    Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.  Continue Reading

  • March 07, 2014 07 Mar'14

    split brain syndrome

    Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster. Believing the other clusters ...  Continue Reading

  • March 07, 2014 07 Mar'14

    segmented memory

    Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode. The segmented memory system was used to expand the 64KB limit on first-generation flat address space.  Continue Reading

  • March 07, 2014 07 Mar'14

    Intel 8086

    The Intel 8086 was Intel’s first x86 processor. Released in 1978, the 8086 began the long line of Intel’s most successful architecture, which eventually included the 80286, 80386 and 80486.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.