Browse Definitions :
  • September 20, 2019 20 Sep'19

    market validation

    Market validation is a series of actions that an entrepreneur carries out early in the product development lifecycle to verify there is a need for the new product or service in question.  Continue Reading

  • September 19, 2019 19 Sep'19

    release train engineer (RTE)

    A release train engineer (RTE) is a servant leader who facilitates program level processes and execution, drives continuous development, manages risks and escalates impediments while also acting as a full time chief scrum master for a Scaled Agile ...  Continue Reading

  • September 18, 2019 18 Sep'19

    social learning theory

    The social learning theory is the philosophy that people can learn from each other through observation, imitation and modeling.  Continue Reading

  • September 13, 2019 13 Sep'19

    LCD (Liquid Crystal Display)

    LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation.  Continue Reading

  • September 12, 2019 12 Sep'19

    Google Pay (Android Pay)

    Google Pay is the search company’s electronic wallet and payment service offering.  Continue Reading

  • September 12, 2019 12 Sep'19

    Ice Lake

    Ice Lake is a coming Intel central processing unit (CPU) product generation that is expected to be on the long awaited 10nm process.  Continue Reading

  • September 12, 2019 12 Sep'19

    cyberpsychology

    Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.  Continue Reading

  • September 06, 2019 06 Sep'19

    booking engine

    A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online. In computer programming, an engine is a program that performs a core or essential ...  Continue Reading

  • September 05, 2019 05 Sep'19

    finite state machine

    Finite state machine (FSM) is a term used by programmers, mathematicians and other professionals to describe a mathematical model for any system with a limited number of conditional states of being.  Continue Reading

  • September 05, 2019 05 Sep'19

    operations research (OR)

    Operations research (OR) is an analytical method of problem-solving and decision-making that is useful in the management of organizations.  Continue Reading

  • September 05, 2019 05 Sep'19

    culture of failure (blameless culture)

    A culture of failure is a set of processes and infrastructure that an organization can use to learn from, recover from and ultimately avoid actions that prove to be unsuccessful.  Continue Reading

  • August 31, 2019 31 Aug'19

    black box AI

    Black box AI is any artificial intelligence system whose inputs and workings are not accessible to the user or another interested party.  Continue Reading

  • August 31, 2019 31 Aug'19

    machine learning algorithm

    A machine learning algorithm is the method by which the AI system conducts its task, generally predicting output values from given input data.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close