Browse Definitions:
  • October 30, 2015 30 Oct'15

    holographic display

    A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.  Continue Reading

  • October 30, 2015 30 Oct'15

    Trick or Treat Halloween Quiz

    This WhatIs.com Learn IT quiz will test your knowledge about tech terms that you might find on your doorstep or in your trick-or-treat bag Halloween night.  Continue Reading

  • October 29, 2015 29 Oct'15

    format war

    A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.  Continue Reading

  • October 29, 2015 29 Oct'15

    Freedom on the Net report

    Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected.  Continue Reading

  • October 28, 2015 28 Oct'15

    kanban

    Kanban is a visual signal that's used to trigger an action. At its simplest, kanban is a card with an inventory number that’s attached to a part.  Continue Reading

  • October 28, 2015 28 Oct'15

    liquid computing

    Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop before leaving the office and start from the same point ...  Continue Reading

  • October 27, 2015 27 Oct'15

    federated search (universal search)

    Federated search is an approach to information retrieval that aggregates query results from multiple information sources. Federated search may also be called universal search.  Continue Reading

  • October 27, 2015 27 Oct'15

    witching hour

    Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.m. Eastern and the stock market close at 4 p.m.  Continue Reading

  • October 27, 2015 27 Oct'15

    Snowden effect

    The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001.  Continue Reading

  • October 22, 2015 22 Oct'15

    EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies ...  Continue Reading

  • October 21, 2015 21 Oct'15

    card dipping (EMV card dipping)

    Dipping can be contrasted with swiping. Swiping requires the cardholder to slide the card quickly through the reader. Dipping requires the cardholder to insert the card into the reader and wait until the reader indicates it has the information it ...  Continue Reading

  • October 20, 2015 20 Oct'15

    born digital

    Born digital, in reference to people, is a description of individuals who have grown up with the current state of near-ubiquitous computing, enabled by technology like smartphones and pervasive wireless networks.  Continue Reading

  • October 17, 2015 17 Oct'15

    Safari

    Safari is Apple's default Web browser for OS X and iOS-based devices.  Continue Reading

  • October 16, 2015 16 Oct'15

    form factor

    In computers, the form factor is the size, configuration, or physical arrangement of a computing device.  Continue Reading

  • October 16, 2015 16 Oct'15

    projector phone

    A projector phone is a smartphone with an embedded pico projector. Pico projectors are standalone, peripheral or embedded devices that make it possible to project presentations and other media content without requiring the bulky and not particularly...  Continue Reading

  • October 15, 2015 15 Oct'15

    emoji

    An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications. The emoji is the graphical successor to the emoticon.  Continue Reading

  • October 14, 2015 14 Oct'15

    transistor

    The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.  Continue Reading

  • October 14, 2015 14 Oct'15

    pico projector

    A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.  Continue Reading

  • October 13, 2015 13 Oct'15

    corporate performance

    Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.  Continue Reading

  • October 13, 2015 13 Oct'15

    Peter principle

    The Peter principle is an observance about a commonly-seen pattern in which an employee is promoted based on performance in their current position rather than their fit for the role they are being promoted to.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close