Browse Definitions :

IT standards and organizations

Terms related to information technology (IT) standards, including definitions about IT organizations and words and phrases about policies and compliance.

REV - ZUL

  • Reverse Address Resolution Protocol (RARP) - Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • RS-232C - RS-232C is a long-established standard ("C" is the current version) that describes the physical interface and protocol for relatively low-speed serial data communication between computers and related devices.
  • SAE International - SAE International is a professional association and standards development organization for the engineering industry, with a special focus on transport sectors such as automotive, aerospace and commercial vehicles.
  • Sarbanes-Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
  • scientific notation (power-of-10 notation) - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • second (s or sec) - The second (s or sec) is the International System of Units (SI) unit of time measurement.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is the U.
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • serial digital interface (SDI) - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • Server Message Block protocol (SMB protocol) - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • Six Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
  • slowness movement - The slowness movement is a grassroots reaction to the hectic pace, overwork, and lack of leisure typical of modern life.
  • SMB (small and medium-sized business or small and midsized business) - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • solid - A solid is a state of matter that retains its shape and density when not confined.
  • SpaceX - SpaceX (Space Exploration Technologies Corporation) is a space transportation and aerospace manufacturer founded in 2002 by Elon Musk.
  • Spanning Tree Protocol (STP) - Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • specific gravity - Specific gravity, more formally known as relative density, is a measure of the density of a substance in comparison to the density of water.
  • square meter (meter squared) - The square meter, also called the meter squared, is the International System of Units (SI) unit of area.
  • SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • SSADM (Structured Systems Analysis and Design Method) - SSADM (Structured Systems Analysis and Design Method) is a widely used computer application development method in the United Kingdom, where its use is often specified as a requirement for government computing projects.
  • SSAE 16 - The Statement on Standards for Attestation Engagements No.
  • SSL (secure sockets layer) - Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
  • stand-up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
  • standard - A standard is a generally agreed-upon technology, method or format for a given application.
  • standard temperature and pressure (STP) - Standard temperature and pressure (STP) refers to the nominal conditions in the atmosphere at sea level.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • statistical mean, median, mode and range - The terms mean, median, mode, and range describe properties of statistical distributions.
  • Stefan-Boltzmann constant - The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (σ), is a physical constant expressing the relationship between the heat radiation emitted by a black body and its absolute temperature.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • The Open Group Architecture Framework (TOGAF) - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • Top searches of 2008 - What were people searching the WhatIs.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transparency - Transparency is the quality of being easily seen through, while transparency in a business or governance context refers to being open and honest.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • U.S. Department of Homeland Security (DHS) - The U.S.
  • UDDI (Universal Description, Discovery and Integration) - UDDI, or Universal Description, Discovery and Integration, is an Extensible Language Markup (XML)-based standard to describe, publish and find information about web services.
  • Unicode - Unicode is an entirely new idea in setting up binary codes for text or script characters.
  • United Launch Alliance (ULA) - United Launch Alliance (ULA) is a private aerospace launch provider.
  • United States Secret Service (USSS) - The United States Secret Service (USSS) is a federal law enforcement agency mandated by Congress to carry out two sets of primary objectives: provide protection for designated sites and events as well as national and visiting leaders, and preserve the integrity of the U.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • vehicle to infrastructure (V2I or v2i) - Vehicle-to-infrastructure (V2I or V2X) is a communication model that allows vehicles to share information with the components that support a country's highway system.
  • velocity - Velocity is a vector expression of the displacement that an object or particle undergoes with respect to time.
  • vertical market - A vertical market is made up of companies that offer goods and services to meet the needs of customers in a specific industry or niche market.
  • VHS (Video Home System) - VHS (Video Home System) is a widely-adopted videocassette recording (VCR) technology that was developed by Japan Victor Company (JVC) and put on the market in 1976.
  • VistA EHR - VistA EHR, more formally known as the VistA Computerized Patient Record System, is an open source electronic health record (EHR) system developed by the United States Department of Veterans Affairs (VA).
  • volt-ampere (VA) - A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • W3C (World Wide Web Consortium) - The W3C (World Wide Web Consortium) is an international organization that creates standards for the World Wide Web.
  • watt-hour (Wh) - The watt-hour, which is symbolized Wh, is a unit of energy equivalent to one watt of power expended for one hour of time.
  • wave number - The term wave number refers to the number of complete wave cycles of an electromagnetic field (EM field) that exist in one meter (1 m) of linear space.
  • well-known port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • What is cybersecurity? - Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.
  • Wien's constant - Wien's constant is a physical constant that is used in defining the relationship between the thermodynamic temperature of a black body (an object that radiates electromagnetic energy perfectly) and the wavelength at which the intensity of the radiation is the greatest.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
  • Wireless Application Protocol (WAP) - Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way wireless devices, such as mobile phones and radio transceivers, can be used for internet access, including email, the web, newsgroups and instant messaging.
  • WLAN Authentication and Privacy Infrastructure (WAPI) - WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.
  • work - Work is force applied over distance.
  • working draft (draft document) - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • World Wide Web (WWW) - The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • XML (Extensible Markup Language) - XML (Extensible Markup Language) is used to describe data.
  • XML Schema Definition (XSD) - XML Schema Definition or XSD is a recommendation by the World Wide Web Consortium (W3C) to describe and validate the structure and content of an XML document.
  • Xon/Xoff (X-on/X-off or XON/XOFF) - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced eks-AWN eks-AWF) is a protocol for controlling the flow of data between computers and other devices on an asynchronous serial connection.
  • yottabyte (YB) - A yottabyte (YB) is a measure of theoretical storage capacity and data volumes equal to 2 to the 80th power bytes, or approximately a million trillion megabytes (MB).
  • Zigbee - Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • Zulu (Zulu time) - Zulu (Zulu time) is used in the military and navigation for timekeeping purposes to avert confusion when coordinating with countries using other time standards.
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • messaging security

    Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's ...

  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

CIO
  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close