Browse Definitions :
  • October 30, 2015 30 Oct'15

    holographic display

    A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.  Continue Reading

  • October 30, 2015 30 Oct'15

    cutover migration

    The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch. Related user accounts are then administered in Office 365.  Continue Reading

  • October 30, 2015 30 Oct'15

    Trick or Treat Halloween Quiz

    This WhatIs.com Learn IT quiz will test your knowledge about tech terms that you might find on your doorstep or in your trick-or-treat bag Halloween night.  Continue Reading

  • October 29, 2015 29 Oct'15

    format war

    A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.  Continue Reading

  • October 29, 2015 29 Oct'15

    Freedom on the Net report

    Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected.  Continue Reading

  • October 28, 2015 28 Oct'15

    kanban

    Kanban is a visual signal that's used to trigger an action. At its simplest, kanban is a card with an inventory number that’s attached to a part.  Continue Reading

  • October 28, 2015 28 Oct'15

    liquid computing

    Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop before leaving the office and start from the same point ...  Continue Reading

  • October 27, 2015 27 Oct'15

    federated search (universal search)

    Federated search is an approach to information retrieval that aggregates query results from multiple information sources. Federated search may also be called universal search.  Continue Reading

  • October 27, 2015 27 Oct'15

    witching hour

    Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.m. Eastern and the stock market close at 4 p.m.  Continue Reading

  • October 27, 2015 27 Oct'15

    Snowden effect

    The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001.  Continue Reading

  • October 22, 2015 22 Oct'15

    EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies ...  Continue Reading

  • October 21, 2015 21 Oct'15

    card dipping (EMV card dipping)

    Dipping can be contrasted with swiping. Swiping requires the cardholder to slide the card quickly through the reader. Dipping requires the cardholder to insert the card into the reader and wait until the reader indicates it has the information it ...  Continue Reading

  • October 20, 2015 20 Oct'15

    born digital

    Born digital, in reference to people, is a description of individuals who have grown up with the current state of near-ubiquitous computing, enabled by technology like smartphones and pervasive wireless networks.  Continue Reading

  • October 17, 2015 17 Oct'15

    Safari

    Safari is Apple's default Web browser for OS X and iOS-based devices.  Continue Reading

  • October 16, 2015 16 Oct'15

    form factor

    In computers, the form factor is the size, configuration, or physical arrangement of a computing device.  Continue Reading

  • October 16, 2015 16 Oct'15

    projector phone

    A projector phone is a smartphone with an embedded pico projector. Pico projectors are standalone, peripheral or embedded devices that make it possible to project presentations and other media content without requiring the bulky and not particularly...  Continue Reading

  • October 15, 2015 15 Oct'15

    emoji

    An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications. The emoji is the graphical successor to the emoticon.  Continue Reading

  • October 14, 2015 14 Oct'15

    transistor

    The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.  Continue Reading

  • October 14, 2015 14 Oct'15

    pico projector

    A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.  Continue Reading

  • October 13, 2015 13 Oct'15

    corporate performance

    Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close