Browse Definitions :
  • July 31, 2017 31 Jul'17

    data context

    Data context is the network of connections among data points. Those connections may be created as metadata or simply identified and correlated.  Continue Reading

  • July 31, 2017 31 Jul'17

    applet

    An applet (little application) is a small software program that supports a larger application program. In the past, the term applet was often associated with the Java programming language.  Continue Reading

  • July 31, 2017 31 Jul'17

    data integration

    Data integration is the process of retrieving data from multiple source systems and combining it in such a way that it can yield consistent, comprehensive, current and correct information for business reporting and analysis.  Continue Reading

  • July 31, 2017 31 Jul'17

    Echo Show

    The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistant. Amazon introduced the Echo Show in May 2017.  Continue Reading

  • July 31, 2017 31 Jul'17

    PredictionIO

    PredictionIO is a machine learning server built on a state-of-the-art open source stack, allowing developers and data scientists to build smart applications and create predictive engines for machine learning.  Continue Reading

  • July 30, 2017 30 Jul'17

    perpetual software license

    A perpetual software license is a type of software license that authorizes an individual to use a program indefinitely.  Continue Reading

  • July 30, 2017 30 Jul'17

    Markov model

    A Markov model is a stochastic method for randomly changing systems where it is assumed that future states do not depend on past states.  Continue Reading

  • July 29, 2017 29 Jul'17

    software audit

    A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.  Continue Reading

  • July 28, 2017 28 Jul'17

    perpetual inventory system

    A perpetual (or continuous) inventory system is a mechanism that companies use to provide a real-time measure of inventory on hand throughout the year.  Continue Reading

  • July 24, 2017 24 Jul'17

    product positioning

    Product positioning is the tailored presentation of a product or brand for a specific targeted demographic. The goal of product positioning is to show the product in the best light for target consumers.  Continue Reading

  • July 22, 2017 22 Jul'17

    semiotics

    Semiotics is the study of the use of symbolic communication. Semiotics can include signs, logos, gestures and other linguistic and nonlinguistic communication methods.  Continue Reading

  • July 22, 2017 22 Jul'17

    secondary data

    Secondary data is research data that has previously been gathered and can be accessed by researchers. The term contrasts with primary data, which is data collected directly from its source.  Continue Reading

  • July 22, 2017 22 Jul'17

    red teaming

    Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach. The purpose of red teaming is to overcome cognitive errors common to organizations such as group ...  Continue Reading

  • July 22, 2017 22 Jul'17

    internal marketing

    Internal marketing is the promotion of a company’s objectives, as well as its products and services, to people within the organization. The purpose of the promotion is increasing employee engagement with the company’s goals and fostering brand ...  Continue Reading

  • July 22, 2017 22 Jul'17

    survey research

    Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online. Conducting surveys is one form of primary research: gathering data first-hand from its source.  Continue Reading

  • July 18, 2017 18 Jul'17

    bug bounty program

    A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.  Continue Reading

  • July 18, 2017 18 Jul'17

    weak tie theory

    Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.  Continue Reading

  • July 17, 2017 17 Jul'17

    T-shaped employee

    A T-shaped employee, in the context of human resources, is an individual that has a depth of knowledge and skills in a particular area of specialization, along with a breadth of knowledge in related areas and the ability to make connections across ...  Continue Reading

  • July 16, 2017 16 Jul'17

    market share

    Market share is the percentage of sales in a market acquired by a particular company.  Continue Reading

  • July 16, 2017 16 Jul'17

    logo

    A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close