Browse Definitions:
  • July 29, 2016 29 Jul'16

    LinkedIn

    LinkedIn is a social networking site for the business community. The LinkedIn service allows registered members to establish and document networks of people they know and trust professionally.  Continue Reading

  • July 29, 2016 29 Jul'16

    LinkedIn Economic Graph

    The LinkedIn Economic Graph is a digital map of the global economy that seeks to include every member of the global workforce and their skills, as well as all open jobs, all employers and all educational institutions.  Continue Reading

  • July 29, 2016 29 Jul'16

    glue code (glue code language)

    Glue code is custom-written programming that connects incompatible software components. It's sometimes looked upon as a necessary evil because it can easily become excessively complicated spaghetti code that negatively affects performance.  Continue Reading

  • July 27, 2016 27 Jul'16

    data shadow

    A data shadow is the collective body of data that is automatically generated and recorded as we go about our lives rather than intentionally created. Sources include sensors and IP surveillance, metadata from communciations and security and ...  Continue Reading

  • July 27, 2016 27 Jul'16

    chief data officer (CDO)

    A chief data officer (CDO) is a C-level corporate executive who is responsible for an organization's data governance. The position is related to, but separate from, the job of the chief information officer (CIO).  Continue Reading

  • July 27, 2016 27 Jul'16

    Producer Price Index (PPI)

    The Producer Price Index (PPI) is an economic measurement of the average change in prices that domestic producers of goods receive for their products in a given country or region.  Continue Reading

  • July 26, 2016 26 Jul'16

    body area network (BAN)

    A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body. A BAN typically includes a smartphone in a pocket or bag that serves as a mobile data hub, acquiring user data and ...  Continue Reading

  • July 26, 2016 26 Jul'16

    exception

    An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions. Exception is a short way of saying exceptional event.  Continue Reading

  • July 25, 2016 25 Jul'16

    empiricism

    Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses. In empiricism, concepts are spoken of as a posteriori or “from the latter” meaning from the experiences.  Continue Reading

  • July 25, 2016 25 Jul'16

    green screen (blue screen)

    Green screen (also blue screen) is the use of a single color as a backdrop in filming to make it simpler and easier to add backgrounds, characters or other images.  Continue Reading

  • July 22, 2016 22 Jul'16

    CGI (computer-generated imagery)

    CGI (computer-generated imagery) is used to produce visual content for many purposes including visual art, advertising, anatomical modeling, architectural design, engineering, video game art and film special effects, as well as augmented reality (...  Continue Reading

  • July 21, 2016 21 Jul'16

    Enterprise Integration Patterns (EIP)

    "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration. The book, sometimes referred to as EIP, was written by Gregor Hohpe and Bobby Woolf and ...  Continue Reading

  • July 21, 2016 21 Jul'16

    blacklist

    A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user IDs, domains, email addresses, MAC addresses or ...  Continue Reading

  • July 13, 2016 13 Jul'16

    Pokémon GO

    Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems. The game is considered a breakthrough for augmented reality gaming, as it is the first AR game to achieve widespread consumer use....  Continue Reading

  • July 08, 2016 08 Jul'16

    bitwise

    Bitwise operations manipulate data at the bit level rather than with bytes or larger units of data, as is more common. Most operators work with either single or multiple bytes, which in most systems contain eight bits  Continue Reading

  • July 06, 2016 06 Jul'16

    SS7 attack

    While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now, with operators opening the SS7 network to offer ...  Continue Reading

  • July 06, 2016 06 Jul'16

    mobile spyware

    Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.  Continue Reading

  • July 06, 2016 06 Jul'16

    slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated ...  Continue Reading

  • July 06, 2016 06 Jul'16

    gated content / ungated content

    Gated content is online materials, such as white papers, articles or videos, that require the user to fill out a form before they can access them. Ungated content, on the other hand, is immediately accessible.  Continue Reading

  • July 05, 2016 05 Jul'16

    monotasking (single-tasking)

    Monotasking, also known as single-tasking, is the practice of dedicating oneself to a given task and minimizing potential interruptions until the task is completed or a significant period of time has elapsed. The practice contrasts with multitasking...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close