Browse Definitions :

Browse Definitions by Alphabet

WIP - WYS

  • wipe - Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable.
  • Wipro Technologies (Wipro Limited) - Wipro Technologies, also known as Wipro Limited, is an India-based software and technology services provider that targets the global market.
  • WIPS (wireless intrusion prevention system) - A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless LAN network's radio spectrum for rogue access points and other wireless threats.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireframe - A wireframe is a black and white line drawing that's used in early-stage web design to provide stakeholders with a visual representation of a web page's layout and information architecture.
  • wireless - Wireless is a term used to define telecommunication and data transmission without wires.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • Wireless Application Protocol (WAP) - Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for internet access, including email, the web, newsgroups and instant messaging.
  • wireless backhaul - Wireless backhaul is the use of wireless communication systems to transport data between the internet and subnetworks.
  • wireless broadband (WiBB) - Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).
  • wireless charging - Wireless charging is any of several methods of charging batteries without the use of cables.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless fidelity - Wireless fidelity is frequently thought to be the full version of Wi-Fi, which refers to any of the IEEE (Institute of Electrical and Electronics Engineers) 802.
  • wireless ISP (wireless Internet service provider or WISP) - A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale.
  • wireless point of sale (wireless POS or WPOS) - Wireless point of sale (wireless POS or WPOS) is the use of wireless devices in retail establishments to facilitate payment for products or services.
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • wireless sensor network (WSN) - A wireless sensor network is a group of specialized transducers with a communications infrastructure that uses radio to monitor and record physical or environmental conditions.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP.
  • wireless USB (WUSB) - Wireless USB (WUSB) is a form of Universal Serial Bus (USB) technology that uses radio-frequency (RF) links rather than cables to provide the interfaces between a computer and peripherals, such as monitors, printers, external drives, head sets, MP3 players and digital cameras.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • Wireshark - Wireshark is an open source tool for analyzing packets and profiling network traffic.
  • wiretapping - Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications.
  • witching hour - Witching hour, in a financial context, is the final hour of daily trading in the stock market between the close of the bond market at 3 p.
  • wizard - A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.
  • Wizard of Oz prototyping - Wizard of Oz prototyping is a tactic used by developers to give the appearance that an application or program has been completely automated when, in fact, it hasn't.
  • WLAN Authentication and Privacy Infrastructure (WAPI) - WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.
  • WNS Global Services (WNS Holdings) - WNS Global Services (WNS Holdings Ltd) is a Mumbai-based business process outsourcing (BPO) company that provides services to enterprises worldwide.
  • Wolfram Alpha - Wolfram Alpha is a computational search engine (sometimes referred to as an "answer engine").
  • word - In computer architecture, a word is a unit of data of a defined bitlength that can be addressed and moved between storageand the computer processor.
  • word processor - A word processor is a computer program that provides special capabilities beyond that of a text editor such as the WordPad program that comes as part of Microsoft's Windows operating systems.
  • WordPress - WordPress is free, open source publishing software that can be installed locally on a web server and viewed on a proprietary web site or hosted in the cloud and viewed on the WordPress web site.
  • Words-to-Go: Voice over IP - Internet Protocol (IP) - method or protocol by which data is sent from one computer to another on the Internet.
  • work - Work is force applied over distance.
  • work breakdown structure (WBS) - A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole.
  • work in progress (WIP) - Work in progress (WIP), also called work in process, is inventory that has begun the manufacturing process and is no longer included in raw materials inventory but is not yet a completed product.
  • work-life balance - Work-life balance is the optimal arrangement of an individual’s on-the-job and private time to facilitate health and personal satisfaction without hindering productivity or professional success.
  • workaround - A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn't working.
  • Workboard - Workboard is an application for improving a company's strategic planning, boosting teamwork and collaboration, and tracking the goals and performance of employees.
  • Workday - Workday is a cloud-based software vendor that specializes in human capital management and financial management applications.
  • workflow - Workflow is the series of activities that are necessary to complete a task.
  • workflow automation - Workflow automation is an approach to making the flow of tasks, documents and information across work-related activities perform independently in accordance with defined business rules.
  • workforce analytics - Workforce analytics is a combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management (HRM).
  • workforce management (WFM) - Workforce management (WFM) is an integrated set of processes that a company uses to optimize the productivity of its employees.
  • Workforce management (WFM) software - Workforce management (WFM) software is an umbrella term for desktop and mobile programs that help a business manage staff scheduling.
  • workforce optimization (WFO) software - Workforce optimization (WFO) software is a program suite that combines recording, quality management (QM) and other call center technologies into one console with the purpose of optimizing call center performance.
  • workforce planning - Workforce planning is the strategy used by employers to anticipate labor needs and deploy workers most effectively, usually with advanced human resources technology.
  • working capital - Working capital is the difference between a business's current assets and current liabilities.
  • working draft (draft document) - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • workload - In computing, a workload, typically, is any program or application that runs on any computer.
  • Workplace Join - Workplace Join is a tool in Windows Server 2012 R2 that allows a Windows 8.
  • workplace positive psychology - Workplace positive psychology is a subset of Industrial and Organizational (I/O) psychology that seeks optimization of the work experience from the employee’s perspective.
  • workstation - A workstation is a computer intended for individual use that is faster and more capable than a personal computer.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is hard-coded into each Fibre Channel (FC) device by the device's manufacturer.
  • World Wide Web (WWW) - The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
  • WORM (write once, read many) - In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
  • Worse is Better - Worse is Better is a software design principle that states that software quality is not wholly dependent on the number features of functions and that less is often more.
  • WPA3 - WPA3 is a security certification program developed by the Wi-Fi Alliance to ensure Wi-Fi related products meet a common standard.
  • WPAN (wireless personal area network) - A WPAN (wireless personal area network) is a personal area network - a network for interconnecting devices centered around an individual person's workspace - in which the connections are wireless.
  • WRAM (Window RAM) - Window RAM (WRAM), unrelated to Microsoft Windows, is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less.
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • wrap plug - A wrap plug, also known as a loopback plug, is a special plug that can be inserted into a port on a communications device to perform a diagnostic test called a loopback test.
  • write amplification - Write amplification is an issue that occurs in solid state storage devices that can decrease the lifespan of the device and impact performance.
  • write amplification factor (WAF) - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid-state drive (SSD) controller writes in relation to the amount of data that the host's flash controller writes.
  • write back - Write back is a storage method in which data is written into the cache every time a change occurs, but is written into the corresponding location in main memory only at specified intervals or under certain conditions.
  • write endurance - Write endurance is the number of program/erase (P/E) cycles that can be applied to a block of flash memory before the storage media becomes unreliable.
  • write once, run anywhere (WORA) - Write once, run anywhere (WORA) is a term that refers to a particular program's supposed ability to run on all common OSs (operating systems).
  • write through - Write through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-SecureConversation (Web Services Secure Conversation Language) - WS-SecureConversation, also called Web Services Secure Conversation Language, is a specification that provides secure communication between Web services using session keys.
  • WSAN (wireless sensor and actuator network) - A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them.
  • WSO2 - WSO2 is a middleware vendor that sells open source application program interface (API) management software.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WUE (water usage effectiveness) - WUE (water usage effectiveness) is a metric developed by The Green Grid nonprofit consortium to help data centers measure how much water a facility uses for cooling and other building needs.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • WYSIWYG (what you see is what you get) - A WYSIWYG (pronounced "wiz-ee-wig") editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close