Browse Definitions :
  • February 24, 2017 24 Feb'17

    serial position effect

    The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle. The serial position effect is a form of cognitive bias, and it includes both the primacy effect and the recency ...  Continue Reading

  • February 23, 2017 23 Feb'17

    holistic security

    Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system.  Continue Reading

  • February 22, 2017 22 Feb'17

    targeted ad (targeted advertising)

    A targeted ad, in online marketing, is an advertisement that is served to a specific audience, which could be a particular demographic, a group or an individual.  Continue Reading

  • February 21, 2017 21 Feb'17

    confirmation bias

    Confirmation bias is a type of mistake that occurs in thinking when information that confirms a pre-existing belief is given priority over information that does not support a preexisting belief.  Continue Reading

  • February 21, 2017 21 Feb'17

    keyword (in SEO)

    A keyword is a term chosen to describe the content of a web page. The purpose is to improve the page’s search engine optimization (SEO) value, which determines its position on a search engine results page (SERP) and the likelihood that it will be ...  Continue Reading

  • February 20, 2017 20 Feb'17

    alternative data

    Alternative data is information gathered from non-traditional information sources. Analysis of alternative data can provide insights beyond that which an industry’s regular data sources are capable of providing.  Continue Reading

  • February 20, 2017 20 Feb'17

    availability bias

    The availability bias is the human tendency to think that examples of things that come readily to mind are more representative than is actually the case.  Continue Reading

  • February 17, 2017 17 Feb'17

    critical thinking

    Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems. An essential element of critical thinking is human efforts dedicated to the continuous improvement of our cognitive ...  Continue Reading

  • February 16, 2017 16 Feb'17

    colored coin

    A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata. Colored coins are often called metacoins.  Continue Reading

  • February 16, 2017 16 Feb'17

    address bar

    The address bar is the familiar text field at the top of a web browser’s graphical user interface (GUI) that displays the name or the URL (uniform resource locator) of the current web page. Users request websites and pages by typing either the name ...  Continue Reading

  • February 16, 2017 16 Feb'17

    can you hear me? (telephone voice signature scam)

    "Can you hear me?" is a telephone scam in which a perpetrator creates an audio recording of the victim saying the word "yes" by asking a question that will most likely be answered affirmatively. The affirmative response is then attached to another ...  Continue Reading

  • February 16, 2017 16 Feb'17

    bot herder

    A bot herder is a hacker that seeks out vulnerable computers and infects them so that they can be controlled as a botnet.  Continue Reading

  • February 16, 2017 16 Feb'17

    quad-core processor

    A quad-core processor is a chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data, and branch.  Continue Reading

  • February 15, 2017 15 Feb'17

    altcoin

    An altcoin is any digital cryptocurrency similar to Bitcoin. The term is said to stand for “alternative to Bitcoin.” Some altcoins are built off the existing blockchain by which their encrypted data is stored; others use a different blockchain and ...  Continue Reading

  • February 14, 2017 14 Feb'17

    Ada Lovelace (Augusta Ada King)

    Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer. She is known for writing the first algorithm for a machine, inventing the subroutine and recognizing the importance of ...  Continue Reading

  • February 13, 2017 13 Feb'17

    Qi (Wireless Power Consortium)

    Qi (pronounced CHEE) is a manufacturer-agnostic standard for wirelessly charging battery-powered devices. Qi, which means life energy in Chinese, was developed and is maintained by the Wireless Power Consortium.  Continue Reading

  • February 13, 2017 13 Feb'17

    sensor fusion

    Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.  Continue Reading

  • February 13, 2017 13 Feb'17

    romance scam

    A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship and then attempts to get money or sensitive information from the target under various false pretenses.  Continue Reading

  • February 10, 2017 10 Feb'17

    impression

    In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.  Continue Reading

  • February 08, 2017 08 Feb'17

    framing effect

    Framing effect is a form of cognitive bias which causes people to focus more on the positive or negative aspects of a decision, situation or information based on the way it is presented.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • secondary storage

    Secondary storage is storage for noncritical data that will not be frequently accessed.

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

Close