Browse Definitions :
  • May 29, 2019 29 May'19

    copypasta

    Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.  Continue Reading

  • May 29, 2019 29 May'19

    digital trust

    Digital trust is the confidence users have in the ability of people, technology and processes to create a secure digital world.  Continue Reading

  • May 29, 2019 29 May'19

    field-effect transistor (FET)

    A field-effect transistor (FET) is a type of transistor commonly used for weak-signal amplification (for example, for amplifying wireless signals).  Continue Reading

  • May 29, 2019 29 May'19

    greenhouse effect

    The Greenhouse effect is the warming effect of the sun on greenhouse gases like CO2 that act to trap this heat in our atmosphere. Greenhouse gases in the earth’s atmosphere release heat absorbed from the sun's IR. Some of the heat released reaches ...  Continue Reading

  • May 29, 2019 29 May'19

    independent variable

    An independent variable is a variable that is manipulated to determine the value of a dependent variable.  Continue Reading

  • May 29, 2019 29 May'19

    Ohm's Law

    Ohm's Law is the mathematical relationship among electric current, resistance, and voltage.  Continue Reading

  • May 28, 2019 28 May'19

    presentation management

    Presentation management is the supervised creation, distribution, updating and publishing of messages and visuals in presentations across an entire enterprise. Managing presentations strategically encourages organizations to treat all internal and ...  Continue Reading

  • May 28, 2019 28 May'19

    attention management

    Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.  Continue Reading

  • May 28, 2019 28 May'19

    Great Firewall of China

    The Great Firewall of China is a country wide firewall that restricts content that is censored by the Chinese Government, protecting infrastructure from cyber-attacks and Chinese corporate and state secrets.  Continue Reading

  • May 24, 2019 24 May'19

    Media Rating Council (MRC)

    The Media Rating Council (MRC) is an industry-funded organization whose purpose is to review and accredit audience rating services within the media industry and secure a measurement service that is valid, reliable and effective.  Continue Reading

  • May 23, 2019 23 May'19

    flaky test

    A flaky test is a quality assurance (QA) test that fails to produces consistent results. Typically, a flaky test using the same software code and the same configuration will produce both a passing result and a failing result at some point in time.  Continue Reading

  • May 23, 2019 23 May'19

    micro app

    A micro app is a small, mobile application that is designed to perform one, simple task.  Continue Reading

  • May 22, 2019 22 May'19

    attention economy

    The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.  Continue Reading

  • May 22, 2019 22 May'19

    computer hallucination

    Computer hallucinations are interpretation errors in artificial intelligence (AI) machine vision and machine learning technology.  Continue Reading

  • May 22, 2019 22 May'19

    GAFA (the Big Four)

    GAFA is an acronym for Google, Apple, Facebook and Amazon (the second and fourth companies are sometimes reversed in order).  Continue Reading

  • May 20, 2019 20 May'19

    SPARQL

    SPARQL is a declarative programming language and protocol used for analytics by graph databases. It is often linked with its complementary data model, Resource Description Framework (RDF).  Continue Reading

  • May 20, 2019 20 May'19

    Osborne Effect

    The Osborne Effect is a reduction in sales of current products after the announcement of a future product.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close