Browse Definitions :
  • July 31, 2017 31 Jul'17

    data context

    Data context is the network of connections among data points. Those connections may be created as metadata or simply identified and correlated.  Continue Reading

  • July 31, 2017 31 Jul'17

    Schrodinger's cat

    Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory. The virtual experiment was proposed by Nobel Prize-winning Austrian physicist Erwin...  Continue Reading

  • July 31, 2017 31 Jul'17

    data integration

    Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, comprehensive, current and correct information for business reporting and analysis.  Continue Reading

  • July 31, 2017 31 Jul'17

    Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.  Continue Reading

  • July 31, 2017 31 Jul'17

    PredictionIO

    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.  Continue Reading

  • July 30, 2017 30 Jul'17

    perpetual software license

    A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.  Continue Reading

  • July 30, 2017 30 Jul'17

    Markov model

    A Markov model is a stochastic method for randomly changing systems where it is assumed that future states do not depend on past states.  Continue Reading

  • July 29, 2017 29 Jul'17

    software audit

    A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.  Continue Reading

  • July 28, 2017 28 Jul'17

    perpetual inventory system

    A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.  Continue Reading

  • July 24, 2017 24 Jul'17

    product positioning

    Product positioning is the tailored presentation of a product or brand for a specific targeted demographic. The goal of product positioning is to show the product in the best light for target consumers.  Continue Reading

  • July 22, 2017 22 Jul'17

    semiotics

    Semiotics is the study of the use of symbolic communication. Semiotics can include signs, logos, gestures and other linguistic and nonlinguistic communication methods.  Continue Reading

  • July 22, 2017 22 Jul'17

    secondary data

    Secondary data is research data that has previously been gathered and can be accessed by researchers. The term contrasts with primary data, which is data collected directly from its source.  Continue Reading

  • July 22, 2017 22 Jul'17

    red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group ...  Continue Reading

  • July 22, 2017 22 Jul'17

    internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand ...  Continue Reading

  • July 22, 2017 22 Jul'17

    survey research

    Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online. Conducting surveys is one form of primary research: gathering data first-hand from its source.  Continue Reading

  • July 18, 2017 18 Jul'17

    bug bounty program

    A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.  Continue Reading

  • July 18, 2017 18 Jul'17

    weak tie theory

    Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.  Continue Reading

  • July 17, 2017 17 Jul'17

    T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across ...  Continue Reading

  • July 16, 2017 16 Jul'17

    market share

    Market share is the percentage of sales in a market acquired by a particular company.  Continue Reading

  • July 16, 2017 16 Jul'17

    logo

    A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close