Browse Definitions:
  • September 30, 2016 30 Sep'16

    microtrend

    A microtrend is a tendency in the direction of some phenomenon that is fairly pervasive within a given sphere of influence and lasts for a few years.  Continue Reading

  • September 30, 2016 30 Sep'16

    macrotrend

    A macro trend is a persistent shift in the direction of some phenomenon on a global level. Examples of current macro trends include urbanization, automation and changing demographics.  Continue Reading

  • September 30, 2016 30 Sep'16

    firmographic data

    Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on. Firmographics is the corporate equivalent of demographics, the statistical study of groups of ...  Continue Reading

  • September 29, 2016 29 Sep'16

    management by objective (MBO)

    Management by objective (MBO) is a model in which employees and their managers collaboratively develop, define and explicitly agree to objectives. The purpose of MBO is to increase productivity and efficiency.  Continue Reading

  • September 29, 2016 29 Sep'16

    social networking

    Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals.  Continue Reading

  • September 27, 2016 27 Sep'16

    Kaspersky Lab

    Kaspersky Lab is a security software and services company with a presence in 200 countries and territories around the world. Corporate headquarters are in Moscow.  Continue Reading

  • September 27, 2016 27 Sep'16

    3-D printing (additive manufacturing)

    3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.  Continue Reading

  • September 26, 2016 26 Sep'16

    register (processor register, CPU register)

    A processor register is one of a small set of data holding places that are part of a processor, or CPU, in a computer.  Continue Reading

  • September 26, 2016 26 Sep'16

    flexible workforce

    A flexible workforce is one that grows in number to meet needs at any given time and falls back to a baseline number when the increased size is no longer necessary.  Continue Reading

  • September 26, 2016 26 Sep'16

    processor (CPU)

    A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer.  Continue Reading

  • September 25, 2016 25 Sep'16

    latency

    In a computer system, latency usually refers to any delay or waiting that causes noticeable increases of real or perceived response time. Read our definition of latency for more information about network latency, computer latency, Internet latency ...  Continue Reading

  • September 25, 2016 25 Sep'16

    printer

    A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper.  Continue Reading

  • September 24, 2016 24 Sep'16

    compiler

    A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.  Continue Reading

  • September 23, 2016 23 Sep'16

    algorithm

    An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem. Algorithms are used throughout almost all areas of information technology.  Continue Reading

  • September 22, 2016 22 Sep'16

    operating system (OS)

    An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer.  Continue Reading

  • September 21, 2016 21 Sep'16

    3D camera

    A 3D camera is an imaging device that enables the perception of depth in images to replicate three dimensions as experienced through human binocular vision.  Continue Reading

  • September 21, 2016 21 Sep'16

    timeline

    A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.  Continue Reading

  • September 21, 2016 21 Sep'16

    predictive personalization

    Predictive personalization is the effort and ability to predict the actions of users, based on their previous behaviors online.  Continue Reading

  • September 20, 2016 20 Sep'16

    Code of Connection (CoCo)

    In the U.K., the Code of Connection (CoCo) is a mandatory set of requirements that must be demonstrated before local authorities in England and Wales can connect to the Government Secure Intranet (GSI).  Continue Reading

  • September 19, 2016 19 Sep'16

    social media

    Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration. This definition of social media explains what it is, how it works and how it's transforming personal and business ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close