Browse Definitions :
  • November 29, 2016 29 Nov'16

    Semios mesh network

    Semios mesh network is the communications backbone of the Semios orchard farming automation platform.  Continue Reading

  • November 29, 2016 29 Nov'16

    software engineering

    Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.  Continue Reading

  • November 29, 2016 29 Nov'16

    Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.  Continue Reading

  • November 28, 2016 28 Nov'16

    Moral Machine

    The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI). Initially, the system targets AI for autonomous cars.  Continue Reading

  • November 28, 2016 28 Nov'16

    roboethics (robot ethics)

    Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.  Continue Reading

  • November 28, 2016 28 Nov'16

    software robot

    A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.  Continue Reading

  • November 25, 2016 25 Nov'16

    Khan Academy

    The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.  Continue Reading

  • November 24, 2016 24 Nov'16

    security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.  Continue Reading

  • November 23, 2016 23 Nov'16

    von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.  Continue Reading

  • November 21, 2016 21 Nov'16

    learning curve

    Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning. The learning curve provides a way to show a subject’s learnability.  Continue Reading

  • November 21, 2016 21 Nov'16

    screencast

    A screencast is a digital video recording that captures actions taking place on a computer desktop.  Continue Reading

  • November 21, 2016 21 Nov'16

    canary (canary test, canary deployment)

    In software testing, a canary (also called a canary test) is a push of code changes to a small number of users who have not volunteered or opted-in for testing. Because the canary is only pushed to a small number of users, its impact is relatively ...  Continue Reading

  • November 18, 2016 18 Nov'16

    causation

    Causation, or causality, is the capacity of one variable to influence another. The first variable may bring the second into existence or may cause the incidence of the second variable to fluctuate.  Continue Reading

  • November 18, 2016 18 Nov'16

    correlation

    Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in tandem.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.  Continue Reading

  • November 18, 2016 18 Nov'16

    Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS query

    A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating that the site does not exist.  Continue Reading

  • November 18, 2016 18 Nov'16

    iterative DNS query

    An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.  Continue Reading

  • November 15, 2016 15 Nov'16

    IPv4 address class

    An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing. Separate IP classes are used for different types of networks.  Continue Reading

  • November 14, 2016 14 Nov'16

    compensating control (alternative control)

    A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close