Browse Definitions :

Browse Definitions by Alphabet

OSC - WHA

  • oscilloscope - An oscilloscope is a laboratory instrument commonly used to display and analyze the waveform of electronic signals.
  • OSGi (Open Service Gateway Initiative) - The OSGi (Open Service Gateway Initiative) specification is a Java framework for developing and deploying modular software programs and libraries.
  • OSI model (Open Systems Interconnection) - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • OSPF (Open Shortest Path First) - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • OST file (.ost) - An OST file is an offline folder file in Microsoft Outlook.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • OUCH protocol - OUCH is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Our Favorite Technology Quotations - These are some of our favorite quotations about computers, the Internet, and technology in general.
  • Oura ring - Oura ring is a wearable device made to measure the quality of the wearer’s sleep.
  • out of the box - "Out of the box" is an expression that describes nonconformal, creative thinking.
  • out-of-band authentication - Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • out-of-order execution (OoOE) - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • outbound call - An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.
  • outbound call center - An outbound call center is one in which call center agents make outbound calls to customers on behalf of a business or client.
  • outbound marketing - Outbound marketing is a traditional form of marketing and in which a company initiates contact with potential customers, or leads.
  • outcome economy - Outcome economy describes an economy based on the marketing, pricing and selling of the results provided by goods and services rather than their face value.
  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • outsourcing - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • over-the-top (OTT) - Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.
  • overall equipment effectiveness (OEE) - Overall equipment effectiveness is a measure of manufacturing operations performance and productivity, expressed in a percentage.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overfitting - Overfitting is the incorrect optimizing of an artificial intelligence (AI) model, where the seeking of accuracy goes too far and may result in false positives.
  • overhead - In business accounting, overhead is general operating expenses, including such items as heat and electricity for the premises, that have no direct relationship to the production or selling of a company's goods and services.
  • overlay network - An overlay network is a virtual or logical network that is created on top of an existing physical network.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a solid-state drive.
  • oversubscription - Oversubscription in a storage area network (SAN) is the practice of committing more network bandwidth to devices connected to that network than what is physically available.
  • oVirt - OVirt is an open source data center virtualization platform developed and promoted by Red Hat.
  • OVSDB (Open vSwitch Database Management Protocol) - The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • owned media/earned media/paid media - Owned, earned and paid media are three different types of advertising content used by digital marketing teams to create a complete and effective marketing strategy.
  • What is observability? A beginner's guide - Observability is a management strategy focused on keeping the most relevant, important and core issues at or near the top of an operations process flow.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close