Browse Definitions :
  • August 31, 2016 31 Aug'16

    leet speak (leet)

    Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resemble the letters they replace so the resulting word ...  Continue Reading

  • August 26, 2016 26 Aug'16

    rebranding

    Rebranding is an update of the materials and presentation used to represent a business. A company may rebrand to appear more modern or to distance itself from past issues, among other possibilities.  Continue Reading

  • August 26, 2016 26 Aug'16

    app monetization

    App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.  Continue Reading

  • August 25, 2016 25 Aug'16

    default password

    Default passwords are commonly used for routers, access points, switches and firewalls.Left unchanged, they present a serious security risk.  Continue Reading

  • August 25, 2016 25 Aug'16

    unique default password

    Unique default passwords can provide more security, although that depends on what type of system is used. Passwords generated from the device's MAC address are easily accessed.  Continue Reading

  • August 25, 2016 25 Aug'16

    perishable data

    Perishable data is the specific bits of data within large volumes gathered that must be quickly acted upon to realize any benefit to a business.  Continue Reading

  • August 24, 2016 24 Aug'16

    micro-datacenter

    Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management.  Continue Reading

  • August 23, 2016 23 Aug'16

    haptics

    Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.  Continue Reading

  • August 23, 2016 23 Aug'16

    immersive virtual reality (immersive VR)

    Immersive virtual reality (immersive VR) is the presentation of an artificial environment that replaces users' real-world surroundings convincingly enough that they are able to suspend disbelief and fully engage with the created environment.  Continue Reading

  • August 22, 2016 22 Aug'16

    Zadara Storage

    Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS). Services can be deployed in the cloud, on-premises or in hybrid-cloud configurations.  Continue Reading

  • August 22, 2016 22 Aug'16

    workload automation

    Workload automation is the practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. A workload, in this context, can be thought of as the total amount of processing that a computer or a ...  Continue Reading

  • August 19, 2016 19 Aug'16

    The Phoenix Project

    The Phoenix Project is a novel about the recovery of a late and over-budget IT project by Gene Kim, George Spafford, and Kevin Behr. The novel was published in 2013 by IT Revolution Press.  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality therapy (VR therapy)

    Virtual reality therapy (VR therapy) is the use of simulated interactive and immersive environments as a tool for physical or psychological healthcare applications. VR therapy has become more practical and affordable since the advent of virtual ...  Continue Reading

  • August 19, 2016 19 Aug'16

    virtual reality gaming (VR gaming)

    At its simplest, a VR game might involve a 3-D image that can be explored interactively on a computing device by manipulating keys, mouse or touchscreen. More sophisticated and immersive examples include VR headsets, wrap-around display screens and ...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality app (AR app)

    An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment. AR software is used for training, work and consumer applications in many...  Continue Reading

  • August 19, 2016 19 Aug'16

    augmented reality gaming (AR gaming)

    Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it. AR games are typically played on ...  Continue Reading

  • August 19, 2016 19 Aug'16

    VR room (virtual reality room)

    Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.  Continue Reading

  • August 19, 2016 19 Aug'16

    room-scale VR (room-scale virtual reality)

    Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming. The term room-scale distinguishes that type of setup from the self-contained environment of a...  Continue Reading

  • August 18, 2016 18 Aug'16

    CAVE (Cave Automatic Virtual Environment)

    CAVE (Cave Automatic Virtual Environment) is a virtual reality environment consisting of a cube-shaped room in which the walls, floors and ceilings are projection screens. The user typically wears a VR headset.  Continue Reading

  • August 17, 2016 17 Aug'16

    hamburger icon (slide drawer navigation)

    The hamburger icon got its name because it resembles a burger in a bun. The icon, which is composed of three horizontal lines in a stack, represents a hidden menu that slides out when the icon is clicked.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close