Browse Definitions :
  • June 30, 2015 30 Jun'15

    Roles and responsibilities guide: What does a CIO do?

    Learn about the role of the chief information officer including daily responsibilities, necessary skills and how the role is evolving in the digital age.  Continue Reading

  • June 30, 2015 30 Jun'15

    data residency (data sovereignty)

    Data residency is the physical location or locations of an organization's data and the area of storage management involved with issues specific to managing data in those particular locations.  Continue Reading

  • June 29, 2015 29 Jun'15

    cloud configuration

    Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate. The complexities of a cloud environment, and a hybrid cloud environment in particular, make...  Continue Reading

  • June 26, 2015 26 Jun'15

    lossless and lossy compression

    Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.  Continue Reading

  • June 25, 2015 25 Jun'15

    Project Vault

    Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.  Continue Reading

  • June 25, 2015 25 Jun'15

    gesture recognition

    Gesture recognition is the mathematical interpretation of a human motion by a computing device. In personal computing, gestures are most often used for input commands.  Continue Reading

  • June 25, 2015 25 Jun'15

    hotword

    Hotword is an audio listening module included with Google Chrome and Chromium, the open source version of the browser. Hotword listens for key words that activate the “OK Google” voice interface.  Continue Reading

  • June 24, 2015 24 Jun'15

    Google ATAP (Advanced Technologies and Products)

    Google ATAP (Advanced Technologies and Products) is the company's development lab for disruptive technologies. ATAP projects include Project Tango (a high-end tablet optimized for 3-D applications and gaming), Project Jacquard (tech-embedded fabric)...  Continue Reading

  • June 23, 2015 23 Jun'15

    Payment Card Industry (PCI)

    The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.  Continue Reading

  • June 22, 2015 22 Jun'15

    data currency (data as currency)

    Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money.  Continue Reading

  • June 19, 2015 19 Jun'15

    logical interface (LIF)

    A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.  Continue Reading

  • June 18, 2015 18 Jun'15

    Quick Start Glossary: Hybrid cloud

    A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.  Continue Reading

  • June 18, 2015 18 Jun'15

    Hybrid cloud vocabulary quiz

    Take this quiz to find out how much you know about the essential terminology related to hybrid cloud technologies. See also, our Quick Start Glossary: Hybrid cloud.  Continue Reading

  • June 17, 2015 17 Jun'15

    personalized search

    Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” Google uses a combination of information from user search history, bookmarks and personalized Google+...  Continue Reading

  • June 17, 2015 17 Jun'15

    DuckDuckGo

    DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).  Continue Reading

  • June 16, 2015 16 Jun'15

    latitude and longitude

    Latitude and longitude are angles that uniquely define points on a sphere. Together, the angles comprise a coordinate scheme that can locate or identify geographic positions on the surfaces of planets such as the earth.  Continue Reading

  • June 16, 2015 16 Jun'15

    Linux Mint

    Linux Mint is a free and open source operating system (OS) distribution based on Ubuntu and Debian for use on x-86 x-64-compatible machines.  Continue Reading

  • June 15, 2015 15 Jun'15

    Let's Encrypt

    Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.  Continue Reading

  • June 12, 2015 12 Jun'15

    OpenPGP

    OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.  Continue Reading

  • June 12, 2015 12 Jun'15

    BYOE (bring your own encryption)

    BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.   Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close