Browse Definitions :
  • January 30, 2015 30 Jan'15

    just-in-time manufacturing (JIT manufacturing)

    Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production ...  Continue Reading

  • January 29, 2015 29 Jan'15

    theory of relativity

    Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, ...  Continue Reading

  • January 29, 2015 29 Jan'15


    A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~. It's a special typographic character found on most keyboards that means various things, depending on the context.  Continue Reading

  • January 29, 2015 29 Jan'15

    critical path method (CPM)

    The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects. Since that time the CPM has been adapted to other fields including hardware and software product research and development.  Continue Reading

  • January 29, 2015 29 Jan'15

    use case diagram (UML use case diagram)

    A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.  Continue Reading

  • January 28, 2015 28 Jan'15

    social engineering penetration testing

    Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management. The purpose is to ascertain the company's vulnerability to social engineering exploits.  Continue Reading

  • January 27, 2015 27 Jan'15

    network attack surface

    Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or ...  Continue Reading

  • January 27, 2015 27 Jan'15

    software attack surface

    The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ...  Continue Reading

  • January 27, 2015 27 Jan'15

    physical attack surface

    The physical attack surface is the totality of the security vulnerabilities in a given system that are available to an attacker in the same location as the target.  Continue Reading

  • January 27, 2015 27 Jan'15

    social engineering attack surface

    Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an ...  Continue Reading

  • January 26, 2015 26 Jan'15

    cloud robotics

    Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.  Continue Reading

  • January 23, 2015 23 Jan'15

    Faraday constant

    Faraday's constant, symbolized by the italic uppercase letter F, is the physical constant representing the electric charge in a mole. The unit is named for Michael Faraday, an early 19th century inventor of the electrical motor.  Continue Reading

  • January 23, 2015 23 Jan'15

    farad (F)

    The farad is the standard international unit of capacitance. Both the farad and Faraday's constant are symbolized by the capital letter F; however they are different. Faraday's constant is a measure of the amount of electrical charge in a single ...  Continue Reading

  • January 22, 2015 22 Jan'15


    A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly. Cyberheists differ in terms of the target and method of operation and can ...  Continue Reading

  • January 22, 2015 22 Jan'15

    vision-correcting display

    A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses. The distortion makes it possible for users to view the display without wearing glasses or contact lenses.  Continue Reading

  • January 21, 2015 21 Jan'15

    Intel Curie

    Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE. The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devices.  Continue Reading

  • January 21, 2015 21 Jan'15

    non-profit organization (NPO)

    A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization. Non-profit organizations are often used for trusts, cooperatives,...  Continue Reading

  • January 19, 2015 19 Jan'15

    IFrame (Inline Frame)

    The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding ...  Continue Reading

  • January 16, 2015 16 Jan'15

    ARM processor

    An ARM processor is any of several 32-bit RISC (reduced instruction set computer) microprocessors developed by Advanced RISC Machines, Ltd. The ARM architecture was originally developed by Acorn Computers in the 1980s.  Continue Reading

  • January 16, 2015 16 Jan'15

    quantum theory

    Quantum theory is the theoretical basis of modern physics explaining the nature and behavior of matter and energy on the atomic and subatomic level, sometimes called quantum mechanics or quantum physics. This definition provides an introduction to ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.