Browse Definitions :
  • December 29, 2016 29 Dec'16

    discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.  Continue Reading

  • December 23, 2016 23 Dec'16

    motherboard

    A motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect.  Continue Reading

  • December 23, 2016 23 Dec'16

    boot sector

    A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.  Continue Reading

  • December 22, 2016 22 Dec'16

    binary

    Binary describes a numbering scheme in which there are only two possible values for each digit: 0 and 1. The term also refers to any digital encoding/decoding system in which there are exactly two possible states.  Continue Reading

  • December 21, 2016 21 Dec'16

    Internet Crime Complaint Center (IC3)

    The Internet Crime Complaint Center (IC3) is a website and that offers users a standardized mechanism and interface to report suspected cybercrime or other illegal activity facilitated by the internet.  Continue Reading

  • December 21, 2016 21 Dec'16

    memory dump

    A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more ...  Continue Reading

  • December 21, 2016 21 Dec'16

    semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.  Continue Reading

  • December 21, 2016 21 Dec'16

    geo-fencing (geofencing)

    Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.  Continue Reading

  • December 20, 2016 20 Dec'16

    disruptive technology

    A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. Harvard Business School professor Clayton M. Christensen coined the term.  Continue Reading

  • December 20, 2016 20 Dec'16

    interrupt

    An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.  Continue Reading

  • December 20, 2016 20 Dec'16

    lithium polymer battery (LiPo)

    A lithium-polymer battery (LiPo) is a rechargeable battery that, in the case of true LiPo, uses solid polymer for the electrolyte and lithium for one of the electrodes.  Continue Reading

  • December 20, 2016 20 Dec'16

    latent data (ambient data)

    Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.  Continue Reading

  • December 19, 2016 19 Dec'16

    Ryzen (AMD Ryzen)

    Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.  Continue Reading

  • December 18, 2016 18 Dec'16

    unsupervised learning

    Unsupervised learning is the training of an artificial intelligence (AI) algorithm using information that is neither classified nor labeled and allowing the algorithm to act on that information without guidance.  Continue Reading

  • December 15, 2016 15 Dec'16

    molecule

    A molecule is the smallest particle in a chemical element or compound that has the chemical properties of that element or compound.  Continue Reading

  • December 15, 2016 15 Dec'16

    single-page application (SPA)

    A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.  Continue Reading

  • December 13, 2016 13 Dec'16

    structured content

    Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.  Continue Reading

  • December 13, 2016 13 Dec'16

    burner phone

    A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded. Burners are purchased with prepaid minutes and without a contract.  Continue Reading

  • December 12, 2016 12 Dec'16

    mobile number privacy

    Mobile number privacy is the protection of the phone user’s number from unwanted access.  Continue Reading

  • December 12, 2016 12 Dec'16

    smart data

    Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close