Browse Definitions :
  • October 31, 2017 31 Oct'17

    sorting algorithm

    A sorting algorithm is a method for reorganizing a large number of items into a specific order, such as alphabetical, highest-to-lowest value or shortest-to-longest distance.  Continue Reading

  • October 30, 2017 30 Oct'17

    facial occlusion position

    A facial occlusion position is one of a number of possible poses in which something, such as a person's hand, blocks (occludes) part of their face.  Continue Reading

  • October 30, 2017 30 Oct'17

    facepalm

    Facepalm is a gesture in which an individual places the palm of one or both hands on their face to express one of a number of emotions, including shock, disbelief, distress, embarrassment, horror and frustration.  Continue Reading

  • October 30, 2017 30 Oct'17

    ARKit

    ARKit (Apple ARKit) is Apple’s augmented reality (AR) development platform for iOS mobile devices.  Continue Reading

  • October 30, 2017 30 Oct'17

    ARCore

    ARCore (Google ARCore) is a development platform for building augmented reality apps (AR apps) for Android mobile devices.  Continue Reading

  • October 30, 2017 30 Oct'17

    single-source publishing (multi-channel publishing)

    Single-source publishing, often used synonymously with multi-channel publishing, is a content management method in which material from one document can be used for various file formats, such as a text file, a website or an image file.  Continue Reading

  • October 30, 2017 30 Oct'17

    life-cycle cost analysis (LCCA)

    Life-cycle cost analysis (LCCA) is the study of all the costs associated with processes, materials and goods from acquisition to ownership and maintenance, through to and including disposal.  Continue Reading

  • October 30, 2017 30 Oct'17

    Data Protection Bill 2017

    The Data Protection Bill 2017 is legislation that will replace the Data Protection Act of 1998. It is designed to balance the privacy needs of United Kingdom (UK) and European Union (EU) citizens with the interests of business.  Continue Reading

  • October 30, 2017 30 Oct'17

    data protection officer (DPO)

    A data protection officer (DPO) is an enterprise security officer tasked with ensuring that data management is compliant with the European Union’s General Data Protection Regulations (GDPR).  Continue Reading

  • October 30, 2017 30 Oct'17

    Azure Notification Hubs

    Azure Notification Hubs are push notification engines designed to update users with alerts about new content for a given site, service or app.  Continue Reading

  • October 30, 2017 30 Oct'17

    data citizen

    A data citizen is an employee who relies on data to make decisions and perform job responsibilities. In both a government context and a data context, citizenship offers both rights and responsibilities.  Continue Reading

  • October 29, 2017 29 Oct'17

    surprise and delight

    Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.  Continue Reading

  • October 29, 2017 29 Oct'17

    voice emulation (voice reproduction)

    Voice emulation is the software-generated reproduction of an individual's speech.  Continue Reading

  • October 28, 2017 28 Oct'17

    charm offensive

    A charm offensive is an intense and carefully plotted campaign to win over someone who may not be favorably disposed toward the campaigner.  Continue Reading

  • October 25, 2017 25 Oct'17

    operation

    An operation, in mathematics and computer science, is an action that is carried out to accomplish a given task.  Continue Reading

  • October 25, 2017 25 Oct'17

    digital body language (DBL)

    Digital body language (DBL) is the aggregate of an individual’s online activity – including his or her email use, web visits, searches, referrals from social media sites and webinar attendance.  Continue Reading

  • October 24, 2017 24 Oct'17

    macromarketing

    Macromarketing is the influence that marketing policies and strategies have on the economy and society as a whole.  Continue Reading

  • October 24, 2017 24 Oct'17

    adaptive cruise control

    Adaptive cruise control (ACC) is a driver assistance technology that sets a maximum speed for vehicles and automatically slows the speed of the car when traffic is sensed in front of the vehicle. The technology is also known as autonomous cruise ...  Continue Reading

  • October 24, 2017 24 Oct'17

    driver assistance

    Driver assistance, also known as advanced driver-assistance systems (ADAS), are technologies used to make motor vehicle travel safer by automating, improving or adapting some or all of the tasks involved in operating a vehicle.  Continue Reading

  • October 24, 2017 24 Oct'17

    industrial automation

    Industrial automation is the control of machinery and processes used in various industries by autonomous systems, which may involve robots or computer software.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • secondary storage

    Secondary storage is storage for noncritical data that will not be frequently accessed.

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

Close