Browse Definitions :

Browse Definitions by Alphabet

VMW - WHA

  • VMware vShield - VMware vShield is a group of networking and security products for virtualized IT infrastructures, comprising vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint.
  • VMware vSphere - VMware vSphere -- formerly known as VMware Infrastructure -- is the brand name for VMware's suite of server virtualization products that includes its ESXi hypervisor and vCenter management software.
  • VMware vSphere App HA - VMware vSphere App HA is virtual appliance introduced with vSphere 5.
  • VMware vSphere Big Data Extensions (BDE) - VMware vSphere Big Data Extensions (BDE) is a virtual appliance that enables administrators to deploy and manage the Hadoop clusters for big data analytics in the vSphere virtual infrastructure.
  • VMware vSphere Client - The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.
  • VMware vSphere Content Library - The vSphere Content Library is a centralized repository in vSphere 6 to help manage and distribute virtual machines, templates, ISO images, scripts, vApps and other files related to virtual machines.
  • VMware vSphere Data Protection Advanced (VMware VDPA) - VMware vSphere Data Protection Advanced (VMware VDPA) is a backup management, recovery and replication utility for virtual machines and applications that is based on EMC Avamar deduplication technology.
  • VMware vSphere Distributed Switch (VMware vDS) - A VMware vSphere Distributed Switch (VMware vDS) allows a single virtual switch to connect multiple hosts in a cluster or multiple clusters for centralized management of network configurations in a vSphere environment.
  • VMware vSphere Hypervisor - The VMware vSphere Hypervisor is a free, bare-metal hypervisor from VMware that allows users to virtualize their servers and consolidate applications.
  • VMware vSphere Integrated Containers (VIC) - VMware vSphere Integrated Containers allow an administrator to deploy and manage containers alongside their traditional VMs in vSphere.
  • VMware vSphere Network I/O Control (NIOC) - VMware vSphere Network I/O Control (NIOC) allows administrator to set up rules and policies to prioritize bandwidth for different network resource pools on a vSphere distributed switch.
  • VMware vSphere PowerCLI - VMware vSphere PowerCLI is a command-line interface (CLI) tool for automating vSphere and vCloud management.
  • VMware vSphere Security Hardening Guide - The VMware vSphere Security Hardening Guide is an Excel document provided by VMware that lists more than 150 recommendations to systems administrators to further secure their vSphere environment.
  • VMware vSphere Site Recovery Manager (SRM) - VMware vSphere Site Recovery Manager (SRM) is a disaster recovery management product from VMware that provides automated failover and disaster recovery testing.
  • VMware vSphere Storage Appliance (VSA) - VMware vSphere Storage Appliance (VSA) is software developed by VMware that pools disk space from ESXi hosts to provide high availability features without requiring additional storage hardware.
  • VMware vSphere Update Manager (VUM) - VMware vSphere Update Manager (VUM) is software that manages vSphere versions, installs and updates third-party ESX/ESXi host extensions, automates the patch and upgrade process on ESX/ESXi hosts, and performs upgrades to virtual appliances, VMware Tools and virtual machine hardware.
  • VMware vSphere Web Client plug-in - VMware vSphere Web Client plug-ins are programs that either come from VMware itself or from third-party developers and partners to extend the vSphere Web Client with custom menu selections and toolbar icons that provide access to custom capabilities and external functionality.
  • VMware vStorage Thin Provisioning - VMware vStorage Thin Provisioning increases virtual machine (VM) storage use through dynamic allocation and intelligent provisioning of physical storage capacity.
  • VMware Workspace ONE - VMware Workspace ONE is a management platform that allows IT administrators to centrally control end users' mobile devices and cloud-hosted virtual desktops and applications from the cloud or from an on-premises deployment.
  • VMware Workstation Pro - VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.
  • VMworld - VMworld is a conference covering virtualization and cloud computing technologies from VMware Inc and its partners and third-party vendors.
  • VMXNET Generation 3 (VMXNET3) - VMXNET Generation 3 (VMXNET3) is a virtual network adapter designed to deliver high performance in virtual machines (VMs) running on the VMware vSphere platform.
  • vNUMA (virtual NUMA) - vNUMA (virtual NUMA) is a memory-access optimization method for VMware virtual machines (VMs) that helps prevent memory-bandwidth bottlenecks.
  • vocoder - A vocoder is an audio processor that captures the characteristic elements of an an audio signal and then uses this characteristic signal to affect other audio signals.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice control (voice assistance) - Voice control, also called voice assistance, is a user interface that allows hands-free operation of a digital device.
  • voice design - Voice design is the process of planning and mapping all the possible interactions that might occur between a voice assistant and an end user.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice of the customer (VOC) - Voice of the customer (VOC) is the component of customer experience that focuses on customer needs, wants, expectations and preferences.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice SEO - Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.
  • voice signature - A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP (voice over Internet Protocol) - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP caller ID (voice over Internet Protocol caller identification) - VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is a type of memory that maintains its data only while the device is powered.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt per meter (V/m) - Volt per meter is the standard unit of electric field (E field) strength.
  • volt-ampere (VA) - A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • VoltDB - VoltDB is an in-memory database.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VPD (vital product data) - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPN (virtual private network) - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VPN appliance - A VPN (virtual private network) appliance is a network device equipped with enhanced security features.
  • VPN Reconnect - VPN Reconnect is a feature of Windows 7 and Windows Server 2008 R2 that allows a virtual private network (VPN) connection to remain open during a brief interruption of Internet service.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VRML (Virtual Reality Modeling Language) - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VSAM (Virtual Storage Access Method) - VSAM (Virtual Storage Access Method) is a file management system for IBM's larger operating systems now called z/OS.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSPEX - VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • vSphere CLI (vCLI) - VMware's vSphere CLI (vCLI) commands are used in a command line interface (CLI) when managing VMware ESX/ESXi infrastructures.
  • vSphere HA (VMware High Availability) - VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.
  • vSphere hot add - VMware vSphere hot add is a feature that allows an administrator to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime.
  • vSphere hot plug - vSphere hot plug is a function lets administrators add additional virtual hardware to running virtual machines (VMs).
  • vSphere Replication - VSphere Replication is a feature of vSphere 5.
  • VSTO (Visual Studio Tools for Office or Microsoft Visual Studio Tools) - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • vStorage API - A vStorage API is an application program interface (API) from VMware that enables third-party storage and backup vendors to integrate their products with VMware’s vSphere server virtualization platform.
  • vStorage APIs for Array Integration (VAAI) - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Storage Awareness (VASA) - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • vTax - VTax is the derogatory nickname the general public gave to a licensing change for VMware vSphere 5.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • vulnerability (information technology) - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability assessment (vulnerability analysis) - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability disclosure - Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware.
  • vulnerability management planning - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors.
  • VVOLS (Virtual Volumes) - VVOLs is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and managed.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • VXLAN gateway (Virtual Extensible VLAN gateway) - A VXLAN gateway is a solution that allows a virtual extensible LAN (VXLAN) to communicate with another network, particularly a virtual LAN (VLAN).
  • What is virtual desktop infrastructure? VDI explained - Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close