Browse Definitions :
  • April 21, 2016 21 Apr'16

    list price

    The list price is the stated value for which something is offered for sale through a particular channel such as a showroom, a retail store, a catalog or a retail, wholesale or distributor website.  Continue Reading

  • April 21, 2016 21 Apr'16

    net price

    Net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted. Net price is what the seller’s customers pay.  Continue Reading

  • April 21, 2016 21 Apr'16

    cost price

    A cost price includes all outlays that are required for production, including property costs, materials, power, research and development, testing, worker wages and anything else that must be paid for.  Continue Reading

  • April 21, 2016 21 Apr'16

    manufacturer's suggested retail price (MSRP)

    Manufacturer’s suggested retail price (MSRP) is the price that the maker of a product recommends for it in customer-facing retail stores. A MSRP is commonly 2.5 to 3 times a wholesale price.  Continue Reading

  • April 21, 2016 21 Apr'16

    wholesale price

    Wholesale price is the price charged for a product as sold in bulk to large trade or distributor groups as opposed to what is charged to consumers.  Continue Reading

  • April 19, 2016 19 Apr'16

    critical infrastructure security

    Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or ...  Continue Reading

  • April 15, 2016 15 Apr'16

    rollable display

    A rollable display is a digital screen technology that can be rolled up like a newspaper. At CES 2016, LG demonstrated rollable screens based on flexible OLED (organic light-emitting diode) displays.  Continue Reading

  • April 15, 2016 15 Apr'16

    critical infrastructure and key resources (CIKR)

    Critical infrastructure and key resources (CIKR) is the collective of natural and man-made resources, along with the systems for their processing and delivery, upon which a nation depends on for functioning.  Continue Reading

  • April 14, 2016 14 Apr'16

    USB-C (USB Type C)

    USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector.  Continue Reading

  • April 14, 2016 14 Apr'16

    virtual machine escape

    Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor.  Continue Reading

  • April 14, 2016 14 Apr'16

    bring your own network (BYON)

    When a network administrator talks about BYON, he is describing the ability that employees have to create a wireless hot spot at work. Vendors are using the term to describe a service that allows remote employees to bring their own Internet access ...  Continue Reading

  • April 13, 2016 13 Apr'16


    Freebooting is the unauthorized duplication of digital content, which is then republished and presented as original work. Online content is protected under copyright law and any duplication beyond what is deemed to be fair use is illegal.  Continue Reading

  • April 13, 2016 13 Apr'16

    mobile hotspot

    A mobile hotspot is wireless Internet connectivity that is enabled by a dedicated hardware device or a smartphone feature that shares the phone's cellular data. Mobile hotspots are also known as portable hotspots, and the hardware devices used to ...  Continue Reading

  • April 12, 2016 12 Apr'16

    F8 (Facebook F8)

    F8 (pronounced F-eight) is Facebook's developer conference for those creating applications on the social media site's platform. The first F8 event was held May 24, 2007; the conference has been held sporadically in the years since then, when ...  Continue Reading

  • April 11, 2016 11 Apr'16

    impact sourcing

    Impact sourcing is a service provision model in which jobs or tasks are outsourced to economically disadvantaged areas as a means of improving the situation of people living there.  Continue Reading

  • April 11, 2016 11 Apr'16

    medical identity theft

    Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social ...  Continue Reading

  • April 07, 2016 07 Apr'16

    fast data

    Fast data is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value. The goal of fast data is to quickly gather and mine structured and unstructured data so that ...  Continue Reading

  • April 05, 2016 05 Apr'16


    A cohort is a group of people that have some demographic or statistical characteristic in common. The term is commonly used to refer to people that were born at a particular time although the group can be based on just about any commonality, such as...  Continue Reading

  • April 05, 2016 05 Apr'16

    Generation Z

    Generation Z is the demographic cohort following Generation Y, also known as the Millennials or the Millennial Generation.  Continue Reading

  • April 04, 2016 04 Apr'16


    Standardization is the process of developing, promoting and possibly mandating standards-based and compatible technologies within a given industry.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.