Browse Definitions :
  • November 04, 2015 04 Nov'15

    RankBrain

    RankBrain is an artificial intelligence (AI) component of Google's Hummingbird search algorithm that uses machine learning to improve the way Web pages are positioned in search engine results pages (SERP).  Continue Reading

  • November 03, 2015 03 Nov'15

    hardware vulnerability

    A hardware vulnerability is an exploitable weakness in a computer system that enables attack through remote or physical access to system hardware.  Continue Reading

  • November 03, 2015 03 Nov'15

    RTA (recovery time actual)

    RTA (recovery time actual) is the amount of real-world time it takes for an organization to recover its systems and business processes following an unplanned disruption; that amount of time can differ significantly from the recovery time objective (...  Continue Reading

  • November 02, 2015 02 Nov'15

    servo (servomechanism)

    A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close