Browse Definitions :

Browse Definitions by Alphabet

OS - WHA

  • OS X - OS X is version 10 of the Apple Macintosh operating system.
  • Osborne Effect - The Osborne Effect is a reduction in sales of current products after the announcement of a future product.
  • oscillation - Oscillation, in general, is a periodic fluctuation between two things; in the broadest sense, oscillation can occur in anything from a person's decision-making process to tides and the pendulum of a clock.
  • oscillator - An oscillator is a mechanical or electronic device that works on the principles of oscillation: a periodic fluctuation between two things based on changes in energy.
  • oscilloscope - An oscilloscope is a laboratory instrument commonly used to display and analyze the waveform of electronic signals.
  • OSGi (Open Service Gateway Initiative) - The OSGi (Open Service Gateway Initiative) specification is a Java framework for developing and deploying modular software programs and libraries.
  • OSI model (Open Systems Interconnection) - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • OSPF (Open Shortest Path First) - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • OST file (.ost) - An OST file is an offline folder file in Microsoft Outlook.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • OUCH protocol - OUCH is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Oura ring - Oura ring is a wearable device made to measure the quality of the wearer’s sleep.
  • out of the box - "Out of the box" is an expression that describes nonconformal, creative thinking.
  • out-of-band authentication - Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • out-of-order execution (OoOE) - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • outbound call - An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.
  • outbound call center - An outbound call center is one in which call center agents make outbound calls to customers on behalf of a business or client.
  • outbound marketing - Outbound marketing is a traditional form of marketing and in which a company initiates contact with potential customers, or leads.
  • outcome economy - Outcome economy describes an economy based on the marketing, pricing and selling of the results provided by goods and services rather than their face value.
  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • outsourcing - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • over-the-top (OTT) - Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.
  • overall equipment effectiveness (OEE) - Overall equipment effectiveness is a measure of manufacturing operations performance and productivity, expressed in a percentage.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overfitting - Overfitting is the incorrect optimizing of an artificial intelligence (AI) model, where the seeking of accuracy goes too far and may result in false positives.
  • overhead - In business accounting, overhead is general operating expenses, including such items as heat and electricity for the premises, that have no direct relationship to the production or selling of a company's goods and services.
  • overlay network - An overlay network is a virtual or logical network that is created on top of an existing physical network.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a solid-state drive.
  • oversubscription - Oversubscription in a storage area network (SAN) is the practice of committing more network bandwidth to devices connected to that network than what is physically available.
  • oVirt - OVirt is an open source data center virtualization platform developed and promoted by Red Hat.
  • OVSDB (Open vSwitch Database Management Protocol) - The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • owned media/earned media/paid media - Owned, earned and paid media are three different types of advertising content used by digital marketing teams to create a complete and effective marketing strategy.
  • What is observability? - Observability is a management strategy focused on keeping the most relevant, important and core issues at or near the top of an operations process flow.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close