poison mailbox

A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the…

chief risk officer (CRO)

The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive,…

access governance (AG)

Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce…

Hofstadter’s law

Hofstadter’s law is the observation that “It always takes longer than you expect, even when you…

cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a…

VMware Access Point

VMware Access Point is a virtual appliance used as a secure gateway which authorized users can…

Great car, but where do you put your drink?

When it comes to using a car, there are more important issues than the size of…

What is Snapchat?

Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.…