Browse Definitions :
  • September 26, 2019 26 Sep'19

    Kari's law

    Kari's law is legislation in the United States that requires multi-line telephone systems (MLTS) to route 9-1-1 emergency service calls through the phone system automatically. Kari's law mandates that the electronics and software used in multi-line ...  Continue Reading

  • September 20, 2019 20 Sep'19

    market validation

    Market validation is a series of actions that an entrepreneur carries out early in the product development lifecycle to verify there is a need for the new product or service in question.  Continue Reading

  • September 19, 2019 19 Sep'19

    release train engineer (RTE)

    A release train engineer (RTE) is a servant leader who facilitates program level processes and execution, drives continuous development, manages risks and escalates impediments while also acting as a full time chief scrum master for a Scaled Agile ...  Continue Reading

  • September 19, 2019 19 Sep'19

    risk-based security strategy

    A risk-based security strategy is one in which an organization identifies specific security precautions that should be taken in an information technology (IT) environment and documents when and where those precautions should be applied.  Continue Reading

  • September 13, 2019 13 Sep'19

    LCD (Liquid Crystal Display)

    LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.  Continue Reading

  • September 12, 2019 12 Sep'19

    Google Pay (Android Pay)

    Google Pay is the search company’s electronic wallet and payment service offering.  Continue Reading

  • September 12, 2019 12 Sep'19

    cyberpsychology

    Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.  Continue Reading

  • September 12, 2019 12 Sep'19

    Ice Lake

    Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.  Continue Reading

  • September 06, 2019 06 Sep'19

    booking engine

    A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online. In computer programming, an engine is a program that performs a core or essential ...  Continue Reading

  • September 05, 2019 05 Sep'19

    finite state machine

    Finite state machine (FSM) is a term used by programmers, mathematicians and other professionals to describe a mathematical model for any system with a limited number of conditional states of being.  Continue Reading

  • September 05, 2019 05 Sep'19

    operations research (OR)

    Operations research (OR) is an analytical method of problem-solving and decision-making that is useful in the management of organizations.  Continue Reading

  • September 05, 2019 05 Sep'19

    culture of failure (blameless culture)

    A culture of failure is a set of shared values, goals and practices that encourages learning through experimentation. The goal of building a culture of failure is to create workflows that allow employees to learn from unsuccessful endeavors.  Continue Reading

  • August 31, 2019 31 Aug'19

    machine learning algorithm

    A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.  Continue Reading

  • August 31, 2019 31 Aug'19

    black box AI

    Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.  Continue Reading

  • August 31, 2019 31 Aug'19

    data labeling

    Data labeling, in the context of machine learning, is the process of detecting and tagging data samples.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close