Browse Definitions :
  • November 30, 2016 30 Nov'16

    URI (Uniform Resource Identifier)

    A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network. There are two types of URIs, Uniform Resource Identifiers (URLs) and Uniform Resource Names (URNs).  Continue Reading

  • November 29, 2016 29 Nov'16

    Semios mesh network

    Semios mesh network is the communications backbone of the Semios orchard farming automation platform.  Continue Reading

  • November 29, 2016 29 Nov'16

    software engineering

    Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.  Continue Reading

  • November 29, 2016 29 Nov'16

    Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.  Continue Reading

  • November 28, 2016 28 Nov'16

    Moral Machine

    The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI). Initially, the system targets AI for autonomous cars.  Continue Reading

  • November 28, 2016 28 Nov'16

    roboethics (robot ethics)

    Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.  Continue Reading

  • November 28, 2016 28 Nov'16

    software robot

    A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.  Continue Reading

  • November 25, 2016 25 Nov'16

    Khan Academy

    The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.  Continue Reading

  • November 24, 2016 24 Nov'16

    security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.  Continue Reading

  • November 23, 2016 23 Nov'16

    von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.  Continue Reading

  • November 21, 2016 21 Nov'16

    learning curve

    Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning. The learning curve provides a way to show a subject’s learnability.  Continue Reading

  • November 21, 2016 21 Nov'16

    screencast

    A screencast is a digital video recording that captures actions taking place on a computer desktop.  Continue Reading

  • November 21, 2016 21 Nov'16

    canary (canary test, canary deployment)

    In software testing, a canary (also called a canary test) is a push of code changes to a small number of users who have not volunteered or opted-in for testing. Because the canary is only pushed to a small number of users, its impact is relatively ...  Continue Reading

  • November 18, 2016 18 Nov'16

    causation

    Causation, or causality, is the capacity of one variable to influence another. The first variable may bring the second into existence or may cause the incidence of the second variable to fluctuate.  Continue Reading

  • November 18, 2016 18 Nov'16

    correlation

    Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in tandem.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.  Continue Reading

  • November 18, 2016 18 Nov'16

    Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS query

    A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating that the site does not exist.  Continue Reading

  • November 18, 2016 18 Nov'16

    iterative DNS query

    An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.  Continue Reading

  • November 15, 2016 15 Nov'16

    IPv4 address class

    An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing. Separate IP classes are used for different types of networks.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close