Browse Definitions :
  • May 31, 2018 31 May'18

    VR locomotion (virtual reality locomotion)

    VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment. Locomotion through a virtual environment is enabled by a variety of methods including head bobbing and arm swinging, as ...  Continue Reading

  • May 31, 2018 31 May'18


    Locomotion is directional movement that enables someone or something to move from one location to another. The word derives from the Latin words locō (place) and mōtiō (to move).  Continue Reading

  • May 31, 2018 31 May'18

    omnidirectional treadmill (ODT)

    An omnidirectional treadmill (ODT) is a mechanical or electronic machine that allows the user to travel in any direction.  Continue Reading

  • May 30, 2018 30 May'18

    active defense

    An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.  Continue Reading

  • May 29, 2018 29 May'18


    Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions.  Continue Reading

  • May 28, 2018 28 May'18

    intermittent reinforcement

    Intermittent reinforcement is the delivery of a reward at irregular intervals, a method that has been determined to yield the greatest effort from the subject.  Continue Reading

  • May 25, 2018 25 May'18

    Federal Emergency Management Agency (FEMA)

    Federal Emergency Management Agency (FEMA) is a United States government agency with the purpose to coordinate aid and respond to disasters around the nation when local resources are insufficient.  Continue Reading

  • May 25, 2018 25 May'18

    functional requirements

    Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering. The systems in systems engineering can be either software electronic hardware or combination software driven ...  Continue Reading

  • May 25, 2018 25 May'18

    combination and permutation

    In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets. In a combination, the elements of the subset can be listed in any order. In a permutation, the elements of the subset are listed in a ...  Continue Reading

  • May 24, 2018 24 May'18

    smartphone addiction (cell phone addiction)

    Smartphone addiction is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.  Continue Reading

  • May 24, 2018 24 May'18

    Windows Mixed Reality

    Windows Mixed Reality is a Microsoft platform for virtual reality (VR), augmented reality (AR) and mixed reality (MR).  Continue Reading

  • May 18, 2018 18 May'18

    calibration management software (CMS)

    Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.  Continue Reading

  • May 18, 2018 18 May'18


    Caffe2 (Convolutional Architecture for Fast Feature Embedding) is an open source, high-performance framework for the development of machine learning models.  Continue Reading

  • May 18, 2018 18 May'18


    FinTech (a portmanteau of financial tech) is the use of new technology and delivery models to complement or compete with traditional financial service delivery processes. An important focus of the FinTech industry is to develop safer, more ...  Continue Reading

  • May 18, 2018 18 May'18

    Serenity BDD

    Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.  Continue Reading

  • May 18, 2018 18 May'18

    digital signage ROI

    Digital signage ROI is the return on investments made on digital signage used to advertise and attract customer attention or communicate information.  Continue Reading

  • May 15, 2018 15 May'18

    backward chaining

    Backward chaining is the logical process of inferring unknown truths from known conclusions by moving backward from a solution to determine the initial conditions and rules.  Continue Reading

  • May 15, 2018 15 May'18

    forward chaining

    Forward chaining is the logical process of inferring unknown truths from known data and moving forward using determined conditions and rules to find a solution.  Continue Reading

  • May 11, 2018 11 May'18


    LinuxONE is a mainframe series that runs on Linux created by IBM as a way of competing with cloud computing solutions.  Continue Reading

  • May 11, 2018 11 May'18


    Grasshopper is a free Android app made to teach the basics of coding in JavaScript.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...