Browse Definitions :
  • August 31, 2017 31 Aug'17

    weaponized information

    Weaponized information is a message or content piece that is designed to affect the recipient's perception about something or someone in a way that is not warranted.  Continue Reading

  • August 31, 2017 31 Aug'17

    cognitive hacking

    Cognitive hacking is a cyberattack that seeks to manipulate the perception of people by exploiting their psychological vulnerabilities. The purpose of the attack is changes in behavior, usually resulting from exposure to misinformation.  Continue Reading

  • August 31, 2017 31 Aug'17

    cognitive security

    Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems.  Continue Reading

  • August 31, 2017 31 Aug'17

    body cam (bodycam)

    A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.  Continue Reading

  • August 31, 2017 31 Aug'17

    legal analytics

    Legal analytics is the application of data analysis methods and technologies within the field of law to improve efficiency, gain insight and realize greater value from available data.  Continue Reading

  • August 30, 2017 30 Aug'17

    forensic image

    A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital profiling

    Digital profiling is the process of gathering and analyzing information about an individual that exists online. A digital profile can include information about personal characteristics, behaviors, affiliations, connections and interactions.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital identity

    A digital identity is the body of information about an individual, organization or electronic device that exists online. Unique identifiers and use patterns make it possible to detect individuals or their devices.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital evidence presentation system (DEPS)

    A digital evidence presentation system (DEPS) is a system with an overhead camera and a liquid crystal display (LCD) used in courts to present and record evidence digitally.  Continue Reading

  • August 30, 2017 30 Aug'17

    computational economics

    Computational economics is a field of economic study at the intersection of computer science, economics and management science.  Continue Reading

  • August 30, 2017 30 Aug'17

    digital preservation

    As a part of the formalized efforts of library and archival sciences, digital preservation includes the practices required to ensure that information is safe from medium failures as well as software and hardware obsolescence.  Continue Reading

  • August 30, 2017 30 Aug'17

    content as a service (CaaS)

    Content as a service (CaaS) is a web-based service for the creation, storage, management and delivery of content such as text, audio, video or images.  Continue Reading

  • August 30, 2017 30 Aug'17

    Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model)

    Unfreeze, Change, Refreeze, also known as the Kurt Lewin Change Management Model, is a method for managing change within an organization.  Continue Reading

  • August 30, 2017 30 Aug'17

    computational law

    Computational law is the area of legal informatics focusing on the automation of formerly manual processes and the integration of legal information with other applications and systems.  Continue Reading

  • August 29, 2017 29 Aug'17

    Melbourne shuffle algorithm

    The Melbourne shuffle algorithm is a sequence of actions intended to obscure the patterns by which cloud-based data is accessed.  Continue Reading

  • August 29, 2017 29 Aug'17

    consignment inventory

    Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold.  Continue Reading

  • August 29, 2017 29 Aug'17

    internet shaming (online shaming)

    Internet shaming is the use of social media, blogs and other online communication channels to attack a target individual or organization. The purpose of the attack is often to publicly embarrass the target, often as retribution for some behavior.  Continue Reading

  • August 29, 2017 29 Aug'17

    FPV drone (first-person view drone)

    An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.  Continue Reading

  • August 23, 2017 23 Aug'17

    fulfillment center

    A fulfillment center is a warehouse where incoming orders are received, processed and filled.  Continue Reading

  • August 23, 2017 23 Aug'17

    cycle counting

    Cycle counting is an inventory-control method that lets businesses conduct a regular count of several items in different areas in a warehouse, without constantly adding up the entire inventory.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close