Browse Definitions :

Browse Definitions by Alphabet

X - XSL

  • X (compact disc access time) - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • x and y coordinates - X and y coordinates are, respectively, the horizontal and vertical addresses of a point in any two-dimensional (2D) space, such as a sheet of paper or a computer display screen.
  • X dimension - In barcode technology, the X dimension is the narrowest part of a barcode's symbology.
  • X Window System (X or XWindows) - The X Window System (sometimes referred to as "X" or as "XWindows") is an open, cross-platform, client/server system for managing a windowed graphical user interface in a distributed network.
  • X-engineering (cross-engineering) - X-engineering (sometimes called cross-engineering) is a collaborative and process-oriented approach to change management in the business world.
  • X.400 - X.400 is the messaging (notably e-mail) standard specified by the ITU-TS (International Telecommunications Union - Telecommunication Standard Sector).
  • X.509 certificate - An X.509 certificate is a digital certificate that uses the widely accepted international X.
  • x86 - x86 is a generic name for the series of Intel microprocessor families that began with the 80286 microprocessor.
  • x86-64 - x86-64 is a 64-bit processing technology developed by AMD that debuted with the Opteron and Athlon 64 processor.
  • X9 (ASC X9) - ASC X9, Inc.
  • XaaS (anything as a service) - XaaS is a collective term that refers to the delivery of anything as a service.
  • XACML (Extensible Access Control Markup Language) - XACML (Extensible Access Control Markup Language) is an attribute-based access control policy language (ABAC) or XML-based language, designed to express security policies and access requests to information.
  • Xactly Corporation - Xactly Corporation is a vendor that sells web-based compensation management software and services.
  • XAM (eXtensible Access Method) - XAM (eXtensible Access Method) is a standard that makes it easier to manage fixed content by freeing data from dependencies on location, applications and storage devices.
  • XAML (Extensible Application Markup Language) - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • xAPI (experience API) - The xAPI (experience API), also known as Tin Can API, is an open source software specification that provides a set of rules for representing the events a learner performs while interacting with a piece of learning content.
  • XCCDF (Extensible Configuration Checklist Description Format) - XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists, benchmarks and related types of documents.
  • Xen - Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.
  • xenodochial - Xenodochial is an adjective describing something, such as a person, place, or software application, that is friendly to strangers.
  • Xeon - Xeon (pronounced ZEE-ahn) is a 400 MHz Pentium microprocessor from Intel for use in "mid-range" enterprise servers and workstations.
  • xerography (electrophotography) - Xerography, also known as electrophotography, is a printing and photocopying technique that works on the basis of electrostatic charges.
  • Xerox - Xerox is a provider of document-related technology and services.
  • XFS file system - XFS is a 64-bit, highly scalable file system that was developed by Silicon Graphics Inc.
  • XGA and XGA-2 (Extended Graphics Array) - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • XKeyscore - XKeyscore (XKS) is the front end search engine interface that interacts with all NSA  federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens.
  • XML (Extensible Markup Language) - XML (Extensible Markup Language) is used to describe data.
  • XML bomb - An XML (Extensible Markup Language) bomb is a small but dangerous message that is composed and sent with the intent of overwhelming the program that parses XML files.
  • XML Schema Definition (XSD) - XML Schema Definition or XSD is a recommendation by the World Wide Web Consortium (W3C) to describe and validate the structure and content of an XML document.
  • Xon/Xoff (X-on/X-off or XON/XOFF) - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced eks-AWN eks-AWF) is a protocol for controlling the flow of data between computers and other devices on an asynchronous serial connection.
  • XQL (XML Query Language) - XQL (XML Query Language) is a way to locate and filter the elements (data fields) and text in an Extensible Markup Language (XML) document.
  • XSL (Extensible Stylesheet Language) - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close