There is no shortage of cybersecurity threats. New risks seem to be uncovered daily/weekly an…
Data fabric is a term coined by the research firm Gartner to describe a distributed IT archite…
Quantum ML (quantum machine learning) is an area of research and development (R&D) that fo…
IOTA is a distributed ledger technology (DLT) that supports feeless transactions and micropaymen…
Decentralized identity is an approach to identity and access management ( IAM ) that seeks ways …
Sovereign cloud refers to a cloud structure that’s designed and built to deliver security an…
A Java applet is a small dynamic Java program that can be transferred via the Internet and run b…
Communication protocols are formal descriptions of digital message formats and rules. They are r…
Passive fault management is a kind of fault management that helps in detecting, isolating and co…
The General Algebraic Modeling System (GAMS) is a computer system that models mathematical opera…
Active fault management is one of two ways to perform fault management in network systems. It is…
Self-replicating machines are a category of autonomous robot that can make copies or reproduce t…
A collaborative robot is a robot that works with with humans in some way – either as an assistan…
Gray goo is the term used by scientists to refer to a hypothetical condition of planet Earth whe…
Consumer Electronics ATA (CE-ATA) is a standards group created to define an interface for small …
Advanced Technology Attachment (ATA) is a standard physical interface for connecting storage dev…
Consumer electronics (CE) refers to any electronic devices designed to be purchased and used by …
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that use wire…
A near field communication tag (NFC tag) is a sticker or wristband with small microchips that c…
Ubuntu cloud is an online platform that is designed to allow users to create their own private…