Browse Definitions :
  • May 10, 2018 10 May'18


    Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information. An important goal of interconnection is to enable extremely high bandwidth exchanges with the lowest possible latency, at ...  Continue Reading

  • May 09, 2018 09 May'18

    multi-level marketing

    Multi-level marketing (MLM) is a sales and distribution model in which a business contracts with representatives to promote and sell the company’s products to customers, while also recruiting those customers to become representatives themselves.  Continue Reading

  • May 08, 2018 08 May'18

    mixed reality (hybrid reality, extended reality)

    Mixed reality (MR) is a user environment in which physical reality and digital content are combined in a way that enables interaction with and among real-world and virtual objects.  Continue Reading

  • May 08, 2018 08 May'18


    A bezel is the border between the screen and frame of a computer monitor, smartphone or any other computing device.  Continue Reading

  • May 04, 2018 04 May'18


    Yardi is a software vendor that makes applications for all sizes of property management and real estate companies.  Continue Reading

  • May 04, 2018 04 May'18

    crop insurance

    Crop insurance is a type of protection policy that covers agricultural producers against unexpected loss of projected crop yields or profits from produce sales at market.  Continue Reading

  • May 04, 2018 04 May'18


    Kinematics is the study of the motion of mechanical points, bodies and systems without consideration of their associated physical properties and the forces acting on them.  Continue Reading

  • May 04, 2018 04 May'18

    collision sensor

    A collision sensor is a piece of electronic equipment that detects an impact. Collision sensors are also known as impact sensors.  Continue Reading

  • May 04, 2018 04 May'18

    last mile delivery

    Last mile delivery is a term used for transportation of merchandise from the nearest distribution hub to the final destination, such as a home or business.  Continue Reading

  • May 03, 2018 03 May'18

    factor of safety (FoS)

    Factor of safety (FoS) is ability of a system's structural capacity to be viable beyond its expected or actual loads. An FoS may be expressed as a ratio that compares absolute strength to actual applied load, or it may be expressed as a constant ...  Continue Reading

  • May 03, 2018 03 May'18

    United Launch Alliance (ULA)

    United Launch Alliance (ULA) is a private aerospace launch provider formed in 2006 through a joint venture of The Boeing Company and Lockheed Martin Corporation. Launch operations are at Cape Canaveral Air Force Station, Florida, and Vandenberg Air ...  Continue Reading

  • May 02, 2018 02 May'18


    Space Exploration Technologies Corp., better known as SpaceX, is a privately held rocket and spacecraft company founded in 2002 by CEO and lead designer Elon Musk, who is also a co-founder and product developer of Tesla Inc.  Continue Reading

  • May 02, 2018 02 May'18

    Blue Origin

    Blue Origin is a privately funded aerospace company focused on developing and flying rocket-powered vertical-takeoff and vertical-landing (VTVL) vehicles for providing access to suborbital and orbital space.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.