Browse Definitions:
  • March 31, 2015 31 Mar'15


    Burstiness is an intermittent type of data transmission. That transmission type contrasts with with streamed, paced or continuous transmissions.  Continue Reading

  • March 31, 2015 31 Mar'15


    A vendor is an individual or company that sells goods or services to somone else in the economic production chain. Learn about different types of vendors.  Continue Reading

  • March 31, 2015 31 Mar'15

    hypervisor attack

    A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences.  Continue Reading

  • March 31, 2015 31 Mar'15

    attack surface analysis

    An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering. Attack surface analysis allows the organization to detect those ...  Continue Reading

  • March 31, 2015 31 Mar'15

    public sector

    The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.  Continue Reading

  • March 30, 2015 30 Mar'15

    PCI DSS vocabulary quiz

    Take this quiz to test your knowledge of abbreviations related to the Payment Card Industry Data Security Standard (PCI DSS).  Continue Reading

  • March 30, 2015 30 Mar'15

    Quick Start Glossary: PCI DSS (Payment Card Industry Data Security Standard)

    Payment Card Industry Data Security Standard (PCI DSS): Print the glossary out for a fast reference or access online to see full definitions and further resources.  Continue Reading

  • March 30, 2015 30 Mar'15

    RFC 1918

    RFC 1918 specifies ranges of IP addresses for use in private networks. These private IP addresses cannot be routed on the Internet.  Continue Reading

  • March 27, 2015 27 Mar'15

    network socket

    Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C interface for sockets.  Continue Reading

  • March 26, 2015 26 Mar'15

    behavioral biometrics

    Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints.  Continue Reading

  • March 26, 2015 26 Mar'15

    National Vulnerability Database (NVD)

    NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability ...  Continue Reading

  • March 26, 2015 26 Mar'15

    enterprise search

    There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvantages.  Continue Reading

  • March 26, 2015 26 Mar'15

    virtual payment terminal

    Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.  Continue Reading

  • March 25, 2015 25 Mar'15

    critical path

    The critical path is the longest sequence of tasks in a project plan. Each task must be completed before the next can be begun.  Continue Reading

  • March 25, 2015 25 Mar'15

    negative float (negative slack)

    Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.  Continue Reading

  • March 25, 2015 25 Mar'15

    float (project float, slack)

    In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project. Essentially, float is margin for error -- the amount of time that a task can be delayed without ...  Continue Reading

  • March 21, 2015 21 Mar'15

    cone of uncertainty

    The cone of uncertainty is a project management tool that illustrates the fact that the accuracy of estimates increases over the span of the project.  Continue Reading

  • March 20, 2015 20 Mar'15

    pick two (pick any two)

    Pick two is the principle that, for any given three desirable qualities, you are likely to only be able to achieve two out of the three.  Continue Reading

  • March 20, 2015 20 Mar'15

    triple constraint

    The project management triangle is also known as the triple constraint, the project management triple constraint and the the iron triangle. The model defines the most significant project management constraints: scope, time and cost.  Continue Reading

  • March 19, 2015 19 Mar'15

    constraint (project constraint)

    A project constraint is any limit or restriction applied to a project. The traditional triple constraint of project management, for example, consists of time, cost and scope.  Continue Reading



  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...


  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...



  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.