Browse Definitions :
  • August 31, 2015 31 Aug'15

    first-person view (FPV)

    First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video ...  Continue Reading

  • August 31, 2015 31 Aug'15

    drone surveillance

    Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.  Continue Reading

  • August 28, 2015 28 Aug'15

    drone journalism

    Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.  Continue Reading

  • August 28, 2015 28 Aug'15

    colocation (colo)

    A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware. Typically, a colo provides the building, cooling, power, bandwidth and physical security while the customer provides servers ...  Continue Reading

  • August 27, 2015 27 Aug'15

    time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.  Continue Reading

  • August 27, 2015 27 Aug'15

    tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and ...  Continue Reading

  • August 26, 2015 26 Aug'15

    Windows 10 Mobile

    Windows 10 Mobile is Microsoft’s operating system for handheld devices; the mobile OS follows Windows Phone 8. The operating system, which replaces Windows Phone, is designed as a step towards the unification of Windows desktop and mobile systems.  Continue Reading

  • August 10, 2015 10 Aug'15

    extension strategy

    An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline. Extension strategies include rebranding, ...  Continue Reading

  • August 07, 2015 07 Aug'15

    open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.  Continue Reading

  • August 07, 2015 07 Aug'15

    volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

    Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close