Browse Definitions :
  • January 17, 2019 17 Jan'19

    segment routing

    Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.  Continue Reading

  • January 16, 2019 16 Jan'19

    zero tolerance

    Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.  Continue Reading

  • January 16, 2019 16 Jan'19

    market intelligence manager

    A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.  Continue Reading

  • January 15, 2019 15 Jan'19

    VM automation

    VM automation is the ability for a virtual machine (VM) to perform basic functionality and maintain necessary balances to optimize its performance on its own or with some input from a user.  Continue Reading

  • January 15, 2019 15 Jan'19

    event sourcing

    Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.  Continue Reading

  • January 15, 2019 15 Jan'19

    offset printing (offset lithography)

    Offset printing, also called offset lithography, is a method of mass-production printing in which the images on metal plates are transferred (offset) to rubber blankets or rollers and then to the print media.  Continue Reading

  • January 08, 2019 08 Jan'19

    quantum internet

    The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.  Continue Reading

  • January 08, 2019 08 Jan'19

    nuclear option

    The nuclear option, in a colloquial sense, is the most extreme solution to a given problem.  Continue Reading

  • January 08, 2019 08 Jan'19

    customer base

    Customer base is the group of clients to whom a business markets and sells their goods or services.  Continue Reading

  • January 06, 2019 06 Jan'19

    lexical ambiguity

    Lexical ambiguity is the potential for multiple interpretations of spoken or written language that renders it difficult or impossible to understand without some additional information.  Continue Reading

  • January 06, 2019 06 Jan'19

    structural ambiguity

    Structural or syntactic ambiguity is the potential of multiple interpretations for a piece of written or spoken language because of the way words or phrases are organized.  Continue Reading

  • January 04, 2019 04 Jan'19


    Mimikatz is an open source malware program used by hackers and penetration testers to gather credentials on Windows computers.  Continue Reading

  • January 03, 2019 03 Jan'19

    linguistic ambiguity

    Linguistic ambiguity is a quality of language that makes speech or written text open to multiple interpretations.  Continue Reading

  • January 03, 2019 03 Jan'19

    figure of speech

    A figure of speech is a word or phrase that is not intended to be interpreted literally, usually as a device to make language more interesting, intense or colorful.  Continue Reading

  • January 03, 2019 03 Jan'19

    figurative language

    Figurative language is writing or speech in which any type of linguistic device has been used to make it more interesting or impactful.  Continue Reading



  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...


  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...


  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...