Browse Definitions :

Browse Definitions by Alphabet

  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Client Access License (CAL) - A Windows Server Client Access License (CAL) is a license that gives a user or device the right to access services from a server running the Windows Server operating system.
  • Windows Server Failover Clustering (WSFC) - Windows Server Failover Clustering (WSFC) enables several computers to host a service, and if one has a fault, the remaining computers automatically take over the hosting of the service.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • Windows Sysinternals - Windows Sysinternals is a collection of 70 freeware utilities that Microsoft offers IT administrators and developers to help them monitor, manage, diagnose and troubleshoot Windows systems and their applications.
  • WinZip - WinZip is a software product used to archive, compress and encrypt files in a variety of archive formats for more efficient storage and distribution.
  • wipe - Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable.
  • WIPS (wireless intrusion prevention system) - A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless LAN network's radio spectrum for rogue access points and other wireless threats.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • Wireless Application Protocol (WAP) - Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way wireless devices, such as mobile phones and radio transceivers, can be used for internet access, including email, the web, newsgroups and instant messaging.
  • wireless backhaul - Wireless backhaul is the use of wireless communication systems to transport data between the internet and subnetworks.
  • wireless broadband (WiBB) - Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).
  • wireless charging - Wireless charging is any of several methods of charging batteries without the use of cables.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN) without requiring that they connect through a wired backbone.
  • wireless ISP (wireless Internet service provider or WISP) - A wireless internet service provider (WISP) is an internet service provider (ISP) that allows subscribers to connect to the internet at designated hot spots or access points using a wireless connection such as Wi-Fi.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • Wireshark - Wireshark is a widely used network protocol analyzer that lets users capture and view the details of network traffic in real time.
  • wiretapping - Wiretapping is the surreptitious electronic monitoring and interception of phone-, fax- or internet-based communications.
  • WLAN Authentication and Privacy Infrastructure (WAPI) - WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.
  • WNS Global Services (WNS Holdings) - WNS Global Services (WNS Holdings Ltd) is a Mumbai-based business process outsourcing (BPO) company that provides services to enterprises worldwide.
  • word (in computing) - In computer architecture, a word is a unit of data of a defined bit length that can be addressed and moved between storage and the computer processor.
  • WordPress - WordPress is free, open source publishing software that can be installed locally on a web server and viewed on a proprietary web site or hosted in the cloud and viewed on the WordPress web site.
  • work - Work is force applied over distance.
  • work in progress (WIP) - Work in progress (WIP) refers to the number of tasks or projects that are currently in the process of being completed.
  • Workday - Workday is a cloud-based software vendor that specializes in human capital management and financial management applications.
  • workflow - Workflow is the series of activities that are necessary to complete a task.
  • workflow automation - Workflow automation is an approach to making the flow of tasks, documents and information across work-related activities perform independently in accordance with defined business rules.
  • workflow management - Workflow management is the discipline of creating, documenting, monitoring and improving upon the series of steps, or workflow, that is required to complete a specific task.
  • workforce analytics - Workforce analytics is a combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management (HRM).
  • workforce management (WFM) - Workforce management (WFM) is an integrated set of processes that a company uses to optimize the productivity of its employees.
  • Workforce management (WFM) software - Workforce management (WFM) software is an umbrella term for desktop and mobile programs that help a business manage staff scheduling.
  • workforce optimization (WFO) software - Workforce optimization (WFO) software is a program suite that combines recording, quality management (QM) and other call center technologies into one console with the purpose of optimizing call center performance.
  • workforce planning - Workforce planning is the strategy used by employers to anticipate labor needs and deploy workers most effectively, usually with advanced human resources technology.
  • working capital - Working capital is the difference between a business's current assets and current liabilities.
  • workload - In computing, a workload is typically any program or application that runs on a computer.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is hard-coded into each Fibre Channel (FC) device by the device's manufacturer.
  • World Wide Web (WWW) - The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
  • WORM (write once, read many) - In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
  • WPA3 - WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance.
  • write amplification factor (WAF) - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid-state drive (SSD) controller writes in relation to the amount of data that the host's flash controller writes.
  • write endurance - Write endurance is the number of program/erase (P/E) cycles that can be applied to a block of flash memory before the storage media becomes unreliable.
  • write once, run anywhere (WORA) - Write once, run anywhere (WORA) is a term that refers to a particular program's supposed ability to run on all common OSs (operating systems).
  • write-back - Write-back is a technique used to cache data between the local processor or central processing unit and the final storage location, which is typically either main memory -- RAM -- or disk.
  • write-through - Write-through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WSO2 - WSO2 is a middleware vendor that sells open source application program interface (API) management software.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • WYSIWYG (what you see is what you get) - WYSIWYG (pronounced wiz-ee-wig) is a type of editing software that allows users to see and edit content in a form that appears as it would when displayed on an interface, webpage, slide presentation or printed document.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close