Browse Definitions :
  • March 31, 2018 31 Mar'18

    Fuchsia OS

    Fuchsia OS is a cross-device, open source operating system from Google.  Continue Reading

  • March 30, 2018 30 Mar'18

    cost containment

    Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.  Continue Reading

  • March 30, 2018 30 Mar'18

    multi-channel network (MCN)

    A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.  Continue Reading

  • March 30, 2018 30 Mar'18

    Microsoft AppSource

    Microsoft AppSource is an app store for business applications such as Office 365, Dynamics 365, Power BI or separate Azure web apps.  Continue Reading

  • March 29, 2018 29 Mar'18

    CompTIA Project+

    CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.  Continue Reading

  • March 29, 2018 29 Mar'18

    Citrix certfication

    Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.  Continue Reading

  • March 29, 2018 29 Mar'18

    neuroscience

    Neuroscience is the area of study concerning the makeup and functioning of the nervous system. In particular, neuroscience is concerned with the human central nervous system (CNS), which is made up of the brain and spinal cord, and peripheral ...  Continue Reading

  • March 28, 2018 28 Mar'18

    Intel Xeon D-2100

    The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.  Continue Reading

  • March 28, 2018 28 Mar'18

    Certified in Risk and Information Systems Control (CRISC)

    Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.  Continue Reading

  • March 28, 2018 28 Mar'18

    automotive subscription plan

    An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.  Continue Reading

  • March 27, 2018 27 Mar'18

    digital tattoo

    With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip. A digital tattoo also refers to the permanent nature of a person’s actions and ...  Continue Reading

  • March 26, 2018 26 Mar'18

    compliance gaining (behavioral compliance gaining)

    Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.  Continue Reading

  • March 26, 2018 26 Mar'18

    virtual power plant

    A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.  Continue Reading

  • March 26, 2018 26 Mar'18

    brushing scam

    A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.  Continue Reading

  • March 26, 2018 26 Mar'18

    random walk hypothesis

    Random walk hypothesis is a mathematical theory where a variable does not follow an apparent trend and moves seemingly at random.  Continue Reading

  • March 26, 2018 26 Mar'18

    traveling salesman problem (TSP)

    The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.  Continue Reading

  • March 26, 2018 26 Mar'18

    affective computing (emotion AI)

    Affective computing, also known as AC or emotion AI, is an area of study within cognitive computing and artificial intelligence that is concerned with gathering data from faces, voices and body language to measure human emotion.  Continue Reading

  • March 23, 2018 23 Mar'18

    M2M economy (machine-to-machine economy)

    A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.  Continue Reading

  • March 23, 2018 23 Mar'18

    Instagram Stories

    Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.  Continue Reading

  • March 16, 2018 16 Mar'18

    cost per impression

    Cost per Impression (CPI) is a business efficiency measure common to advertising in paper and web-based media.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close