Browse Definitions :
  • March 31, 2018 31 Mar'18

    Fuchsia OS

    Fuchsia OS is a cross-device, open source operating system from Google.  Continue Reading

  • March 30, 2018 30 Mar'18

    cost containment

    Cost containment is a process of judiciously reducing costs in a business or limiting them to a constant level.  Continue Reading

  • March 30, 2018 30 Mar'18

    multi-channel network (MCN)

    A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.  Continue Reading

  • March 30, 2018 30 Mar'18

    Microsoft AppSource

    Microsoft AppSource is an app store for business applications such as Office 365, Dynamics 365, Power BI or separate Azure web apps.  Continue Reading

  • March 29, 2018 29 Mar'18

    CompTIA Project+

    CompTIA Project + is the Computing Technology Industry Association’s certification program designed to demonstrate validated learning and skills in project management.  Continue Reading

  • March 29, 2018 29 Mar'18

    Citrix certfication

    Citrix certification is a training offering from Citrix designed to verify learning in an area of expertise with the company's cloud computing solutions.  Continue Reading

  • March 29, 2018 29 Mar'18

    neuroscience

    Neuroscience is the area of study concerning the makeup and functioning of the nervous system. In particular, neuroscience is concerned with the human central nervous system (CNS), which is made up of the brain and spinal cord, and peripheral ...  Continue Reading

  • March 28, 2018 28 Mar'18

    Intel Xeon D-2100

    The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of Internet of Things (IoT) and smart devices.  Continue Reading

  • March 28, 2018 28 Mar'18

    Certified in Risk and Information Systems Control (CRISC)

    Certified in Risk and Information Systems Control (CRISC) is a certification program that recognizes knowledge and training in the field of risk management for IT.  Continue Reading

  • March 28, 2018 28 Mar'18

    automotive subscription plan

    An automotive subscription plan is a service that offers use of a motor vehicle to a driver for a monthly subscription fee.  Continue Reading

  • March 28, 2018 28 Mar'18

    logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR)

    A logic gate is an elementary building block of a digital circuit. There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and XNOR.  Continue Reading

  • March 27, 2018 27 Mar'18

    digital tattoo

    With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip. A digital tattoo also refers to the permanent nature of a person’s actions and ...  Continue Reading

  • March 26, 2018 26 Mar'18

    compliance gaining (behavioral compliance gaining)

    Compliance gaining (behavioral compliance gaining) is the process of getting someone to do what you want them to do, despite any reluctance on their part.  Continue Reading

  • March 26, 2018 26 Mar'18

    virtual power plant

    A virtual power plant is the combination of numerous solar-powered, battery-backed homes delivering excess power back into the grid to provide power for other locations.  Continue Reading

  • March 26, 2018 26 Mar'18

    brushing scam

    A brushing scam is an exploit in which a vendor ships a package to an unwitting receiver who hadn’t ordered it and then submits positive reviews that are supposedly from the verified owner.  Continue Reading

  • March 26, 2018 26 Mar'18

    random walk hypothesis

    Random walk hypothesis is a mathematical theory where a variable does not follow an apparent trend and moves seemingly at random.  Continue Reading

  • March 26, 2018 26 Mar'18

    traveling salesman problem (TSP)

    The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.  Continue Reading

  • March 26, 2018 26 Mar'18

    affective computing (emotion AI)

    Affective computing, also known as AC or emotion AI, is an area of study within cognitive computing and artificial intelligence that is concerned with gathering data from faces, voices and body language to measure human emotion.  Continue Reading

  • March 23, 2018 23 Mar'18

    M2M economy (machine-to-machine economy)

    A machine-to-machine (M2M) economy is one in which machines are autonomous market participants that have their own bank accounts.  Continue Reading

  • March 23, 2018 23 Mar'18

    Instagram Stories

    Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close