Browse Definitions :
  • January 29, 2016 29 Jan'16

    Wi-Fi backscattering

    Wi-Fi backscattering is a low-power communications technology that uses radio frequency (RF) signals as a power source and reuses the existing Wi-Fi infrastructure to provide RF-powered devices with Internet connectivity.  Continue Reading

  • January 29, 2016 29 Jan'16

    brand

    A brand is a product, service, or concept that is publicly distinguished from other products, services, or concepts so that it can be easily communicated and usually marketed.  Continue Reading

  • January 28, 2016 28 Jan'16

    wind turbine

    A wind turbine is a power generating device that is driven by the kinetic energy of the wind. Wind turbines general fall into one of two categories: Horizontal axis wind turbines (HAWTs) and vertical axis wind turbines (VAWTs).  Continue Reading

  • January 28, 2016 28 Jan'16

    viral ad

    A viral ad is an advertisement that achieves wide-spread reach because people who view it are inclined to share it among their social networks.  Continue Reading

  • January 26, 2016 26 Jan'16

    ad blocker

    An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.  Continue Reading

  • January 25, 2016 25 Jan'16

    smart robot

    A smart robot is an artificial intelligence (AI) system that can learn from its environment and its experience and build on its capabilities based on that knowledge.  Continue Reading

  • January 25, 2016 25 Jan'16

    book of business

    Book of business is another name for an account or client list.  Continue Reading

  • January 21, 2016 21 Jan'16

    Pretty Easy Privacy (pEp)

    Pretty Easy Privacy (pEp) is an open source encryption tool designed to make it simple for users to protect their online communications.  Continue Reading

  • January 20, 2016 20 Jan'16

    corporate email policy

    A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment. The policy sets guidelines for what is deemed acceptable use ...  Continue Reading

  • January 19, 2016 19 Jan'16

    Salesforce Health Cloud

    Salesforce Health Cloud is a health IT CRM system that incorporates doctor-patient relationship and record management services.  Continue Reading

  • January 18, 2016 18 Jan'16

    information silo

    An information silo is a business division or group of employees within an organization that fails to communicate freely or effectively with other groups, including management.  Continue Reading

  • January 18, 2016 18 Jan'16

    DNS Security Extensions (DNSSEC)

    DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.  Continue Reading

  • January 15, 2016 15 Jan'16

    FBI Alert Number I-091015-PSA

    FBI Alert Number I-091015-PSA is a public service announcement from the United States Federal Bureau of Investigation to inform individuals and organizations about the importance of Internet of Things (IoT) security, including potential ...  Continue Reading

  • January 15, 2016 15 Jan'16

    Pinterest

    Pinterest is a social curation website for sharing and categorizing images found online. The site’s name is a portmanteau of the words “pin” and “interest.” Marketers are just beginning to discover Pinterest and are experimenting with ways to reach ...  Continue Reading

  • January 12, 2016 12 Jan'16

    product-agnostic

    Product-agnostic is a description of something that is not associated with a particular commercial product -- such as a specific device or application -- or something that is interoperable with all products of a given type.  Continue Reading

  • January 12, 2016 12 Jan'16

    nanomedicine

    Nanomedicine is the application of nanotechnology (the engineering of tiny machines) to the prevention and treatment of disease in the human body.  Continue Reading

  • January 08, 2016 08 Jan'16

    open content

    Open content is material, such as documents, audio or video presentations, that may be freely and legally edited, excerpted, reproduced and republished.  Continue Reading

  • January 08, 2016 08 Jan'16

    Wikipedia

    Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians.  Continue Reading

  • January 08, 2016 08 Jan'16

    agnostic

    Agnostic, in an information technology (IT) context, refers to something that is generalized so that it is interoperable among various systems.  Continue Reading

  • January 08, 2016 08 Jan'16

    open

    In information technology, a product or system is described as open when its workings are exposed to the public and capable of being modified or improved by anyone.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close