Browse Definitions :

Browse Definitions by Alphabet

FIX - FRE

  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • fixed-mobile convergence (FMC) - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flag - In programming, a flag is a predefined bitor bit sequence that holds a binary value.
  • flaky test - A flaky test is a quality assurance (QA) test that fails to produces consistent results.
  • flamebait - On the Internet, flamebait is a "posting" or note on a Web site discussion forum, an online bulletin board, a Usenet newsgroup, or other public forum that is intended to elicit the extremely strong responses characteristic of flaming and active public discussions.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • FLAPE - FLAPE (flash plus tape) is an approach to tiered storage that allows administrators to archive data as soon as it is written.
  • Flash - Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection.
  • flash controller (flash memory controller) - A flash controller is the part of solid-state flash memory that communicates with the host device and manages the flash file system directory.
  • Flash cookie - Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.
  • flash file system - Flash file systems are designed specifically for memory devices.
  • flash memory - Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.
  • flash memory card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • flash solid-state drive (SSD) - A flash solid-state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.
  • FlashMob supercomputer - A FlashMob supercomputer is a group of computer enthusiasts who gather together in one physical location for a brief time period in order to function as a supercomputer and work on a single problem.
  • flat address space - 1. A flat address space is a set of addresses arranged on a single level.
  • flat backup - Flat backup uses snapshots to protect data without traditional backup software.
  • flat file - A flat file is a collection of data stored in a two-dimensional database in which similar yet discrete strings of information are stored as records in a table.
  • flat file system - A flat file system is a system of files in which every file in the system must have a different name.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • fleet management - Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations.
  • fleet management software - Fleet management software is an application that helps companies organize, manage and coordinate work vehicles from a central information system to keep the overall fleet operation running smoothly.
  • Flex - Flex is an open source program designed to automatically and quickly generate scanners, also known as tokenizers, which recognize lexical patterns in text.
  • flexible display - A flexible display or foldable tech/smartphone is a visual output surface on a device that is designed to be folded or closed like a book or a device which incorporates such a screen.
  • flexible workforce - A flexible workforce is one that grows in number to meet needs at any given time and falls back to a baseline number when the increased size is no longer necessary.
  • flip flops (bistable gates) - Flip-flops, also called bistable gates, are digital logic circuits that can be in one of two states.
  • float (project float, slack) - In project management, float or slack is the time span between the completion of the last task on the critical path and the finish date for the project.
  • floating gate transistor (FGT) - A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.
  • flooding (network) - In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.
  • FLOPS (floating-point operations per second) - In computers, FLOPS are floating-point operations per second.
  • flow (psychology) - Flow, in the context of psychology, is a state of intense engagement, focus and contentment in the present moment and current activity.
  • flow control - Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace.
  • flow routing - Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.
  • flowchart - A flowchart is a formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
  • FlowVisor - FlowVisor is an experimental software-defined networking controller that enables network virtualization by slicing a physical network into multiple logical networks.
  • flux - Flux is the presence of a force field in a specified physical medium, or the flow of energy through a surface.
  • FLV file format - FLV is a file format used by Adobe Flash Player and Adobe AIR for storing and delivering synchronized audio and video streams.
  • FMEA (failure mode and effective analysis) - FMEA (failure mode and effective analysis) is a step-by-step approach for collecting knowledge about possible points of failure in a design, manufacturing process, product or service.
  • folder - In the Windows, Macintosh, and some other operating system s, a folder is a named collection of related files that can be retrieved, moved, and otherwise manipulated as one entity.
  • FOMO (fear of missing out) - The fear of missing out (FOMO) is an emotional response to the belief that other people are living better, more satisfying lives or that important opportunities are being missed.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • font psychology - Font psychology is the deliberate use of particular styles and sizes of characters to produce a desired effect in the viewer.
  • foo (in software programming) - Foo (pronounced FOO) is a term used by programmers as a placeholder for a value that can change depending on conditions or on information passed to the program.
  • Foo Camp - Foo Camp was a gathering of about 200 computer and Internet thinkers and inventors who were invited by publisher O'Reilly and Associates to spend a week-end brainstorming, collaborating, and otherwise advancing progress in information technology.
  • foot cubed (cubic foot) - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
  • foot per second (ft/s or ft/sec) - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • foot squared (square foot) - The foot squared, also called the square foot, is the standard unit of area in the English foot-pound-second (fps) system.
  • foot-pound-second system of units (fps system of units) - The foot-pound-second (fps) system of units is a scheme for measuring dimensional and material quantities.
  • footprint - In information technology, a footprint is the amount of space a particular unit of hardware or software occupies.
  • footprinting - Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them.
  • for your information (FYI) - This term is included in our list of chat term and other chat acronyms.
  • Force.com - Force.com is a Platform as a Service (PaaS) product designed to simplify the development and deployment of cloud-based applications and websites.
  • foreign key - A foreign key is a column or columns of data in one table that connects to the primary key data in the original table.
  • foreign qualification - Foreign qualification is the process that a corporation or limited liability corportation (LLC) in the United States follows to carry out business legally in a state other than the one where the corporation was incorporated.
  • forensic image - A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.
  • forensic watermark (digital watermark) - A forensic watermark, also called a digital watermark, is a sequence of characters or code embedded in a digital document, image, video or computer program to uniquely identify its originator and authorized user.
  • forking (software fork) - Forking is to take the source code from an open source software program and develop an entirely new program.
  • form factor - In computers, the form factor is the size, configuration, or physical arrangement of a computing device.
  • formal methods - Formal methods are the use of a specific mathematical technique for the specification, development and verification of systems in both software and electronic hardware.
  • format - A format (noun, pronounced FOHR-mat ) is a preestablished layout for data.
  • format war - A format war is a competition for market dominance -- and often survival -- between two or more producers of a particular type of product.
  • formulary - A formulary is a list of prescription drugs that are covered by a specific health care plan.
  • FORTRAN (FORmula TRANslation) - FORTRAN (FORmula TRANslation) is a third-generation (3GL) programming language that was designed for use by engineers, mathematicians, and other users and creators of scientific algorithms.
  • Fortune 500 - The Fortune 500 is Fortune Magazine's annual ranking of the United States' 500 largest corporations.
  • forward chaining - Forward chaining is the logical process of inferring unknown truths from known data and moving forward using determined conditions and rules to find a solution.
  • Forward DNS lookup - Forward DNS lookup is using an Internet domain name to find an IP address.
  • forward error correction (FEC) - Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • four eyes principle - The four eyes principle is a requirement that two individuals review and approve some action before it can be taken.
  • four-factor authentication (4FA) - Four-factor authentication (4FA) is the use of four types of identity-confirming credentials, typically categorized as knowledge, possession, inherence and location factors.
  • Fourier analysis - Fourier analysis is a method of defining periodic waveforms in terms of trigonometric function s.
  • Fourier synthesis - Fourier synthesis is a method of electronically constructing a signal with a specific, desired periodic waveform.
  • Fourth Industrial Revolution - The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way modern people live and work.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • foxed - A fan club Web site can be said to have been "foxed" when it has received a letter of warning about copyright violations from the owners of images or other copyrighted material it is using.
  • FPCA (Foreign Corrupt Practices Act) - The Foreign Corrupt Practices Act (FCPA) is a federal U.
  • FpML (Financial Products Markup Language) - Financial Products Markup Language (FpML) is a business information exchange standard based on Extensible Markup Language (XML) that enables business-to-business over-the-counter (OTC) financial derivative transactions using the Internet.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • fractal - Fractals are non-regular geometric shapes that have the same degree of non-regularity on all scales.
  • fractional CIO - A fractional CIO is a high-level consultant who specializes in aligning information technology (IT) with business goals.
  • fragmentation - In some operating system's file systems, a data file over a certain size is stored in several "chunks" or fragments rather than in a single contiguous sequence of bits in one place on the storage medium, a process that is called fragmentation.
  • frame - See frames for the use of multiple Web pages on a single display screen.
  • frame relay - Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
  • frames (web site) - In creating a Web site, frames is the use of multiple, independently controllable sections on a Web presentation.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • framing effect - Framing effect is a form of cognitive bias which causes people to focus more on the positive or negative aspects of a decision, situation or information based on the way it is presented.
  • fraud detection - Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.
  • Free and open source software (FOSS) or free/libre open source software (FLOSS) - Free and open source software (FOSS), also known as free/libre open source software (FLOSS) and free/open source software (F/OSS), is software developed by informal collaborative networks of programmers and end users.
  • free cooling - Free cooling is an approach to lowering the air temperature in a building or data center by using naturally cool air or water instead of mechanical refrigeration.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • Free Software Foundation (FSF) - The Free Software Foundation (FSF) was founded in 1983 along with its demonstration GNU project.
  • free-space optics (FSO) - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • freebooting - Freebooting is the unauthorized duplication of digital content, which is then republished and presented as original work.
  • freedom of expression - Freedom of expression is the right of individuals and organizations to exchange information without fear of repercussion or censorship.
  • freemail - Freemail is a service that provides free e-mail delivery to anyone in exchange for exposure to advertising on the site where you request your e-mail and, in some cases, for some personal information.
  • freemium - Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features.
  • FreeNAS Project - The FreeNAS storage operating system is compatible with most major protocols and storage hardware and provides file sharing in a NAS environment.
  • freeware - Freeware (not to be confused with free software) is programming that is offered at no cost and is a common class of small applications available for downloading and use in most operating systems.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close