Browse Definitions :
  • October 31, 2016 31 Oct'16

    poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.  Continue Reading

  • October 31, 2016 31 Oct'16

    OpenConfig

    OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.  Continue Reading

  • October 30, 2016 30 Oct'16

    pervasive Wi-Fi

    Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.  Continue Reading

  • October 30, 2016 30 Oct'16

    reality computing

    Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM. This enables faster design and solutions.  Continue Reading

  • October 28, 2016 28 Oct'16

    reality capture

    Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.  Continue Reading

  • October 25, 2016 25 Oct'16

    photogrammetry

    Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.  Continue Reading

  • October 22, 2016 22 Oct'16

    Vblock (VCE Vblock)

    Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines.  Continue Reading

  • October 21, 2016 21 Oct'16

    point cloud

    A point cloud is a collection of data points defined by a given coordinates system. In a 3D coordinates system, for example, a point cloud may define the shape of some real or created physical system.  Continue Reading

  • October 21, 2016 21 Oct'16

    3D mesh

    A 3D mesh is the structural build of a 3D model consisting of polygons. 3D meshes use reference points in X, Y and Z axes to define shapes with height, width and depth.  Continue Reading

  • October 21, 2016 21 Oct'16

    access recertification

    Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.  Continue Reading

  • October 20, 2016 20 Oct'16

    access governance (AG)

    Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.  Continue Reading

  • October 19, 2016 19 Oct'16

    golden ratio (golden mean)

    The golden ratio is a proportion (roughly 1:1.6) that occurs frequently throughout the natural world and is broadly applied across many areas of human endeavor including engineering, architecture, art, interface design and music.  Continue Reading

  • October 18, 2016 18 Oct'16

    Network Node Manager i (NNMi)

    The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.  Continue Reading

  • October 18, 2016 18 Oct'16

    huddle room

    A huddle room is a small conference area, typically seating 3-6 people and equipped with conferencing and collaboration technologies.  Continue Reading

  • October 18, 2016 18 Oct'16

    network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  Continue Reading

  • October 17, 2016 17 Oct'16

    Hofstadter's law

    Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.”  Continue Reading

  • October 17, 2016 17 Oct'16

    walking skeleton

    A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.  Continue Reading

  • October 14, 2016 14 Oct'16

    software development

    Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).  Continue Reading

  • October 13, 2016 13 Oct'16

    Conway's law

    Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.  Continue Reading

  • October 12, 2016 12 Oct'16

    rack unit

    A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.75") applied to hardware racks and the devices that they contain.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close