Browse Definitions :
  • July 31, 2018 31 Jul'18

    distributive bargaining

    Distributive bargaining is an adversarial type of negotiation in which it is assumed that any gain of a competitor is a loss to the other party.  Continue Reading

  • July 31, 2018 31 Jul'18

    billable hours

    Billable hours are the amounts of an employee’s work time that can be charged to a client.  Continue Reading

  • July 31, 2018 31 Jul'18

    zero-hours contract

    A zero-hours contract is an agreement stating that a given employer is not obligated to provide a worker with any minimum number of hours.  Continue Reading

  • July 31, 2018 31 Jul'18

    revenue model

    A revenue model is a component of a company’s business planning that describes the way it intends to make money.  Continue Reading

  • July 31, 2018 31 Jul'18


    Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.  Continue Reading

  • July 31, 2018 31 Jul'18

    Cisco Jasper

    Cisco Jasper is a branch of the networking company that provides a cloud-based software platform for businesses looking to provide cloud services.  Continue Reading

  • July 31, 2018 31 Jul'18


    IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy. IOTA was created by the non-profit foundation of the same name.  Continue Reading

  • July 31, 2018 31 Jul'18

    Google Titan

    Google Titan is a security chip designed to protect computers from firmware-based rootkits and other malware-infecting firmware. Titan as a key element in Google's security and allows the company to boast that security for its Google Cloud Platform ...  Continue Reading

  • July 31, 2018 31 Jul'18

    Facebook Workplace

    Facebook Workplace is the social networking company’s enterprise-level collaboration tool. The tool is made to ease both inter- and intra-departmental communications and connect workers. Workplace is a mobile-focused solution with an available ...  Continue Reading

  • July 30, 2018 30 Jul'18

    employee pulse survey

    An employee pulse survey is a review model used by employers to receive company feedback from employees in an efficient, routine way.  Continue Reading

  • July 30, 2018 30 Jul'18

    simultaneous localization and mapping

    Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.  Continue Reading

  • July 30, 2018 30 Jul'18

    IBM Watson Assistant

    IBM Watson Assistant is a white label cloud service that allows enterprise-level software developers to embed a virtual assistant (VA) in the software they are developing and brand the VA as their own.  Continue Reading

  • July 30, 2018 30 Jul'18

    APK file (Android Package Kit file format)

    An APK (Android Package Kit) is the file format for applications used on the Android operating system. An APK file includes all of the software program’s code and assets.  Continue Reading

  • July 26, 2018 26 Jul'18

    fiat money (fiat currency)

    A fiat money is a type of currency that is declared legal tender by a government but has no intrinsic or fixed value and is not backed by any tangible asset, such as gold or silver.  Continue Reading

  • July 26, 2018 26 Jul'18

    shadow banning (shadowban)

    Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user. The controversial practice allows administrators to effectively prevent specific users from actively participating ...  Continue Reading

  • July 25, 2018 25 Jul'18

    What's the difference between pay TV, over-the-top (OTT) TV and over-the-air (OTA) TV?

    Over-the-top (OTT) and pay TV are two business models that allow consumers to subscribe to television content. Pay TV, which is generally more expensive, typically bundles content and requires the user to lease a proprietary coaxial cable or ...  Continue Reading

  • July 25, 2018 25 Jul'18

    explainable AI (XAI)

    Explainable AI (XAI) is artificial intelligence that is programmed to describe its purpose, rationale and decision-making process in a way that can be understood by the average person.  Continue Reading

  • July 20, 2018 20 Jul'18

    Microsoft Cognitive Services

    Microsoft Cognitive Services are a purpose-built collection of AI algorithms and application programming interfaces (APIs) to help developers add AI capabilities to websites, apps and AI agents.  Continue Reading

  • July 15, 2018 15 Jul'18

    AWS Certified Solutions Architect - Professional

    AWS Certified Solutions Architect - Professional certification is a category of technical certifications offered by Amazon Web Services (AWS) for professionals who design applications and systems using the AWS platform and who have professional ...  Continue Reading

  • July 13, 2018 13 Jul'18

    margin of safety (MoS)

    In statistics, the margin of error is a measure of the random variation in a survey's results. It expresses the maximum expected difference between a parameter and an estimate of that parameter as calculated by sampling.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...