Browse Definitions :
  • July 30, 2015 30 Jul'15

    deprecated

    In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.  Continue Reading

  • July 28, 2015 28 Jul'15

    security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that would make it ...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.  Continue Reading

  • July 24, 2015 24 Jul'15

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • July 21, 2015 21 Jul'15

    data literacy

    Data literacy is the ability to derive information from data, just as literacy in general is the ability to derive information from the written word.  Continue Reading

  • July 20, 2015 20 Jul'15

    security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness.   Continue Reading

  • July 20, 2015 20 Jul'15

    case study

    In a business context, a case study is a documented implementation of something, such as a practice, a product or a service. An organization might deploy, for example, a new business intelligence (BI) platform. A case study of its implementation ...  Continue Reading

  • July 17, 2015 17 Jul'15

    codebase (code base)

    A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.  Continue Reading

  • July 16, 2015 16 Jul'15

    hard error

    A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.  Continue Reading

  • July 16, 2015 16 Jul'15

    soft error

    A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way. Errors that change data stored in RAM are either soft errors or hard errors, which result from a hardware failure.  Continue Reading

  • July 16, 2015 16 Jul'15

    memory read error

    A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.  Continue Reading

  • July 15, 2015 15 Jul'15

    niche app

    A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices. Niche apps can be seen as a divergence from the large, generalized social media platforms such as Facebook and Twitter.  Continue Reading

  • July 14, 2015 14 Jul'15

    negative correlation

    A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.  Correlation is expressed on a range from +1 to -1, known as the correlation coefficent. Values below zero express ...  Continue Reading

  • July 14, 2015 14 Jul'15

    authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an inside vantage point and find many ...  Continue Reading

  • July 14, 2015 14 Jul'15

    unauthenticated security scan (logged-out secuity scan)

    An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.  Continue Reading

  • July 09, 2015 09 Jul'15

    Euler diagram

    An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.  Continue Reading

  • July 08, 2015 08 Jul'15

    pixel

    The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.  Continue Reading

  • July 08, 2015 08 Jul'15

    IDOV methodology (identify, design, optimize, verify)

    The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.  Continue Reading

  • July 07, 2015 07 Jul'15

    cloud service latency

    Latency greatly affects how usable and enjoyable devices and communications are. Those problems can be magnified for cloud service communications, which can be especially prone to latency for a number of reasons.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close