Browse Definitions :
  • February 28, 2019 28 Feb'19

    known unknown

    A known unknown is information whose existence you are aware of but that is not in your possession.  Continue Reading

  • February 28, 2019 28 Feb'19

    unknown unknown

    An unknown unknown is unidentified information.  Continue Reading

  • February 27, 2019 27 Feb'19


    A satisficer is a pragmatic individual who makes decisions based on meeting requirements in a timely manner, finding the “good enough” solution and moving on.  Continue Reading

  • February 27, 2019 27 Feb'19


    A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.  Continue Reading

  • February 27, 2019 27 Feb'19

    5G NR (new radio)

    5G NR (new radio) is a set of standards that replace the LTE network 4G wireless communications standard. 5G NR is designed to support high bandwidth transmissions required for streaming video, as well as low bandwidth transmissions used in ...  Continue Reading

  • February 27, 2019 27 Feb'19

    technical errata

    Technical errata are the details of unintended faults in hardware and software components.  Continue Reading

  • February 26, 2019 26 Feb'19


    E-Verify is a free program and web service made available to employers to allow them to ascertain the eligibility of an individual to work in the United States.  Continue Reading

  • February 26, 2019 26 Feb'19

    earned media management (EMM)

    Earned media management (EMM) is a strategy for measuring and influencing the business impact that social media initiatives have on consumer behavior.  Continue Reading

  • February 26, 2019 26 Feb'19

    intangible asset

    Intangible assets are those assets that are based off non-physical assets.  Continue Reading

  • February 26, 2019 26 Feb'19

    Crystal Reports

    Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.  Continue Reading

  • February 26, 2019 26 Feb'19

    attack surface

    An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit. Attack surfaces can be physical or digital.  Continue Reading

  • February 25, 2019 25 Feb'19

    digital wellbeing

    Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.  Continue Reading

  • February 25, 2019 25 Feb'19

    cooperative games

    Cooperative games are games where players work with one and other in order to achieve a common objective.  Continue Reading

  • February 25, 2019 25 Feb'19

    Asilomar AI Principles

    Asilomar AI Principles are 23 main beliefs for guiding the research and development of artificial intelligence (AI).  Continue Reading

  • February 21, 2019 21 Feb'19

    desktop publishing (DTP)

    Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.  Continue Reading

  • February 20, 2019 20 Feb'19

    Snapchat dysmorphia

    Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image. At its most severe, the disorder may cause people to seek out cosmetic procedures in order to replicate the altered images they present ...  Continue Reading

  • February 20, 2019 20 Feb'19

    data in use

    Data in use is data that is currently being updated, processed, accessed and read by a system.  Continue Reading

  • February 20, 2019 20 Feb'19

    secure container

    A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.  Continue Reading

  • February 20, 2019 20 Feb'19

    Gen V attack (5th generation cyberattack)

    Gen V attack is a 5th generation cyberattack that is typically defined by the threat level and sophistication of the attack, including very large data breaches.  Continue Reading

  • February 18, 2019 18 Feb'19

    data in motion

    Data in motion, also referred to as data in transit or data in flight, is a stream of data that is moving or being transported between locations within or between computer systems.  Continue Reading



  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...


  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...



  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...


  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...