Browse Definitions :
  • October 15, 2018 15 Oct'18

    next issue avoidance (NIA)

    Next issue avoidance (NIA) is a metric used by a company's support or customer service department to stay proactive when helping their customers by predicting related issues that might arise.  Continue Reading

  • October 15, 2018 15 Oct'18

    SOLID (software design principles)

    SOLID is a mnemonic acronym for a set of design principles created for software development in object-oriented languages.  Continue Reading

  • October 15, 2018 15 Oct'18

    IBM Power9 Server

    IBM Power9 Server is a series of high-end enterprise-level servers, part of the company’s Power Systems line. Power9 is designed to deliver high-performance computing (HPC), speed and bandwidth for heavy workloads.  Continue Reading

  • October 11, 2018 11 Oct'18

    Barnum effect (Forer effect)

    The Barnum effect is the tendency for an individual to personalize a generalization that could apply to anyone. It is a type of cognitive bias that was characterized by psychologist Bertram Forer as being a logical fallacy of personal validation.  Continue Reading

  • October 11, 2018 11 Oct'18

    SPSS (Statistical Package for the Social Sciences)

    SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.  Continue Reading

  • October 10, 2018 10 Oct'18

    full HDTV (ultra-HD, true HDTV, 1080p)

    Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image ...  Continue Reading

  • October 09, 2018 09 Oct'18

    days inventory outstanding (DIO)

    Days inventory outstanding (DOI) is the average number of days it takes for inventory to be sold. DOI is also known as inventory days of supply or days in inventory.  Continue Reading

  • October 09, 2018 09 Oct'18

    binomial distribution

    Binomial distribution is a type of formula in mathematics and statistics for predicting probabilities where there are two possible outcomes over a set of instances.  Continue Reading

  • October 08, 2018 08 Oct'18

    Shared Call Appearance (SCA)

    Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.  Continue Reading

  • October 05, 2018 05 Oct'18

    search engine

    A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.  Continue Reading

  • October 04, 2018 04 Oct'18

    bring your own bandwidth (BYOB)

    Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.  Continue Reading

  • October 02, 2018 02 Oct'18

    actionable intelligence

    Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.  Continue Reading

  • October 01, 2018 01 Oct'18

    property management system (PMS)

    A property management system (PMS) is a software application for the operations of hotels, other hospitality accommodations and commercial residential rental properties.  Continue Reading

  • October 01, 2018 01 Oct'18

    Solidity

    Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close