Browse Definitions :
  • January 31, 2019 31 Jan'19

    social loafing

    Social loafing is a reduction of individual effort that tends to occur when people work in groups.  Continue Reading

  • January 30, 2019 30 Jan'19

    paradox of choice

    The paradox of choice is an observation that having many options to choose from, rather than making people happy and ensuring they get what they want, can cause them stress and problematize decision-making.  Continue Reading

  • January 30, 2019 30 Jan'19

    analysis paralysis

    Analysis paralysis is a stagnation point that can occur in decision-making processes when people become over-involved in researching and evaluating options.  Continue Reading

  • January 29, 2019 29 Jan'19

    AI hearing aid

    An AI hearing aid is a wearable device that can incorporate capabilities such as fitness tracking, audio streaming and translation in addition to the conventional function of enhancing sound for the user.  Continue Reading

  • January 28, 2019 28 Jan'19

    data lineage

    Data lineage is the history of data, including where the data has traveled through-out the its existence within an organization.  Continue Reading

  • January 25, 2019 25 Jan'19

    Google Chrome Enterprise

    Google Chrome Enterprise is the business-focused solution for Chrome devices, Chrome browser and Chrome OS. Chrome Enterprise offers cloud-based management tools, integrations with third party products and 24/7 support for IT administrators.  Continue Reading

  • January 23, 2019 23 Jan'19

    U.S. Department of Justice (DOJ)

    U.S. Department of Justice (DOJ) is a United States federal government agency tasked with the enforcing of justice and law.  Continue Reading

  • January 22, 2019 22 Jan'19

    data discovery platform

    A data discovery platform is a complete set of tools for the purpose of detecting patterns, and those outlier results outside of patterns, in data.  Continue Reading

  • January 22, 2019 22 Jan'19

    Bitcoin Cash (BCH)

    Bitcoin Cash (BCH) is an altcoin version of the popular Bitcoin cryptocurrency.  Continue Reading

  • January 22, 2019 22 Jan'19


    Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.  Continue Reading

  • January 21, 2019 21 Jan'19

    database automation

    Database automation is the use of unattended processes and self-updating procedures for administrative tasks in a database.  Continue Reading

  • January 18, 2019 18 Jan'19

    International Institute of Business Analysis (IIBA)

    International Institute of Business Analysis (IIBA) is a non-profit association that promotes and aids in the use of business analysis.  Continue Reading

  • January 17, 2019 17 Jan'19

    segment routing

    Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.  Continue Reading

  • January 16, 2019 16 Jan'19

    zero tolerance

    Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.  Continue Reading

  • January 16, 2019 16 Jan'19

    market intelligence manager

    A market intelligence manager is a corporate employee who studies a given market, makes recommendations as to actions to capitalize on opportunities and helps direct strategy to assist the company in reaching its revenue targets.  Continue Reading

  • January 15, 2019 15 Jan'19

    event sourcing

    Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.  Continue Reading

  • January 15, 2019 15 Jan'19

    offset printing (offset lithography)

    Offset printing, also called offset lithography, is a method of mass-production printing in which the images on metal plates are transferred (offset) to rubber blankets or rollers and then to the print media.  Continue Reading

  • January 13, 2019 13 Jan'19

    VIPER (View, Interactor, Presenter, Entity and Router)

    VIPER (View, Interactor, Presenter, Entity and Router) is a design pattern for software development that develops modular code based on clean design architecture.  Continue Reading

  • January 08, 2019 08 Jan'19

    quantum internet

    The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.  Continue Reading

  • January 08, 2019 08 Jan'19

    nuclear option

    The nuclear option, in a colloquial sense, is the most extreme solution to a given problem.  Continue Reading



  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...


  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.


  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...



  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...