Browse Definitions:
  • December 31, 2015 31 Dec'15

    Industrial Internet Consortium (IIC)

    The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.  Continue Reading

  • December 30, 2015 30 Dec'15

    GNU project

    The GNU project is a mass collaborative initiative for the development of free software. Richard Stallman founded the project in 1978 at MIT.  Continue Reading

  • December 28, 2015 28 Dec'15

    slacktivism

    Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.  Continue Reading

  • December 28, 2015 28 Dec'15

    dynamic voltage and frequency scaling (DVFS)

    Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device’s various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power-saving when ...  Continue Reading

  • December 27, 2015 27 Dec'15

    consumerism

    Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.  Continue Reading

  • December 25, 2015 25 Dec'15

    Twitter

    Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.  Continue Reading

  • December 24, 2015 24 Dec'15

    LoRa Alliance

    The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).  Continue Reading

  • December 22, 2015 22 Dec'15

    Jargon File (New Hacker's Dictionary)

    The Jargon File is a compilation of computer-related slang that was first developed in 1975 by Raphael Finkel at Stanford University from sources including the Stanford and MIT AI Labs, Carnegie Mellon University and Worcester Polytechnic Institute.  Continue Reading

  • December 21, 2015 21 Dec'15

    cyberbullying

    Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.  Continue Reading

  • December 18, 2015 18 Dec'15

    widget

    In general, widget (pronounced WID-jit) is a term used to refer to any discrete object, usually of some mechanical nature and relatively small size, when it doesn't have a name, when you can't remember the name, or when you're talking about a class ...  Continue Reading

  • December 18, 2015 18 Dec'15

    beta test

    In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.  Continue Reading

  • December 18, 2015 18 Dec'15

    Google Docs

    Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.  Continue Reading

  • December 15, 2015 15 Dec'15

    digital wallet security

    Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.  Continue Reading

  • December 15, 2015 15 Dec'15

    stingray (IMSI catcher)

    A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator. Stingray is sold to governmental and law enforcement sectors.  Continue Reading

  • December 15, 2015 15 Dec'15

    cryptocurrency

    A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.  Continue Reading

  • December 15, 2015 15 Dec'15

    circular economy

    A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.  Continue Reading

  • December 11, 2015 11 Dec'15

    collaborative consumption

    Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.  Continue Reading

  • December 10, 2015 10 Dec'15

    limited liability company (LLC)

    A limited liability company (LLC) is a hybrid unincorporated business structure that combines the pass-through tax model of partnerships and sole proprietorships with the protection of individual assets provided by the C corporation.  Continue Reading

  • December 10, 2015 10 Dec'15

    cooperative (co-op)

    A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members. A cooperative is formed when several people identify an unmet need.  Continue Reading

  • December 10, 2015 10 Dec'15

    sole proprietorship

    A sole proprietorship is an unincorporated business owned by a single individual or a couple who files a single tax return.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close