Browse Definitions :

Archive

???archives.subheading_whatis???

2009 Stories

  • November 17, 2009 17Nov2009 Definição

    backscatter spam

    Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender... Continue Reading

  • November 11, 2009 11Nov2009 Definição

    Bank Secrecy Act (BSA)

    The Bank Secrecy Act (BSA), also known as the Currency and Foreign Transactions Reporting Act, is legislation passed by the United States Congress in 1970 that requires U.S. financial institutions to collaborate with the U.S. government in cases of ... Continue Reading

  • October 22, 2009 22Oct2009 Definição

    Enterprise 2.0

    Enterprise 2.0 is the strategic integration of Web 2.0 technologies into an enterprise's intranet, extranet and business processes. Continue Reading

  • October 19, 2009 19Oct2009 Definição

    rendering

    In 3-D graphic design, rendering is the process of add shading, color and lamination to a 2-D or 3-D wireframe in order to create life-like images on a screen. Continue Reading

  • October 12, 2009 12Oct2009 Definição

    tweet

    A tweet is a post on Twitter. Continue Reading

  • October 09, 2009 09Oct2009 Definição

    remote deposit capture (RDC)

    Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection. When the bank receives a check image from the customer, it ... Continue Reading

  • August 28, 2009 28Aug2009 Definição

    disposable email

    What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses. Continue Reading

  • August 24, 2009 24Aug2009 Definição

    preamble

    A preamble is a signal used in network communications to synchronize transmission timing between two or more systems. Continue Reading

  • July 14, 2009 14Jul2009 Definição

    Massachusetts data protection law

    What is the Massachusetts data protection law?The Massachusetts data protection law is legislation that stipulates security requirements for organizations that handle the private data of residents. Continue Reading

  • July 10, 2009 10Jul2009 Definição

    GRUB (GRand Unified Bootloader)

    GRUB (GRand Unified Bootloader) is a boot loader package developed to support multiple operating systems and allow the user to select among them during boot-up. Continue Reading

  • July 09, 2009 09Jul2009 Definição

    GNU GRUB

    GNU GRUB (or just GRUB) is a boot loader package that supports multiple operating systems on a computer... (Continued) Continue Reading

  • July 01, 2009 01Jul2009 Definição

    Web bug (Web beacon)

    A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior. Continue Reading

  • June 23, 2009 23Jun2009 Definição

    insourcing

    Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house. Continue Reading

  • June 11, 2009 11Jun2009 Definição

    personality profile

    A personality profile is a knowledge management tool used to provide an evaluation of an employee's personal attributes, values and life skills in an effort to maximize his or her job performance and contribution to the company. Continue Reading

  • May 06, 2009 06May2009 Definição

    shareware

    Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. Continue Reading

  • April 16, 2009 16Apr2009 Definição

    redundancy

    Redundancy is a system design in which a component is duplicated so if it fails there will be a backup. Continue Reading

  • April 16, 2009 16Apr2009 Definição

    atomic data

    In a data warehouse, atomic data is the lowest level of detail. Continue Reading

  • March 31, 2009 31Mar2009 Definição

    Conficker

    Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems. Continue Reading

  • March 13, 2009 13Mar2009 Definição

    Google Street View

    Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world. Continue Reading

  • March 05, 2009 05Mar2009 Definição

    Real ID

    Real ID is a driver's license that complies with standards mandated by the United States Real ID Act of 2005. (Continued...) Continue Reading

  • March 03, 2009 03Mar2009 Definição

    seven wastes

    The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS). Continue Reading

  • February 26, 2009 26Feb2009 Definição

    end effector

    In robotics, an end effector is a device or tool that's connected to the end of a robot arm where the hand would be. Continue Reading

  • January 29, 2009 29Jan2009 Definição

    Ogg Vorbis

    Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC. Continue Reading

Networking
  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

Security
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • Pegasus malware

    Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, ...

  • risk-based patch management (RBPM)

    Risk-based patch management (RBPM) is an approach to implementing patches to fix software code that prioritizes patches that ...

CIO
  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

HRSoftware
  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • succession planning

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close