Browse Definitions:
  • March 31, 2018 31 Mar'18

    Fuchsia OS

    Fuchsia OS is a cross-device, open source operating system from Google.  Continue Reading

  • March 30, 2018 30 Mar'18

    cost containment

    Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.  Continue Reading

  • March 30, 2018 30 Mar'18

    multi-channel network (MCN)

    A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.  Continue Reading

  • March 30, 2018 30 Mar'18

    Microsoft AppSource

    Microsoft AppSource is an app store for business applications such as Office 365, Dynamics 365, Power BI or separate Azure web apps.  Continue Reading

  • March 30, 2018 30 Mar'18

    explainable AI (XAI)

    Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.  Continue Reading

  • March 29, 2018 29 Mar'18

    CompTIA Project+

    CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.  Continue Reading

  • March 29, 2018 29 Mar'18

    Citrix certfication

    Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.  Continue Reading

  • March 29, 2018 29 Mar'18

    neuroscience

    Neuroscience is the area of study concerning the makeup and functioning of the nervous system. In particular, neuroscience is concerned with the human central nervous system (CNS), which is made up of the brain and spinal cord, and peripheral ...  Continue Reading

  • March 28, 2018 28 Mar'18

    Intel Xeon D-2100

    The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.  Continue Reading

  • March 28, 2018 28 Mar'18

    Certified in Risk and Information Systems Control (CRISC)

    Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.  Continue Reading

  • March 28, 2018 28 Mar'18

    automotive subscription plan

    An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.  Continue Reading

  • March 28, 2018 28 Mar'18

    logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR)

    A logic gate is an elementary building block of a digital circuit. There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and XNOR.  Continue Reading

  • March 27, 2018 27 Mar'18

    digital tattoo

    With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip. A digital tattoo also refers to the permanent nature of a person’s actions and ...  Continue Reading

  • March 26, 2018 26 Mar'18

    compliance gaining (behavioral compliance gaining)

    Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.  Continue Reading

  • March 26, 2018 26 Mar'18

    virtual power plant

    A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.  Continue Reading

  • March 26, 2018 26 Mar'18

    brushing scam

    A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.  Continue Reading

  • March 26, 2018 26 Mar'18

    random walk hypothesis

    Random walk hypothesis is a mathematical theory where a variable does not follow an apparent trend and moves seemingly at random.  Continue Reading

  • March 26, 2018 26 Mar'18

    traveling salesman problem (TSP)

    The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.  Continue Reading

  • March 26, 2018 26 Mar'18

    affective computing (emotion AI)

    Affective computing, also known as AC or emotion AI, is an area of study within cognitive computing and artificial intelligence that is concerned with gathering data from faces, voices and body language to measure human emotion.  Continue Reading

  • March 23, 2018 23 Mar'18

    Instagram Stories

    Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close