Browse Definitions :
  • May 12, 2017 12 May'17

    field of view (FOV)

    Field of view (FOV) is the open observable area a person can see through his or her eyes or via an optical device. In the case of optical devices and sensors, FOV describes the angle through which the devices can pick up electromagnetic radiation.n.  Continue Reading

  • May 11, 2017 11 May'17

    dongle

    A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very expensive programs.  Continue Reading

  • May 11, 2017 11 May'17

    simulator sickness

    Simulator sickness is a form of motion sickness related to interacting with a simulated environment. It can be caused, for example, by discrepancies between the simulated vehicle motion in a simulator and the user's perception or expectation of ...  Continue Reading

  • May 11, 2017 11 May'17

    red herring

    A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.  Continue Reading

  • May 10, 2017 10 May'17

    halo effect

    The halo effect is a form of cognitive bias which causes one part to make the whole seem more attractive or desirable.  Continue Reading

  • May 08, 2017 08 May'17

    Project Owl

    Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.  Continue Reading

  • May 06, 2017 06 May'17

    head tracking

    Head tracking is a software application that monitors a user’s head position and orientation. It’s often used alongside face and eye tracking to help and improve human-computer interaction (HCI).  Continue Reading

  • May 06, 2017 06 May'17

    interactive whiteboard

    An interactive whiteboard, also known as a smartboard, is an interactive display in the format of a whiteboard that reacts to user input either directly or through other devices.  Continue Reading

  • May 06, 2017 06 May'17

    smart projector

    A smart projector is a video projector with extra inputs, connectivity and a built-in computer that is used primarily for entertainment and presentations.  Continue Reading

  • May 05, 2017 05 May'17

    behavior-based security

    Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity.  Continue Reading

  • May 04, 2017 04 May'17

    data gravity

    Data gravity is an attribute of data that is manifest in the way software and services are drawn to it relative to its mass (the amount of data).  Continue Reading

  • May 03, 2017 03 May'17

    cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance is a contract that an individual or entity can purchase to help reduce the financial risks associated with doing business online. In exchange for a monthly or quarterly fee, the insurance policy transfers some of the risk to ...  Continue Reading

  • May 02, 2017 02 May'17

    video projector

    A video projector is an electronic device that takes input audio/visual signals and outputs video onto any flat surface.  Continue Reading

  • May 02, 2017 02 May'17

    stateless app

    A stateless app is an application program that does not save client data generated in one session for use in the next session with that client. Each session is carried out as if it was the first time and is not dependent upon data from a previous ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close