[Term of the Day]: Global Variables
Term of the Day "Global Variables" Definition — What are Global Variables? Global variables are also called a global state or global environment, is a programming language construct, a variable type that is declared outside any function and is accessible to all functions throughout the program. This means that they can be changed by any function at any point and may affect the program as a whole. In layman's terms, if variables were humans, Global variables have passports with the visa to go
[Term of the Day]:Quality Assurance
Term of the Day “Quality Assurance” Definition — What is QA? Quality Assurance (QA) is a systematic way of creating an environment to ensure that the software product being developed meets the quality requirements. The QA primarily focuses on improving the processes to deliver quality products to the customers. An organization has to ensure, that processes are efficient and effective as per the quality standards defined for software products. The standards and procedures of the QA program help
[Term of the Day]: Mean Time To Recovery (MTTR)
Term of the Day "Mean Time To Recovery" Definition — What is Mean Time To Recovery (MTTR)? MTTR, the acronym of Mean Time to Resolve (sometimes called mean time to restore) is a service level metric for both service desk and desktop support that measures the average elapsed time from when an incident is reported until the incident is resolved/closed. MTTR = (Total Hours of Downtime) / Total Number of Incidents So, let’s say our systems were down for 30 minutes in two separate incidents in a 24-hour
[Term of the Day]: System Hardening
Term of the Day "System Hardening" Definition — What is System Hardening? System hardening, also known as hardening, refers to securing and configuring a system in such a way that it reduces its surface of vulnerability to a great extent. This is done largely by removing unnecessary software, hardening default credentials, disabling unnecessary services, and modifying other configuration parameters from default values so that the system works securely for a focused set of services. Hardening
[Term of the Day]: Incident Response
Term of the Day "Incident Response" Definition — What is Incident Response? Incident response, also known as an IT incident, computer incident or security incident is the methodology an organization uses to address and manage the aftermath of a security breach or cyberattack. A cyberattack or security breach can wreak havoc potentially affecting customers, intellectual property company time and resources and brand value. The goal of the incident response is to handle the situation in a way that
[Term of the Day]: Voice Search
Term of the Day “Voice Search” Definition — What is Voice Search? Voice Search has been in the market for more than a decade, the technology is majorly used in smartphone and smart device industries. Voice search is a technology that allows users to perform a search on the internet by verbally asking a question on a smartphone, smart device, or a computer. Voice Search uses speech recognition technology to understand what users are saying with high accuracy. It then gives results orally to
[Term of the Day]: Penetration Test
Term of the Day "Penetration Testing" Definition — What is Penetration Testing? Penetration testing also called pen testing is an ethical hacking that is attempted to exploit the vulnerabilities of a computer system, network or web application that an attacker could exploit. For example, this is like a bank hiring someone to dress as a burglar and try to break into their building and gain access to the vault. If the 'burglar' succeeds and gets into the bank or the vault, the bank will gain valuable
[Term of the Day]: Computer Vision
Term of the Day “Computer Vision” Definition — What is CV? Computer Vision, often abbreviated as CV, is a field in computer science that falls under the umbrella of artificial intelligence (AI). The CV technology can process, analyze, and make sense of visual data (images or videos) in the same way that humans visualize. The concept of computer vision is based on teaching computers to process an image at a pixel level and understand it. Deep learning models enable machines to accurately identify
[Term of the Day]: Dynamic data masking (DDM)
Term of the Day "Dynamic Data Masking" Definition — What is Dynamic Data Masking (DDM)? Dynamic data masking (DDM) or data redaction is a process that aims at obscuring or blocking out data that is personally identifiable or sensitive or confidential. DDM can be installed on the database to hide sensitive information of queries over the database, while the information in the database is not changed. It does this as it’s being retrieved from a database; it leaves the data in the database unchanged
[Term of the Day]: Kanban
Term of the Day “Kanban” Definition — What is Kanban? Kanban is a visual system used to manage and keep track of a team’s workflow. The Kanban is commonly used in project management tools. It is an easy way of organizing entire team activities by breaking it down into tasks and visually representing various stages of progress. Everyone can see a clear picture of what has to be done, who is doing what, and what is already done. Kanban method emphasis increased project transparency and collaboration
[Term of the Day]: DLL (Dynamic Link Library) files
Term of the Day "Dynamic Link Library files" Definition — What are DLL (Dynamic Link Library) files? DLL, stands for "Dynamic Link Library" files designed and implemented by Microsoft for its operating systems for enhanced performance in terms of memory management and many other low-level definitions. A DLL file contains functions, classes, variables, UIs and resources (such as icons, images, files, ...) that an EXE, or other DLL uses. When a windows app developer writes an application he does
[Term of the Day]:VoIP
Term of the Day “Voice over Internet Protocol” Definition — What is VoIP? VoIP stands for Voice over Internet Protocol. It can also be referred to as IP telephony or internet telephony. At the simplest level, VoIP phones use hardware and software to handle telephone calls using VoIP technology. The traditional method for domestic and business telephone systems used the legacy technology of the Public Switched Telephone Network (PSTN) or Integrated Services Digital Network (ISDN). In VoIP telephone
[Term of the Day]: Geofencing
Term of the Day "Geofencing" Definition — What is Geofencing and what is it used for? Geofencing is a location-based technology for setting geographic boundaries defined by GPS or RFID technology and the administrator can set up triggers that send a text message, email alert, or app notification when a mobile device enters (or exits) the specified area. Use cases for Geofencing are diverse, with both major enterprises and local businesses now embracing location-based offers. Here are some of
[Term of the Day]:Unified Threat Management
Term of the Day “Unified Threat Management” Definition — What is UTM and its benefits? Unified threat management (UTM) is an information security term that refers to a single security solution, and usually, a single security appliance, that provides multiple security functions at a single point on the network and protects the users from a blend of sophisticated cyber threats. The all-in-one solution will make your IT security much simpler, more unified, and easier to manage. A UTM appliance
[Term of the Day]: Endpoint Protection
Term of the Day "Endpoint Protection" Definition — What is Endpoint Protection and why is it crucial today? Endpoint protection is a term often used interchangeably with endpoint security. It refers to the approach of protecting an endpoint business network when accessed by remote devices like smartphones, laptops, tablets or other wireless devices. Every device which can connect to a network poses considerable danger. As these devices are placed outside of the corporate firewall on the edge
[Term of the Day]:Search Engine Marketing
Term of the Day “Search Engine Marketing” Definition — What is SEM? Search Engine Marketing or SEM (also known as Search Marketing) is the practice of gaining traffic and visibility from search engine results pages, using both paid and unpaid efforts. Traditional SEM is made up of two processes: “organic” search engine optimization (SEO) and pay-per-click advertising (PPC). SEM was an umbrella term that incorporated search engine optimization (SEO) and paid search. Over time, the definition
[Term of the Day]: Backdoor
Term of the Day "Backdoor" Definition — What is a Backdoor in Computing? In layman's terms, a backdoor is normally a door that is obscured from the general public. It is not normally used as an active passage in the everyday working of things. Imagine you're a burglar casing a house for a potential robbery. You see a "Protected by…" security sign staked in the front lawn and Ring doorbell camera. Being the crafty cat burglar that you are, you hop the fence leading to the back of the house. You
[Term of the Day]: Progressive Web App
Term of the Day “Progressive Web App” Definition — What is PWA? A PWA is a web app that uses modern web capabilities to deliver an app-like experience to users. It's built from the web technologies we all know like HTML, CSS, and JavaScript, but with a feel and functionality that rivals an actual native app. PWAs run in the browser, so there's no need to download the app from the Google Play Store or iOS App Store. Twitter is one good example of a progressive web application. When you access
[Term of the Day]: Denial-of-Service (DoS) Attack
Term of the Day “Denial-of-Service Attack” Definition — What is a Denial-of-Service (DoS) Attack? A denial-of-service attack is a type of cyber attack to prevent or deny legitimate users from accessing specific computer systems, devices, services, or other IT resources. DoS attacks are typically executed using the DoS tools that send many request packets to a targeted Internet server (usually Web, FTP, or Mail server). The attack floods the server's resources and makes the system unusable. Unlike
[Term of the Day]: Agile Software Development
Term of the Day “Agile Software Development” Definition — What is Agile? Agile is an umbrella term for light-weight frameworks, tools, and techniques that help teams and organizations achieve agility. The Agile software development methodology is one of the most simplest and effective processes to turns a vision for a business need into software solutions. Agile mainly focuses on keeping the process lean with continuous planning and continuous testing before anything is final. Feedback is
[Term of the Day]: Click-Through Rate (CTR)
Term of the Day “Click-Through Rate” Definition — What is CTR and why is it important? CTR, the acronym for Click-Through Rate is the most common metric for measuring engagement within an email campaign. It is a measure that refers to the number of times a webpage advertisement is clicked, compared to the number of times it is displayed; it does not include the people who failed to click, yet arrived at the site later as a result of seeing the ad. Your CTR is one of your key performance indicators
[Term of the Day]: Cloud Computing
Term of the Day “Cloud Computing” Definition — What is Cloud computing? Cloud computing is also known as virtual server computing. Cloud computing refers to servers that are accessed over the Internet, and the software and databases that run on those servers. In simple terms, is the delivery of on-demand computing resources on a pay for use basis. Cloud servers are located in data centers all over the world. IT organizations or Company's rather than storing files, data ( like images, videos,
[Term of the Day]: Network Operations Center
Term of the Day “Network Operations Center” Definition — What is NOC? Network Operations Center (NOC) is a centralized location where IT Network administrators supervise and maintain a telecommunication network, its performance, and its quality. Basically, a NOC is the nervous system of any organization. A NOC is often the first line of defense against any attacks or anomalies that an organization or enterprise might experience with their telecommunications networks in the area of security.
[Term of the Day]: Operating System (OS) Virtualization
Term of the Day "Operating System Virtualization" Definition — What is Operating System (OS) Virtualization and what it does? Operating System (OS) Virtualization, also called a "virtual private server" is a method for splitting a server into multiple partitions called "containers" or "virtual environments" (VEs) in order to prevent applications from interfering with each other. This involves tailoring a standard operating system so that it can run different applications handled by multiple
[Term of the Day]: Natural Language Processing
Term of the Day “Natural Language Processing” Definition — What is NLP? Natural Language Processing or (NLP) is a form of artificial intelligence (AI) that gives computers the ability to read, understand, and interpret human language. It is a field of study that focuses on the interactions between human language and computers. Let say you need a chatbot for your customer support environment, In order to train an NLP algorithm to understand human speech and text, the algorithm needs to be input
[Term of the Day]: Collaborative Writing
Term of the Day “Collaborative Writing” Definition — What is Collaborative Writing? Collaborative Writing — by its very definition — is two or more persons working together to produce a written document. It is an iterative and social process that involves a team focused on a common objective that negotiates, coordinates, and communicates during the creation of a common document. Collaborative Writing has become a significant component of work in the business world, and many forms of business
[Term of the Day]: Blockchain
Term of the Day “Blockchain” Definition — What is Blockchain? Blockchain technology is a structure that stores transactional records, also known as the Block. This digital information ("Block") takes the form of a string of binary "bits", ones and zeros, which can be processed by computers to be made readable by humans. The blocks are stored in public databases, known as the "Chain", in a network connected through peer-to-peer nodes. This “Chain” of transactions grows larger as new “blocks”
[Term of the Day]: TechQuilibrium
Term of the Day “TechQuilibrium” Definition — What is TechQuilibrium? “TechQuilibrium” is a new term introduced by Gartner in 2019 to describe the ideal technology equilibrium that enterprises need to achieve in order to thrive under uncertainty about what the world will look like five, ten, twenty years from now. According to Gartner, achieving TechQuilibrium is the only way to “accelerate in the turns.” In other words, to survive and even excel when faced with economic, geopolitical, and digital
[Term of the Day]: Post Implementation Review (PIR)
Term of the Day “Post Implementation Review” Definition — What is PIR and what is its key goal? PIR, the acronym for Post Implementation Review is a comprehensive feedback mechanism that takes place after a change has been implemented. This is done to evaluate the success and effectiveness and to identify the opportunities for improvements. The Post Implementation Review (PIR) process collects and utilises knowledge learned throughout a change that can be instrumental to optimise the delivery
[Term of the Day]: Recovery Time Objective
Term of the Day “Recovery Time Objective” Definition — What is RTO and why is it important? RTO, the acronym of Recovery Time Objective represents the maximum acceptable amount of time for restoring an unexpected failure or disaster and not result in significant damage to a business and regaining access to data after an unplanned disruption. It comprises of the following components: Starting from the point of disaster, the time before a disaster is declared, the time to perform tasks (as documented
[Term of the Day]: BYOD
Term of the Day “Bring Your Own Device” Definition — What is BYOD? BYOD - ( Bring Your Own Device ) It’s a policy that enables employees to bring personal devices - Laptops, Smartphones, Tablets, and USB devices for company purposes and giving those devices access to the company network. In the year 2011, official support for BYOD programs was introduced into the organizations. Statistics say over a third of worldwide employees use a personal device in their place of work. This can make employees
[Term of the Day]: Relational Database
Term of the Day “Relational Database” Definition — What is a Relational Database? Databases are an essential component of almost every piece of software today. A relational database is a type of database that uses a structure that allows us to identify and access data in relation to another piece of data in the database. RDBs establish a well-defined relationship between database tables. Tables communicate and share information, which facilitates data searchability, organization and reporting.
[Term of the Day]: Digital Twin
Term of the Day “Digital Twin” Definition — What is Digital Twin? Digital twin in simple words can be explained as a virtual representation of a real-world machine, device, process, or system. Digital twin, however, shouldn’t be confused with digitization. A digital twin does not substitute a physical item or process with a digital one to make it more accessible, efficient, or secure. It’s a precise replica of the physical object and a means of testing and monitoring it without needing to
[Term of the Day]: Network Attached Storage
Term of the Day “Network Attached Storage” Definition — What is NAS? Network-attached storage (NAS) is a file-level storage architecture that makes stored data connected to a network, providing data access to heterogeneous clients. HDD sits on your desk and connects through USB. A NAS is a centralized server that connects directly to your computer through a USB cable, but that would negate its main benefit: the network. It creates a small network all its own that any device with the right credentials
[Term of the Day]: NFC
Term of the Day “Near Field Communication” Definition — What is NFC? Near field communication or (NFC) technology has become so common that most of us do not even realize when they are being used. NFC provides short-range wireless connectivity technology that carries secure two-way interactions between electronic devices such as smartphones. The technology can provide contactless communication up to distances of about 4 or 5 centimeters range. You can transfer information between devices
[Term of the Day]: Network Redundancy
Term of the Day “Network Redundancy” Definition — What is Network Redundancy and why does it matter? Network redundancy is a high-availability service for a network that has additional links to connect all nodes in case one link goes down. In the event of a failure with various network communications links or devices, redundancy allows your network, servers, and internet connectivity to remain in service by providing alternative communications paths and backup equipment. Network redundancies
[Term of the Day]: Quantum Computing
Term of the Day “Quantum Computing” Definition — What is Quantum Computing? Quantum computing is an area of computing focused on developing computer technology based on the principles of quantum theory, which explains the behavior of energy and material on the atomic and subatomic levels. Quantum computers can process massive, complex datasets more efficiently and effectively than classical computers. The classical computers that we use today can only encode information in bits that take the
[Term of the Day]: Synthetic Data
Term of the Day “Synthetic Data” Definition — What is Synthetic Data? Synthetic data is information that's programmatically generated rather than data created naturally in the real world. Synthetic data is created without actual driving organic data events. For example, while a real set of identifiers is collected about a customer who uses a platform, an engineer could ultimately just create the same identifiers for a fictional customer, and load them into the system – and that would be an example
[Term of the Day]: Security Operations Center
Term of the Day “Security Operations Center” Definition — What is SOC? A Security Operations Center often referred to as a SOC. It is a physical or a virtual facility within an organization that comprises a team of IT professionals with expertise in information security. The team analyzes and monitors the security systems of an organization. SOC teams isolate abnormal activity on servers, databases, networks, endpoints, applications, etc., identify security threats, investigate them, and ensures
[Term of the Day]: Wireless Body Area Network
Term of the Day “Wireless Body Area Network” Definition — What is WBAN and it's purpose? WBANs consist of wirelessly connected nodes of sensors or actuators that are specially designed to operate autonomously to connect various medical sensors and devices. The nodes are placed in, on and around/off the human body forming a network for the continuous and unobtrusive monitoring of physiological and/or environmental signals to support medical, lifestyle and entertainment applications. With the rapid
Next Page