Browse Definitions :
  • July 29, 2016 29 Jul'16

    LinkedIn

    LinkedIn is a social networking site for the business community. The LinkedIn service allows registered members to establish and document networks of people they know and trust professionally.  Continue Reading

  • July 29, 2016 29 Jul'16

    LinkedIn Economic Graph

    The LinkedIn Economic Graph is a digital map of the global economy that seeks to include every member of the global workforce and their skills, as well as all open jobs, all employers and all educational institutions.  Continue Reading

  • July 29, 2016 29 Jul'16

    glue code (glue code language)

    Glue code is custom-written programming that connects incompatible software components. It's sometimes looked upon as a necessary evil because it can easily become excessively complicated spaghetti code that negatively affects performance.  Continue Reading

  • July 27, 2016 27 Jul'16

    data shadow

    A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and ...  Continue Reading

  • July 27, 2016 27 Jul'16

    chief data officer (CDO)

    A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but separate from, the job of the chief information officer (CIO).  Continue Reading

  • July 27, 2016 27 Jul'16

    Producer Price Index (PPI)

    The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.  Continue Reading

  • July 26, 2016 26 Jul'16

    body area network (BAN)

    A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body. A BAN typically includes a smartphone in a pocket or bag that serves as a mobile data hub, acquiring user data and ...  Continue Reading

  • July 26, 2016 26 Jul'16

    exception

    An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions. Exception is a short way of saying exceptional event.  Continue Reading

  • July 25, 2016 25 Jul'16

    empiricism

    Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses. In empiricism, concepts are spoken of as a posteriori or “from the latter” meaning from the experiences.  Continue Reading

  • July 25, 2016 25 Jul'16

    green screen (blue screen)

    Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.  Continue Reading

  • July 22, 2016 22 Jul'16

    CGI (computer-generated imagery)

    CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (...  Continue Reading

  • July 21, 2016 21 Jul'16

    Enterprise Integration Patterns (EIP)

    "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration. The book, sometimes referred to as EIP, was written by Gregor Hohpe and Bobby Woolf and ...  Continue Reading

  • July 21, 2016 21 Jul'16

    blacklist

    A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user IDs, domains, email addresses, MAC addresses or ...  Continue Reading

  • July 13, 2016 13 Jul'16

    Pokémon GO

    Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems. The game is considered a breakthrough for augmented reality gaming, as it is the first AR game to achieve widespread consumer use....  Continue Reading

  • July 08, 2016 08 Jul'16

    bitwise

    Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common. Most operators work with either single or multiple bytes, which in most systems contain eight bits  Continue Reading

  • July 06, 2016 06 Jul'16

    SS7 attack

    While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer ...  Continue Reading

  • July 06, 2016 06 Jul'16

    mobile spyware

    Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.  Continue Reading

  • July 06, 2016 06 Jul'16

    slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated ...  Continue Reading

  • July 06, 2016 06 Jul'16

    gated content / ungated content

    Gated content is online materials, such as white papers, articles or videos, that require the user to fill out a form before they can access them. Ungated content, on the other hand, is immediately accessible.  Continue Reading

  • July 05, 2016 05 Jul'16

    monotasking (single-tasking)

    Monotasking, also known as single-tasking, is the practice of dedicating oneself to a given task and minimizing potential interruptions until the task is completed or a significant period of time has elapsed. The practice contrasts with multitasking...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close