Browse Definitions :
  • June 30, 2015 30 Jun'15

    Roles and responsibilities guide: What does a CIO do?

    Learn about the role of the chief information officer including daily responsibilities, necessary skills and how the role is evolving in the digital age.  Continue Reading

  • June 30, 2015 30 Jun'15

    data residency (data sovereignty)

    Data residency is the physical location or locations of an organization's data and the area of storage management involved with issues specific to managing data in those particular locations.  Continue Reading

  • June 29, 2015 29 Jun'15

    cloud configuration

    Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate. The complexities of a cloud environment, and a hybrid cloud environment in particular, make...  Continue Reading

  • June 26, 2015 26 Jun'15

    lossless and lossy compression

    Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.  Continue Reading

  • June 25, 2015 25 Jun'15

    Project Vault

    Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.  Continue Reading

  • June 25, 2015 25 Jun'15

    gesture recognition

    Gesture recognition is the mathematical interpretation of a human motion by a computing device. In personal computing, gestures are most often used for input commands.  Continue Reading

  • June 25, 2015 25 Jun'15

    hotword

    Hotword is an audio listening module included with Google Chrome and Chromium, the open source version of the browser. Hotword listens for key words that activate the “OK Google” voice interface.  Continue Reading

  • June 24, 2015 24 Jun'15

    Google ATAP (Advanced Technologies and Products)

    Google ATAP (Advanced Technologies and Products) is the company's development lab for disruptive technologies. ATAP projects include Project Tango (a high-end tablet optimized for 3-D applications and gaming), Project Jacquard (tech-embedded fabric)...  Continue Reading

  • June 23, 2015 23 Jun'15

    Payment Card Industry (PCI)

    The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.  Continue Reading

  • June 22, 2015 22 Jun'15

    data currency (data as currency)

    Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money.  Continue Reading

  • June 19, 2015 19 Jun'15

    logical interface (LIF)

    A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.  Continue Reading

  • June 18, 2015 18 Jun'15

    Quick Start Glossary: Hybrid cloud

    A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.  Continue Reading

  • June 18, 2015 18 Jun'15

    Hybrid cloud vocabulary quiz

    Take this quiz to find out how much you know about the essential terminology related to hybrid cloud technologies. See also, our Quick Start Glossary: Hybrid cloud.  Continue Reading

  • June 17, 2015 17 Jun'15

    personalized search

    Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” Google uses a combination of information from user search history, bookmarks and personalized Google+...  Continue Reading

  • June 17, 2015 17 Jun'15

    DuckDuckGo

    DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).  Continue Reading

  • June 16, 2015 16 Jun'15

    latitude and longitude

    Latitude and longitude are angles that uniquely define points on a sphere. Together, the angles comprise a coordinate scheme that can locate or identify geographic positions on the surfaces of planets such as the earth.  Continue Reading

  • June 16, 2015 16 Jun'15

    Linux Mint

    Linux Mint is a free and open source operating system (OS) distribution based on Ubuntu and Debian for use on x-86 x-64-compatible machines.  Continue Reading

  • June 15, 2015 15 Jun'15

    Let's Encrypt

    Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.  Continue Reading

  • June 12, 2015 12 Jun'15

    OpenPGP

    OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.  Continue Reading

  • June 12, 2015 12 Jun'15

    BYOE (bring your own encryption)

    BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.   Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close