Browse Definitions :
  • May 29, 2019 29 May'19

    copypasta

    Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.  Continue Reading

  • May 29, 2019 29 May'19

    field-effect transistor (FET)

    A field-effect transistor (FET) is a type of transistor commonly used for weak-signal amplification (for example, for amplifying wireless signals).  Continue Reading

  • May 29, 2019 29 May'19

    greenhouse effect

    The Greenhouse effect is the warming effect of the sun on greenhouse gases like CO2 that act to trap this heat in our atmosphere. Greenhouse gases in the earth’s atmosphere release heat absorbed from the sun's IR. Some of the heat released reaches ...  Continue Reading

  • May 29, 2019 29 May'19

    Ohm's Law

    Ohm's Law is the mathematical relationship among electric current, resistance, and voltage.  Continue Reading

  • May 29, 2019 29 May'19

    independent variable

    An independent variable is a variable that is manipulated to determine the value of a dependent variable.  Continue Reading

  • May 29, 2019 29 May'19

    digital trust

    Digital trust is the confidence users have in the ability of people, technology and processes to create a secure digital world.  Continue Reading

  • May 28, 2019 28 May'19

    attention management

    Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.  Continue Reading

  • May 28, 2019 28 May'19

    Great Firewall of China

    The Great Firewall of China is a country wide firewall that restricts content that is censored by the Chinese Government, protecting infrastructure from cyber-attacks and Chinese corporate and state secrets.  Continue Reading

  • May 28, 2019 28 May'19

    presentation management

    Presentation management is the supervised creation, distribution, updating and publishing of messages and visuals in presentations across an entire enterprise. Managing presentations strategically encourages organizations to treat all internal and ...  Continue Reading

  • May 24, 2019 24 May'19

    Media Rating Council (MRC)

    The Media Rating Council (MRC) is an industry-funded organization whose purpose is to review and accredit audience rating services within the media industry and secure a measurement service that is valid, reliable and effective.  Continue Reading

  • May 23, 2019 23 May'19

    flaky test

    A flaky test is a quality assurance (QA) test that fails to produces consistent results. Typically, a flaky test using the same software code and the same configuration will produce both a passing result and a failing result at some point in time.  Continue Reading

  • May 23, 2019 23 May'19

    micro app

    A micro app is a small, mobile application that is designed to perform one, simple task.  Continue Reading

  • May 22, 2019 22 May'19

    attention economy

    The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.  Continue Reading

  • May 22, 2019 22 May'19

    computer hallucination

    Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.  Continue Reading

  • May 22, 2019 22 May'19

    GAFA (the Big Four)

    GAFA is an acronym for Google, Apple, Facebook and Amazon (the second and fourth companies are sometimes reversed in order).  Continue Reading

  • May 20, 2019 20 May'19

    SPARQL

    SPARQL is a declarative programming language and protocol used for analytics by graph databases. It is often linked with its complementary data model, Resource Description Framework (RDF).  Continue Reading

  • May 20, 2019 20 May'19

    Osborne Effect

    The Osborne Effect is a reduction in sales of current products after the announcement of a future product.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close