Browse Definitions :
  • August 31, 2015 31 Aug'15

    first-person view (FPV)

    First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video ...  Continue Reading

  • August 31, 2015 31 Aug'15

    drone surveillance

    Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.  Continue Reading

  • August 28, 2015 28 Aug'15

    drone journalism

    Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.  Continue Reading

  • August 27, 2015 27 Aug'15

    time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.  Continue Reading

  • August 27, 2015 27 Aug'15

    tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and ...  Continue Reading

  • August 26, 2015 26 Aug'15

    Windows 10 Mobile

    Windows 10 Mobile is Microsoft’s operating system for handheld devices; the mobile OS follows Windows Phone 8. The operating system, which replaces Windows Phone, is designed as a step towards the unification of Windows desktop and mobile systems.  Continue Reading

  • August 13, 2015 13 Aug'15

    secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.  Continue Reading

  • August 10, 2015 10 Aug'15

    extension strategy

    An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline. Extension strategies include rebranding, ...  Continue Reading

  • August 07, 2015 07 Aug'15

    open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.  Continue Reading

  • August 07, 2015 07 Aug'15

    volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

    Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.  Continue Reading

  • August 06, 2015 06 Aug'15

    Kerckhoff's principle

    Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.  Continue Reading

  • August 05, 2015 05 Aug'15

    telepresence

    Telepresence is a sophisticated form of robotic remote control in which a human operator has a sense of being in a remote location so that the experience resembles virtual reality (VR).  Continue Reading

  • August 05, 2015 05 Aug'15

    BOINC (Berkeley Open Infrastructure for Network Computing)

    BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.  Continue Reading

  • August 03, 2015 03 Aug'15

    center of excellence (CoE)

    A center of excellence (CoE) is a corporate department or team that provides support, guidance, leadership and training for other employees in regard to a specific area of the business.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close