Browse Definitions :
  • November 30, 2016 30 Nov'16

    URI (Uniform Resource Identifier)

    A URI (Uniform Resource Identifier) is a sequence of characters that identifies a logical or physical resource on a network. There are two types of URIs, Uniform Resource Identifiers (URLs) and Uniform Resource Names (URNs).  Continue Reading

  • November 29, 2016 29 Nov'16

    Semios mesh network

    Semios mesh network is the communications backbone of the Semios orchard farming automation platform.  Continue Reading

  • November 29, 2016 29 Nov'16

    software engineering

    Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.  Continue Reading

  • November 29, 2016 29 Nov'16

    Office of Personnel Management (OPM)

    The Office of Personnel Management (OPM) is an independent agency of the United States government that is tasked with the oversight of civil service hirings.  Continue Reading

  • November 28, 2016 28 Nov'16

    Moral Machine

    The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI). Initially, the system targets AI for autonomous cars.  Continue Reading

  • November 28, 2016 28 Nov'16

    roboethics (robot ethics)

    Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.  Continue Reading

  • November 28, 2016 28 Nov'16

    software robot

    A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.  Continue Reading

  • November 25, 2016 25 Nov'16

    Khan Academy

    The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.  Continue Reading

  • November 24, 2016 24 Nov'16

    security incident

    A security incident is an event that may indicate that an organization's systems or data have been compromised.  Continue Reading

  • November 23, 2016 23 Nov'16

    von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.  Continue Reading

  • November 21, 2016 21 Nov'16

    learning curve

    Learning curves are a visualization of the difficulty estimated in learning a subject over a period of time as well as relative progress throughout the process of learning. The learning curve provides a way to show a subject’s learnability.  Continue Reading

  • November 21, 2016 21 Nov'16

    screencast

    A screencast is a digital video recording that captures actions taking place on a computer desktop.  Continue Reading

  • November 21, 2016 21 Nov'16

    canary (canary test, canary deployment)

    In software testing, a canary (also called a canary test) is a push of code changes to a small number of users who have not volunteered or opted-in for testing. Because the canary is only pushed to a small number of users, its impact is relatively ...  Continue Reading

  • November 18, 2016 18 Nov'16

    causation

    Causation, or causality, is the capacity of one variable to influence another. The first variable may bring the second into existence or may cause the incidence of the second variable to fluctuate.  Continue Reading

  • November 18, 2016 18 Nov'16

    correlation

    Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate in tandem.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.  Continue Reading

  • November 18, 2016 18 Nov'16

    Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.  Continue Reading

  • November 18, 2016 18 Nov'16

    recursive DNS query

    A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating that the site does not exist.  Continue Reading

  • November 18, 2016 18 Nov'16

    iterative DNS query

    An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.  Continue Reading

  • November 15, 2016 15 Nov'16

    IPv4 address class

    An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing. Separate IP classes are used for different types of networks.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close