[Term of the Day]: Martian address
Term of the Day “Martian Address” Definition — What is a Martian Address? A Martian address is a source or destination IP address that does not exist, it's an invalid IP address that is non-routable. This type of address is typically created accidentally
[Term of the Day]: W3C
Term of the Day "W3C" What is W3C? W3C, which stands for World Wide Web Consortium, is an international community created in 1994 by the major players on the internet that develops web standards and promotes interoperability between web technologies,
[Term of the Day]: Clickjacking
Term of the Day “Clickjacking” Definition — What is Clickjacking? Clickjacking or UI redressing is one of the common cybersecurity attacks. It was first identified in 2008 by Robert Hansen and Jeremiah Grossman. It is a malicious practice in which
[Term of the Day]: Servlet Engine
Term of the Day "Servlet Engine" What is Servlet Engine? Servlet engine, also known as the servlet container is a java technology managed by a container that runs on a web server or an application server to deliver dynamic contents. Usually, every
[Term of the Day]: Quantum Internet
Term of the Day “Quantum Internet” Definition — What is Quantum Internet? The Quantum Internet is a network that will let quantum devices exchange some information within an environment. In the quantum world, data can be encoded in the state of
[Term of the Day]: Normalization
Term of the Day "Normalization" What is Normalization? Normalization is the process of organizing the database structure by splitting up the larger tables into smaller but meaningful tables. This process involves organizing, analyzing, and cleaning
[Term of the Day]: Biometric Authentication
Term of the Day “Biometric Authentication” Definition — What is a Biometric Authentication? The term “Biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). Automated biometric systems have only become available over
[Term of the Day]: Boolean Expression
Term of the Day "Boolean Expression" What is Boolean Expression? Boolean expression is a logical statement named after the prominent English mathematician George Boole, that results in a true or false (logical) condition. For example, in the Boolean
[Term of the Day]: Dogfooding
Term of the Day “Dogfooding” Definition — What is a Dogfooding? In modern IT terminology "Dogfooding" or “Eating your own dog food” is a software practice where a company uses its own product. The term is sometimes shortened simply to "dog food"
[Term of the Day]: Extranet
Term of the Day "Extranet" What is Extranet? An extranet is a private network similar to an organization's intranet, but typically open to external authorized parties, such as business partners, vendors, key customers, prospects and so on. It plays
[Term of the Day]: Zip Bomb
Term of the Day “Zip Bomb” Definition — What is a Zip Bomb? The classic Zip Bomb is a tiny zip archive file, also know as 'Zip of Death' or 'Decompression Bomb'. It is usually a small compressed file that can contain malicious data. On extracting
[Term of the Day]: SoC
Term of the Day "SoC" Definition — What is SoC? SoC, stands for system-on-a-chip is an integrated circuit that incorporates a majority of components (chipset features) present on a computer into a single silicon chip. Along with a processor, the SoC
[Term of the Day]: Disruptive Technology
Term of the Day “Disruptive Technology” Definition — What is a Disruptive Technology? Disruptive technology is an innovation that dramatically changes the way consumers, businesses and industries operate. Clayton Christensen popularized the idea
[Term of the Day]: Semantic Web
Term of the Day "Semantic Web" Definition — What is Semantic Web? Semantic Web, an extension of the World Wide Web (WWW) in which data are given well-defined meaning (semantics), better enabling computers and people to work in cooperation. In 2001,
[Term of the Day]: Green Computing
Term of the Day "Green Computing" Definition — What is Green Computing? Green Computing, also known as Green IT is the study and the efficient use of eco-friendly computing technology. It is unfortunate that IT is responsible for about 17% of the
[Term of the Day]: Internet of Behaviors
Term of the Day “Internet of Behaviors” Definition — What is an IoB? The Internet of Behaviors aka (IoB) extends from the Internet of Things (IoT). The IoB is a new step in the concept of the Internet of Things. Gote Nyman, a retired Psychology
[Term of the Day]: Compiler
Term of the Day "Compiler" Definition — What is Compiler? A complier is a software program that converts high level programming code written by a programmer into machine language code (binary code). Imagine you are on a vacation to a beautiful country
[Term of the Day]: Domain Name
Term of the Day “Domain Name” Definition — What is a Domain Name? A Domain name is the web address that people type into the URL browser box to access your website. In the simplest of definitions, a domain name is your website’s address on the internet. Each
[Term of the Day]: Blade Server
Term of the Day "Blade Server" Definition — What does Blade Server mean? When discussing data centers, the term blade server, also known as high density server often comes up as well. Blade servers were developed to offer an alternative to traditional
[Term of the Day]: Content Delivery Network
Term of the Day “Content Delivery Network” Definition — What is a CDN? Content Delivery Network (CDN) also know as Content Distribution Network is a huge collection of distributed servers that are strategically placed across the globe to handle
[Term of the Day]: Cron
Term of the Day "Cron" Definition — What is Piconet? A Cron, also known as Cron Job or Cron Tasks, is a classic utility found on Unix based machines to perform periodic or repeated tasks at the designated times. The name Cron originates from Chronos,
[Term of the Day]: Keyloggers
Term of the Day “Keyloggers” Definition — What is Keyloggers? Keyloggers are also known as keystroke loggers. This is a program that runs all the time on your computer from the minute that you start it up. It is a technology that records every
[Term of the Day]: Network Topology
Term of the Day "Network Topology" Definition — What is Network Topology? Network topology describes the physical and logical relationship of network devices such as switches and routers on a network. This is usually represented by a graph. It determines
[Term of the Day]: Edge Computing
Term of the Day “Edge Computing” Definition — What is Edge Computing? Edge Computing is an emerging technology that is currently receiving vast amounts of attention in the IT sector. This technology is the next evolution of Cloud Computing, the
[Term of the Day]: Piconet
Term of the Day "Piconet" Definition — What is Piconet? Piconet, meaning tiny network, also known as Bluetooth personal area network, is a network that is created using a wireless Bluetooth connection. Communication of bluetooth devices follow a master-slave
[Term of the Day]: Cookie
Term of the Day “Cookie” Definition — What is a Cookie? In the world of computer technology, The term "Cookie" is also called a web cookie, Internet cookie, browser cookie, or HTTP cookie. The cookies were developed for the first time in 1994 by
[Term of the Day]: Eavesdropping Attack
Term of the Day "Eavesdropping Attack" Definition — What is Eavesdropping Attack? Eavesdropping attack, also known as network eavesdropping, snooping attack, or sniffing attack, is an electronic attack where digital communications are intercepted
[Term of the Day]: Intranet
Term of the Day “Intranet” Definition — What is Intranet? The intranet has been around since the 1990s, in earlier days organizations relied on paper documents and filing cabinets, it was difficult to use electronic file systems wherein Intranet
[Term of the Day]: Data Center Infrastructure Management
Term of the Day “Data Center Infrastructure Management” Definition — What is DCIM? DCIM stands for Data Center Infrastructure Management. DCIM provides enterprise IT teams and administrators with insight into data center performance to ensure everything
[Term of the Day]: Cyberveillance
Term of the Day "Cyberveillance" Definition — What is Cyberveillance? Cyber(sur)veillance refers to monitoring an employee's computer activity both online and offline. This monitoring is typically carried out covertly to decrease or eliminate instances
[Term of the Day]: Release Management
Term of the Day “Release Management” Definition — What is Release Management? In an IT environment Release management is a key part of the overall software lifecycle. It's a business function that maps out every step of the product development
[Term of the Day]: Risk Assessment Framework
Term of the Day "Risk Assessment Framework" Definition — What is RAF? RAF, the acronym of Risk Assessment Framework, is the structured process used to identify potential threats to an organization and to define the strategy for prioritizing and eliminating
[Term of the Day]: Knowledge Error Data Base
Term of the Day “Knowledge Error Data Base” Definition — What is KEDB? KEDB stands for Knowledge Error Data Base. It is the repository that holds information about problems/issues affecting customers and IT teams within an organization, for which
[Term of the Day]: NAT64
Term of the Day "Network Address Translation 64" Definition — What is NAT64? As you know, NAT is a mechanism of taking all private IP addresses and hiding them behind a pool of public addresses. NAT64 is a related technology that provides a way to
[Term of the Day]: Hamming Code
Term of the Day "Hamming Code" Definition — What is Hamming Code? Hamming Code is an error detecting and correcting code technique that was developed in 1950 by R.W.Hamming. Whenever a data packet is transmitted over a network, there are possibilities
[Term of the Day]: Backlink
Term of the Day "BackLinking" Definition — What is a BackLink? A backlink, also known as an incoming link, inbound link, inlink or inward link, is a link on another website that points to your site. For example, assume you’ve won an award, the awarding
[Term of the Day]: Distributed File System
Term of the Day "Distributed File System" Definition — What is DFS? DFS, the acronym of Distributed File System, is a method that enables clients to store and access remote files on a client/server architecture. With a DFS, data is stored on a central
[Term of the Day]: Wireless Security Protocols
Term of the Day “Wireless Security Protocols” Definition — What are Wireless Security Protocols? Various wireless security protocols were developed to protect home and office wireless networks. These wireless security protocols include WEP, WPA,
[Term of the Day]: DKIM
Term of the Day "DomainKeys Identified Mail" Definition — What is DKIM? DomainKeys Identified Mail (DKIM) is an email authentication protocol designed to validate the email so that the receiving mail server identifies the sender. It makes sure that
[Term of the Day]: WHOIS Service
Term of the Day “WHOIS Service” Definition — What is WHOIS Service? WHOIS service is primarily used to identify and search for a specific domain name. WHOIS also supports searching IP addresses and hosts. It is one of the oldest tools pertaining
Next Page