Browse Definitions :
  • March 31, 2014 31 Mar'14

    PARC (Palo Alto Research Center)

    PARC is Xerox's Palo Alto Research Center, located in Palo Alto, California, in the high-tech area that has become known as Silicon Valley. PARC was incorporated as an independent, wholly-owned subsidiary of Xerox in 2002.  Continue Reading

  • March 31, 2014 31 Mar'14

    Xerox

    Xerox is a provider of document-related technology and services. Xerox derives from xerography, more commonly known as photocopying. The company's technology was the de facto standard for many years, during which time making photocopies was usually...  Continue Reading

  • March 28, 2014 28 Mar'14

    session control protocol (SCP)

    Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection. Several such lightweight connections can be active simultaneously. SCP is a session layer protocol ...  Continue Reading

  • March 27, 2014 27 Mar'14

    tweet jam

    A tweet jam is a moderated discussion on Twitter that is planned and promoted in advance and scheduled for a specific time period. Tweet jams are public discussions, open to all interested Twitter users. The discussion is organized around hashtags ...  Continue Reading

  • March 27, 2014 27 Mar'14

    standard

    A standard is a generally agreed-upon technology, method or format for a given application. Official standards are overseen by one of a number of governing bodies that exist to promote their development and confirm their status. De facto standards, ...  Continue Reading

  • March 25, 2014 25 Mar'14

    Chromecast

    Chromecast is a streaming media adapter from Google that allows users to play online content such as videos and music on a digital television. The adapter is a dongle that plugs into the TV's HDMI port; another cable connects to a USB port to power ...  Continue Reading

  • March 21, 2014 21 Mar'14

    Internet users' bill of rights

    The Internet user’s bill of rights is legislation proposed by Sir Tim Berners-Lee to protect the rights of individuals online. The proposed bill is part of a campaign called the Web We Want, which was developed to ensure the same core principles ...  Continue Reading

  • March 21, 2014 21 Mar'14

    access network

    An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.  Continue Reading

  • March 20, 2014 20 Mar'14

    base station

    A base station is a fixed point of communication for customer cellular phones on a carrier network. The base station is connected to an antenna (or multiple antennae) that receives and transmits the signals in the cellular network to customer ...  Continue Reading

  • March 20, 2014 20 Mar'14

    PCI forensic investigator program

    A PCI forensic investigator program is a certification process for companies wishing to become eligible to perform investigations into data breaches on payment card industry (PCI) networks. PCI forensic investigator programs provide rules for ...  Continue Reading

  • March 20, 2014 20 Mar'14

    heat pump

    A heat pump is a device that takes heat from one source and moves it to another location through electric or mechanical means. Heat pumps may be used either to heat or cool. Heat pump technologies include phase change, thermoelectrics, ...  Continue Reading

  • March 18, 2014 18 Mar'14

    user engagement

    User engagement is an assessment of an individual's response to some type of offering, such as a product, a service or a website. An individual's degree of engagement may be determined directly through interaction or may be assessed through ...  Continue Reading

  • March 13, 2014 13 Mar'14

    Fairphone

    Insofar as possible, Fairphone is made from recycled, recyclable and responsibly-sourced goods as well as minimal packaging. The modular design means that if one component breaks down or the user wants to update it, only that element need be ...  Continue Reading

  • March 13, 2014 13 Mar'14

    dual-SIM phone

    A dual SIM phone is a mobile phone, typically a smart phone, with the capacity to use two subscriber identity module (SIM) cards. A SIM card is a smart card that stores data for the owner, including user identity and preferences, location and phone...  Continue Reading

  • March 13, 2014 13 Mar'14

    integrated solar

    Integrated solar is the inclusion of solar power technology as a part of original construction rather than as a separate module that is added later. Solar energy may be gathered thermally or through the use of photovoltaic cells. Integrated solar is...  Continue Reading

  • March 11, 2014 11 Mar'14

    content gamification

    Content gamification is the integration of interactive elements to online content as a means of increasing user engagement and as a result boosting page rank and traffic.  Continue Reading

  • March 07, 2014 07 Mar'14

    split brain syndrome

    Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster. Believing the other clusters ...  Continue Reading

  • March 07, 2014 07 Mar'14

    segmented memory

    Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode. The segmented memory system was used to expand the 64KB limit on first-generation flat address space.  Continue Reading

  • March 07, 2014 07 Mar'14

    Intel 8086

    The Intel 8086 was Intel’s first x86 processor. Released in 1978, the 8086 began the long line of Intel’s most successful architecture, which eventually included the 80286, 80386 and 80486.  Continue Reading

  • March 06, 2014 06 Mar'14

    Windows 95

    Windows 95 was the 5th version of Microsoft’s GUI operating system, released in 1995. A huge sales success, Windows 95 was Microsoft’s breakthrough system. It introduced huge numbers of people around the world to the Internet and computers in ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close