Browse Definitions :
  • March 28, 2019 28 Mar'19

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • March 27, 2019 27 Mar'19

    voice of the customer (VOC)

    Voice of the customer (VOC) is the component of customer experience (CX) and customer satisfaction (CSAT) that focuses on the perception of a customer's needs, wants, expectations and preferences.  Continue Reading

  • March 24, 2019 24 Mar'19

    natural number

    A natural number is a number that occurs commonly and obviously in nature.  Continue Reading

  • March 20, 2019 20 Mar'19

    algorithm

    An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.  Continue Reading

  • March 19, 2019 19 Mar'19

    distributed energy resources (DER)

    Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.  Continue Reading

  • March 19, 2019 19 Mar'19

    PTO (paid time off, personal time off)

    Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.  Continue Reading

  • March 15, 2019 15 Mar'19

    binaural sound (binaural beats)

    Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.  Continue Reading

  • March 14, 2019 14 Mar'19

    biotechnology (biotech)

    Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.  Continue Reading

  • March 14, 2019 14 Mar'19

    system software

    System software is a type of computer program that is designed to run a computer’s hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user ...  Continue Reading

  • March 14, 2019 14 Mar'19

    operating system (OS)

    An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.  Continue Reading

  • March 14, 2019 14 Mar'19

    butterfly effect

    The butterfly effect is the notion that a small initial factor may have a part in determining greater and unpredictable changes in large, complex systems.  Continue Reading

  • March 13, 2019 13 Mar'19

    intent-based networking (IBN)

    Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.  Continue Reading

  • March 13, 2019 13 Mar'19

    gig economy

    A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements.  Continue Reading

  • March 13, 2019 13 Mar'19

    Apache Kafka

    Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time. Kafka is written in Scala and Java and is often associated with real-time ...  Continue Reading

  • March 13, 2019 13 Mar'19

    proxy server

    What is a proxy server? A proxy server acts as an intermediary between an end user and the Internet for security, privacy, administrative control and caching services.  Continue Reading

  • March 13, 2019 13 Mar'19

    resistance

    Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.  Continue Reading

  • March 13, 2019 13 Mar'19

    voltage

    Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.  Continue Reading

  • March 12, 2019 12 Mar'19

    cryogenics

    Cryogenics is the study of material sciences at extremely low temperatures. Cryogenics should not be confused with cryonics, the practice of deep-freezing recently-deceased organisms for later revival.  Continue Reading

  • March 12, 2019 12 Mar'19

    tag management system

    A tag management system (TMS) is a software solution used to manage the tags used in digital marketing. Tags are the special headers on websites, tracking pixels used in advertisements and content that enables web analytics.  Continue Reading

  • March 08, 2019 08 Mar'19

    Robert Metcalfe

    Robert Melancton Metcalfe is a United States engineer and inventor born April 7, 1946 who has credits in co-creating the internet, Ethernet, 3Com, and the self-named Metcalfe’s law.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close