Browse Definitions :
  • February 29, 2016 29 Feb'16

    B2B2C (business-to-business-to-consumer)

    B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling ...  Continue Reading

  • February 26, 2016 26 Feb'16

    carbon-negative data center

    A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.  Continue Reading

  • February 25, 2016 25 Feb'16

    direct air capture (DAC)

    Direct air capture has historically been used in closed, manned environments where oxygen is not available from the outside world, such as submarines and space craft, to remove CO2 from the air before concentrations become too high for humans. ...  Continue Reading

  • February 25, 2016 25 Feb'16

    clock gating

    Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power ...  Continue Reading

  • February 25, 2016 25 Feb'16

    gold plating

    Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope.  Continue Reading

  • February 25, 2016 25 Feb'16

    risk-reward ratio

    Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss. The risk-reward ratio is typically expressed as a figure for the assessed risk separated by a colon from the figure for the prospective...  Continue Reading

  • February 25, 2016 25 Feb'16

    IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).  Continue Reading

  • February 23, 2016 23 Feb'16

    deception technology

    Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ...  Continue Reading

  • February 23, 2016 23 Feb'16

    Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.  Continue Reading

  • February 22, 2016 22 Feb'16

    augmented reality (AR)

    Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.  Continue Reading

  • February 22, 2016 22 Feb'16

    design-centric culture

    A design-thinking culture is responsive to customer's needs. The culture is more people-centric than data-centric and uses design thinking to maintain competitive advantage and create new revenue streams.  Continue Reading

  • February 21, 2016 21 Feb'16

    continuum

    A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.  Continue Reading

  • February 20, 2016 20 Feb'16

    law of unintended consequences

    The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose. The superfluous consequences may or may not be foreseeable or even observable and they may be beneficial...  Continue Reading

  • February 19, 2016 19 Feb'16

    3-D (three dimensions or three-dimensional)

    In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.  Continue Reading

  • February 19, 2016 19 Feb'16

    collaboration

    Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability to communicate, view and contribute to documents or other content over a ...  Continue Reading

  • February 19, 2016 19 Feb'16

    design thinking

    Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem. The ...  Continue Reading

  • February 18, 2016 18 Feb'16

    mobile collaboration

    Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.  Continue Reading

  • February 17, 2016 17 Feb'16

    precision agriculture

    Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.  Continue Reading

  • February 15, 2016 15 Feb'16

    scale-out storage

    Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays. If and when a given array reaches its storage limit,...  Continue Reading

  • February 12, 2016 12 Feb'16

    gravity wave (or gravitational wave)

    A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close