Browse Definitions :
  • April 29, 2016 29 Apr'16

    invoice

    An invoice is a document listing billed goods and/or services that a provider presents to a customer. Invoices provide customers with the amount of the total billing and itemize the details that make up the final charge.  Continue Reading

  • April 29, 2016 29 Apr'16

    bill of lading (BoL, B/L)

    A bill of lading (also seen as B/L and BoL) is a document given to a shipper by the carrier that details the shipment and serves as a means of transferring the title of goods.  Continue Reading

  • April 29, 2016 29 Apr'16

    solar panel

    A solar panel is a flat construction resembling a window, built with technology that allows it to passively harvest the heat of the sun or create electricity from its energy through photovoltaics.  Continue Reading

  • April 28, 2016 28 Apr'16

    3D modeling

    3-D modeling is the use of software to create a virtual three-dimensional model of some physical object. 3-D modeling is used in many different industries, including virtual reality, video games, marketing, TV and motion pictures, scientific and ...  Continue Reading

  • April 28, 2016 28 Apr'16

    venture capital (VC)

    Venture capital (VC) is funding invested, or available for investment, in an enterprise that offers the probability of profit along with the possibility of loss.  Continue Reading

  • April 28, 2016 28 Apr'16

    invitation to tender (ITT)

    An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.  Continue Reading

  • April 28, 2016 28 Apr'16

    IT procurement software

    IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.  Continue Reading

  • April 27, 2016 27 Apr'16

    equity crowdfunding

    Equity crowdfunding is a variation on the crowdsource model that offers contributors the ability to purchase stock in a business. The model is typically used to launch a startup or to provide funds for a new business venture.  Continue Reading

  • April 26, 2016 26 Apr'16

    purchase order

    A purchase order is a buyer's request to a seller to order goods. A purchase order is not an active order upon creation but upon acceptance from the seller.  Continue Reading

  • April 26, 2016 26 Apr'16

    lead time (in purchasing/procurement)

    In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival. Procurement lead time includes identifying of a need, selection of a good or service, sourcing vendors, as well as ...  Continue Reading

  • April 26, 2016 26 Apr'16

    warranty

    Warranties provide customers with legally-ensured service replacement or correction of issues insofar as the warranty stipulates in its conditions, for the duration of its term.  Continue Reading

  • April 26, 2016 26 Apr'16

    liquidity event

    Liquidity events are considered exit strategies in which owners and investors terminate some endeavor to cash in shares and other illiquid investments. Common examples of liquidity events include IPOs (initial public offerings) and acquisition of a ...  Continue Reading

  • April 26, 2016 26 Apr'16

    vulture capital

    Vulture capital is funds invested to profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success. The term is derogatory wordplay referencing venture capitalism (VC), which is not by definition ...  Continue Reading

  • April 25, 2016 25 Apr'16

    GPU supercomputer

    A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.  Continue Reading

  • April 25, 2016 25 Apr'16

    data-driven decision management (DDDM)

    Data-driven decision management (DDDM) is an approach to business governance that values actions that can be backed up with verifiable data. The success of a data-driven approach is reliant upon the quality of the data gathered and the effectiveness...  Continue Reading

  • April 25, 2016 25 Apr'16

    baklava code

    Baklava code is programming that is unnecessarily complicated by the inclusion of too many layers. The term is a reference to the flaky and extravagantly layered Middle-Eastern pastry.  Continue Reading

  • April 22, 2016 22 Apr'16

    fixed price contract

    A fixed-price contract, also known as a lump sum contract, is an agreement between a vendor or seller and a client that stipulates goods and/or services that will be provided and the price that will be paid for them.  Continue Reading

  • April 22, 2016 22 Apr'16

    private equity

    Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).  Continue Reading

  • April 22, 2016 22 Apr'16

    risk capital

    Risk capital is funds invested speculatively in a business, typically a startup. Risk capital comes from private equity: Funds belonging to high net-worth individuals and institutions that are amassed for the purpose of making investments and ...  Continue Reading

  • April 21, 2016 21 Apr'16

    fixed price

    A fixed price is a non-negotiable sum charged for a product, service or piece of work. The most common reason for a fixed price for a product is control or mandate by some external entity.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close