Browse Definitions :
  • February 28, 2019 28 Feb'19

    known unknown

    A known unknown is information whose existence you are aware of but that is not in your possession.  Continue Reading

  • February 28, 2019 28 Feb'19

    unknown unknown

    An unknown unknown is unidentified information.  Continue Reading

  • February 27, 2019 27 Feb'19


    A satisficer is a pragmatic individual who makes decisions based on meeting requirements in a timely manner, finding the “good enough” solution and moving on.  Continue Reading

  • February 27, 2019 27 Feb'19


    A maximizer is an individual who consistently seeks the optimal outcome for any endeavor.  Continue Reading

  • February 27, 2019 27 Feb'19

    5G NR (new radio)

    5G NR (new radio) is a set of standards that replace the LTE network 4G wireless communications standard. 5G NR is designed to support high bandwidth transmissions required for streaming video, as well as low bandwidth transmissions used in ...  Continue Reading

  • February 27, 2019 27 Feb'19

    technical errata

    Technical errata are the details of unintended faults in hardware and software components.  Continue Reading

  • February 26, 2019 26 Feb'19


    E-Verify is a free program and web service made available to employers to allow them to ascertain the eligibility of an individual to work in the United States.  Continue Reading

  • February 26, 2019 26 Feb'19

    earned media management (EMM)

    Earned media management (EMM) is a strategy for measuring and influencing the business impact that social media initiatives have on consumer behavior.  Continue Reading

  • February 26, 2019 26 Feb'19

    intangible asset

    Intangible assets are those assets that are based off non-physical assets.  Continue Reading

  • February 26, 2019 26 Feb'19

    attack surface

    An attack surface is the total sum of the vulnerabilities that can be used to carry out a security exploit. Attack surfaces can be physical or digital.  Continue Reading

  • February 26, 2019 26 Feb'19

    Crystal Reports

    Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.  Continue Reading

  • February 25, 2019 25 Feb'19

    digital wellbeing

    Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.  Continue Reading

  • February 25, 2019 25 Feb'19

    cooperative games

    Cooperative games are games where players work with one and other in order to achieve a common objective.  Continue Reading

  • February 25, 2019 25 Feb'19

    Asilomar AI Principles

    Asilomar AI Principles are 23 main beliefs for guiding the research and development of artificial intelligence (AI).  Continue Reading

  • February 21, 2019 21 Feb'19

    desktop publishing (DTP)

    Desktop publishing (DTP) is the use of personal computers to design books and booklets that are intended to be printed by ink jet or laser jet printers.  Continue Reading

  • February 20, 2019 20 Feb'19

    Snapchat dysmorphia

    Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image. At its most severe, the disorder may cause people to seek out cosmetic procedures in order to replicate the altered images they present ...  Continue Reading

  • February 20, 2019 20 Feb'19

    data in use

    Data in use is data that is currently being updated, processed, accessed and read by a system.  Continue Reading

  • February 20, 2019 20 Feb'19

    secure container

    A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.  Continue Reading

  • February 20, 2019 20 Feb'19

    Gen V attack (5th generation cyberattack)

    Gen V attack is a 5th generation cyberattack that is typically defined by the threat level and sophistication of the attack, including very large data breaches.  Continue Reading

  • February 19, 2019 19 Feb'19

    vulnerability (information technology)

    A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attack vectors, through which an intruder could run code ...  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...