Browse Definitions:
  • August 31, 2015 31 Aug'15

    first-person view (FPV)

    First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video ...  Continue Reading

  • August 31, 2015 31 Aug'15

    drone surveillance

    Drone surveillance is the use of unmanned aerial vehicles (UAV) to capture of still images and video to gather information about specific targets, which might be individuals, groups or environments.  Continue Reading

  • August 28, 2015 28 Aug'15

    drone journalism

    Drone journalism is the capture of still images and video by remotely operated or autonomous drones (more formally known as unmanned aerial vehicles or UAV) to record events for report by news agencies and citizen media.  Continue Reading

  • August 27, 2015 27 Aug'15

    time value of money

    Time value of money is the concept that money acquired sooner or held onto longer has a greater worth or potential worth due to the possible accumulation of interest or ROI while that money is saved or invested.  Continue Reading

  • August 27, 2015 27 Aug'15

    tag-jacking

    Tag-jacking is the exploitation of Facebook's friend tagging feature to spread unwanted material such as scams, spam or malware. By taking advantage of permissive security settings, the poster can make the content show up in the user's newsfeed and ...  Continue Reading

  • August 26, 2015 26 Aug'15

    Windows 10 Mobile

    Windows 10 Mobile is Microsoft’s operating system for handheld devices; the mobile OS follows Windows Phone 8. The operating system, which replaces Windows Phone, is designed as a step towards the unification of Windows desktop and mobile systems.  Continue Reading

  • August 13, 2015 13 Aug'15

    secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps.  Continue Reading

  • August 10, 2015 10 Aug'15

    extension strategy

    An extension strategy is a practice used to increase profitability for a given product or service and thus keep it in the maturity phase of the marketing product lifecycle rather than going into decline. Extension strategies include rebranding, ...  Continue Reading

  • August 07, 2015 07 Aug'15

    open security

    Open security is an approach to safeguarding software, hardware and other information system components with methods whose design and details are publicly available.  Continue Reading

  • August 07, 2015 07 Aug'15

    volunteer cloud (peer-to-peer cloud, ad-hoc cloud)

    Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.  Continue Reading

  • August 06, 2015 06 Aug'15

    Kerckhoff's principle

    Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.  Continue Reading

  • August 05, 2015 05 Aug'15

    telepresence

    Telepresence is a sophisticated form of robotic remote control in which a human operator has a sense of being in a remote location so that the experience resembles virtual reality (VR).  Continue Reading

  • August 05, 2015 05 Aug'15

    BOINC (Berkeley Open Infrastructure for Network Computing)

    BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.  Continue Reading

  • August 03, 2015 03 Aug'15

    center of excellence (CoE)

    A center of excellence (CoE) is a corporate department or team that provides support, guidance, leadership and training for other employees in regard to a specific area of the business.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close