Browse Definitions :

Tech Accelerator

Tech Accelerator is a learning resource for cybersecurity, storage, AI, data analytics, DevOps, networking, customer experience management, HR, and related business topics.

  • Top 10 Careers in Supply Chain Management

    Each step of the supply chain -- from procuring raw materials to shipping products to end customers – offers a variety of career opportunities. Here's a look at some of those careers.

  • Prepare for a CIO Interview With These 20 Questions

    What are the intelligent questions to ask a CIO during an interview to ensure they're the right fit for the role? According to many IT leaders and recruiters, these are the top 20.

  • Top 10 CIO Trends in 2020 to Drive IT Leadership

    CIOs are facing many uncertainties and changes in 2020. Cross-functional teams, cyberthreats and IoT are becoming priorities. Here’s a look at future trends CIOs can expect in 2020 and beyond.

  • 7 Supply Chain Management Trends to Watch In 2020

    The role of technology in supply chain management (SCM) is changing. The internet of things (IoT), artificial intelligence (AI), and machine learning, cloud technology and blockchain technologies are all affecting the ways organizations manage their supply chains.

  • 34 Cybersecurity Statistics to Lose Sleep Over in 2020

    Every organization must deal with cybersecurity. Here are 34 eye-opening stats to chew on while working on your company's security plan. These stats include data on cyber crime, jobs and industry trends from dozens of security experts.

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • 3D NAND flash

    3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

Close