Browse Definitions :
  • June 30, 2015 30 Jun'15

    Roles and responsibilities guide: What does a CIO do?

    Learn about the role of the chief information officer including daily responsibilities, necessary skills and how the role is evolving in the digital age.  Continue Reading

  • June 30, 2015 30 Jun'15

    data residency (data sovereignty)

    Data residency is the physical location or locations of an organization's data and the area of storage management involved with issues specific to managing data in those particular locations.  Continue Reading

  • June 29, 2015 29 Jun'15

    cloud configuration

    Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate. The complexities of a cloud environment, and a hybrid cloud environment in particular, make...  Continue Reading

  • June 26, 2015 26 Jun'15

    lossless and lossy compression

    Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.  Continue Reading

  • June 25, 2015 25 Jun'15

    Project Vault

    Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.  Continue Reading

  • June 25, 2015 25 Jun'15

    gesture recognition

    Gesture recognition is the mathematical interpretation of a human motion by a computing device. In personal computing, gestures are most often used for input commands.  Continue Reading

  • June 25, 2015 25 Jun'15

    hotword

    Hotword is an audio listening module included with Google Chrome and Chromium, the open source version of the browser. Hotword listens for key words that activate the “OK Google” voice interface.  Continue Reading

  • June 24, 2015 24 Jun'15

    Google ATAP (Advanced Technologies and Products)

    Google ATAP (Advanced Technologies and Products) is the company's development lab for disruptive technologies. ATAP projects include Project Tango (a high-end tablet optimized for 3-D applications and gaming), Project Jacquard (tech-embedded fabric)...  Continue Reading

  • June 23, 2015 23 Jun'15

    Payment Card Industry (PCI)

    The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.  Continue Reading

  • June 22, 2015 22 Jun'15

    data currency (data as currency)

    Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money.  Continue Reading

  • June 19, 2015 19 Jun'15

    logical interface (LIF)

    A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.  Continue Reading

  • June 18, 2015 18 Jun'15

    Quick Start Glossary: Hybrid cloud

    A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.  Continue Reading

  • June 18, 2015 18 Jun'15

    Hybrid cloud vocabulary quiz

    Take this quiz to find out how much you know about the essential terminology related to hybrid cloud technologies. See also, our Quick Start Glossary: Hybrid cloud.  Continue Reading

  • June 17, 2015 17 Jun'15

    personalized search

    Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” Google uses a combination of information from user search history, bookmarks and personalized Google+...  Continue Reading

  • June 17, 2015 17 Jun'15

    DuckDuckGo

    DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).  Continue Reading

  • June 16, 2015 16 Jun'15

    latitude and longitude

    Latitude and longitude are angles that uniquely define points on a sphere. Together, the angles comprise a coordinate scheme that can locate or identify geographic positions on the surfaces of planets such as the earth.  Continue Reading

  • June 16, 2015 16 Jun'15

    Linux Mint

    Linux Mint is a free and open source operating system (OS) distribution based on Ubuntu and Debian for use on x-86 x-64-compatible machines.  Continue Reading

  • June 15, 2015 15 Jun'15

    Let's Encrypt

    Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.  Continue Reading

  • June 12, 2015 12 Jun'15

    OpenPGP

    OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.  Continue Reading

  • June 12, 2015 12 Jun'15

    BYOE (bring your own encryption)

    BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.   Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close