Browse Definitions :
  • February 29, 2016 29 Feb'16

    B2B2C (business-to-business-to-consumer)

    B2B2C (business-to-business-to-consumer) adds consumer e-commerce to the B2B (business-to-business) model, allowing a company to market its product or service more effectively by entering a B2B relationship with a company whose expertise is selling ...  Continue Reading

  • February 26, 2016 26 Feb'16

    carbon-negative data center

    A carbon-negative data center is one that effectively has a negative carbon dioxide (CO2) output, thus tending to reduce the greenhouse effect (albeit very slightly) and generally reducing its own electric consumption.  Continue Reading

  • February 25, 2016 25 Feb'16

    direct air capture (DAC)

    Direct air capture has historically been used in closed, manned environments where oxygen is not available from the outside world, such as submarines and space craft, to remove CO2 from the air before concentrations become too high for humans. ...  Continue Reading

  • February 25, 2016 25 Feb'16

    clock gating

    Clock gating is the power-saving feature in semiconductor microelectronics that enables switching off circuits. Many electronic devices use clock gating to turn off buses, controllers, bridges and parts of processors, to reduce dynamic power ...  Continue Reading

  • February 25, 2016 25 Feb'16

    gold plating

    Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope.  Continue Reading

  • February 25, 2016 25 Feb'16

    risk-reward ratio

    Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss. The risk-reward ratio is typically expressed as a figure for the assessed risk separated by a colon from the figure for the prospective...  Continue Reading

  • February 25, 2016 25 Feb'16

    IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).  Continue Reading

  • February 23, 2016 23 Feb'16

    deception technology

    Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper ...  Continue Reading

  • February 23, 2016 23 Feb'16

    Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.  Continue Reading

  • February 22, 2016 22 Feb'16

    augmented reality (AR)

    Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.  Continue Reading

  • February 22, 2016 22 Feb'16

    design-centric culture

    A design-thinking culture is responsive to customer's needs. The culture is more people-centric than data-centric and uses design thinking to maintain competitive advantage and create new revenue streams.  Continue Reading

  • February 21, 2016 21 Feb'16

    continuum

    A continuum is a continuous system or range in which adjacent elements do not vary from each other in any marked degree although the endpoints of the system may be drastically different.  Continue Reading

  • February 20, 2016 20 Feb'16

    law of unintended consequences

    The law of unintended consequences is a frequently-observed phenomenon in which any action has results that are not part of the actor's purpose. The superfluous consequences may or may not be foreseeable or even observable and they may be beneficial...  Continue Reading

  • February 19, 2016 19 Feb'16

    3-D (three dimensions or three-dimensional)

    In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.  Continue Reading

  • February 19, 2016 19 Feb'16

    collaboration

    Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability to communicate, view and contribute to documents or other content over a ...  Continue Reading

  • February 19, 2016 19 Feb'16

    design thinking

    Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem. The ...  Continue Reading

  • February 18, 2016 18 Feb'16

    mobile collaboration

    Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.  Continue Reading

  • February 17, 2016 17 Feb'16

    precision agriculture

    Precision agriculture is an approach to farm management that uses information technology (IT) to ensure that plants, animals and the soil receive exactly what they need for optimum health and productivity.  Continue Reading

  • February 15, 2016 15 Feb'16

    scale-out storage

    Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays. If and when a given array reaches its storage limit,...  Continue Reading

  • February 12, 2016 12 Feb'16

    gravity wave (or gravitational wave)

    A gravity wave (or gravitational wave) is a ripple in the curvature of the space-time continuum (the enmeshed combination of our three perceived physical dimensions, plus time) created by the movement of matter.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close