Browse Definitions :
  • September 30, 2014 30 Sep'14

    standard operating environment (SOE)

    Standard operating environments (SOE) simplify desktop deployment and network administration within an organization. SOEs are usually deployed through disk images that typically include the OS, its standard configuration, associated service packs, ...  Continue Reading

  • September 30, 2014 30 Sep'14

    digital due process

    Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications. Due process, in general, is the requirement that established laws and standards of behavior must be ...  Continue Reading

  • September 29, 2014 29 Sep'14

    due process

    Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government. The concept is enacted in the United States Constitution. Although England does not have the same principle legislated, ...  Continue Reading

  • September 29, 2014 29 Sep'14

    first follower theory

    First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general ...  Continue Reading

  • September 24, 2014 24 Sep'14

    employee monitoring

    Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members. Monitoring methods include keystroke logging, wiretapping, GPS tracking and Internet monitoring, ...  Continue Reading

  • September 19, 2014 19 Sep'14

    Trusted Platform Module (TPM)

    A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.  Continue Reading

  • September 18, 2014 18 Sep'14

    IT asset lifecycle

    The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership. An IT asset is any company-owned information, software or hardware that is used in the course of business. ...  Continue Reading

  • September 18, 2014 18 Sep'14

    predictive text

    Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.  Continue Reading

  • September 18, 2014 18 Sep'14

    QuickType

    QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy. The technology can learn different manners of speech to ...  Continue Reading

  • September 16, 2014 16 Sep'14

    Google Hack Honeypot (GHH)

    A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search ...  Continue Reading

  • September 12, 2014 12 Sep'14

    malware testing

    Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications. Malicious software developers want their products to meet a lot of the same ...  Continue Reading

  • September 12, 2014 12 Sep'14

    content-addressed memory (CAM)

    Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications. CAM is capable of searching its entire contents in a single clock cycle. It does that by pairing the SRAM-based memory...  Continue Reading

  • September 11, 2014 11 Sep'14

    virtual assistant

    A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user. Virtual assistants have existed in concept for years. Some may recall the 1970s series Knight Rider in...  Continue Reading

  • September 11, 2014 11 Sep'14

    laser-switched magnetic storage

    Laser-switched magnetic storage is a technology that uses lasers to switch the magnetic polarity of ferromagnetic nanoislands on media, enabling speeds up to 1000 times greater than those of  conventional hard drives.  Continue Reading

  • September 11, 2014 11 Sep'14

    vulnerability

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading

  • September 10, 2014 10 Sep'14

    vulnerability management planning

    Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack ...  Continue Reading

  • September 09, 2014 09 Sep'14

    translation lookaside buffer (TLB)

    A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.  Continue Reading

  • September 09, 2014 09 Sep'14

    Google dork

    A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person.  Continue Reading

  • September 08, 2014 08 Sep'14

    IT asset disposition (ITAD)

    IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner. ITAD vendors specialize in the process of streamlining disposition of IT assets, while minimizing ...  Continue Reading

  • September 05, 2014 05 Sep'14

    search operator

    A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search. Search operators are usually placed directly in front of a query word or phrase, ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...

Close