Browse Definitions :

Browse Definitions by Alphabet

.NE - WOR

  • .NET Framework - .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages.
  • 10 Gigabit Ethernet (10 GbE) - 10 Gigabit Ethernet (10 GbE) is a telecommunication technology that offers data speeds up to 10 billion bits per second.
  • 10,000-year clock - The 10,000-year clock is an accurate, long-term mechanical timepiece designed to tick once a year for 10,000 years.
  • 100 Gigabit Ethernet (100 GbE) - 100 Gigabit Ethernet (100 GbE) is an Ethernet standard that supports data speeds of up to 100 billion bits (gigabits) per second (Gbps).
  • 1000BASE-T (Gigabit Ethernet) - 1000BASE-T is Gigabit Ethernet -- 1 gigabit is 1,000 megabits per second (Mbps) on copper cables, using four pairs of Category 5 (Cat5) unshielded twisted pair (UTP) to achieve the gigabit data rate.
  • 10BASE-T - 10BASE-T is an Ethernet standard for local area networks and one of several physical media specified in the Institute of Electrical and Electronics Engineers (IEEE) 802.
  • 11th dimension - The 11th dimension is a characteristic of space-time that has been proposed as a possible answer to questions that arise in superstring theory.
  • 12 factor app (twelve-factor app) - Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service.
  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 1xRTT (Single-Carrier Radio Transmission Technology) - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • 2-in-1 tablet (hybrid tablet, convertible tablet) - A 2-in-1 tablet, also known as a hybrid or convertible tablet, is a tablet PC that also functions as a notebook.
  • 2.5G - 2.5G describes the state of wireless technology and capability usually associated with General Packet Radio Services (GPRS) - that is, between the second and third generations of wireless technology.
  • 21st Century Cures Act - The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device innovation, mental health research and care, opioid addiction treatment and prevention, and health information technology.
  • 24/7 Customer or [24]7 Inc - 24/7 Customer is a business process outsourcing (BPO) services provider that also sells industry-specific cloud-based applications.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 25 terms to know before taking the IT4IT Foundation exam - Learn about IT4IT and prepare for the basic terminology that may appear in the IT4IT Foundation exam by reviewing these 25 terms.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.
  • 3-2-1 Backup Strategy - The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.
  • 3-D (three dimensions or three-dimensional) - In computers, 3-D (three dimensions or three-dimensional) describes an image that provides the perception of depth.
  • 3-D chip (3D chip) - A 3-D chip is an integrated circuit (IC) containing a three-dimensional array of interconnected devices performing digital, analog, image processing and neural-network functions, either individually or in combination.
  • 3-D printing (additive manufacturing) - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • 3-D scanner - A 3-D scanner is an imaging device that collects distance point measurements from a real-world object and translates them into a virtual 3-D object.
  • 3-D TV - 3-D TV is a television display technology that enables a three-dimensional effect, so that viewers perceive that an image has depth as well as height and width, similarly to objects in the real world.
  • 3-tier application architecture - A 3-tier application architecture is a modular client-server architecture that consists of a presentation tier, an application tier and a data tier.
  • 3.5" SSD (3.5 solid-state drive) - A 3.5 solid-state drive (SSD) is a data storage device designed for the 3.
  • 3270 (Information Display System) - The 3270 Information Display System, a product from IBM, was, prior to the arrival of the PC, the way that almost the entire corporate world interfaced with a computer.
  • 360 review - A 360 review, or 360-degree review, is a feedback collection process aimed at helping employees at all levels obtain responses from various parts of an organization in order to develop and sharpen their professional skills.
  • 360-degree customer view - The 360-degree customer view is the idea that companies can get a complete view of customers by aggregating data from the various touch points in which consumers interact with companies.
  • 360-degree photograph - 360-degree photos simulate being in the shoes of a photographer and looking around to the left, right, up and down as desired as well as sometimes zooming.
  • 360-degree VR (360-degree virtual reality) - 360-degree VR (360-degree virtual reality) is an audiovisual simulation of an altered, augmented or substituted environment that surrounds the user, allowing them to look around them in all directions, just as they can in real life.
  • 3D audio (three-dimensional audio) - 3D audio is a simulation of the natural positioning of sounds for various applications including video presentations and games, virtual environments and sound stages.
  • 3D camera - A 3D camera is an imaging device that enables the perception of depth in images to replicate three dimensions as experienced through human binocular vision.
  • 3D gaming - 3D gaming is interactive computer entertainment that is graphically presented in the three dimensions of height, width and depth; the addition of depth to 2D gaming enabled the exploration of virtual worlds with more realistic representation.
  • 3D mesh - A 3D mesh is the structural build of a 3D model consisting of polygons.
  • 3D model - 3D models are used to portray real-world and conceptual visuals for art, entertainment, simulation and drafting and are integral to many different industries, including virtual reality, video games, 3D printing, marketing, TV and motion pictures, scientific and medical imaging and computer-aided design and manufacturing CAD/CAM.
  • 3D modeling - 3-D modeling is the use of software to create a virtual three-dimensional model of some physical object.
  • 3D mouse - A 3D mouse is a pointing and control device specialized for movement in virtual 3D (three-dimensional) environments.
  • 3D NAND flash - 3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.
  • 3D XPoint - 3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.
  • 3G (third generation of mobile telephony) - 3G refers to the third generation of cellular technology that enables mobile telephony.
  • 3G card - A 3G card is a modem that allows a computing device to access the Internet wirelessly through a cellular provider's 3G network.
  • 3GPP (3rd Generation Partnership Project) - The 3rd Generation Partnership Project (3GPP) is a collaborative project between a group of telecommunications associations with the initial goal of developing globally applicable specifications for third-generation (3G) mobile systems.
  • 3PL (third-party logistics) - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • 3Vs (volume, variety and velocity) - The 3Vs (volume, variety and velocity) are three defining properties or dimensions of big data.
  • 4-D printing (four-dimensional printing) - 4-D printing is additive manufacturing that prints objects capable of transformation and, in some cases, self-assembly.
  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • 401(k) plan - A 401(k) plan is a type of retirement savings account.
  • 404 error - 404 is a status code that tells a web user that a requested page is not available.
  • 404 error page - A 404 page is the webpage served to a user who tries to access a page that is unavailable.
  • 42 (h2g2, meaning of life, The Hitchhiker's Guide to the Galaxy) - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • 4G (fourth-generation wireless) - 4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).
  • 4K video resolution - 4K video resolution is high-definition (HD) video that has four times the resolution of 1080p HD video.
  • 5 things to think about before switching IT career paths - If you're thinking of changing career paths in IT, now could be the right time to do it.
  • 5 V's of big data - The 5 V's of big data are the five main and innate characteristics of big data.
  • 5 Whys (Five Whys) - Five Whys, sometimes written as '5 Whys,' is a guided team exercise for identifying the root cause of a problem.
  • 5G New Radio (NR) - 5G New Radio (NR) is a set of standards that replace the LTE network 4G wireless communications standard.
  • 5G Quiz - Can you speak 5G? - Next-generation 5G wireless technology will offer faster speeds and increased capacity.
  • 6 lessons learned from 'The Phoenix Project' - In The Phoenix Project, a seminal business novel about a fictional American company working through its digital transformation, there is a wealth of insightful lessons about DevOps, IT and working for a modern corporation in general.
  • 64-bit processor (64-bit computing) - A 64-bit processor refers to a microprocessor that can process data and instructions in chunks of 64 bits.
  • 70 percent rule for productivity - According to the 70 percent rule, which has its roots in athletics, employees are most productive when a majority of their time is spent working at a less intense pace.
  • 70-20-10 (70-20-10 rule) - 70-20-10 is a formula that describes how someone learns to do their job.
  • 720p - 720p is the standard high-definition (HD) display resolution of 1280x720 pixels, with progressive scanning, at a 16x9 aspect ratio.
  • 78 Questions to Ask About Any Technology - “78 Questions to Ask about Any Technology” is a list designed to inform users as to the advisability of developing or continuing to support a given technology, based on the answers to the questions.
  • 8-track tape - An 8-track tape is a hard plastic cartridge about the size of an external modem that houses a continuous loop of non-digital (analog) audio data stored on magnetic tape.
  • 802.11 - 802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • 802.11ac (Gigabit Wi-Fi) - 802.11ac, also known as Gigabit Wi-Fi, is a proposed specification in the 802.
  • 802.11d - 802.11d is a communications specification for use in countries where systems using other standards in the 802.
  • 802.11h - The 802.11h specification is an addition to the 802.
  • 802.11i - 802.11i is a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.
  • 802.11n - 802.11n is an addition to the 802.
  • 802.11u - 802.11u is an amendment to the IEEE 802.
  • 802.11x - 802.11x refers to a group of evolving wireless local area network (WLAN) standards that are under development as elements of the IEEE 802.
  • 802.15 - 802.15 is a communications specification that was approved in early 2002 by the Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) for wireless personal area networks (WPANs).
  • 99.999 (Five nines or Five 9s) - In computers, 99.
  • client side framework - There are two sides to web development – the server side and the client side.
  • cloud workload protection (cloud workload security) - Cloud workload protection is a process of safeguarding workloads spread out across multiple cloud environments.
  • CompTIA A+ practice test questions and answers - CompTIA's A+ is the most popular of all IT certification programs.
  • CompTIA ITF+ practice test questions and answers - CompTIA's IT Fundamentals+ certification demonstrates general knowledge of computer components, operating systems and networks.
  • credential theft - Credential theft is a type of cybercrime that involves stealing the proof of identity of the victim, which can be either an individual or a business.
  • customer insight (consumer insight) - Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and feedback into conclusions that can be used to improve product development and customer support.
  • Human Resource Certification Institute (HRCI) - HRCI (Human Resource Certification Institute) is a U.
  • Microsoft Technology Associate (MTA) certification - Microsoft Technology Associate (MTA) certification is the name of a suite of entry-level certifications offered by Microsoft that signify fundamental technology knowledge in those who earn it.
  • software bill of materials (SBOM) - A software bill of materials (SBOM) is an inventory of all constituent components and software dependencies involved in the development and delivery of an application.
  • streaming network telemetry - Streaming network telemetry is a real-time data collection service in which network devices such as routers, switches and firewalls continuously push network health data and interface measurements to a centralized collector.
  • subscription management - Subscription management is the process of overseeing and controlling all aspects of products and services sold repeatedly through a weekly, monthly, quarterly or yearly subscription-based pricing model.
  • The origins of Agile software development - The small team models within the Scrum Framework are scalable, but large organizations often require additional help to manage dependencies and communication.
  • What is 5G? - Fifth-generation wireless (5G) is the latest iteration of cellular technology.
  • What is 6G? Overview of 6G networks & technology - 6G (sixth-generation wireless) is the successor to 5G cellular technology.
  • workflow management - Workflow management is the discipline of creating, documenting, monitoring and improving upon the series of steps, or workflow, that is required to complete a specific task.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close