Browse Definitions :
  • March 31, 2014 31 Mar'14

    PARC (Palo Alto Research Center)

    PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley. PARC was incorporated as an independent, wholly-owned subsidiary of Xerox in 2002.  Continue Reading

  • March 31, 2014 31 Mar'14


    Xerox is a provider of document-related technology and services. Xerox derives from xerography, more commonly known as photocopying. The company's technology was the de facto standard for many years, during which time making photocopies was usually...  Continue Reading

  • March 28, 2014 28 Mar'14

    session control protocol (SCP)

    Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection. Several such lightweight connections can be active simultaneously. SCP is a session layer protocol ...  Continue Reading

  • March 27, 2014 27 Mar'14

    tweet jam

    A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period. Tweet jams are public discussions, open to all interested Twitter users. The discussion is organized around hashtags ...  Continue Reading

  • March 27, 2014 27 Mar'14


    A standard is a generally agreed-upon technology, method or format for a given application. Official standards are overseen by one of a number of governing bodies that exist to promote their development and confirm their status. De facto standards, ...  Continue Reading

  • March 26, 2014 26 Mar'14


    HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages.  Continue Reading

  • March 25, 2014 25 Mar'14


    Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television. The adapter is a dongle that plugs into the TV's HDMI port; another cable connects to a USB port to power ...  Continue Reading

  • March 21, 2014 21 Mar'14

    Internet users' bill of rights

    The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online. The proposed bill is part of a campaign called the Web We Want, which was developed to ensure the same core principles ...  Continue Reading

  • March 21, 2014 21 Mar'14

    access network

    An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.  Continue Reading

  • March 20, 2014 20 Mar'14

    base station

    A base station is a fixed point of communication for customer cellular phones on a carrier network. The base station is connected to an antenna (or multiple antennae) that receives and transmits the signals in the cellular network to customer ...  Continue Reading

  • March 20, 2014 20 Mar'14

    PCI forensic investigator program

    A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks. PCI forensic investigator programs provide rules for ...  Continue Reading

  • March 20, 2014 20 Mar'14

    heat pump

    A heat pump is a device that takes heat from one source and moves it to another location through electric or mechanical means. Heat pumps may be used either to heat or cool. Heat pump technologies include phase change, thermoelectrics, ...  Continue Reading

  • March 18, 2014 18 Mar'14

    user engagement

    User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website. An individual's degree of engagement may be determined directly through interaction or may be assessed through ...  Continue Reading

  • March 13, 2014 13 Mar'14


    Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging. The modular design means that if one component breaks down or the user wants to update it, only that element need be ...  Continue Reading

  • March 13, 2014 13 Mar'14

    dual-SIM phone

    A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards. A SIM card is a smart card that stores data for the owner, including user identity and preferences, location and phone...  Continue Reading

  • March 13, 2014 13 Mar'14

    integrated solar

    Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later. Solar energy may be gathered thermally or through the use of photovoltaic cells. Integrated solar is...  Continue Reading

  • March 11, 2014 11 Mar'14

    content gamification

    Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.  Continue Reading

  • March 07, 2014 07 Mar'14

    split brain syndrome

    Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster. Believing the other clusters ...  Continue Reading

  • March 07, 2014 07 Mar'14

    segmented memory

    Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode. The segmented memory system was used to expand the 64KB limit on first-generation flat address space.  Continue Reading

  • March 07, 2014 07 Mar'14

    Intel 8086

    The Intel 8086 was Intel’s first x86 processor. Released in 1978, the 8086 began the long line of Intel’s most successful architecture, which eventually included the 80286, 80386 and 80486.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...