Browse Definitions :
  • June 30, 2016 30 Jun'16

    Raspberry Pi ($35 computer)

    Raspberry Pi is a small, single-board computer that costs $35. It is is essentially a wireless system-on-a-chip (SoC) with 1 GB RAM, connection ports, a Micro SD card slot, camera and display interfaces and an audio/video jack.  Continue Reading

  • June 30, 2016 30 Jun'16

    smarketing (sales and marketing alignment)

    Smarketing is an alignment of a company's sales and marketing departments for better communication, more collaborative efforts, greater efficiency and, as a result, enhanced profitability.  Continue Reading

  • June 27, 2016 27 Jun'16

    contract theory

    Contract theory is the study of how people and organizations develop legal agreements in situations with uncertain conditions, unknown factors and information asymmetry.  Continue Reading

  • June 27, 2016 27 Jun'16

    graph database

    A graph database, also called a graph-oriented database, is a type of NoSQL database that uses graph theory to store, map and query relationships.  Continue Reading

  • June 24, 2016 24 Jun'16

    Cray Inc.

    Cray Inc. is a pioneering computer company that was founded as Cray Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.  Continue Reading

  • June 24, 2016 24 Jun'16

    influencer marketing

    Influence marketing can be broken down into a few stages. The first step is identifying influencers. To be effective, an influencer should have relevance for your brand or product.  Continue Reading

  • June 24, 2016 24 Jun'16

    influencer (social influencer)

    An influencer's actions and opinions have more impact on their colleagues, social network and the general public than most other individuals have. Influencers include subject experts, celebrities and other individuals with large followings.  Continue Reading

  • June 23, 2016 23 Jun'16

    data cap (broadband cap)

    A data cap is a specific amount of mobile data that a user account can access for a given amount of money, usually specified per month. Because data caps are uniformly unpopular with customers, carriers often refer to them as fair usage or fair ...  Continue Reading

  • June 23, 2016 23 Jun'16

    mobile data

    Mobile data is Internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection rather than Wi-Fi or a wired connection.  Continue Reading

  • June 23, 2016 23 Jun'16

    data plan (mobile data plan)

    Since the advent of the smartphone made mobile Internet possible, most carriers offer data plans at varying rates based on the amount of data transfer allowed before a data cap is imposed.  Continue Reading

  • June 23, 2016 23 Jun'16

    WRAN (wireless regional area network)

    A wireless regional area network (WRAN) is techology based on IEEE 802.22 to take advantage of underused white space spectrum and bring high-speed wireless connectivity to rural areas.  Continue Reading

  • June 22, 2016 22 Jun'16

    manipulative design

    Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.  Continue Reading

  • June 20, 2016 20 Jun'16

    supercomputer

    The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray. Released in 1964, the CDC 6600 had a single CPU and cost $8 million — the equivalent of $60 million today. Cray went on to found a...  Continue Reading

  • June 20, 2016 20 Jun'16

    proactive / reactive chat

    Proactive chat is initiated by a website according to business rules that are triggered by user behavior; reactive chat is user-initiated.  Continue Reading

  • June 17, 2016 17 Jun'16

    buzzword

    A buzzword is a term or phrase that becomes very popular in some specific context, usually for a limited period of time before becoming outdated. Buzzwords are typically either newly coined words -- often acronyms or portmanteaus -- or existing ...  Continue Reading

  • June 17, 2016 17 Jun'16

    buzzword bingo

    Buzzword bingo is a game played during meetings with cards featuring buzzwords such as "incentivize," "outside the box," "push the envelope," and "wave a dead chicken") in place of the numbers of traditional bingo cards.  Continue Reading

  • June 17, 2016 17 Jun'16

    tethering

    Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.  Continue Reading

  • June 16, 2016 16 Jun'16

    White Space Wi-Fi (White-Fi)

    White space Wi-Fi, also known as White-Fi, specified in IEEE 802.11af: The use of frequencies made available by the absence of analog-to-air TV signals to create Wi-Fi networks with greater range, speed and penetration of obstacles.  Continue Reading

  • June 15, 2016 15 Jun'16

    backdoor selling

    Backdoor selling is the unscrupulous practice of seeking information beyond what is publicly available as a means of gaining a competitive advantage for a contract or sale.  Continue Reading

  • June 15, 2016 15 Jun'16

    intellectual property (IP)

    Intellectual property (IP) is a term for any intangible asset -- something proprietary that doesn't exist as a physical object but has value.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • privilege creep

    Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. In IT, a privilege is...

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

Close