Browse Definitions :
  • July 12, 2018 12 Jul'18

    AWS Certified Solutions Architect - Associate

    AWS Certified Solutions Architect - Associate is a category of technical certifications offered by Amazon Web Services (AWS) for beginners and professionals who run enterprise architecture programs, as well as solutions architects.  Continue Reading

  • July 12, 2018 12 Jul'18


    uberAIR is an app-hailed air vehicle ride service in the planning stages at Uber.  Continue Reading

  • July 10, 2018 10 Jul'18

    Bitcoin address

    A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.  Continue Reading

  • July 10, 2018 10 Jul'18


    Waymo is a systems engineering company that specializes in developing autonomous driving car technologies and a subsidiary of Alphabet, Google’s parent company.  Continue Reading

  • July 09, 2018 09 Jul'18

    slice and dice

    To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.  Continue Reading

  • July 09, 2018 09 Jul'18

    technical requirements

    Technical requirements, in the context of software development and systems engineering, are the factors required to deliver a desired function or behavior from a system to satisfy a user’s standards and needs.  Continue Reading

  • July 06, 2018 06 Jul'18

    Apache HTTP Server

    Apache HTTP Server is a freely-available Web server software package that is distributed under an open source license.  Continue Reading

  • July 06, 2018 06 Jul'18


    Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.  Continue Reading

  • July 06, 2018 06 Jul'18

    Wi-Fi calling

    Wi-Fi calling is software used to place and receive calls over Wi-Fi on a smartphone, which would typically use a cellular connection for calls.  Continue Reading

  • July 06, 2018 06 Jul'18

    Web Bluetooth

    Web Bluetooth is an API that enables interaction with Bluetooth devices through web browsers.  Continue Reading

  • July 06, 2018 06 Jul'18

    counterfeit app (fake app)

    A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.  Continue Reading

  • July 03, 2018 03 Jul'18

    Bitcoin ATM

    A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies.  Continue Reading

  • July 03, 2018 03 Jul'18

    computational photography

    Computational photography is the use of computer processing capabilities in cameras to produce an enhanced image beyond what the lens and sensor pics up in a single shot.  Continue Reading

  • July 03, 2018 03 Jul'18

    Facebook Marketplace

    Facebook Marketplace is classified-ad section of the social network that specializes in helping individuals and businesses sell items locally.  Continue Reading

  • July 02, 2018 02 Jul'18

    Automated Insights

    Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.  Continue Reading

  • July 02, 2018 02 Jul'18

    Pretty Please mode

    Pretty Please mode is a feature added to require the use of “please” and “thank you” in voice commands for Google Assistant as used on Android devices and Google Home.  Continue Reading

  • July 02, 2018 02 Jul'18

    Apple HomePod

    Apple HomePod is the company’s Wi-Fi connected smart speaker that supports multi-room setups.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.