Browse Definitions :
  • June 12, 2018 12 Jun'18

    microgrid

    A microgrid is a small-scale power grid that can operate independently or collaboratively with other small power grids.  Continue Reading

  • June 12, 2018 12 Jun'18

    payment gateway

    A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.  Continue Reading

  • June 11, 2018 11 Jun'18

    automatic content classification

    Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.  Continue Reading

  • June 11, 2018 11 Jun'18

    wireline communication

    Wireline communication (also known as wired communication) is the transmission of information over a physical filament. Alternatively, communication technologies that transmit information over-the-air (OTA) are called wireless.  Continue Reading

  • June 11, 2018 11 Jun'18

    Google AI

    Google AI is the new name under which Google Research, the search giant’s artificial intelligence (AI) research and development branch, will continue for its AI applications.  Continue Reading

  • June 11, 2018 11 Jun'18

    pervasive gaming

    Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.  Continue Reading

  • June 11, 2018 11 Jun'18

    videogrammetry

    Videogrammetry is the extraction of an object’s measurements from a video; measurements may be gathered from multiple angles or multiple videos.  Continue Reading

  • June 09, 2018 09 Jun'18

    motion capture (mo-cap)

    Motion capture (mo-cap) is the use of sensors on real bodies (objects and beings) to track motion and record the movements digitally, typically for transferring to virtual 3D imaging.  Continue Reading

  • June 08, 2018 08 Jun'18

    virtual presence

    Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).  Continue Reading

  • June 07, 2018 07 Jun'18

    Unmanned Systems Technology (UST)

    Unmanned Systems Technology (UST) is the software and hardware systems that drive semi- and fully-autonomous vehicles.  Continue Reading

  • June 06, 2018 06 Jun'18

    DRY principle

    The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.  Continue Reading

  • June 05, 2018 05 Jun'18

    Open Plugable Specification (OPS)

    Open Pluggable Specification (OPS) is a set of parameters for standardizing modules that add compute ability to screen readers.  Continue Reading

  • June 01, 2018 01 Jun'18

    virtual honeypot

    A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed...  Continue Reading

  • May 31, 2018 31 May'18

    brain hijacking

    Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close