Browse Definitions :
  • January 31, 2019 31 Jan'19

    social loafing

    Social loafing is a reduction of individual effort that tends to occur when people work in groups.  Continue Reading

  • January 30, 2019 30 Jan'19

    paradox of choice

    The paradox of choice is an observation that having many options to choose from, rather than making people happy and ensuring they get what they want, can cause them stress and problematize decision-making.  Continue Reading

  • January 30, 2019 30 Jan'19

    analysis paralysis

    Analysis paralysis is a stagnation point that can occur in decision-making processes when people become over-involved in researching and evaluating options.  Continue Reading

  • January 29, 2019 29 Jan'19

    AI hearing aid

    An AI hearing aid is a wearable device that can incorporate capabilities such as fitness tracking, audio streaming and translation in addition to the conventional function of enhancing sound for the user.  Continue Reading

  • January 28, 2019 28 Jan'19

    data lineage

    Data lineage is the history of data, including where the data has traveled through-out the its existence within an organization.  Continue Reading

  • January 25, 2019 25 Jan'19

    Google Chrome Enterprise

    Google Chrome Enterprise is the business-focused solution for Chrome devices, Chrome browser and Chrome OS. Chrome Enterprise offers cloud-based management tools, integrations with third party products and 24/7 support for IT administrators.  Continue Reading

  • January 23, 2019 23 Jan'19

    U.S. Department of Justice (DOJ)

    U.S. Department of Justice (DOJ) is a United States federal government agency tasked with the enforcing of justice and law.  Continue Reading

  • January 22, 2019 22 Jan'19

    data discovery platform

    A data discovery platform is a complete set of tools for the purpose of detecting patterns, and those outlier results outside of patterns, in data.  Continue Reading

  • January 22, 2019 22 Jan'19

    Bitcoin Cash (BCH)

    Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.  Continue Reading

  • January 22, 2019 22 Jan'19


    Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.  Continue Reading

  • January 21, 2019 21 Jan'19

    database automation

    Database automation is the use of unattended processes and self-updating procedures for administrative tasks in a database.  Continue Reading

  • January 18, 2019 18 Jan'19

    International Institute of Business Analysis (IIBA)

    International Institute of Business Analysis (IIBA) is a non-profit association that promotes and aids in the use of business analysis.  Continue Reading

  • January 17, 2019 17 Jan'19

    segment routing

    Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.  Continue Reading

  • January 16, 2019 16 Jan'19

    zero tolerance

    Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.  Continue Reading

  • January 16, 2019 16 Jan'19

    market intelligence manager

    A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.  Continue Reading

  • January 15, 2019 15 Jan'19

    event sourcing

    Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.  Continue Reading

  • January 15, 2019 15 Jan'19

    offset printing (offset lithography)

    Offset printing, also called offset lithography, is a method of mass-production printing in which the images on metal plates are transferred (offset) to rubber blankets or rollers and then to the print media.  Continue Reading

  • January 13, 2019 13 Jan'19

    VIPER (View, Interactor, Presenter, Entity and Router)

    VIPER (View, Interactor, Presenter, Entity and Router) is a design pattern for software development that develops modular code based on clean design architecture.  Continue Reading

  • January 08, 2019 08 Jan'19

    quantum internet

    The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.  Continue Reading

  • January 08, 2019 08 Jan'19

    nuclear option

    The nuclear option, in a colloquial sense, is the most extreme solution to a given problem.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...


  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...