Browse Definitions:
  • October 31, 2016 31 Oct'16

    OpenConfig

    OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.  Continue Reading

  • October 30, 2016 30 Oct'16

    pervasive Wi-Fi

    Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.  Continue Reading

  • October 30, 2016 30 Oct'16

    reality computing

    Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM. This enables faster design and solutions.  Continue Reading

  • October 28, 2016 28 Oct'16

    reality capture

    Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.  Continue Reading

  • October 25, 2016 25 Oct'16

    photogrammetry

    Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.  Continue Reading

  • October 22, 2016 22 Oct'16

    Vblock (VCE Vblock)

    Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines.  Continue Reading

  • October 21, 2016 21 Oct'16

    point cloud

    A point cloud is a collection of data points defined by a given coordinates system. In a 3D coordinates system, for example, a point cloud may define the shape of some real or created physical system.  Continue Reading

  • October 21, 2016 21 Oct'16

    3D mesh

    A 3D mesh is the structural build of a 3D model consisting of polygons. 3D meshes use reference points in X, Y and Z axes to define shapes with height, width and depth.  Continue Reading

  • October 21, 2016 21 Oct'16

    access recertification

    Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.  Continue Reading

  • October 20, 2016 20 Oct'16

    access governance (AG)

    Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.  Continue Reading

  • October 19, 2016 19 Oct'16

    golden ratio (golden mean)

    The golden ratio is a proportion (roughly 1:1.6) that occurs frequently throughout the natural world and is broadly applied across many areas of human endeavor including engineering, architecture, art, interface design and music.  Continue Reading

  • October 18, 2016 18 Oct'16

    Network Node Manager i (NNMi)

    The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.  Continue Reading

  • October 18, 2016 18 Oct'16

    huddle room

    A huddle room is a small conference area, typically seating 3-6 people and equipped with conferencing and collaboration technologies.  Continue Reading

  • October 18, 2016 18 Oct'16

    network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  Continue Reading

  • October 17, 2016 17 Oct'16

    Hofstadter's law

    Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.”  Continue Reading

  • October 17, 2016 17 Oct'16

    walking skeleton

    A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.  Continue Reading

  • October 14, 2016 14 Oct'16

    software development

    Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).  Continue Reading

  • October 13, 2016 13 Oct'16

    Conway's law

    Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.  Continue Reading

  • October 12, 2016 12 Oct'16

    rack unit

    A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.75") applied to hardware racks and the devices that they contain.  Continue Reading

  • October 11, 2016 11 Oct'16

    Dell EMC

    Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close