Browse Definitions :
258 results for:

compressed

data compression

Definition | searchStorage

Data compression is a reduction in the number of bits needed to represent data.

cold boot attack

Definition | SearchSecurity

A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a ...

in-memory database

Definition | WhatIs.com

An in-memory database is a type of analytic database designed to streamline the work involved in processing queries.

Advanced Television Systems Committee (ATSC)

Definition | WhatIs.com

The Advanced Television Systems Committee (ATSC) is a standards organization that was created in 1982 as part of the Advanced Television Committee (...

dimensionality reduction

Definition | WhatIs.com

Dimensionality reduction is a machine learning (ML) or statistical technique of reducing the amount of random variables in a problem by obtaining a ...

data backup software

Definition | SearchDataBackup

Backup software makes a duplicate copy of data to protect it and enable recovery if the data is lost or corrupted due to equipment failure or some ...

Actifio

Definition | SearchDataBackup

Actifio is a software vendor in Waltham, Mass., that specializes in copy data management (CDM).

Google Bigtable

Definition | SearchDataManagement

Google Bigtable is a distributed, column-oriented data store created by Google Inc. to handle very large amounts of structured data associated with ...

digital audio broadcasting (DAB)

Definition | SearchMobileComputing

video e-mail

Definition | SearchCRM

Video e-mail is an e-mail message with a video file either inserted in the body of the message or accessible through a hypertext link.

GIF (Graphics Interchange Format)

Definition | SearchWinDevelopment

The GIF (pronounced DJIF by many, including its designer; pronounced GIF with a hard G by many others) stands for Graphics Interchange Format and is ...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close