Browse Definitions :
  • February 28, 2019 28 Feb'19

    known unknown

    A known unknown is information whose existence you are aware of but that is not in your possession.  Continue Reading

  • February 28, 2019 28 Feb'19

    unknown unknown

    An unknown unknown is unidentified information.  Continue Reading

  • February 27, 2019 27 Feb'19

    satisficer

    A satisficer is a pragmatic individual who makes decisions based on meeting requirements in a timely manner, finding the “good enough” solution and moving on.  Continue Reading

  • February 27, 2019 27 Feb'19

    maximizer

    A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.  Continue Reading

  • February 27, 2019 27 Feb'19

    5G NR (new radio)

    5G NR (new radio) is a set of standards that replace the LTE network 4G wireless communications standard. 5G NR is designed to support high bandwidth transmissions required for streaming video, as well as low bandwidth transmissions used in ...  Continue Reading

  • February 27, 2019 27 Feb'19

    technical errata

    Technical errata are the details of unintended faults in hardware and software components.  Continue Reading

  • February 26, 2019 26 Feb'19

    E-Verify

    E-Verify is a free program and web service made available to employers to allow them to ascertain the eligibility of an individual to work in the United States.  Continue Reading

  • February 26, 2019 26 Feb'19

    earned media management (EMM)

    Earned media management (EMM) is a strategy for measuring and influencing the business impact that social media initiatives have on consumer behavior.  Continue Reading

  • February 26, 2019 26 Feb'19

    intangible asset

    Intangible assets are those assets that are based off non-physical assets.  Continue Reading

  • February 26, 2019 26 Feb'19

    attack surface

    An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit. Attack surfaces can be physical or digital.  Continue Reading

  • February 26, 2019 26 Feb'19

    Crystal Reports

    Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.  Continue Reading

  • February 25, 2019 25 Feb'19

    digital wellbeing

    Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.  Continue Reading

  • February 25, 2019 25 Feb'19

    cooperative games

    Cooperative games are games where players work with one and other in order to achieve a common objective.  Continue Reading

  • February 25, 2019 25 Feb'19

    Asilomar AI Principles

    Asilomar AI Principles are 23 main beliefs for guiding the research and development of artificial intelligence (AI).  Continue Reading

  • February 21, 2019 21 Feb'19

    desktop publishing (DTP)

    Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.  Continue Reading

  • February 20, 2019 20 Feb'19

    Snapchat dysmorphia

    Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image. At its most severe, the disorder may cause people to seek out cosmetic procedures in order to replicate the altered images they present ...  Continue Reading

  • February 20, 2019 20 Feb'19

    data in use

    Data in use is data that is currently being updated, processed, accessed and read by a system.  Continue Reading

  • February 20, 2019 20 Feb'19

    secure container

    A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.  Continue Reading

  • February 20, 2019 20 Feb'19

    Gen V attack (5th generation cyberattack)

    Gen V attack is a 5th generation cyberattack that is typically defined by the threat level and sophistication of the attack, including very large data breaches.  Continue Reading

  • February 19, 2019 19 Feb'19

    vulnerability (information technology)

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close