Browse Definitions :

Browse Definitions by Alphabet

  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Client Access License (CAL) - A Windows Server Client Access License (CAL) is a license that gives a user or device the right to access services, such as printing or access to a file share, from a server running the Windows Server operating system (OS).
  • Windows Server Failover Clustering (WSFC) - Windows Server Failover Clustering (WSFC) enables several computers to host a service, and if one has a fault, the remaining computers automatically take over the hosting of the service.
  • Windows Server Update Services (WSUS) - Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • Windows Sysinternals - Windows Sysinternals is a collection of 70 freeware utilities that Microsoft offers IT administrators and developers to help them monitor, manage, diagnose and troubleshoot Windows systems and their applications.
  • WinZip - WinZip is a software product used to archive, compress and encrypt files in a variety of archive formats for more efficient storage and distribution.
  • wipe - Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • Wireless Application Protocol (WAP) - Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way wireless devices, such as mobile phones and radio transceivers, can be used for internet access, including email, the web, newsgroups and instant messaging.
  • wireless backhaul - Wireless backhaul is the use of wireless communication systems to transport data between the internet and subnetworks.
  • wireless broadband (WiBB) - Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).
  • wireless charging - Wireless charging is any of several methods of charging batteries without the use of cables.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN) without requiring that they connect through a wired backbone.
  • wireless intrusion prevention system (WIPS) - A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless local area network (WLAN) or Wi-Fi network's radio spectrum for rogue access points (APs) and other wireless threats.
  • wireless ISP (wireless Internet service provider or WISP) - A wireless internet service provider (WISP) is an internet service provider (ISP) that allows subscribers to connect to the internet at designated hot spots or access points using a wireless connection such as Wi-Fi.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • Wireshark - Wireshark is a widely used network protocol analyzer that lets users capture and view the details of network traffic in real time.
  • wiretapping - Wiretapping is the surreptitious electronic monitoring and interception of phone-, fax- or internet-based communications.
  • WLAN Authentication and Privacy Infrastructure (WAPI) - WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.
  • WNS Global Services (WNS Holdings) - WNS Global Services (WNS Holdings Ltd) is a Mumbai-based business process outsourcing (BPO) company that provides services to enterprises worldwide.
  • word (in computing) - In computer architecture, a word is a unit of data of a defined bit length that can be addressed and moved between storage and the computer processor.
  • WordPress - WordPress is free, open source publishing software that can be installed locally on a web server and viewed on a proprietary web site or hosted in the cloud and viewed on the WordPress web site.
  • work - Work is force applied over distance.
  • work in progress (WIP) - Work in progress (WIP) refers to the number of tasks or projects that are currently in the process of being completed.
  • Workday - Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.
  • workflow - Workflow is the series of activities that are necessary to complete a task.
  • workflow automation - Workflow automation is an approach to making the flow of tasks, documents and information across work-related activities perform independently in accordance with defined business rules.
  • workflow management - Workflow management is the discipline of creating, documenting, monitoring and improving upon the series of steps, or workflow, that is required to complete a specific task.
  • workforce analytics - Workforce analytics is a combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management (HRM).
  • workforce management (WFM) - Workforce management (WFM) is an integrated set of processes that a company uses to optimize the productivity of its employees.
  • Workforce management (WFM) software - Workforce management (WFM) software is an umbrella term for desktop and mobile programs that help a business manage staff scheduling.
  • workforce optimization (WFO) software - Workforce optimization (WFO) software is a program suite that combines recording, quality management (QM) and other call center technologies into one console with the purpose of optimizing call center performance.
  • workforce planning - Workforce planning is the strategy used by employers to anticipate labor needs and deploy workers most effectively, usually with advanced human resources technology.
  • working capital - Working capital is the difference between a business's current assets and current liabilities.
  • workload - In computing, a workload is typically any program or application that runs on a computer.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is hard-coded into each Fibre Channel (FC) device by the device's manufacturer.
  • World Wide Web (WWW) - The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
  • WORM (write once, read many) - In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
  • WPA3 - WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance.
  • write amplification factor (WAF) - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid-state drive (SSD) controller writes in relation to the amount of data that the host's flash controller writes.
  • write endurance - Write endurance is the number of program/erase (P/E) cycles that can be applied to a block of flash memory before the storage media becomes unreliable.
  • write once, run anywhere (WORA) - Write once, run anywhere (WORA) is a term that refers to a particular program's supposed ability to run on all common OSs (operating systems).
  • write-back - Write-back is a technique used to cache data between the local processor or central processing unit and the final storage location, which is typically either main memory -- RAM -- or disk.
  • write-through - Write-through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WSO2 - WSO2 is a middleware vendor that sells open source application program interface (API) management software.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • WYSIWYG (what you see is what you get) - WYSIWYG (pronounced wiz-ee-wig) is a type of editing software that allows users to see and edit content in a form that appears as it would when displayed on an interface, webpage, slide presentation or printed document.
Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

  • virtual agent

    A virtual agent -- sometimes called an intelligent virtual agent (IVA) -- is a software program or cloud service that uses ...

  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

Close