Browse Definitions :
Definition

NORAD Santa tracker

NORAD Santa Tracker is a public service offered by the North American Aerospace Defense Command. Each year, NORAD tracks the  geographical location of Santa Claus as he makes his annual trip delivering gifts to children around the world and makes that information available to the general public. 

NORAD is a bi-national United States and Canadian organization charged with the missions of aerospace warning and aerospace control for North America. Although most data collected by NORAD is top secret, each December 24th, volunteers at NORAD share the data they collect about one specific object in space -- a red sleigh led by eight tiny reindeer (nine if it's foggy).

According to the official web site, the NORAD-U.S. Northern Command (USNORTHCOM) Command Center serves as a central collection and coordination facility for a worldwide system of sensors designed to provide the commander and the leadership of Canada and the U.S. with an accurate picture of the airspace above the U.S. and Canada. The commander is appointed by, and is responsible to, both the U.S. president and the Canadian prime minister.

Although most data collected by NORAD is top secret, each December 24th, volunteers at NORAD share the data they collect about one specific object in space -- a red sleigh led by eight tiny reindeer (nine if it's foggy).

What started as a typographical error in a newspaper ad has become a tradition for many children across America and Canada. According to the special NORAD web site, NORAD uses the latest high-tech systems to track Santa, including radar and satellites.

This was last updated in December 2010
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close