Browse Definitions :
  • September 30, 2014 30 Sep'14

    standard operating environment (SOE)

    Standard operating environments (SOE) simplify desktop deployment and network administration within an organization. SOEs are usually deployed through disk images that typically include the OS, its standard configuration, associated service packs, ...  Continue Reading

  • September 30, 2014 30 Sep'14

    digital due process

    Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications. Due process, in general, is the requirement that established laws and standards of behavior must be ...  Continue Reading

  • September 29, 2014 29 Sep'14

    due process

    Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government. The concept is enacted in the United States Constitution. Although England does not have the same principle legislated, ...  Continue Reading

  • September 29, 2014 29 Sep'14

    first follower theory

    First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general ...  Continue Reading

  • September 24, 2014 24 Sep'14

    employee monitoring

    Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members. Monitoring methods include keystroke logging, wiretapping, GPS tracking and Internet monitoring, ...  Continue Reading

  • September 19, 2014 19 Sep'14

    Trusted Platform Module (TPM)

    A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.  Continue Reading

  • September 18, 2014 18 Sep'14

    IT asset lifecycle

    The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership. An IT asset is any company-owned information, software or hardware that is used in the course of business. ...  Continue Reading

  • September 18, 2014 18 Sep'14

    predictive text

    Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.  Continue Reading

  • September 18, 2014 18 Sep'14

    QuickType

    QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy. The technology can learn different manners of speech to ...  Continue Reading

  • September 16, 2014 16 Sep'14

    Google Hack Honeypot (GHH)

    A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search ...  Continue Reading

  • September 12, 2014 12 Sep'14

    malware testing

    Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications. Malicious software developers want their products to meet a lot of the same ...  Continue Reading

  • September 12, 2014 12 Sep'14

    content-addressed memory (CAM)

    Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications. CAM is capable of searching its entire contents in a single clock cycle. It does that by pairing the SRAM-based memory...  Continue Reading

  • September 11, 2014 11 Sep'14

    virtual assistant

    A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user. Virtual assistants have existed in concept for years. Some may recall the 1970s series Knight Rider in...  Continue Reading

  • September 11, 2014 11 Sep'14

    laser-switched magnetic storage

    Laser-switched magnetic storage is a technology that uses lasers to switch the magnetic polarity of ferromagnetic nanoislands on media, enabling speeds up to 1000 times greater than those of  conventional hard drives.  Continue Reading

  • September 11, 2014 11 Sep'14

    vulnerability

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading

  • September 10, 2014 10 Sep'14

    vulnerability management planning

    Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack ...  Continue Reading

  • September 09, 2014 09 Sep'14

    translation lookaside buffer (TLB)

    A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval.  Continue Reading

  • September 09, 2014 09 Sep'14

    Google dork

    A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person.  Continue Reading

  • September 08, 2014 08 Sep'14

    IT asset disposition (ITAD)

    IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner. ITAD vendors specialize in the process of streamlining disposition of IT assets, while minimizing ...  Continue Reading

  • September 05, 2014 05 Sep'14

    search operator

    A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search. Search operators are usually placed directly in front of a query word or phrase, ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close