Browse Definitions :
  • April 17, 2017 17 Apr'17

    chief integration officer (CIO)

    A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.  Continue Reading

  • April 15, 2017 15 Apr'17

    zero rating

    Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).  Continue Reading

  • April 15, 2017 15 Apr'17

    digital rights

    Digital rights are the rights of individuals as it pertains to computer access and the ability to use, create and publish digital media.  Continue Reading

  • April 15, 2017 15 Apr'17

    search neutrality

    Search neutrality is the direct conducting of transparent search processes that do not discriminate between users or favor specific sites.  Continue Reading

  • April 15, 2017 15 Apr'17

    data discrimination (data censorship)

    Data discrimination, also called discrimination by algorithm, is bias that occurs when predefined data types or data sources are intentionally or unintentionally treated differently than others.  Continue Reading

  • April 13, 2017 13 Apr'17

    human attack surface

    Human attack surface is the totality of all security vulnerabilities within a given system or network that are created through human activities.  Continue Reading

  • April 12, 2017 12 Apr'17

    Hick's law

    Hick's law is a psychological principle which states that the more options are available to a person, the longer it will take for him or her to make a decision about which option is best.  Continue Reading

  • April 12, 2017 12 Apr'17


    Aquaculture is the farming of aquatic animals or plants, including breeding, raising and harvesting in all types of water environments in controlled conditions.  Continue Reading

  • April 12, 2017 12 Apr'17

    common carrier

    A common carrier, in telecommunications, is an entity that provides wired and wireless communication services to the general public for a fee. A common carrier can be contrasted with a contract carrier, also called a private carrier, which provides ...  Continue Reading

  • April 12, 2017 12 Apr'17

    passive keyless entry (PKE)

    Passive keyless entry (PKE) is an automotive locking system that operates automatically when the holder is in proximity to the vehicle. A PKE device can operate while stored in the user's pocket or bag, unlike a standard remote keyless entry (RKE) ...  Continue Reading

  • April 11, 2017 11 Apr'17

    Easter Egg

    An Easter Egg is an unexpected surprise -- an undocumented procedure or unauthorized feature that's playful in nature or gives credit to the software developer or chip designer. Like their namesakes, Easter Eggs can be quite elusive and hard to find.  Continue Reading

  • April 10, 2017 10 Apr'17

    non-disclosure agreement (NDA)

    A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party ...  Continue Reading

  • April 07, 2017 07 Apr'17

    edge provider

    An edge provider is a service that a given ISP’s customers connect to that is not inside that provider’s network and does not belong to them.  Continue Reading

  • April 07, 2017 07 Apr'17

    paid prioritization

    Paid prioritization, in relation to the internet, is the optimization of data transfer rates for certain content providers, websites and web services.  Continue Reading

  • April 06, 2017 06 Apr'17

    Communications Act of 1934

    The Communications Act of 1934 is United States legislation that transfers the Federal Radio Commission’s authority over radio regulation to the Federal Communications Commission (FCC), which was newly formed under the Act’s provisions. The ...  Continue Reading

  • April 06, 2017 06 Apr'17

    variable speed limit (VSL)

    A variable speed limit is a flexible restriction on the rates at which motorists can drive on a given stretch of road. The limit is usually a maximum speed, which changes according to the current environmental and road conditions.  Continue Reading

  • April 06, 2017 06 Apr'17

    bright-line rule

    A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.  Continue Reading

  • April 06, 2017 06 Apr'17

    Open Internet Order of 2010

    The Open Internet Order of 2010 is a set of rules proposed by the United States Federal Communications Commission (FCC) with the purpose of maintaining an open and neutral internet that supports free speech and generally treats all traffic as equal.  Continue Reading

  • April 05, 2017 05 Apr'17


    Firmware is programming that's written to the non-volatile memory of a hardware device. Non-volatile memory is a form of static random access memory whose contents are saved when a hardware device is turned off or loses its external power source.  Continue Reading

  • April 03, 2017 03 Apr'17

    CSO (Chief Security Officer)

    A Chief Security Officer (CSO) is the employee responsible for the physical security of a company, including its communication and business systems.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.