Browse Definitions :
  • July 30, 2015 30 Jul'15

    deprecated

    In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.  Continue Reading

  • July 28, 2015 28 Jul'15

    security by design

    Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obsolescence

    Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as it lacks the market share that would make it ...  Continue Reading

  • July 24, 2015 24 Jul'15

    security through obscurity

    Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.  Continue Reading

  • July 24, 2015 24 Jul'15

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • July 21, 2015 21 Jul'15

    data literacy

    Data literacy is the ability to derive information from data, just as literacy in general is the ability to derive information from the written word.  Continue Reading

  • July 20, 2015 20 Jul'15

    security through minority

    Security through minority is an approach that relies upon infrequently-used code for its effectiveness.   Continue Reading

  • July 20, 2015 20 Jul'15

    case study

    In a business context, a case study is a documented implementation of something, such as a practice, a product or a service. An organization might deploy, for example, a new business intelligence (BI) platform. A case study of its implementation ...  Continue Reading

  • July 17, 2015 17 Jul'15

    codebase (code base)

    A codebase (sometimes spelled as two words, code base) is the complete body of source code for a given software program or application.  Continue Reading

  • July 16, 2015 16 Jul'15

    hard error

    A hard error is an issue in RAM that results from a permanent physical flaw in the module caused by a hardware failure or defect.  Continue Reading

  • July 16, 2015 16 Jul'15

    soft error

    A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way. Errors that change data stored in RAM are either soft errors or hard errors, which result from a hardware failure.  Continue Reading

  • July 16, 2015 16 Jul'15

    memory read error

    A memory read error is a malfunction that occurs when data is being accessed from memory for use by a program, or when a value read from RAM fails to match an expected value.  Continue Reading

  • July 15, 2015 15 Jul'15

    niche app

    A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices. Niche apps can be seen as a divergence from the large, generalized social media platforms such as Facebook and Twitter.  Continue Reading

  • July 14, 2015 14 Jul'15

    negative correlation

    A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.  Correlation is expressed on a range from +1 to -1, known as the correlation coefficent. Values below zero express ...  Continue Reading

  • July 14, 2015 14 Jul'15

    authenticated security scan

    An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an inside vantage point and find many ...  Continue Reading

  • July 14, 2015 14 Jul'15

    unauthenticated security scan (logged-out secuity scan)

    An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.  Continue Reading

  • July 09, 2015 09 Jul'15

    Euler diagram

    An Euler diagram (pronounced OY-ler diagram) is a graphic depiction commonly used to illustrate the relationships between sets or groups; the diagrams are usually drawn with circles or ovals, although they can also use other shapes.  Continue Reading

  • July 08, 2015 08 Jul'15

    pixel

    The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.  Continue Reading

  • July 08, 2015 08 Jul'15

    IDOV methodology (identify, design, optimize, verify)

    The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.  Continue Reading

  • July 07, 2015 07 Jul'15

    cloud service latency

    Latency greatly affects how usable and enjoyable devices and communications are. Those problems can be magnified for cloud service communications, which can be especially prone to latency for a number of reasons.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close