Browse Definitions:
  • August 31, 2016 31 Aug'16

    leet speak (leet)

    Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resemble the letters they replace so the resulting word ...  Continue Reading

  • August 26, 2016 26 Aug'16

    rebranding

    Rebranding is an update of the materials and presentation used to represent a business. A company may rebrand to appear more modern or to distance itself from past issues, among other possibilities.  Continue Reading

  • August 26, 2016 26 Aug'16

    app monetization

    App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.  Continue Reading

  • August 25, 2016 25 Aug'16

    default password

    Default passwords are commonly used for routers, access points, switches and firewalls.Left unchanged, they present a serious security risk.  Continue Reading

  • August 25, 2016 25 Aug'16

    unique default password

    Unique default passwords can provide more security, although that depends on what type of system is used. Passwords generated from the device's MAC address are easily accessed.  Continue Reading

  • August 25, 2016 25 Aug'16

    perishable data

    Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.  Continue Reading

  • August 24, 2016 24 Aug'16

    micro-datacenter

    Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management.  Continue Reading

  • August 23, 2016 23 Aug'16

    haptics

    Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.  Continue Reading

  • August 23, 2016 23 Aug'16

    immersive virtual reality (immersive VR)

    Immersiveness, in a virtual reality environment, is usually considered on a scale or along a continuum, from least immersive to fully immersive. Tyically, user engagement will vary accordingly, to some extent dependent on individual differences.  Continue Reading

  • August 22, 2016 22 Aug'16

    Zadara Storage

    Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS). Services can be deployed in the cloud, on-premises or in hybrid-cloud configurations.  Continue Reading

  • August 22, 2016 22 Aug'16

    workload automation

    Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. A workload, in this context, can be thought of as the total amount of processing that a computer or a ...  Continue Reading

  • August 19, 2016 19 Aug'16

    The Phoenix Project

    The Phoenix Project is a novel about the recovery of a late and over-budget IT project by Gene Kim, George Spafford, and Kevin Behr. The novel was published in 2013 by IT Revolution Press.  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality therapy (VR therapy)

    Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications. VR therapy has become more practical and affordable since the advent of virtual ...  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality gaming (VR gaming)

    At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen. More sophisticated and immersive examples include VR headsets, wrap-around display screens and ...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality app (AR app)

    An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment. AR software is used for training, work and consumer applications in many...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality gaming (AR gaming)

    Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it. AR games are typically played on ...  Continue Reading

  • August 19, 2016 19 Aug'16

    VR room (virtual reality room)

    Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.  Continue Reading

  • August 19, 2016 19 Aug'16

    room-scale VR (room-scale virtual reality)

    Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming. The term room-scale distinguishes that type of setup from the self-contained environment of a...  Continue Reading

  • August 18, 2016 18 Aug'16

    CAVE (Cave Automatic Virtual Environment)

    CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens. The user typically wears a VR headset.  Continue Reading

  • August 17, 2016 17 Aug'16

    hamburger icon (slide drawer navigation)

    The hamburger icon got its name because it resembles a burger in a bun. The icon, which is composed of three horizontal lines in a stack, represents a hidden menu that slides out when the icon is clicked.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close