Browse Definitions :
  • August 31, 2016 31 Aug'16

    leet speak (leet)

    Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resemble the letters they replace so the resulting word ...  Continue Reading

  • August 26, 2016 26 Aug'16

    rebranding

    Rebranding is an update of the materials and presentation used to represent a business. A company may rebrand to appear more modern or to distance itself from past issues, among other possibilities.  Continue Reading

  • August 26, 2016 26 Aug'16

    app monetization

    App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.  Continue Reading

  • August 25, 2016 25 Aug'16

    default password

    Default passwords are commonly used for routers, access points, switches and firewalls.Left unchanged, they present a serious security risk.  Continue Reading

  • August 25, 2016 25 Aug'16

    unique default password

    Unique default passwords can provide more security, although that depends on what type of system is used. Passwords generated from the device's MAC address are easily accessed.  Continue Reading

  • August 25, 2016 25 Aug'16

    perishable data

    Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.  Continue Reading

  • August 24, 2016 24 Aug'16

    micro-datacenter

    Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management.  Continue Reading

  • August 23, 2016 23 Aug'16

    haptics

    Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.  Continue Reading

  • August 23, 2016 23 Aug'16

    immersive virtual reality (immersive VR)

    Immersiveness, in a virtual reality environment, is usually considered on a scale or along a continuum, from least immersive to fully immersive. Tyically, user engagement will vary accordingly, to some extent dependent on individual differences.  Continue Reading

  • August 22, 2016 22 Aug'16

    Zadara Storage

    Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS). Services can be deployed in the cloud, on-premises or in hybrid-cloud configurations.  Continue Reading

  • August 22, 2016 22 Aug'16

    workload automation

    Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. A workload, in this context, can be thought of as the total amount of processing that a computer or a ...  Continue Reading

  • August 19, 2016 19 Aug'16

    The Phoenix Project

    The Phoenix Project is a novel about the recovery of a late and over-budget IT project by Gene Kim, George Spafford, and Kevin Behr. The novel was published in 2013 by IT Revolution Press.  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality therapy (VR therapy)

    Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications. VR therapy has become more practical and affordable since the advent of virtual ...  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality gaming (VR gaming)

    At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen. More sophisticated and immersive examples include VR headsets, wrap-around display screens and ...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality app (AR app)

    An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment. AR software is used for training, work and consumer applications in many...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality gaming (AR gaming)

    Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it. AR games are typically played on ...  Continue Reading

  • August 19, 2016 19 Aug'16

    VR room (virtual reality room)

    Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.  Continue Reading

  • August 19, 2016 19 Aug'16

    room-scale VR (room-scale virtual reality)

    Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming. The term room-scale distinguishes that type of setup from the self-contained environment of a...  Continue Reading

  • August 18, 2016 18 Aug'16

    CAVE (Cave Automatic Virtual Environment)

    CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens. The user typically wears a VR headset.  Continue Reading

  • August 17, 2016 17 Aug'16

    hamburger icon (slide drawer navigation)

    The hamburger icon got its name because it resembles a burger in a bun. The icon, which is composed of three horizontal lines in a stack, represents a hidden menu that slides out when the icon is clicked.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close