Browse Definitions :
  • May 30, 2014 30 May'14

    FedRAMP (Federal Risk and Authorization Management Program)

    The Federal Risk and Authorization Management Program (FedRAMP) is a risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services.  Continue Reading

  • May 29, 2014 29 May'14

    passive solar

    Passive solar is the use of the sun’s energy directly for either heating or cooling purposes. Unlike photovoltaic or other technological solar power applications, passive solar does not involve energy gathering or transformation through mechanical ...  Continue Reading

  • May 29, 2014 29 May'14


    An article is a word used before a noun that indicates whether or not the reference is to a specific entity or an unspecific one. There are only three articles, a, an and the. A and an, the indefinite articles, are used to refer to a single and ...  Continue Reading

  • May 29, 2014 29 May'14

    dual-carbon battery

    Dual-carbon batteries are a new energy storage technology that uses a form of carbon for both the anode and the cathode. Power Japan Plus, who developed the technology, says their dual-carbon batteries (brand-named Rayden) are mostly made of carbon ...  Continue Reading

  • May 29, 2014 29 May'14

    digital footprint management (DFM)

    Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them. A digital footprint, sometimes called a digital dossier, is ...  Continue Reading

  • May 26, 2014 26 May'14

    digital footprint

    A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual. A digital footprint is relatively permanent and once the ...  Continue Reading

  • May 26, 2014 26 May'14


    An adjective is a word or phrase that describes or modifies a noun. Adjectives can add any type of information. An iPhone, for example, could be expensive, new, old, broken, shiny, pink, lost or missing.  Continue Reading

  • May 23, 2014 23 May'14

    haiku error message

    A haiku error message is a poem in the Japanese form on a page advising the user that an Internet problem, such as a 404 error, means that their request cannot be satisfied. A haiku is a Japanese poetry form based on 17 syllables in three lines:  ...  Continue Reading

  • May 23, 2014 23 May'14

    404 error page

    A 404 page is the webpage served to a user who tries to access a page that is unavailable. The 404 error indicates that the server where the page should reside has been contacted but that the page is does not exist at that address. 404 errors can ...  Continue Reading

  • May 23, 2014 23 May'14

    moved to Atlanta

    Moved to Atlanta is Internet slang for the 404 status code, the frequently seen "page not found" error. 404 and other status codes are part of the Web's HTTP (Hypertext Transfer Protocol), written in 1992 by the Web's inventor, Tim Berners-Lee.  Continue Reading

  • May 22, 2014 22 May'14


    NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.   Continue Reading

  • May 21, 2014 21 May'14

    FCC (Federal Communications Commission)

    The FCC (Federal Communications Commission) is the government body responsible for maintaining laws, censorship and broadcast licensing pertaining to interstate and international communications in the United States.  Continue Reading

  • May 21, 2014 21 May'14

    Vint Cerf (Vinton Gray Cerf)

    Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer. With engineer Bob Kahn, Cerf developed the TCP/IP protocol suite and the architecture that enabled the global "network of networks" that the Internet ...  Continue Reading

  • May 20, 2014 20 May'14

    TED talk

    A TED talk is a presentation at the main TED (technology, entertainment, design) conference or one of its many satellite events around the world. The first TED conference was in 1984; the conference has been held annually since 1990. Over the years,...  Continue Reading

  • May 19, 2014 19 May'14


    The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture. The main TED conference is held in Victoria, British Columbia; there are ...  Continue Reading

  • May 16, 2014 16 May'14

    battery management system (BMS)

    A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries. Battery management systems of various types are used in most devices that use rechargeable batteries. ...  Continue Reading

  • May 15, 2014 15 May'14


    AirChat is an anonymous wireless communications and connectivity tool that works without any wireless infrastructure. The technology was developed by the hackivist group Anonymous. The group’s purpose was to reduce dependency on corporate ...  Continue Reading

  • May 15, 2014 15 May'14

    pirate radio

    Pirate radio is the transmission of communications over radio waves by unlicensed amateurs; such broadcasts are illegal because they are not in accordance with FCC transmission requirements.  Continue Reading

  • May 14, 2014 14 May'14


    A conjunction is a word used to connect words, phrases and clauses. Common examples include and, but and or, although there are many other possibilities (including although). The three main types of conjunctions are coordinating, correlative and ...  Continue Reading

  • May 14, 2014 14 May'14

    verb / predicate

    A verb is a word that indicates a physical or mental action or a state of being. Typically, a sentence has at least a subject (the actor) and a verb (the action). The verb tells us what the subject of the sentence is doing.  Continue Reading




  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.