Browse Definitions :
  • June 12, 2018 12 Jun'18


    A microgrid is a small-scale power grid that can operate independently or collaboratively with other small power grids.  Continue Reading

  • June 12, 2018 12 Jun'18

    payment gateway

    A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.  Continue Reading

  • June 11, 2018 11 Jun'18

    automatic content classification

    Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.  Continue Reading

  • June 11, 2018 11 Jun'18

    wireline communication

    Wireline communication (also known as wired communication) is the transmission of information over a physical filament. Alternatively, communication technologies that transmit information over-the-air (OTA) are called wireless.  Continue Reading

  • June 11, 2018 11 Jun'18

    Google AI

    Google AI is the new name under which Google Research, the search giant’s artificial intelligence (AI) research and development branch, will continue for its AI applications.  Continue Reading

  • June 11, 2018 11 Jun'18

    pervasive gaming

    Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device.  Continue Reading

  • June 11, 2018 11 Jun'18


    Videogrammetry is the extraction of an object’s measurements from a video; measurements may be gathered from multiple angles or multiple videos.  Continue Reading

  • June 09, 2018 09 Jun'18

    motion capture (mo-cap)

    Motion capture (mo-cap) is the use of sensors on real bodies (objects and beings) to track motion and record the movements digitally, typically for transferring to virtual 3D imaging.  Continue Reading

  • June 08, 2018 08 Jun'18

    virtual presence

    Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).  Continue Reading

  • June 07, 2018 07 Jun'18

    Unmanned Systems Technology (UST)

    Unmanned Systems Technology (UST) is the software and hardware systems that drive semi- and fully-autonomous vehicles.  Continue Reading

  • June 06, 2018 06 Jun'18

    DRY principle

    The DRY (don't repeat yourself) principle is a best practice in software development that recommends software engineers to do something once, and only once.  Continue Reading

  • June 05, 2018 05 Jun'18

    Open Plugable Specification (OPS)

    Open Pluggable Specification (OPS) is a set of parameters for standardizing modules that add compute ability to screen readers.  Continue Reading

  • June 01, 2018 01 Jun'18

    virtual honeypot

    A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed...  Continue Reading

  • May 31, 2018 31 May'18

    brain hijacking

    Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...