Browse Definitions :
  • January 31, 2017 31 Jan'17

    alphanumeric (alphameric)

    In computers designed for English language users, alphanumeric (sometimes seen as alphameric) characters are those comprised by the combined set of the 26 alphabetic characters, A to Z, and the 10 Arabic numerals, 0 to 9.  Continue Reading

  • January 31, 2017 31 Jan'17

    millimeter (mm, millimetre)

    A millimeter (abbreviated as mm and sometimes spelled as millimetre) is a small unit of length/distance in the metric system, one-thousandth of a meter (which is similar in length to a yard in the Imperial system of measurement).  Continue Reading

  • January 30, 2017 30 Jan'17

    hacking as a service (HaaS)

    Hacking as a service (HaaS) is the commercialization of hacking skills, in which the hacker serves as a contractor. HaaS makes advanced code-breaking skills available to anyone with a web browser and a credit card.  Continue Reading

  • January 30, 2017 30 Jan'17

    tailgating (piggybacking)

    Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.  Continue Reading

  • January 30, 2017 30 Jan'17

    valve

    A valve is a mechanism that opens and closes to control the flow of fluids. In a scientific context, fluids include both liquids and gases – anything that can flow freely – and valves may use either.  Continue Reading

  • January 28, 2017 28 Jan'17

    social proof

    Social proof is a psychological phenomenon in which the actions and attitudes of the people around us (either in real life or online) are considered support to guide our own behavior.  Continue Reading

  • January 27, 2017 27 Jan'17

    falsifiability

    Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong. That capacity is an essential component of the scientific method and hypothesis testing.  Continue Reading

  • January 27, 2017 27 Jan'17

    metric system

    The metric system is considered almost synonymous with the Standard International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS or mks) system.  Continue Reading

  • January 27, 2017 27 Jan'17

    Bootstrap

    Bootstrap is a free and open source front-end development framework for the creation of websites and web apps.  Continue Reading

  • January 27, 2017 27 Jan'17

    hypothesis

    A hypothesis (plural: hypotheses) is a statement that may be tested and proven to be either true or false. The hypothesis maintains the statement is true. however falsifiability -- the ability to be disproven -- is also essential to testing ...  Continue Reading

  • January 26, 2017 26 Jan'17

    AWS Snowmobile

    AWS Snowmobile is an Amazon Web Services (AWS) cloud storage service designed to transfer huge amounts of data by truck.  Continue Reading

  • January 26, 2017 26 Jan'17

    line of sight (LOS)

    The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.  Continue Reading

  • January 26, 2017 26 Jan'17

    conversion rate

    The conversion rate is the rate at which website visitors or potential customers take a specific desirable action.  Continue Reading

  • January 26, 2017 26 Jan'17

    card skimming

    Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS).  Continue Reading

  • January 26, 2017 26 Jan'17

    predictive maintenance (PdM)

    Predictive maintenance (PdM) is the servicing of equipment when it is estimated that service is required, within a certain tolerance. PdM is used in railroads, industrial equipment, manufacturing plants and oil and gas processing.  Continue Reading

  • January 25, 2017 25 Jan'17

    ad fraud botnet

    An ad fraud botnet is a distributed network of computers controlled by a botmaster to defraud advertisers.  Continue Reading

  • January 25, 2017 25 Jan'17

    centimeter (cm)

    The centimeter (abbreviation, cm) is a unit of displacement or length in the cgs (centimeter/gram/second) system of units.  Continue Reading

  • January 25, 2017 25 Jan'17

    Alphanumerish

    Alphanumerish is a term coined to define the shorthand typing language that has developed from computer users' habit of substituting numerals for letters and substituting both letters and numerals for words or word parts.  Continue Reading

  • January 25, 2017 25 Jan'17

    scientific method

    Scientific method is a logical approach to seeking knowledge that involves forming and testing a hypothesis. This methodology is used to answer questions in a wide variety of disciplines outside of science, including business. Scientific method ...  Continue Reading

  • January 25, 2017 25 Jan'17

    ad fraud

    Ad fraud is a type of scam in which the perpetrator fools advertisers into paying for something useless to them, such as fake traffic, fake leads or ineffective and misrepresented ad placement.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close