Browse Definitions :
  • February 28, 2017 28 Feb'17

    ad inventory (advertising inventory)

    Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.  Continue Reading

  • February 28, 2017 28 Feb'17

    real-time bidding (RTB)

    Real-time bidding (RTB) is an automated auction process for the purchase of ad impressions on websites. RTB is an integral component of programmatic advertising, which automates the processes and transactions involved in buying and placing ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    ad network

    An ad network (advertising network) is an intermediary company that acts as a broker between advertisers who want to purchase inventory and publishers who want to host ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    embedded vision

    Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.  Continue Reading

  • February 28, 2017 28 Feb'17

    runtime system

    A runtime system is an engine that translates a given programming language or languages into machine code. Often used as a vague term, runtime systems can be used to refer to the collected managed hardware resources and software needed for program ...  Continue Reading

  • February 28, 2017 28 Feb'17

    programmatic advertising

    Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.  Continue Reading

  • February 27, 2017 27 Feb'17

    Compute Card (Intel Compute Card)

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 27, 2017 27 Feb'17

    Privacy Shield (EU-US Privacy Shield)

    EU-US Privacy Shield is a framework for adherence to E.U. data protection laws for companies that deal with the private data of European Union citizens that is transferred to the United States.  Continue Reading

  • February 27, 2017 27 Feb'17

    Better Business Bureau (BBB)

    The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses. The BBB also acts as a consumer watchdog for questionable sales tactics and scams.  Continue Reading

  • February 27, 2017 27 Feb'17

    build-measure-learn (BML)

    Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.  Continue Reading

  • February 27, 2017 27 Feb'17

    minimum viable product (MVP)

    Minimum viable product (MVP) is a concept for making a product that fills the perceived needs of a customer or solves a problem adequately enough to expect a sustainable business around it.  Continue Reading

  • February 27, 2017 27 Feb'17

    inductive argument

    An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion. Inductive reasoning is used to show the likelihood that an argument will prove true in the future.  Continue Reading

  • February 27, 2017 27 Feb'17

    deductive argument

    A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.  Continue Reading

  • February 27, 2017 27 Feb'17

    Intel Compute Card

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 25, 2017 25 Feb'17

    image content search

    Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query. Should the user request a particular breed of dog, for example, the software would analyze...  Continue Reading

  • February 24, 2017 24 Feb'17

    supply-side platform (SSP)

    A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.  Continue Reading

  • February 24, 2017 24 Feb'17

    retargeting (remarketing)

    Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.  Continue Reading

  • February 24, 2017 24 Feb'17

    ad server

    An ad server is software that stores advertising content and delivers it to websites and applications.  Continue Reading

  • February 24, 2017 24 Feb'17

    negativity bias

    Negativity bias is a form of cognitive bias which causes humans to subconsciously place more significance on negative events than positive ones, affecting behavior and cognition.  Continue Reading

  • February 24, 2017 24 Feb'17

    fake news

    Fake news is an inaccurate, sometimes sensationalistic report that is created to gain attention, mislead, deceive or damage a reputation. Unlike misinformation, which is inaccurate because a reporter has confused facts, fake news is created with the...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close