Browse Definitions :

Browse Definitions by Alphabet

W3C - WIN

  • W3C (World Wide Web Consortium) - The W3C (World Wide Web Consortium) is an international organization that creates standards for the World Wide Web.
  • WAG (estimate) - A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.
  • Wake on LAN - Wake on LAN is a technology that allows a network professional to remotely power on a computer or to wake it up from sleep mode.
  • wake word - A wake word is a phrase spoken to the Amazon Echo hands-free speaker and virtual assistant that causes the device to "wake up" and process a user's request.
  • walking skeleton - A walking skeleton, in a software development context, is a minimal initial implementation of an application that includes and connects the major components of the system's architecture.
  • wall time (real-world time or wall-clock time) - Wall time, also called real-world time or wall-clock time, refers to elapsed time as determined by a chronometer such as a wristwatch or wall clock.
  • walled garden - On the internet, a walled garden is an environment that controls the user's access to network-based content and services.
  • wallet - A wallet is a small software program used for online purchase transactions.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).
  • WAN optimization (WAN acceleration) - WAN optimization -- also known as WAN acceleration -- is a collection of technologies and techniques used to improve the efficiency of data transfer across a wide area network (WAN) between organizations' centralized data centers and their remote locations.
  • WannaCry ransomware - The WannaCry ransomware is a worm that spreads by exploiting vulnerabilities in the Windows operating system.
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • Warehouse control system (WCS) - Warehouse control system (WCS) is a software application for orchestrating activity flow within a warehouses and distribution center.
  • warehouse management system (WMS) - A warehouse management system (WMS) consists of software and processes that allow organizations to control and administer warehouse operations from the time goods or materials enter a warehouse until they move out.
  • warm site - A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down.
  • warranty - Warranties provide customers with legally-ensured service replacement or correction of issues insofar as the warranty stipulates in its conditions, for the duration of its term.
  • Waste Electrical and Electronic Equipment Regulation (WEEE) - Waste Electrical and Electronic Equipment Regulation (WEEE) is a directive in the European Union that designates safe and responsible collection, recycling and recovery procedures for all types of electronic waste.
  • water cooling - Water cooling, also called liquid cooling, is a method used to lower the temperature of computer processor units (CPUs), and sometimes graphics processor units (GPUs).
  • waterfall model - The waterfall model is a linear, sequential approach to the software development lifecycle (SDLC) that is popular in software engineering and product development.
  • watering hole attack - A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
  • watt - The watt (abbreviated W) is the International System of Units' (SI) standard unit of power (energy per unit time), the equivalent of one jouleper second.
  • watt-hour (Wh) - The watt-hour, which is symbolized Wh, is a unit of energy equivalent to one watt of power expended for one hour of time.
  • wave number - The term wave number refers to the number of complete wave cycles of an electromagnetic field (EM field) that exist in one meter (1 m) of linear space.
  • waveform - A waveform is a representation of how alternating current (AC) varies with time.
  • waveguide - A waveguide is an electromagnetic feed line used in microwave communications, broadcasting, and radar installations.
  • wavelength - Wavelength is the distance between identical points (adjacent crests) in the adjacent cycles of a waveform signal propagated in space or along a wire.
  • wbadmin - Wbadmin is an elevated command prompt that allows administrators or backup operators to backup and restore an operating system (OS), volume, file, folder or application.
  • weak tie theory - Weak tie theory is the proposition that acquaintances are likely to be more influential than close friends, particularly in social networks.
  • weaponized information - Weaponized information is a message or content piece that is designed to affect the recipient's perception about something or someone in a way that is not warranted.
  • wear leveling - Wear leveling is a process that is designed to extend the life of solid-state storage devices.
  • wearable computer - A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
  • wearable technology - Wearable technology is any kind of electronic device designed to be worn on the user's body.
  • Web 2.0 - Web 2.0 are websites and applications that make use of user-generated content for end-users.
  • Web 3.0 (Web3) - Web 3.0 (Web3) is the third generation of the evolution of web technologies.
  • web analytics - Web analytics is the process of analyzing the behavior of visitors to a website.
  • Web application (Web app) - A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface.
  • web application development - Web app development is the creation of application programs that reside on remote servers and are delivered to the user’s device over the Internet.
  • Web application firewall (WAF) - A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a website or web application.
  • Web Application Proxy - Web Application Proxy is a service in Windows Server 2012 R2 that allows end users to access applications from outside the corporate network on any device.
  • Web bug (Web beacon) - A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior.
  • web content management system (WCMS) - A web content management system (WCMS) is a type of content management system (CMS) that provides an organization with a way to manage digital information on a website through creating and maintaining content without prior knowledge of web programming or markup languages.
  • web crawler - A web crawler, crawler or web spider, is a computer program that's used to search and automatically index website content and other information over the internet.
  • web development framework (WDF) - A web development framework is a set of resources and tools for software developers to build and manage web applications, web services and websites.
  • Web Proxy Autodiscovery (WPAD) - Web Proxy Autodiscovery (WPAD) is a proposed Internet protocol that allows a client, such as a Web browser or a streaming media application, to automatically locate and interface with cache services in a network so that information can be delivered more quickly to the user.
  • web server - A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web.
  • web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider's web server for use by a client or other web-based programs.
  • Web stack - A Web stack is the collection of software required for Web development.
  • Web texting - Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.
  • WebAuthn API - The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web applications authenticate users without storing their passwords on servers.
  • WebGL - WebGL is a graphics application programming interface (API) created for use in web applications.
  • webhook - A webhook is a software architecture approach that allows applications and services to submit a web-based notification to other applications whenever a specific event occurs.
  • weblog - A blog, short for weblog, is a frequently updated web page used for personal commentary or business content.
  • WebLogic - Oracle WebLogic Server is a leading e-commerce online transaction processing (OLTP) platform, developed to connect users in distributed computing production environments and to facilitate the integration of mainframe applications with distributed corporate data and applications.
  • webmaster - A webmaster is a person who creates and manages the content and organization of a website, manages the computer server and technical programming aspects of a website or does both.
  • webOS - WebOS is an LG-owned, Linux based, smart TV operating system that is set up to allow control and access of LG Smart TV’s more advanced features and connected devices through a graphical user interface (GUI).
  • WebRTC (Web Real-Time Communications) - WebRTC (Web Real-Time Communications) is an open source project that enables real-time voice, text and video communications capabilities between web browsers and devices.
  • WebSocket - WebSocket is a communications protocol for a persistent, bi-directional, full duplex TCP connection from a user’s web browser to a server.
  • weighted fair queueing (WFQ) - Weighted fair queueing (WFQ) is a method of automatically smoothing out the flow of data in packet-switched communication networks by sorting packets to minimize the average latency and prevent exaggerated discrepancies between the transmission efficiency afforded to narrowband versus broadband signals.
  • well-known port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • Western Digital Corporation (WDC) - Western Digital Corporation (often referred to as WDC, Western Digital) is a data storage device manufacturer founded in 1970 and headquartered in San Jose, Calif.
  • wetware - Wetware refers to programmers, developers, systems administrators, cloud and IT architects and other employees that directly affect how servers, applications, networks and the rest of an IT system functions.
  • whaling attack (whaling phishing) - A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.
  • what if scenario analysis (WISA) - A business can use what if scenario analysis (WISA) to see how a given outcome, such as project costs, might be affected by changes in particular variables, such as the late delivery of supplies or the unavailability of key personnel.
  • WhatsApp - WhatsApp is a free cross-platform messaging service.
  • Whistleblower Protection Act - The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.
  • white box server - A white box server is a data center computer that is not manufactured by a well-known brand name vendor.
  • white box testing - White box testing is a software testing methodology in which the code structure is known and understood by the tester.
  • white hat hacker - A white hat hacker -- or ethical hacker -- is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  • white hat link building - White hat link building strives to drive traffic to a website through search engine optimization techniques, such as relevant linking to other, relevant content that enhances users' experience, generation of quality content and more.
  • white label cloud service - A white label cloud service is a cloud provider that sells customers resources that they can, in turn, offer to their own customers under their own brand.
  • white paper - A white paper is an article that states an organization's position or philosophy about a social, political, or other subject, or a not-too-detailed technical explanation of an architecture, framework, or product technology.
  • whitelist (allowlist) - A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others.
  • whole-team approach (team-based approach) - The whole-team approach (team-based approach) is a style of project management in which everyone on the project team is held equally responsible for the quality and success of the project.
  • wholesale price - Wholesale price is the price charged for a product as sold in bulk to large trade or distributor groups as opposed to what is charged to consumers.
  • Wi-Fi (802.11x standard) - Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.
  • Wi-Fi 6 - Wi-Fi 6, also known as 802.
  • Wi-Fi 6E - Wi-Fi 6E is one variant of the 802.
  • Wi-Fi 7 - Wi-Fi 7 is the pending 802.
  • Wi-Fi Alliance - The Wi-Fi Alliance is a wireless industry organization that exists to promote wireless technologies and interoperability.
  • Wi-Fi calling - Wi-Fi calling is a voice service that lets users place and receive calls over a wireless internet connection, as opposed to using a cellular signal.
  • Wi-Fi finder (Wi-Fi signal finder, Wi-Fi seeker or Wi-Fi locator) - A Wi-Fi finder, also called a Wi-Fi signal finder, Wi-Fi seeker or Wi-Fi locator, is a miniature electronic device that can determine whether or not a portable computer user is within range of an access point for a wireless local area network (WLAN).
  • Wi-Fi Pineapple - A Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.
  • Wi-Fi Protected Access (WPA) - Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.
  • Wi-Fi range extender (range expander) - A Wi-Fi range extender, sometimes called a range expander, is a type of wireless repeater used to expand the reach of a wireless LAN.
  • widget - In computing, a widget is an element of a graphical user interface that displays information or provides a specific way for a user to interact with the operating system (OS) or an application.
  • Wiegand - Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.
  • Wien's constant - Wien's constant is a physical constant that defines the relationship between the thermodynamic temperature of a black body (an object that radiates electromagnetic energy perfectly) and the wavelength at which the intensity of the radiation is the greatest.
  • wiki - A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site.
  • Wikipedia - Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • wildcard character - A wildcard character is a special character that represents one or more other characters.
  • wind turbine - A wind turbine is a power generating device that is driven by the kinetic energy of the wind.
  • window - A window is a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface (GUI).
  • Windows - Windows is Microsoft's flagship operating system (OS), the de facto standard for home and business computers.
  • Windows 10 (Microsoft Windows 10) - Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.
  • Windows 10 Update Assistant - Windows 10 Update Assistant is a native update management tool designed to help individual users keep up with OS updates as Microsoft publishes them.
  • Windows 2000 - Windows 2000 is an operating system developed by Microsoft.
  • Windows 7 - Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.
  • Windows as a service - Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.
  • Windows Autopilot - Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close