Browse Definitions:
  • December 23, 2016 23 Dec'16

    motherboard

    A motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect.  Continue Reading

  • December 23, 2016 23 Dec'16

    boot sector

    A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.  Continue Reading

  • December 22, 2016 22 Dec'16

    binary

    Binary describes a numbering scheme in which there are only two possible values for each digit: 0 and 1. The term also refers to any digital encoding/decoding system in which there are exactly two possible states.  Continue Reading

  • December 21, 2016 21 Dec'16

    Internet Crime Complaint Center (IC3)

    The Internet Crime Complaint Center (IC3) is a website and that offers users a standardized mechanism and interface to report suspected cybercrime or other illegal activity facilitated by the internet.  Continue Reading

  • December 21, 2016 21 Dec'16

    memory dump

    A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more ...  Continue Reading

  • December 21, 2016 21 Dec'16

    semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.  Continue Reading

  • December 21, 2016 21 Dec'16

    geo-fencing (geofencing)

    Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.  Continue Reading

  • December 20, 2016 20 Dec'16

    disruptive technology

    A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. Harvard Business School professor Clayton M. Christensen coined the term.  Continue Reading

  • December 20, 2016 20 Dec'16

    interrupt

    An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.  Continue Reading

  • December 20, 2016 20 Dec'16

    lithium polymer battery (LiPo)

    A lithium-polymer battery (LiPo) is a rechargeable battery that, in the case of true LiPo, uses solid polymer for the electrolyte and lithium for one of the electrodes.  Continue Reading

  • December 20, 2016 20 Dec'16

    latent data (ambient data)

    Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.  Continue Reading

  • December 19, 2016 19 Dec'16

    Ryzen (AMD Ryzen)

    Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.  Continue Reading

  • December 18, 2016 18 Dec'16

    unsupervised learning

    Unsupervised learning is the training of an artificial intelligence (AI) algorithm using information that is neither classified nor labeled and allowing the algorithm to act on that information without guidance.  Continue Reading

  • December 15, 2016 15 Dec'16

    molecule

    A molecule is the smallest particle in a chemical element or compound that has the chemical properties of that element or compound.  Continue Reading

  • December 15, 2016 15 Dec'16

    single-page application (SPA)

    A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.  Continue Reading

  • December 13, 2016 13 Dec'16

    structured content

    Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.  Continue Reading

  • December 13, 2016 13 Dec'16

    burner phone

    A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded. Burners are purchased with prepaid minutes and without a contract.  Continue Reading

  • December 12, 2016 12 Dec'16

    mobile number privacy

    Mobile number privacy is the protection of the phone user’s number from unwanted access.  Continue Reading

  • December 12, 2016 12 Dec'16

    smart data

    Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics.  Continue Reading

  • December 10, 2016 10 Dec'16

    pressure sensing

    Pressure sensing is the capacity for some system to sense the force exerted on a surface per unit area and express that force in the strength of an electric signal.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close