Browse Definitions :
  • February 28, 2017 28 Feb'17

    ad inventory (advertising inventory)

    Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.  Continue Reading

  • February 28, 2017 28 Feb'17

    real-time bidding (RTB)

    Real-time bidding (RTB) is an automated auction process for the purchase of ad impressions on websites. RTB is an integral component of programmatic advertising, which automates the processes and transactions involved in buying and placing ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    ad network

    An ad network (advertising network) is an intermediary company that acts as a broker between advertisers who want to purchase inventory and publishers who want to host ads.  Continue Reading

  • February 28, 2017 28 Feb'17

    embedded vision

    Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video.  Continue Reading

  • February 28, 2017 28 Feb'17

    runtime system

    A runtime system is an engine that translates a given programming language or languages into machine code. Often used as a vague term, runtime systems can be used to refer to the collected managed hardware resources and software needed for program ...  Continue Reading

  • February 28, 2017 28 Feb'17

    programmatic advertising

    Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps.  Continue Reading

  • February 27, 2017 27 Feb'17

    Compute Card (Intel Compute Card)

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 27, 2017 27 Feb'17

    Privacy Shield (EU-US Privacy Shield)

    EU-US Privacy Shield is a framework for adherence to E.U. data protection laws for companies that deal with the private data of European Union citizens that is transferred to the United States.  Continue Reading

  • February 27, 2017 27 Feb'17

    Better Business Bureau (BBB)

    The Better Business Bureau (BBB) is a non-profit accreditor of ethical businesses. The BBB also acts as a consumer watchdog for questionable sales tactics and scams.  Continue Reading

  • February 27, 2017 27 Feb'17

    build-measure-learn (BML)

    Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.  Continue Reading

  • February 27, 2017 27 Feb'17

    minimum viable product (MVP)

    Minimum viable product (MVP) is a concept for making a product that fills the perceived needs of a customer or solves a problem adequately enough to expect a sustainable business around it.  Continue Reading

  • February 27, 2017 27 Feb'17

    inductive argument

    An inductive argument is the use of collected instances of evidence of something specific to support a general conclusion. Inductive reasoning is used to show the likelihood that an argument will prove true in the future.  Continue Reading

  • February 27, 2017 27 Feb'17

    deductive argument

    A deductive argument is the presentation of statements that are assumed or known to be true as premises for a conclusion that necessarily follows from those statements.  Continue Reading

  • February 27, 2017 27 Feb'17

    Intel Compute Card

    Intel Compute Card is a device that includes everything needed to add a computing base to smart and connected devices. The add-on device comes in a 95x55x5mm package, the size of a stack of five credit cards.  Continue Reading

  • February 25, 2017 25 Feb'17

    image content search

    Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query. Should the user request a particular breed of dog, for example, the software would analyze...  Continue Reading

  • February 24, 2017 24 Feb'17

    supply-side platform (SSP)

    A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.  Continue Reading

  • February 24, 2017 24 Feb'17

    retargeting (remarketing)

    Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.  Continue Reading

  • February 24, 2017 24 Feb'17

    ad server

    An ad server is software that stores advertising content and delivers it to websites and applications.  Continue Reading

  • February 24, 2017 24 Feb'17

    negativity bias

    Negativity bias is a form of cognitive bias which causes humans to subconsciously place more significance on negative events than positive ones, affecting behavior and cognition.  Continue Reading

  • February 24, 2017 24 Feb'17

    fake news

    Fake news is an inaccurate, sometimes sensationalistic report that is created to gain attention, mislead, deceive or damage a reputation. Unlike misinformation, which is inaccurate because a reporter has confused facts, fake news is created with the...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close