Browse Definitions :
  • March 29, 2019 29 Mar'19


    Brainjacking is the hacking of neural implants, surgically implanted devices, which interface with the brain and the central nervous system.  Continue Reading

  • March 29, 2019 29 Mar'19

    bell curve

    A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on ...  Continue Reading

  • March 28, 2019 28 Mar'19

    Web server

    A Web server is a program that uses the client/server model and the Hypertext Transfer Protocol (HTTP) to serve the files that form Web pages to users, whose computers contain HTTP clients that forward their requests.  Continue Reading

  • March 27, 2019 27 Mar'19

    voice of the customer (VOC)

    Voice of the customer (VOC) is the component of customer experience (CX) and customer satisfaction (CSAT) that focuses on the perception of a customer's needs, wants, expectations and preferences.  Continue Reading

  • March 24, 2019 24 Mar'19

    natural number

    A natural number is a number that occurs commonly and obviously in nature.  Continue Reading

  • March 20, 2019 20 Mar'19


    An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.  Continue Reading

  • March 19, 2019 19 Mar'19

    distributed energy resources (DER)

    Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.  Continue Reading

  • March 19, 2019 19 Mar'19

    PTO (paid time off, personal time off)

    Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.  Continue Reading

  • March 17, 2019 17 Mar'19

    dark mode

    Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.  Continue Reading

  • March 15, 2019 15 Mar'19

    binaural sound (binaural beats)

    Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.  Continue Reading

  • March 14, 2019 14 Mar'19

    biotechnology (biotech)

    Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.  Continue Reading

  • March 14, 2019 14 Mar'19

    system software

    System software is a type of computer program that is designed to run a computer’s hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user ...  Continue Reading

  • March 14, 2019 14 Mar'19

    operating system (OS)

    An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.  Continue Reading

  • March 14, 2019 14 Mar'19

    butterfly effect

    The butterfly effect is the notion that a small initial factor may have a part in determining greater and unpredictable changes in large, complex systems.  Continue Reading

  • March 13, 2019 13 Mar'19

    intent-based networking (IBN)

    Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.  Continue Reading

  • March 13, 2019 13 Mar'19

    gig economy

    A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements.  Continue Reading

  • March 13, 2019 13 Mar'19

    Apache Kafka

    Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time. Kafka is written in Scala and Java and is often associated with real-time ...  Continue Reading

  • March 13, 2019 13 Mar'19

    proxy server

    What is a proxy server? A proxy server acts as an intermediary between an end user and the Internet for security, privacy, administrative control and caching services.  Continue Reading

  • March 13, 2019 13 Mar'19


    Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.  Continue Reading

  • March 13, 2019 13 Mar'19


    Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.  Continue Reading



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider.