Browse Definitions :
  • February 28, 2017 28 Feb'17

    ad inventory (advertising inventory)

    Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.  Continue Reading

  • February 28, 2017 28 Feb'17

    real-time bidding (RTB)

    Real-time bidding (RTB) is an automated auction process for the purchase of ad impressions on websites. RTB is an integral component of programmatic advertising, which automates the processes and transactions involved in buying and placing ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    ad network

    An ad network (advertising network) is an intermediary company that acts as a broker between advertisers who want to purchase inventory and publishers who want to host ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    embedded vision

    Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.  Continue Reading

  • February 28, 2017 28 Feb'17

    runtime system

    A runtime system is an engine that translates a given programming language or languages into machine code. Often used as a vague term, runtime systems can be used to refer to the collected managed hardware resources and software needed for program ...  Continue Reading

  • February 28, 2017 28 Feb'17

    programmatic advertising

    Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.  Continue Reading

  • February 27, 2017 27 Feb'17

    Compute Card (Intel Compute Card)

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 27, 2017 27 Feb'17

    Privacy Shield (EU-US Privacy Shield)

    EU-US Privacy Shield is a framework for adherence to E.U. data protection laws for companies that deal with the private data of European Union citizens that is transferred to the United States.  Continue Reading

  • February 27, 2017 27 Feb'17

    Better Business Bureau (BBB)

    The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses. The BBB also acts as a consumer watchdog for questionable sales tactics and scams.  Continue Reading

  • February 27, 2017 27 Feb'17

    build-measure-learn (BML)

    Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.  Continue Reading

  • February 27, 2017 27 Feb'17

    minimum viable product (MVP)

    Minimum viable product (MVP) is a concept for making a product that fills the perceived needs of a customer or solves a problem adequately enough to expect a sustainable business around it.  Continue Reading

  • February 27, 2017 27 Feb'17

    inductive argument

    An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion. Inductive reasoning is used to show the likelihood that an argument will prove true in the future.  Continue Reading

  • February 27, 2017 27 Feb'17

    deductive argument

    A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.  Continue Reading

  • February 27, 2017 27 Feb'17

    Intel Compute Card

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 25, 2017 25 Feb'17

    image content search

    Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query. Should the user request a particular breed of dog, for example, the software would analyze...  Continue Reading

  • February 24, 2017 24 Feb'17

    supply-side platform (SSP)

    A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.  Continue Reading

  • February 24, 2017 24 Feb'17

    retargeting (remarketing)

    Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.  Continue Reading

  • February 24, 2017 24 Feb'17

    ad server

    An ad server is software that stores advertising content and delivers it to websites and applications.  Continue Reading

  • February 24, 2017 24 Feb'17

    negativity bias

    Negativity bias is a form of cognitive bias which causes humans to subconsciously place more significance on negative events than positive ones, affecting behavior and cognition.  Continue Reading

  • February 24, 2017 24 Feb'17

    fake news

    Fake news is an inaccurate, sometimes sensationalistic report that is created to gain attention, mislead, deceive or damage a reputation. Unlike misinformation, which is inaccurate because a reporter has confused facts, fake news is created with the...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close