Browse Definitions :
  • March 31, 2018 31 Mar'18

    Fuchsia OS

    Fuchsia OS is a cross-device, open source operating system from Google.  Continue Reading

  • March 30, 2018 30 Mar'18

    cost containment

    Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.  Continue Reading

  • March 30, 2018 30 Mar'18

    multi-channel network (MCN)

    A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.  Continue Reading

  • March 30, 2018 30 Mar'18

    Microsoft AppSource

    Microsoft AppSource is an app store for business applications such as Office 365, Dynamics 365, Power BI or separate Azure web apps.  Continue Reading

  • March 29, 2018 29 Mar'18

    CompTIA Project+

    CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.  Continue Reading

  • March 29, 2018 29 Mar'18

    Citrix certfication

    Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.  Continue Reading

  • March 29, 2018 29 Mar'18

    neuroscience

    Neuroscience is the area of study concerning the makeup and functioning of the nervous system. In particular, neuroscience is concerned with the human central nervous system (CNS), which is made up of the brain and spinal cord, and peripheral ...  Continue Reading

  • March 28, 2018 28 Mar'18

    Intel Xeon D-2100

    The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.  Continue Reading

  • March 28, 2018 28 Mar'18

    Certified in Risk and Information Systems Control (CRISC)

    Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.  Continue Reading

  • March 28, 2018 28 Mar'18

    automotive subscription plan

    An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.  Continue Reading

  • March 28, 2018 28 Mar'18

    logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR)

    A logic gate is an elementary building block of a digital circuit. There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and XNOR.  Continue Reading

  • March 27, 2018 27 Mar'18

    digital tattoo

    With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip. A digital tattoo also refers to the permanent nature of a person’s actions and ...  Continue Reading

  • March 26, 2018 26 Mar'18

    compliance gaining (behavioral compliance gaining)

    Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.  Continue Reading

  • March 26, 2018 26 Mar'18

    virtual power plant

    A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.  Continue Reading

  • March 26, 2018 26 Mar'18

    brushing scam

    A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.  Continue Reading

  • March 26, 2018 26 Mar'18

    random walk hypothesis

    Random walk hypothesis is a mathematical theory where a variable does not follow an apparent trend and moves seemingly at random.  Continue Reading

  • March 26, 2018 26 Mar'18

    traveling salesman problem (TSP)

    The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.  Continue Reading

  • March 26, 2018 26 Mar'18

    affective computing (emotion AI)

    Affective computing, also known as AC or emotion AI, is an area of study within cognitive computing and artificial intelligence that is concerned with gathering data from faces, voices and body language to measure human emotion.  Continue Reading

  • March 23, 2018 23 Mar'18

    M2M economy (machine-to-machine economy)

    A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.  Continue Reading

  • March 23, 2018 23 Mar'18

    Instagram Stories

    Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other ...

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • storage at the edge

    Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of ...

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

Close