Browse Definitions :

Browse Definitions by Alphabet

FIR - FUN

  • firewall - A firewall is software or firmware that prevents unauthorized access to a network.
  • firewall as a service (FWaaS) - Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic inspection capabilities to customers seeking to decommission or augment their existing network firewall appliances.
  • firmographic data - Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on.
  • firmware - Firmware is programming that's written to a hardware device's non-volatile memory.
  • first call resolution (FCR) - First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.
  • first follower theory - First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general population.
  • first-order logic - First-order logic (FOL) refers to logic in which the predicate of a sentence or statement can only refer to a single subject.
  • first-person view (FPV) - First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.
  • fiscal quarter - A fiscal quarter is one of the four three-month periods that make up an organization’s fiscal year.
  • fiscal year - A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.
  • fishbone diagram (Ishikawa cause and effect) - A fishbone diagram is a visualization tool for categorizing the potential root causes of a problem.
  • fist to five (fist of five) - Fist to five, or fist of five, is a consensus-building technique used by Agile software development teams to poll team members and come to an agreement.
  • Five Eyes Alliance - The Five Eyes Alliance (abbreviated as FVEY in government documents) is a cooperative intelligence network that monitors the electronic communications of citizens and foreign governments.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed price - A fixed price is a non-negotiable sum charged for a product, service or piece of work.
  • fixed wireless - Fixed wireless networking refers to the operation of wireless devices in fixed locations such as homes and offices.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • fixed-mobile convergence (FMC) - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flaky test - A flaky test is a quality assurance (QA) test that fails to produces consistent results.
  • FLAPE - FLAPE (flash plus tape) is an approach to tiered storage that allows administrators to archive data as soon as it is written.
  • flash controller (flash memory controller) - A flash controller is the part of solid-state flash memory that communicates with the host device and manages the flash file system directory.
  • Flash cookie - Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.
  • flash file system - Flash file systems are designed specifically for memory devices.
  • flash memory - Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.
  • flash memory card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • flash solid-state drive (SSD) - A flash solid-state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.
  • flat file - A flat file is a collection of data stored in a two-dimensional database in which similar yet discrete strings of information are stored as records in a table.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • fleet management - Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations.
  • float (project float, slack) - In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project.
  • floating gate transistor (FGT) - A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.
  • flooding (network) - In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.
  • FLOPS (floating-point operations per second) - In computers, FLOPS are floating-point operations per second.
  • flow (psychology) - Flow, in the context of psychology, is a state of intense engagement, focus and contentment in the present moment and current activity.
  • flow control - Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace.
  • flow routing - Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.
  • flowchart - A flowchart is a formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
  • flux - In physics, flux is a measure of the number of electric or magnetic field lines passing through a surface in a given amount time.
  • FMEA (Failure Mode and Effects Analysis) - FMEA (failure mode and effects analysis) is a step-by-step approach for collecting knowledge about possible points of failure in a design, manufacturing process, product or service.
  • FOMO (fear of missing out) - The fear of missing out (FOMO) is an emotional response to the belief that other people are living better, more satisfying lives or that important opportunities are being missed.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • foo (in software programming) - Foo (pronounced FOO) is a term used by programmers as a placeholder for a value that can change depending on conditions or on information passed to the program.
  • foot cubed (cubic foot) - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
  • foot per second (ft/s or ft/sec) - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • foot-pound-second system of units (fps system of units) - The foot-pound-second (fps) system of units is a scheme for measuring dimensional and material quantities.
  • footprinting - Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • Force.com - Force.com is a Platform as a Service (PaaS) product designed to simplify the development and deployment of cloud-based applications and websites.
  • foreign key - A foreign key is a column or columns of data in one table that refers to the unique data values -- often the primary key data -- in another table.
  • forensic image - A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.
  • forking (software fork) - Forking is to take the source code from an open source software program and develop an entirely new program.
  • form factor - In computers, the form factor is the size, configuration, or physical arrangement of a computing device.
  • FORTRAN (FORmula TRANslation) - FORTRAN (FORmula TRANslation) is a third-generation (3GL) programming language that was designed for use by engineers, mathematicians, and other users and creators of scientific algorithms.
  • Fortune 500 - The Fortune 500 is Fortune Magazine's annual ranking of the United States' 500 largest corporations.
  • forward chaining - Forward chaining is the logical process of inferring unknown truths from known data and moving forward using determined conditions and rules to find a solution.
  • forward error correction (FEC) - Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • four eyes principle - The four eyes principle is a requirement that two individuals review and approve some action before it can be taken.
  • four-factor authentication (4FA) - Four-factor authentication (4FA) is the use of four types of identity-confirming credentials, typically categorized as knowledge, possession, inherence and location factors.
  • Fourth Industrial Revolution - The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way modern people live and work.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • fractal - Fractals are non-regular geometric shapes that have the same degree of non-regularity on all scales.
  • fractional CIO - A fractional CIO is a high-level consultant who specializes in aligning information technology (IT) with business goals.
  • frame relay - Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • framing effect - Framing effect is a form of cognitive bias which causes people to focus more on the positive or negative aspects of a decision, situation or information based on the way it is presented.
  • fraud detection - Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.
  • free cooling - Free cooling is an approach to lowering the air temperature in a building or data center by using naturally cool air or water instead of mechanical refrigeration.
  • free-space optics (FSO) - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • freemium - Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features.
  • FreeNAS Project - The FreeNAS storage operating system is compatible with most major protocols and storage hardware and provides file sharing in a NAS environment.
  • freeware - Freeware (not to be confused with free software) is a type of proprietary software that is released without charge to the public.
  • frequency - For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction.
  • frequency jammer - Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
  • frequency-division multiplexing (FDM) - In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.
  • frequency-hopping spread spectrum (FHSS) - Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.
  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
  • friendly name - A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the fiber-based connection of the cloud radio access network (C-RAN), a new type of cellular network architecture of centralized baseband units (BBUs) and remote radio heads (RRHs) at the access layer of the network.
  • FTC (Federal Trade Commission) - The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fudge factor - A fudge factor is an element inserted into a calculation, formula or model to allow for error or uncertainty.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • Fujitsu Ltd. - Fujitsu Ltd.
  • Fulfillment by Amazon (FBA) - Fulfillment by Amazon (FBA) is an advanced service in which third-party vendors store their products in Amazon’s fulfillment centers and the e-commerce giant picks, sorts, packs, ships, keeps records, and handles returns and refunds for these products.
  • fulfillment center - A fulfillment center is a warehouse where incoming orders are received, processed and filled.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • full-disk encryption (FDE) - Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • fully qualified domain name (FQDN) - A fully qualified domain name (FQDN) is the complete address of an internet host or computer.
  • function as a service (FaaS) - Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • functional specification - A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.
Networking
  • packet filtering

    Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and ...

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local ...

  • network protocol

    A network protocol is a set of established rules that specify how to format, send and receive data so that computer network ...

Security
  • FIDO (Fast Identity Online)

    FIDO (Fast Identity Online) is a set of technology-agnostic security specifications for strong authentication.

  • Cloud Security Alliance (CSA)

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by ...

CIO
  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

  • lean management

    Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term ...

  • device ID (device identification)

    A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such ...

HRSoftware
  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • passive candidate

    A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.

Customer Experience
  • product-qualified lead (PQL)

    A product-qualified lead (PQL) is an individual or business that experienced value from using a product as a result of a free ...

  • marketing-qualified lead (MQL)

    A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate they are likely to become a customer.

  • customer success

    Customer success is a strategy to ensure a company's products are meeting the needs of the customer.

Close