Browse Definitions :

Browse Definitions by Alphabet

VOL - WHA

  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is a type of memory that maintains its data only while the device is powered.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt per meter (V/m) - Volt per meter is the standard unit of electric field (E field) strength.
  • volt-ampere (VA) - A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VPN (virtual private network) - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VSAM (Virtual Storage Access Method) - VSAM (Virtual Storage Access Method) is a file management system for IBM's larger operating systems now called z/OS.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSPEX - VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • vSphere HA (VMware High Availability) - VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.
  • vStorage APIs for Storage Awareness (VASA) - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • vulnerability (information technology) - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability assessment (vulnerability analysis) - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability disclosure - Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • What is virtual desktop infrastructure? VDI explained - Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close