Browse Definitions :
  • July 31, 2017 31 Jul'17

    data context

    Data context is the network of connections among data points. Those connections may be created as metadata or simply identified and correlated.  Continue Reading

  • July 31, 2017 31 Jul'17

    Schrodinger's cat

    Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory. The virtual experiment was proposed by Nobel Prize-winning Austrian physicist Erwin...  Continue Reading

  • July 31, 2017 31 Jul'17

    data integration

    Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, comprehensive, current and correct information for business reporting and analysis.  Continue Reading

  • July 31, 2017 31 Jul'17

    Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.  Continue Reading

  • July 31, 2017 31 Jul'17

    PredictionIO

    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.  Continue Reading

  • July 30, 2017 30 Jul'17

    perpetual software license

    A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.  Continue Reading

  • July 30, 2017 30 Jul'17

    Markov model

    A Markov model is a stochastic method for randomly changing systems where it is assumed that future states do not depend on past states.  Continue Reading

  • July 29, 2017 29 Jul'17

    software audit

    A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.  Continue Reading

  • July 28, 2017 28 Jul'17

    perpetual inventory system

    A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.  Continue Reading

  • July 24, 2017 24 Jul'17

    product positioning

    Product positioning is the tailored presentation of a product or brand for a specific targeted demographic. The goal of product positioning is to show the product in the best light for target consumers.  Continue Reading

  • July 22, 2017 22 Jul'17

    semiotics

    Semiotics is the study of the use of symbolic communication. Semiotics can include signs, logos, gestures and other linguistic and nonlinguistic communication methods.  Continue Reading

  • July 22, 2017 22 Jul'17

    secondary data

    Secondary data is research data that has previously been gathered and can be accessed by researchers. The term contrasts with primary data, which is data collected directly from its source.  Continue Reading

  • July 22, 2017 22 Jul'17

    red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group ...  Continue Reading

  • July 22, 2017 22 Jul'17

    internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand ...  Continue Reading

  • July 22, 2017 22 Jul'17

    survey research

    Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online. Conducting surveys is one form of primary research: gathering data first-hand from its source.  Continue Reading

  • July 18, 2017 18 Jul'17

    bug bounty program

    A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.  Continue Reading

  • July 18, 2017 18 Jul'17

    weak tie theory

    Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.  Continue Reading

  • July 17, 2017 17 Jul'17

    T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across ...  Continue Reading

  • July 16, 2017 16 Jul'17

    market share

    Market share is the percentage of sales in a market acquired by a particular company.  Continue Reading

  • July 16, 2017 16 Jul'17

    logo

    A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close