Browse Definitions :
  • March 29, 2019 29 Mar'19

    brainjacking

    Brainjacking is the hacking of neural implants, surgically implanted devices, which interface with the brain and the central nervous system.  Continue Reading

  • March 29, 2019 29 Mar'19

    bell curve

    A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on ...  Continue Reading

  • March 27, 2019 27 Mar'19

    voice of the customer (VOC)

    Voice of the customer (VOC) is the component of customer experience (CX) and customer satisfaction (CSAT) that focuses on the perception of a customer's needs, wants, expectations and preferences.  Continue Reading

  • March 24, 2019 24 Mar'19

    natural number

    A natural number is a number that occurs commonly and obviously in nature.  Continue Reading

  • March 20, 2019 20 Mar'19

    algorithm

    An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.  Continue Reading

  • March 19, 2019 19 Mar'19

    PTO (paid time off, personal time off)

    Paid time off (PTO) is a human resource management (HRM) policy that provides employees with a pool of bankable hours that can be used for any purpose.  Continue Reading

  • March 19, 2019 19 Mar'19

    distributed energy resources (DER)

    Distributed energy resources (DER) are the combination of physical and virtual resources used in the production and storage of energy at or near where it will be used and separate from the main grid.  Continue Reading

  • March 17, 2019 17 Mar'19

    dark mode

    Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.  Continue Reading

  • March 15, 2019 15 Mar'19

    binaural sound (binaural beats)

    Binaural sound is audio that is recorded through specialized dual microphone setups, allowing for a stereophonic 3D audio effect that simulates sound as heard when physically present.  Continue Reading

  • March 14, 2019 14 Mar'19

    biotechnology (biotech)

    Biotechnology is the use of biological processes, organisms, or systems to manufacture products intended to improve the quality of human life.  Continue Reading

  • March 14, 2019 14 Mar'19

    butterfly effect

    The butterfly effect is the notion that a small initial factor may have a part in determining greater and unpredictable changes in large, complex systems.  Continue Reading

  • March 13, 2019 13 Mar'19

    intent-based networking (IBN)

    Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.  Continue Reading

  • March 13, 2019 13 Mar'19

    proxy server

    What is a proxy server? A proxy server acts as an intermediary between an end user and the Internet for security, privacy, administrative control and caching services.  Continue Reading

  • March 13, 2019 13 Mar'19

    resistance

    Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.  Continue Reading

  • March 13, 2019 13 Mar'19

    voltage

    Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.  Continue Reading

  • March 13, 2019 13 Mar'19

    Apache Kafka

    Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time. Kafka is written in Scala and Java and is often associated with real-time ...  Continue Reading

  • March 12, 2019 12 Mar'19

    tag management system

    A tag management system (TMS) is a software solution used to manage the tags used in digital marketing. Tags are the special headers on websites, tracking pixels used in advertisements and content that enables web analytics.  Continue Reading

  • March 12, 2019 12 Mar'19

    cryogenics

    Cryogenics is the study of material sciences at extremely low temperatures. Cryogenics should not be confused with cryonics, the practice of deep-freezing recently-deceased organisms for later revival.  Continue Reading

  • March 08, 2019 08 Mar'19

    Robert Metcalfe

    Robert Melancton Metcalfe is a United States engineer and inventor born April 7, 1946 who has credits in co-creating the internet, Ethernet, 3Com, and the self-named Metcalfe’s law.  Continue Reading

  • March 06, 2019 06 Mar'19

    Schrodinger's cat

    Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory. The virtual experiment was proposed by Nobel Prize-winning Austrian physicist Erwin...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close