Browse Definitions:
  • May 30, 2014 30 May'14

    Federal Risk and Authorization Program (FedRAMP)

    The Federal Risk and Authorization Program (FedRAMP) is a risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services.  Continue Reading

  • May 29, 2014 29 May'14

    passive solar

    Passive solar is the use of the sun’s energy directly for either heating or cooling purposes. Unlike photovoltaic or other technological solar power applications, passive solar does not involve energy gathering or transformation through mechanical ...  Continue Reading

  • May 29, 2014 29 May'14


    An article is a word used before a noun that indicates whether or not the reference is to a specific entity or an unspecific one. There are only three articles, a, an and the. A and an, the indefinite articles, are used to refer to a single and ...  Continue Reading

  • May 29, 2014 29 May'14

    dual-carbon battery

    Dual-carbon batteries are a new energy storage technology that uses a form of carbon for both the anode and the cathode. Power Japan Plus, who developed the technology, says their dual-carbon batteries (brand-named Rayden) are mostly made of carbon ...  Continue Reading

  • May 29, 2014 29 May'14

    digital footprint management (DFM)

    Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them. A digital footprint, sometimes called a digital dossier, is ...  Continue Reading

  • May 26, 2014 26 May'14

    digital footprint

    A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual. A digital footprint is relatively permanent and once the ...  Continue Reading

  • May 26, 2014 26 May'14


    An adjective is a word or phrase that describes or modifies a noun. Adjectives can add any type of information. An iPhone, for example, could be expensive, new, old, broken, shiny, pink, lost or missing.  Continue Reading

  • May 23, 2014 23 May'14

    haiku error message

    A haiku error message is a poem in the Japanese form on a page advising the user that an Internet problem, such as a 404 error, means that their request cannot be satisfied. A haiku is a Japanese poetry form based on 17 syllables in three lines:  ...  Continue Reading

  • May 23, 2014 23 May'14

    404 error page

    A 404 page is the webpage served to a user who tries to access a page that is unavailable. The 404 error indicates that the server where the page should reside has been contacted but that the page is does not exist at that address. 404 errors can ...  Continue Reading

  • May 23, 2014 23 May'14

    moved to Atlanta

    Moved to Atlanta is Internet slang for the 404 status code, the frequently seen "page not found" error. 404 and other status codes are part of the Web's HTTP (Hypertext Transfer Protocol), written in 1992 by the Web's inventor, Tim Berners-Lee.  Continue Reading

  • May 22, 2014 22 May'14


    NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.   Continue Reading

  • May 21, 2014 21 May'14

    FCC (Federal Communications Commission)

    The FCC (Federal Communications Commission) is the government body responsible for maintaining laws, censorship and broadcast licensing pertaining to interstate and international communications in the United States.  Continue Reading

  • May 21, 2014 21 May'14

    Vint Cerf (Vinton Gray Cerf)

    Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer. With engineer Bob Kahn, Cerf developed the TCP/IP protocol suite and the architecture that enabled the global "network of networks" that the Internet ...  Continue Reading

  • May 20, 2014 20 May'14

    TED talk

    A TED talk is a presentation at the main TED (technology, entertainment, design) conference or one of its many satellite events around the world. The first TED conference was in 1984; the conference has been held annually since 1990. Over the years,...  Continue Reading

  • May 19, 2014 19 May'14


    The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture. The main TED conference is held in Victoria, British Columbia; there are ...  Continue Reading

  • May 16, 2014 16 May'14

    battery management system (BMS)

    A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries. Battery management systems of various types are used in most devices that use rechargeable batteries. ...  Continue Reading

  • May 15, 2014 15 May'14


    AirChat is an anonymous wireless communications and connectivity tool that works without any wireless infrastructure. The technology was developed by the hackivist group Anonymous. The group’s purpose was to reduce dependency on corporate ...  Continue Reading

  • May 15, 2014 15 May'14

    pirate radio

    Pirate radio is the transmission of communications over radio waves by unlicensed amateurs; such broadcasts are illegal because they are not in accordance with FCC transmission requirements.  Continue Reading

  • May 14, 2014 14 May'14


    A conjunction is a word used to connect words, phrases and clauses. Common examples include and, but and or, although there are many other possibilities (including although). The three main types of conjunctions are coordinating, correlative and ...  Continue Reading

  • May 14, 2014 14 May'14

    verb / predicate

    A verb is a word that indicates a physical or mental action or a state of being. Typically, a sentence has at least a subject (the actor) and a verb (the action). The verb tells us what the subject of the sentence is doing.  Continue Reading



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...


  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...



  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.