Browse Definitions :

Browse Definitions by Alphabet

WHA - ZUO

  • What is zero trust? Ultimate guide to the network security model - Zero trust is a security strategy that assumes all users, devices and transactions are already compromised.
  • z coordinate - A z coordinate is the third-dimensional coordinate in a volume pixel, or voxel.
  • Z-Wave - Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
  • z/OS - Introduced in 2000, IBM z/OS is a 64-bit mainframe operating system (OS) developed by IBM for its family of enterprise z/Architecture mainframe computers.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • Zadara VPSA and ZIOS - Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.
  • zebibyte (ZiB) - A zebibyte (ZiB) is a unit used to measure computing and storage capacity.
  • Zenoss - Zenoss is a company that develops hybrid IT monitoring analytics software for visibility in cloud, virtual and physical IT environments.
  • zero (0) - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zero rating - Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).
  • zero tolerance - Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.
  • zero-based thinking (ZBT) - Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.
  • zero-day (computer) - Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.
  • zero-hours contract - A zero-hours contract is an agreement stating that a given employer is not obligated to provide a worker with any minimum number of hours.
  • zero-sum game - A zero-sum game is a situation in which the potential gain for players remains constant.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
  • Zero-TV - Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts.
  • Zerto - Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.
  • zettabyte - A zettabyte is a unit of measurement used by technology professionals and the general public to describe a computer or other device's storage capacity.
  • Zettabyte Era - The Zettabyte Era is the current age in terms of digital data.
  • zettaflops - Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS).
  • Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • ZFS - ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.
  • Zigbee - Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • Zimbra Collaboration Server - Zimbra is an open source server and client technology for enterprise messaging and collaboration.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.
  • zipping - Zipping is the act of packaging a set of files into a single file or archive that is called a zip file.
  • zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by William George Horner, was an early form of motion picture projector that consisted of a drum containing a set of still images, that was turned in a circular fashion in order to create the illusion of motion.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.
  • zombie VM - A zombie VM is a virtual machine that is created, often for a particular purpose, that is forgotten when it is no longer needed for that purpose.
  • Zoom fatigue (virtual meeting fatigue) - Zoom fatigue, also known as virtual meeting fatigue, is the feeling of exhaustion that often occurs after attending a series of virtual video meetings.
  • Zoombombing - Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online meetings over the Zoom video conference app.
  • zoopraxiscope - The zoopraxiscope (pronounced ZOH-uh-PRACKS-uh-scohp), invented by British photographer Eadweard Muybridge and first shown in 1879, was a primitive version of later motion picture devices which worked by showing a sequence of still photographs in rapid succession.
  • Zugata - Zugata is performance management software that helps employers to gather continuous feedback about individual employees in order to foster a corporate culture that empowers each employee to reach his or her full potential.
  • Zulu (Zulu time) - Zulu (Zulu time) is used in the military and navigation for timekeeping purposes to avert confusion when coordinating with countries using other time standards.
  • Zuora - Zuora sells software that helps companies manage their cloud subscriptions, including sales, pricing, billing, collection and renewal.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close