The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive,…
Year: 2016
access governance (AG)
Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce…
Hofstadter’s law
Hofstadter’s law is the observation that “It always takes longer than you expect, even when you…
cloud storage infrastructure
Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a…
VMware Access Point
VMware Access Point is a virtual appliance used as a secure gateway which authorized users can…
Great car, but where do you put your drink?
When it comes to using a car, there are more important issues than the size of…
What is Snapchat?
Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.…
3-D printing (additive manufacturing)
3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from…