Browse Definitions :
  • January 30, 2015 30 Jan'15

    just-in-time manufacturing (JIT manufacturing)

    Just-in-time (JIT) manufacturing is designed to avoid the waste associated with overproduction, waiting and excess inventory, three of the seven waste categories defined in the Toyota Production System (known in North America as the lean production ...  Continue Reading

  • January 29, 2015 29 Jan'15

    theory of relativity

    Albert Einstein's theory of relativity is actually two separate theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics of Moving Bodies and his theory of general relativity, an expansion of the earlier theory, ...  Continue Reading

  • January 29, 2015 29 Jan'15

    tilde

    A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~. It's a special typographic character found on most keyboards that means various things, depending on the context.  Continue Reading

  • January 29, 2015 29 Jan'15

    critical path method (CPM)

    The CPM was developed in the 1950s by DuPont, and was first used in missile-defense construction projects. Since that time the CPM has been adapted to other fields including hardware and software product research and development.  Continue Reading

  • January 29, 2015 29 Jan'15

    use case diagram (UML use case diagram)

    A use case is a methodology used in system analysis to identify, clarify, and organize system requirements; a use case diagram is a graphic depiction of the interactions among the elements of a system.  Continue Reading

  • January 28, 2015 28 Jan'15

    social engineering penetration testing

    Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management. The purpose is to ascertain the company's vulnerability to social engineering exploits.  Continue Reading

  • January 27, 2015 27 Jan'15

    network attack surface

    Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or ...  Continue Reading

  • January 27, 2015 27 Jan'15

    software attack surface

    The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ...  Continue Reading

  • January 27, 2015 27 Jan'15

    physical attack surface

    The physical attack surface is the totality of the security vulnerabilities in a given system that are available to an attacker in the same location as the target.  Continue Reading

  • January 27, 2015 27 Jan'15

    social engineering attack surface

    Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful. The social engineering attack surface is the totality of an ...  Continue Reading

  • January 26, 2015 26 Jan'15

    cloud robotics

    Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.  Continue Reading

  • January 23, 2015 23 Jan'15

    Faraday constant

    Faraday's constant, symbolized by the italic uppercase letter F, is the physical constant representing the electric charge in a mole. The unit is named for Michael Faraday, an early 19th century inventor of the electrical motor.  Continue Reading

  • January 23, 2015 23 Jan'15

    farad (F)

    The farad is the standard international unit of capacitance. Both the farad and Faraday's constant are symbolized by the capital letter F; however they are different. Faraday's constant is a measure of the amount of electrical charge in a single ...  Continue Reading

  • January 22, 2015 22 Jan'15

    cyberheist

    A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly. Cyberheists differ in terms of the target and method of operation and can ...  Continue Reading

  • January 22, 2015 22 Jan'15

    vision-correcting display

    A vision-correcting display distorts the images on users' screens according to algorithms based on their prescriptions for eyeglasses. The distortion makes it possible for users to view the display without wearing glasses or contact lenses.  Continue Reading

  • January 21, 2015 21 Jan'15

    Intel Curie

    Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE. The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devices.  Continue Reading

  • January 21, 2015 21 Jan'15

    non-profit organization (NPO)

    A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization. Non-profit organizations are often used for trusts, cooperatives,...  Continue Reading

  • January 19, 2015 19 Jan'15

    IFrame (Inline Frame)

    The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page. Although an IFrame behaves like an inline image, it can be configured with its own scrollbar independent of the surrounding ...  Continue Reading

  • January 16, 2015 16 Jan'15

    ARM processor

    An ARM processor is any of several 32-bit RISC (reduced instruction set computer) microprocessors developed by Advanced RISC Machines, Ltd. The ARM architecture was originally developed by Acorn Computers in the 1980s.  Continue Reading

  • January 16, 2015 16 Jan'15

    quantum theory

    Quantum theory is the theoretical basis of modern physics explaining the nature and behavior of matter and energy on the atomic and subatomic level, sometimes called quantum mechanics or quantum physics. This definition provides an introduction to ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close