Browse Definitions :
  • October 30, 2015 30 Oct'15

    holographic display

    A holographic display is a display that uses coherent light, such as that created by laser, to create a three-dimensional (3D) image in space.  Continue Reading

  • October 30, 2015 30 Oct'15

    cutover migration

    The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch. Related user accounts are then administered in Office 365.  Continue Reading

  • October 30, 2015 30 Oct'15

    Trick or Treat Halloween Quiz

    This WhatIs.com Learn IT quiz will test your knowledge about tech terms that you might find on your doorstep or in your trick-or-treat bag Halloween night.  Continue Reading

  • October 29, 2015 29 Oct'15

    format war

    A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.  Continue Reading

  • October 29, 2015 29 Oct'15

    Freedom on the Net report

    Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected.  Continue Reading

  • October 28, 2015 28 Oct'15

    kanban

    Kanban is a visual signal that's used to trigger an action. At its simplest, kanban is a card with an inventory number that’s attached to a part.  Continue Reading

  • October 28, 2015 28 Oct'15

    liquid computing

    Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop before leaving the office and start from the same point ...  Continue Reading

  • October 27, 2015 27 Oct'15

    federated search (universal search)

    Federated search is an approach to information retrieval that aggregates query results from multiple information sources. Federated search may also be called universal search.  Continue Reading

  • October 27, 2015 27 Oct'15

    witching hour

    Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.m. Eastern and the stock market close at 4 p.m.  Continue Reading

  • October 27, 2015 27 Oct'15

    Snowden effect

    The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001.  Continue Reading

  • October 22, 2015 22 Oct'15

    EMV card

    An EMV card is a credit or debit card with an embedded computer chip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals; EMV stands for Europay, Mastercard and Visa, the three companies ...  Continue Reading

  • October 21, 2015 21 Oct'15

    card dipping (EMV card dipping)

    Dipping can be contrasted with swiping. Swiping requires the cardholder to slide the card quickly through the reader. Dipping requires the cardholder to insert the card into the reader and wait until the reader indicates it has the information it ...  Continue Reading

  • October 20, 2015 20 Oct'15

    born digital

    Born digital, in reference to people, is a description of individuals who have grown up with the current state of near-ubiquitous computing, enabled by technology like smartphones and pervasive wireless networks.  Continue Reading

  • October 17, 2015 17 Oct'15

    Safari

    Safari is Apple's default Web browser for OS X and iOS-based devices.  Continue Reading

  • October 16, 2015 16 Oct'15

    form factor

    In computers, the form factor is the size, configuration, or physical arrangement of a computing device.  Continue Reading

  • October 16, 2015 16 Oct'15

    projector phone

    A projector phone is a smartphone with an embedded pico projector. Pico projectors are standalone, peripheral or embedded devices that make it possible to project presentations and other media content without requiring the bulky and not particularly...  Continue Reading

  • October 15, 2015 15 Oct'15

    emoji

    An emoji is a small image, either static or animated, that represents an emotion, an item or a concept (among other possibilities) in digital communications. The emoji is the graphical successor to the emoticon.  Continue Reading

  • October 14, 2015 14 Oct'15

    transistor

    The transistor, invented by three scientists at the Bell Laboratories in 1947, rapidly replaced the vacuum tube as an electronic signal regulator.  Continue Reading

  • October 14, 2015 14 Oct'15

    pico projector

    A pico projector is a small hardware device designed to project content from a smartphone, camera, notebook or memory device, typically for content viewing or presentations.  Continue Reading

  • October 13, 2015 13 Oct'15

    corporate performance

    Corporate performance is a composite assessment of how well an organization executes on its most important parameters, typically financial, market and shareholder performance.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close