Browse Definitions :

Browse Definitions by Alphabet

K-1 - UNF

  • K-12 - K-12, a term used in education and educational technology in the United States, Canada, and possibly other countries, is a short form for the publicly-supported school grades prior to college.
  • Kaizen (continuous improvement) - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.
  • kanban - Kanban is a visual system used to manage and keep track of work as it moves through a process.
  • Kano Model - The Kano Model is a product development theory which is centered on customer satisfaction.
  • Kapow - Kapow is a company that provides an API (application program interface) called Katalyst to migrate digital content in the cloud between diverse applications or databases.
  • Kari's law - Kari's law is legislation in the United States that requires multi-line telephone systems (MLTS) to route 9-1-1 emergency service calls through the phone system automatically.
  • Karnaugh map (K-map) - A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions without having to use Boolean algebra theorems and equation manipulations.
  • Kaspersky Lab - Kaspersky Lab is a security software and services company with a presence in 200 countries and territories around the world.
  • Kbps (kilobits per second) - In the U.S.
  • Kebab case - Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.
  • keiretsu - Keiretsu is a business network composed of manufacturers, supply chain partners, distributors and financiers who remain financially independent but work closely together to ensure each other's success.
  • keiretsu - In corporate culture, keiretsu refers to a uniquely Japanese form of corporate organization.
  • keitai - Keitai (pronounced k-tie) is a Japanese word meaning "portable.
  • kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • Kerberos - Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet.
  • Kerckhoff's principle - Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.
  • kernel - The kernel is the essential center of a computer operating system (OS).
  • kernel panic - A kernel panic refers to a computer error from which the system's operating system (OS) cannot quickly or easily recover.
  • kernel virtualization - Kernel virtualization is any one of a number of methods in which an operating system (OS) kernel is adapted to support different users running applications simultaneously on a single machine.
  • Kessler Syndrome - The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.
  • key fob - A key fob is a small, programmable device that provides access to a physical object.
  • key performance indicators (KPIs) - Key performance indicators (KPIs) are business metrics used by corporate executives and other managers to track and analyze factors deemed crucial to the success of an organization.
  • key results indicator (KRI) - A key result indicator (KRI) is a metric that measures the quantitative results of business actions to help companies track progress and reach organizational goals.
  • key risk indicator (KRI) - A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be successful.
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • keyboard - On most computers, a keyboard is the primary text input device.
  • keyboard wedge (KBW) - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
  • Keyhole Markup Language (KML) - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
  • keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer.
  • keystone jack - A keystone jack is a female connector used in data communications, particularly local area networks (LANs).
  • keystroke dynamics - Keystroke dynamics are the patterns of rhythm and timing created when a person types.
  • keyword stuffing - Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results.
  • Khan Academy - The Khan Academy is a non-profit educational organization that provides free video tutorials and interactive exercises.
  • kHz (kilohertz) - The kilohertz, abbreviated kHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one thousand hertz (1,000 Hz).
  • Kibana - Kibana is an open source data visualization and exploration platform from Elastic that is specialized for large volumes of streaming and real-time data.
  • kibi, mebi, gibi, tebi, pebi and exbi - Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC).
  • kill switch - A kill switch in an IT context is a mechanism used to shut down or disable a device or program.
  • killer app - A "killer app" is jargon in the computer industry for an application program that intentionally or unintentionally gets you to make the decision to buy the system the application runs on.
  • Kilo, mega, giga, tera, peta, exa, zetta and all that - Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.
  • kilobit - In data communications, a kilobit is a thousand (103) bits.
  • kilobyte (KB or Kbyte) - A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science professionals, along with the general public, when referring to amounts of computer data using the metric system.
  • kilogram (kg) - The kilogram (abbreviation, kg) is the Standard International (SI) System of Units unit of mass.
  • kilogram-meter per second - The kilogram-meter per second is the standard unit of momentum.
  • kilowatt-hour (kWh) - The kilowatt-hour (symbolized kWh) is a unit of energy equivalent to one kilowatt (1 kW) of power expended for one hour (1 h) of time.
  • Kindle Fire - Kindle Fire is a low-priced tablet computer from Amazon.
  • Kinect - Kinect is Microsoft’s motion gaming system for the Xbox 360.
  • kinematics - Kinematics is the study of the motion of mechanical points, bodies and systems without consideration of their associated physical properties and the forces acting on them.
  • kinetic energy - Kinetic energy is the energy of motion, observable as the movement of an object, particle, or set of particles.
  • kiosk - A kiosk (pronounced KEE-ahsk ) is a small, free-standing physical structure that displays information or provides a service.
  • kiosk mode (Windows assigned access) - Kiosk mode is specialized function that allows Microsoft Windows to provide a single application for users signing on as guests or generic authorized users while preventing access to other files, data and functionality of the operating system and computer.
  • Klez - Klez (pronounced KLEHZ) is an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients.
  • KLOC (thousands of lines of code) - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • Klout score - A Klout score is a measure of a social influence that aggregates one's reach on various social media platforms.
  • kludge - In information technology, a kludge (pronounced KLOOdzh) is an awkward or clumsy (but at least temporarily effective) solution to a programming or hardware design or implementation problem.
  • Knative - Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the cloud, on premises or in a third-party data center.
  • knowledge - In information technology, knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it.
  • knowledge base - In general, a knowledge base is a centralized repository for information: a public library, a database of related information about a particular subject, and whatis.
  • knowledge engineering - Knowledge engineering is a field of artificial intelligence (AI) that tries to emulate the judgment and behavior of a human expert in a given field.
  • knowledge factor - The knowledge factor, in a security context, is a category of authentication credentials consisting of information that the user possesses, such as a personal identification number (PIN), a user name, a password or the answer to a secret question.
  • knowledge management (KM) - Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • knowledge worker - A knowledge worker is anyone who works for a living at the tasks of developing or using knowledge.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • knowledge-based systems (KBS) - A knowledge-based system (KBS) is a form of artificial intelligence (AI) that aims to capture the knowledge of human experts to support decision-making.
  • known known - A known known is information that is fully studied and well understood, so that an individual or organization can have confidence in its comprehension and relevance.
  • known unknown - A known unknown is information whose existence you are aware of but that is not in your possession.
  • Kong - Kong is an open source API gateway and platform that acts as middleware between compute clients and the API-centric applications.
  • Kony - Kony is a company that provides enterprise mobility products and services, including a mobile application development platform (MADP) and mobile backend as a service.
  • Kool-Aid point - The Kool-Aid point is a threshold of fame or success that, when reached, will cause a negative backlash simply because the individual in question is famous or successful.
  • Korn shell - The Korn shell is the UNIX shell (command execution program, often called a command interpreter) that was developed by David Korn of Bell Labs as a comprehensive combined version of other major UNIX shells.
  • Kotlin - Kotlin is a static type, object-oriented programing (OOP) language that is interoperable with the Java virtual machine, Java libraries and Android.
  • Kraken - Kraken is the name given to a family of malware that's currently being used to create what the security firm Damballa has called "the world's largest botnet.
  • Kronos Inc. - Kronos Inc. is a provider of workforce management software and associated services headquartered in Chelmsford, Mass.
  • Kryder's Law - Kryder's Law describes the rate at which former Seagate CTO Mark Kryder predicted disk drive density would grow.
  • Kubernetes - Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.
  • Kubernetes Node - A Kubernetes Node is a logical collection of IT resources that supports one or more containers.
  • Kubernetes Operators - A Kubernetes Operator is a method for application deployment that extends the capabilities of Kubernetes to manage more complex, stateful workloads.
  • Kubernetes Pod - Kubernetes Pods are the smallest deployable computing units in the open source Kubernetes container scheduling and orchestration environment.
  • Kubernetes scheduler - Kubernetes scheduler is a part of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.
  • Kubernetes volume - A Kubernetes volume is a directory that contains data accessible to containers in a given Pod in the orchestration and scheduling platform.
  • KVM hypervisor - KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM).
  • Kyoto cooling (Kyoto wheel) - KyotoCooling is an energy-efficient free cooling system for data centers.
  • Kyoto Protocol - The Kyoto Protocol, also known as the Kyoto Accord, is an international treaty among industrialized nations that sets mandatory limits on greenhouse gas emissions.
  • Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model) - Unfreeze, Change, Refreeze, also known as the Kurt Lewin Change Management Model, is a method for managing change within an organization.
SearchNetworking
SearchSecurity
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

  • SYN flood attack

    A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.

SearchCIO
  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

  • business transformation

    Business transformation is a term used to describe what happens when a company makes fundamental changes to how it operates.

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close