Browse Definitions:
  • September 30, 2014 30 Sep'14

    standard operating environment (SOE)

    Standard operating environments (SOE) simplify desktop deployment and network administration within an organization. SOEs are usually deployed through disk images that typically include the OS, its standard configuration, associated service packs, ...  Continue Reading

  • September 30, 2014 30 Sep'14

    digital due process

    Digital due process is an adaptation and extension of that legal concept to protect the rights of individuals with regard to online communications. Due process, in general, is the requirement that established laws and standards of behavior must be ...  Continue Reading

  • September 29, 2014 29 Sep'14

    due process

    Due process is a legal principle designed to protect the rights of citizens to fair treatment at the hands of the government. The concept is enacted in the United States Constitution. Although England does not have the same principle legislated, ...  Continue Reading

  • September 29, 2014 29 Sep'14

    first follower theory

    First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general ...  Continue Reading

  • September 24, 2014 24 Sep'14

    employee monitoring

    Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members. Monitoring methods include keystroke logging, wiretapping, GPS tracking and Internet monitoring, ...  Continue Reading

  • September 19, 2014 19 Sep'14

    Trusted Platform Module (TPM)

    A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.  Continue Reading

  • September 18, 2014 18 Sep'14

    IT asset lifecycle

    The IT asset lifecycle is the stages that an organization’s information technology asset goes through during the time span of its ownership. An IT asset is any company-owned information, software or hardware that is used in the course of business. ...  Continue Reading

  • September 18, 2014 18 Sep'14

    predictive text

    Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.  Continue Reading

  • September 18, 2014 18 Sep'14

    QuickType

    QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy. The technology can learn different manners of speech to ...  Continue Reading

  • September 17, 2014 17 Sep'14

    Internet of Things

     Continue Reading

  • September 16, 2014 16 Sep'14

    Google Hack Honeypot (GHH)

    A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search ...  Continue Reading

  • September 12, 2014 12 Sep'14

    malware testing

    Malware testing is the practice of subjecting malicious programs to software testing tools and procedures designed to assess the viability of legitimate applications. Malicious software developers want their products to meet a lot of the same ...  Continue Reading

  • September 12, 2014 12 Sep'14

    content-addressed memory (CAM)

    Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications. CAM is capable of searching its entire contents in a single clock cycle. It does that by pairing the SRAM-based memory...  Continue Reading

  • September 11, 2014 11 Sep'14

    virtual assistant

    A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user. Virtual assistants have existed in concept for years. Some may recall the 1970s series Knight Rider in...  Continue Reading

  • September 11, 2014 11 Sep'14

    laser-switched magnetic storage

    Laser-switched magnetic storage is a technology that uses lasers to switch the magnetic polarity of ferromagnetic nanoislands on media, enabling speeds up to 1000 times greater than those of  conventional hard drives.  Continue Reading

  • September 11, 2014 11 Sep'14

    vulnerability

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading

  • September 10, 2014 10 Sep'14

    vulnerability management planning

    Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack ...  Continue Reading

  • September 09, 2014 09 Sep'14

    translation lookaside buffer (TLB)

    A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval. When a virtual memory address is referenced by a program, the search starts in the CPU. First, ...  Continue Reading

  • September 09, 2014 09 Sep'14

    Google dork

    A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person.  Continue Reading

  • September 08, 2014 08 Sep'14

    IT asset disposition (ITAD)

    IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner. ITAD vendors specialize in the process of streamlining disposition of IT assets, while minimizing ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

Close