Browse Definitions :
  • April 29, 2016 29 Apr'16

    invoice

    An invoice is a document listing billed goods and/or services that a provider presents to a customer. Invoices provide customers with the amount of the total billing and itemize the details that make up the final charge.  Continue Reading

  • April 29, 2016 29 Apr'16

    bill of lading (BoL, B/L)

    A bill of lading (also seen as B/L and BoL) is a document given to a shipper by the carrier that details the shipment and serves as a means of transferring the title of goods.  Continue Reading

  • April 29, 2016 29 Apr'16

    solar panel

    A solar panel is a flat construction resembling a window, built with technology that allows it to passively harvest the heat of the sun or create electricity from its energy through photovoltaics.  Continue Reading

  • April 28, 2016 28 Apr'16

    3D modeling

    3-D modeling is the use of software to create a virtual three-dimensional model of some physical object. 3-D modeling is used in many different industries, including virtual reality, video games, marketing, TV and motion pictures, scientific and ...  Continue Reading

  • April 28, 2016 28 Apr'16

    venture capital (VC)

    Venture capital (VC) is funding invested, or available for investment, in an enterprise that offers the probability of profit along with the possibility of loss.  Continue Reading

  • April 28, 2016 28 Apr'16

    invitation to tender (ITT)

    An invitation to tender (ITT) is the initial step in competitive tendering, in which suppliers and contractors are invited to provide offers for supply or service contracts.  Continue Reading

  • April 28, 2016 28 Apr'16

    IT procurement software

    IT procurement software is an application or product suite that automates and coordinates tasks involved with the acquisition of information technology-related products and services.  Continue Reading

  • April 27, 2016 27 Apr'16

    equity crowdfunding

    Equity crowdfunding is a variation on the crowdsource model that offers contributors the ability to purchase stock in a business. The model is typically used to launch a startup or to provide funds for a new business venture.  Continue Reading

  • April 26, 2016 26 Apr'16

    purchase order

    A purchase order is a buyer's request to a seller to order goods. A purchase order is not an active order upon creation but upon acceptance from the seller.  Continue Reading

  • April 26, 2016 26 Apr'16

    lead time (in purchasing/procurement)

    In procurement, lead time includes the first effort to initiate procurement of goods or services up to the time of their arrival. Procurement lead time includes identifying of a need, selection of a good or service, sourcing vendors, as well as ...  Continue Reading

  • April 26, 2016 26 Apr'16

    warranty

    Warranties provide customers with legally-ensured service replacement or correction of issues insofar as the warranty stipulates in its conditions, for the duration of its term.  Continue Reading

  • April 26, 2016 26 Apr'16

    liquidity event

    Liquidity events are considered exit strategies in which owners and investors terminate some endeavor to cash in shares and other illiquid investments. Common examples of liquidity events include IPOs (initial public offerings) and acquisition of a ...  Continue Reading

  • April 26, 2016 26 Apr'16

    vulture capital

    Vulture capital is funds invested to profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success. The term is derogatory wordplay referencing venture capitalism (VC), which is not by definition ...  Continue Reading

  • April 25, 2016 25 Apr'16

    GPU supercomputer

    A GPU supercomputer is a networked group of computers with multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem on a single task.  Continue Reading

  • April 25, 2016 25 Apr'16

    data-driven decision management (DDDM)

    Data-driven decision management (DDDM) is an approach to business governance that values actions that can be backed up with verifiable data. The success of a data-driven approach is reliant upon the quality of the data gathered and the effectiveness...  Continue Reading

  • April 25, 2016 25 Apr'16

    baklava code

    Baklava code is programming that is unnecessarily complicated by the inclusion of too many layers. The term is a reference to the flaky and extravagantly layered Middle-Eastern pastry.  Continue Reading

  • April 22, 2016 22 Apr'16

    fixed price contract

    A fixed-price contract, also known as a lump sum contract, is an agreement between a vendor or seller and a client that stipulates goods and/or services that will be provided and the price that will be paid for them.  Continue Reading

  • April 22, 2016 22 Apr'16

    private equity

    Private equity is funds belonging to high net worth individuals and organizations that are held to target investment opportunities, such as startups and IPOs (initial public offerings).  Continue Reading

  • April 22, 2016 22 Apr'16

    risk capital

    Risk capital is funds invested speculatively in a business, typically a startup. Risk capital comes from private equity: Funds belonging to high net-worth individuals and institutions that are amassed for the purpose of making investments and ...  Continue Reading

  • April 21, 2016 21 Apr'16

    fixed price

    A fixed price is a non-negotiable sum charged for a product, service or piece of work. The most common reason for a fixed price for a product is control or mandate by some external entity.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close