Browse Definitions :
  • May 30, 2014 30 May'14

    FedRAMP (Federal Risk and Authorization Management Program)

    The Federal Risk and Authorization Management Program (FedRAMP) is a risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services.  Continue Reading

  • May 29, 2014 29 May'14

    passive solar

    Passive solar is the use of the sun’s energy directly for either heating or cooling purposes. Unlike photovoltaic or other technological solar power applications, passive solar does not involve energy gathering or transformation through mechanical ...  Continue Reading

  • May 29, 2014 29 May'14


    An article is a word used before a noun that indicates whether or not the reference is to a specific entity or an unspecific one. There are only three articles, a, an and the. A and an, the indefinite articles, are used to refer to a single and ...  Continue Reading

  • May 29, 2014 29 May'14

    dual-carbon battery

    Dual-carbon batteries are a new energy storage technology that uses a form of carbon for both the anode and the cathode. Power Japan Plus, who developed the technology, says their dual-carbon batteries (brand-named Rayden) are mostly made of carbon ...  Continue Reading

  • May 29, 2014 29 May'14

    digital footprint management (DFM)

    Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them. A digital footprint, sometimes called a digital dossier, is ...  Continue Reading

  • May 26, 2014 26 May'14

    digital footprint

    A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual. A digital footprint is relatively permanent and once the ...  Continue Reading

  • May 26, 2014 26 May'14


    An adjective is a word or phrase that describes or modifies a noun. Adjectives can add any type of information. An iPhone, for example, could be expensive, new, old, broken, shiny, pink, lost or missing.  Continue Reading

  • May 23, 2014 23 May'14

    haiku error message

    A haiku error message is a poem in the Japanese form on a page advising the user that an Internet problem, such as a 404 error, means that their request cannot be satisfied. A haiku is a Japanese poetry form based on 17 syllables in three lines:  ...  Continue Reading

  • May 23, 2014 23 May'14

    404 error page

    A 404 page is the webpage served to a user who tries to access a page that is unavailable. The 404 error indicates that the server where the page should reside has been contacted but that the page is does not exist at that address. 404 errors can ...  Continue Reading

  • May 23, 2014 23 May'14

    moved to Atlanta

    Moved to Atlanta is Internet slang for the 404 status code, the frequently seen "page not found" error. 404 and other status codes are part of the Web's HTTP (Hypertext Transfer Protocol), written in 1992 by the Web's inventor, Tim Berners-Lee.  Continue Reading

  • May 22, 2014 22 May'14


    NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.   Continue Reading

  • May 21, 2014 21 May'14

    FCC (Federal Communications Commission)

    The FCC (Federal Communications Commission) is the government body responsible for maintaining laws, censorship and broadcast licensing pertaining to interstate and international communications in the United States.  Continue Reading

  • May 21, 2014 21 May'14

    Vint Cerf (Vinton Gray Cerf)

    Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer. With engineer Bob Kahn, Cerf developed the TCP/IP protocol suite and the architecture that enabled the global "network of networks" that the Internet ...  Continue Reading

  • May 20, 2014 20 May'14

    TED talk

    A TED talk is a presentation at the main TED (technology, entertainment, design) conference or one of its many satellite events around the world. The first TED conference was in 1984; the conference has been held annually since 1990. Over the years,...  Continue Reading

  • May 19, 2014 19 May'14


    The TED (technology, entertainment, design) conference is an annual gathering for presentations known as TED talks on a broad range of topics related to science and culture. The main TED conference is held in Victoria, British Columbia; there are ...  Continue Reading

  • May 16, 2014 16 May'14

    battery management system (BMS)

    A battery management system (BMS) is an electronic regulator that monitors and controls the charging and discharging of rechargeable batteries. Battery management systems of various types are used in most devices that use rechargeable batteries. ...  Continue Reading

  • May 15, 2014 15 May'14


    AirChat is an anonymous wireless communications and connectivity tool that works without any wireless infrastructure. The technology was developed by the hackivist group Anonymous. The group’s purpose was to reduce dependency on corporate ...  Continue Reading

  • May 15, 2014 15 May'14

    pirate radio

    Pirate radio is the transmission of communications over radio waves by unlicensed amateurs; such broadcasts are illegal because they are not in accordance with FCC transmission requirements.  Continue Reading

  • May 14, 2014 14 May'14


    A conjunction is a word used to connect words, phrases and clauses. Common examples include and, but and or, although there are many other possibilities (including although). The three main types of conjunctions are coordinating, correlative and ...  Continue Reading

  • May 14, 2014 14 May'14

    verb / predicate

    A verb is a word that indicates a physical or mental action or a state of being. Typically, a sentence has at least a subject (the actor) and a verb (the action). The verb tells us what the subject of the sentence is doing.  Continue Reading



  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...


  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.


  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...



  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...