Browse Definitions:
  • August 31, 2016 31 Aug'16

    leet speak (leet)

    Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resemble the letters they replace so the resulting word ...  Continue Reading

  • August 26, 2016 26 Aug'16

    rebranding

    Rebranding is an update of the materials and presentation used to represent a business. A company may rebrand to appear more modern or to distance itself from past issues, among other possibilities.  Continue Reading

  • August 26, 2016 26 Aug'16

    app monetization

    App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.  Continue Reading

  • August 25, 2016 25 Aug'16

    default password

    Default passwords are commonly used for routers, access points, switches and firewalls.Left unchanged, they present a serious security risk.  Continue Reading

  • August 25, 2016 25 Aug'16

    unique default password

    Unique default passwords can provide more security, although that depends on what type of system is used. Passwords generated from the device's MAC address are easily accessed.  Continue Reading

  • August 25, 2016 25 Aug'16

    perishable data

    Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.  Continue Reading

  • August 24, 2016 24 Aug'16

    micro-datacenter

    Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management.  Continue Reading

  • August 23, 2016 23 Aug'16

    haptics

    Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.  Continue Reading

  • August 23, 2016 23 Aug'16

    immersive virtual reality (immersive VR)

    Immersiveness, in a virtual reality environment, is usually considered on a scale or along a continuum, from least immersive to fully immersive. Tyically, user engagement will vary accordingly, to some extent dependent on individual differences.  Continue Reading

  • August 22, 2016 22 Aug'16

    Zadara Storage

    Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS). Services can be deployed in the cloud, on-premises or in hybrid-cloud configurations.  Continue Reading

  • August 22, 2016 22 Aug'16

    workload automation

    Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. A workload, in this context, can be thought of as the total amount of processing that a computer or a ...  Continue Reading

  • August 19, 2016 19 Aug'16

    The Phoenix Project

    The Phoenix Project is a novel about the recovery of a late and over-budget IT project by Gene Kim, George Spafford, and Kevin Behr. The novel was published in 2013 by IT Revolution Press.  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality therapy (VR therapy)

    Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications. VR therapy has become more practical and affordable since the advent of virtual ...  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality gaming (VR gaming)

    At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen. More sophisticated and immersive examples include VR headsets, wrap-around display screens and ...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality app (AR app)

    An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment. AR software is used for training, work and consumer applications in many...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality gaming (AR gaming)

    Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it. AR games are typically played on ...  Continue Reading

  • August 19, 2016 19 Aug'16

    VR room (virtual reality room)

    Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.  Continue Reading

  • August 19, 2016 19 Aug'16

    room-scale VR (room-scale virtual reality)

    Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming. The term room-scale distinguishes that type of setup from the self-contained environment of a...  Continue Reading

  • August 18, 2016 18 Aug'16

    CAVE (Cave Automatic Virtual Environment)

    CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens. The user typically wears a VR headset.  Continue Reading

  • August 17, 2016 17 Aug'16

    hamburger icon (slide drawer navigation)

    The hamburger icon got its name because it resembles a burger in a bun. The icon, which is composed of three horizontal lines in a stack, represents a hidden menu that slides out when the icon is clicked.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close