Browse Definitions :
  • December 29, 2016 29 Dec'16

    discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.  Continue Reading

  • December 23, 2016 23 Dec'16

    motherboard

    A motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity point, through which all components and external peripherals connect.  Continue Reading

  • December 23, 2016 23 Dec'16

    boot sector

    A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.  Continue Reading

  • December 22, 2016 22 Dec'16

    binary

    Binary describes a numbering scheme in which there are only two possible values for each digit: 0 and 1. The term also refers to any digital encoding/decoding system in which there are exactly two possible states.  Continue Reading

  • December 21, 2016 21 Dec'16

    Internet Crime Complaint Center (IC3)

    The Internet Crime Complaint Center (IC3) is a website and that offers users a standardized mechanism and interface to report suspected cybercrime or other illegal activity facilitated by the internet.  Continue Reading

  • December 21, 2016 21 Dec'16

    memory dump

    A memory dump is the process of taking all information content in RAM and writing it to a storage drive. Developers commonly use memory dumps to gather diagnostic information at the time of a crash to help them troubleshoot issues and learn more ...  Continue Reading

  • December 21, 2016 21 Dec'16

    semantic search

    Semantic search is an approach to locating information on the internet in which programming predicts context for a query. The goal of semantic search is to provide the end user with the most relevant search engine results possible.  Continue Reading

  • December 21, 2016 21 Dec'16

    geo-fencing (geofencing)

    Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.  Continue Reading

  • December 20, 2016 20 Dec'16

    disruptive technology

    A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. Harvard Business School professor Clayton M. Christensen coined the term.  Continue Reading

  • December 20, 2016 20 Dec'16

    interrupt

    An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the computer (the operating system) to stop and figure out what to do next.  Continue Reading

  • December 20, 2016 20 Dec'16

    lithium polymer battery (LiPo)

    A lithium-polymer battery (LiPo) is a rechargeable battery that, in the case of true LiPo, uses solid polymer for the electrolyte and lithium for one of the electrodes.  Continue Reading

  • December 20, 2016 20 Dec'16

    latent data (ambient data)

    Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications.  Continue Reading

  • December 19, 2016 19 Dec'16

    Ryzen (AMD Ryzen)

    Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.  Continue Reading

  • December 18, 2016 18 Dec'16

    unsupervised learning

    Unsupervised learning is the training of an artificial intelligence (AI) algorithm using information that is neither classified nor labeled and allowing the algorithm to act on that information without guidance.  Continue Reading

  • December 15, 2016 15 Dec'16

    molecule

    A molecule is the smallest particle in a chemical element or compound that has the chemical properties of that element or compound.  Continue Reading

  • December 15, 2016 15 Dec'16

    single-page application (SPA)

    A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.  Continue Reading

  • December 13, 2016 13 Dec'16

    structured content

    Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.  Continue Reading

  • December 13, 2016 13 Dec'16

    burner phone

    A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded. Burners are purchased with prepaid minutes and without a contract.  Continue Reading

  • December 12, 2016 12 Dec'16

    mobile number privacy

    Mobile number privacy is the protection of the phone user’s number from unwanted access.  Continue Reading

  • December 12, 2016 12 Dec'16

    smart data

    Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close