Browse Definitions:
  • October 31, 2016 31 Oct'16

    OpenConfig

    OpenConfig is a working group and network communication model that attempts to unify standards in networking management interfaces across vendors.  Continue Reading

  • October 30, 2016 30 Oct'16

    pervasive Wi-Fi

    Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.  Continue Reading

  • October 30, 2016 30 Oct'16

    reality computing

    Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM. This enables faster design and solutions.  Continue Reading

  • October 28, 2016 28 Oct'16

    reality capture

    Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.  Continue Reading

  • October 25, 2016 25 Oct'16

    photogrammetry

    Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.  Continue Reading

  • October 22, 2016 22 Oct'16

    Vblock (VCE Vblock)

    Vblock is VCE’s hyper-converged infrastructure (HCI) product family. Vblock systems are offered in a range of preconfigured rack-based data center machines.  Continue Reading

  • October 21, 2016 21 Oct'16

    point cloud

    A point cloud is a collection of data points defined by a given coordinates system. In a 3D coordinates system, for example, a point cloud may define the shape of some real or created physical system.  Continue Reading

  • October 21, 2016 21 Oct'16

    3D mesh

    A 3D mesh is the structural build of a 3D model consisting of polygons. 3D meshes use reference points in X, Y and Z axes to define shapes with height, width and depth.  Continue Reading

  • October 21, 2016 21 Oct'16

    access recertification

    Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.  Continue Reading

  • October 20, 2016 20 Oct'16

    access governance (AG)

    Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.  Continue Reading

  • October 19, 2016 19 Oct'16

    golden ratio (golden mean)

    The golden ratio is a proportion (roughly 1:1.6) that occurs frequently throughout the natural world and is broadly applied across many areas of human endeavor including engineering, architecture, art, interface design and music.  Continue Reading

  • October 18, 2016 18 Oct'16

    Network Node Manager i (NNMi)

    The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.  Continue Reading

  • October 18, 2016 18 Oct'16

    huddle room

    A huddle room is a small conference area, typically seating 3-6 people and equipped with conferencing and collaboration technologies.  Continue Reading

  • October 18, 2016 18 Oct'16

    network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  Continue Reading

  • October 17, 2016 17 Oct'16

    Hofstadter's law

    Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.”  Continue Reading

  • October 17, 2016 17 Oct'16

    walking skeleton

    A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.  Continue Reading

  • October 14, 2016 14 Oct'16

    software development

    Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).  Continue Reading

  • October 13, 2016 13 Oct'16

    Conway's law

    Conway’s law is an observation that the design of any system is significantly affected by the communications structure of the organization that develops it.  Continue Reading

  • October 12, 2016 12 Oct'16

    rack unit

    A rack unit (abbreviated as U, less commonly seen as RU) is a unit of measurement (1.75") applied to hardware racks and the devices that they contain.  Continue Reading

  • October 11, 2016 11 Oct'16

    Dell EMC

    Dell EMC is an American multinational technology company that offers products and services across all areas of computing, networking and storage.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

SearchHealthIT

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

SearchDisasterRecovery

SearchStorage

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close