Browse Definitions:
  • June 30, 2015 30 Jun'15

    Roles and responsibilities guide: What does a CIO do?

    Learn about the role of the chief information officer including daily responsibilities, necessary skills and how the role is evolving in the digital age.  Continue Reading

  • June 30, 2015 30 Jun'15

    data residency (data sovereignty)

    Data residency is the physical location or locations of an organization's data and the area of storage management involved with issues specific to managing data in those particular locations.  Continue Reading

  • June 29, 2015 29 Jun'15

    cloud configuration

    Cloud configuration is the process of setting hardware and software details for all elements of a cloud to ensure that they can interoperate and communicate. The complexities of a cloud environment, and a hybrid cloud environment in particular, make...  Continue Reading

  • June 26, 2015 26 Jun'15

    lossless and lossy compression

    Lossless and lossy compression are terms that describe whether or not, in the compression of a file, all original data can be recovered when the file is uncompressed.  Continue Reading

  • June 25, 2015 25 Jun'15

    Project Vault

    Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.  Continue Reading

  • June 25, 2015 25 Jun'15

    gesture recognition

    Gesture recognition is the mathematical interpretation of a human motion by a computing device. In personal computing, gestures are most often used for input commands.  Continue Reading

  • June 25, 2015 25 Jun'15

    hotword

    Hotword is an audio listening module included with Google Chrome and Chromium, the open source version of the browser. Hotword listens for key words that activate the “OK Google” voice interface.  Continue Reading

  • June 24, 2015 24 Jun'15

    Google ATAP (Advanced Technologies and Products)

    Google ATAP (Advanced Technologies and Products) is the company's development lab for disruptive technologies. ATAP projects include Project Tango (a high-end tablet optimized for 3-D applications and gaming), Project Jacquard (tech-embedded fabric...  Continue Reading

  • June 23, 2015 23 Jun'15

    Payment Card Industry (PCI)

    The Payment Card Industry (PCI) is the segment of the financial industry that governs the use of all electronic forms of payment.  Continue Reading

  • June 22, 2015 22 Jun'15

    data currency (data as currency)

    Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money.  Continue Reading

  • June 19, 2015 19 Jun'15

    logical interface (LIF)

    A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.  Continue Reading

  • June 18, 2015 18 Jun'15

    Quick Start Glossary: Hybrid cloud

    A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.  Continue Reading

  • June 18, 2015 18 Jun'15

    Hybrid cloud vocabulary quiz

    Take this quiz to find out how much you know about the essential terminology related to hybrid cloud technologies. See also, our Quick Start Glossary: Hybrid cloud.  Continue Reading

  • June 17, 2015 17 Jun'15

    personalized search

    Google introduced personalized search in 2004, promoting it as a way to “understand exactly what you mean and give you back exactly what you want.” Google uses a combination of information from user search history, bookmarks and personalized Google+...  Continue Reading

  • June 17, 2015 17 Jun'15

    DuckDuckGo

    DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).  Continue Reading

  • June 16, 2015 16 Jun'15

    latitude and longitude

    Latitude and longitude are angles that uniquely define points on a sphere. Together, the angles comprise a coordinate scheme that can locate or identify geographic positions on the surfaces of planets such as the earth.  Continue Reading

  • June 16, 2015 16 Jun'15

    Linux Mint

    Linux Mint is a free and open source operating system (OS) distribution based on Ubuntu and Debian for use on x-86 x-64-compatible machines.  Continue Reading

  • June 15, 2015 15 Jun'15

    Let's Encrypt

    Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates.  Continue Reading

  • June 12, 2015 12 Jun'15

    OpenPGP

    OpenPGP is an open and free version of the Pretty Good Privacy (PGP) standard that defines encryption formats to enable private messaging abilities for email and other message encryption.  Continue Reading

  • June 12, 2015 12 Jun'15

    BYOE (bring your own encryption)

    BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.   Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close