Browse Definitions :

IT standards and organizations

Terms related to information technology (IT) standards, including definitions about IT organizations and words and phrases about policies and compliance.

STA - ZUL

  • stand-up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
  • standard - A standard is a generally agreed-upon technology, method or format for a given application.
  • standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • standard temperature and pressure (STP) - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
  • standards organization - A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.
  • statcoulomb (statC) - The statcoulomb (abbreviated statC) is the unit of electric charge quantity in the cgs (centimeter/gram/second) system.
  • State Bank of India (SBI) - State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.
  • statfarad (statF) - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • statistical mean, median, mode and range - The terms mean, median, mode, and range describe properties of statistical distributions.
  • statvolt (statV) - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
  • Stefan-Boltzmann constant - The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.
  • steradian - The steradian (symbolized sr) is the Standard International (SI) unit of solid angular measure.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • survey research - Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • temperature (T) - Temperature (symbolized T) is an expression of heat energy.
  • terminology management - Terminology management is the systematized collection of concepts and terms with the purpose of unifying and standardizing technical documentation.
  • The Open Group Architecture Framework (TOGAF) - The Open Group Architecture Framework, or TOGAF gives software architects a structured approach for organizing and governing their software technology design, development and maintenance.
  • think tank - A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies, issues or ideas.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • TKIP (Temporal Key Integrity Protocol) - TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.
  • Top searches of 2008 - What were people searching the WhatIs.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transparency - Transparency, in the context of governance, means being open and honest in all official activities.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Trusted Internet Connections (TIC) - Trusted Internet Connections (TIC) is a mandate from the Office of Management and Budget (OMB) to reduce the number of Internet gateways on the federal government network and ensure that all external connections are routed through a government agency that has been designated as an approved TIC Access Provider.
  • U.S. Department of Homeland Security (DHS) - The U.S.
  • U.S. Department of Justice (DOJ) - U.S.
  • UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
  • Ultra DMA (UDMA or Ultra DMA/33) - Ultra DMA (UDMA, or, more accurately, Ultra DMA/33) is a protocol for transferring data between a hard disk drive through the computer's data paths (or bus) to the computer's random access memory (RAM).
  • Unicode - Unicode is an entirely new idea in setting up binary codes for text or script characters.
  • Unique Identification Authority of India (UIDAI) - Unique Identification Authority of India (UIDAI) is the issuing authority of Aadhaar cards (aka unique identification numbers or UIDs).
  • United Launch Alliance (ULA) - United Launch Alliance (ULA) is a private aerospace launch provider.
  • United States Census - The United States Census is a national survey conducted every ten years to enumerate the population for taxation and political representation.
  • United States Secret Service (USSS) - The United States Secret Service (USSS) is a federal law enforcement agency mandated by Congress to carry out two sets of primary objectives: provide protection for designated sites and events as well as national and visiting leaders, and preserve the integrity of the U.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized within the new word that forms the name.
  • USA Patriot Act - The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks.
  • USGCB (United States Government Configuration Baseline) - The United States Government Configuration Baseline, or USGCB, is a government-wide initiative that provides guidance on information security configuration best practices for IT products leveraged by federal agencies.
  • UUCP (UNIX-to-UNIX Copy Protocol) - UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system.
  • Uuencode (Uuencode/Uudecode) - Uuencode (also called Uuencode/Uudecode) is a popular utility for encoding and decoding files exchanged between users or systems in a network.
  • varicode - Varicode is a method of binary character encoding in which the number of bits for each character is not fixed, but varies for each character depending on how often that character occurs in general usage.
  • vehicle to infrastructure (V2I or v2i) - Vehicle-to-infrastructure (V2I or V2X) is a communication model that allows vehicles to share information with the components that support a country's highway system.
  • velocity - Velocity is a vector expression of the displacement that an object or particle undergoes with respect to time.
  • vertical market - A vertical market is made up of companies that offer goods and services to meet the needs of customers in a specific industry or niche market.
  • VESA Local Bus (VESA VL bus) - VESA Local Bus (sometimes called the VESA VL bus) is a standard interface between your computer and its expansion slot that provides faster data flow between the devices controlled by the expansion cards and your computer's microprocessor.
  • VHS (Video Home System) - VHS (Video Home System) is a widely-adopted videocassette recording (VCR) technology that was developed by Japan Victor Company (JVC) and put on the market in 1976.
  • VistA EHR - VistA EHR, more formally known as the VistA Computerized Patient Record System, is an open source electronic health record (EHR) system developed by the United States Department of Veterans Affairs (VA).
  • volt-ampere (VA) - A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • W3C (World Wide Web Consortium) - The W3C is an industry consortium which seeks to promote standards for the evolution of the Web and interoperability between WWW products by producing specifications and reference software.
  • watt-hour (Wh) - The watt-hour (symbolized Wh) is a unit of energy equivalent to one watt (1 W) of power expended for one hour (1 h) of time.
  • wave number - The term wave number refers to the number of complete wave cycles of an electromagnetic field (EM field) that exist in one meter (1 m) of linear space.
  • WAX (Wireless Abstract XML) - Wireless Abstract XML (WAX) is an abstract markup language and associated tools that facilitate wireless application development.
  • Web Proxy Autodiscovery (WPAD) - Web Proxy Autodiscovery (WPAD) is a proposed Internet protocol that allows a client, such as a Web browser or a streaming media application, to automatically locate and interface with cache services in a network so that information can be delivered more quickly to the user.
  • Web Standards Project (WaSP) - The Web Standards Project (WaSP) is a grass roots effort to encourage the main browser makers to create a standard implementation of the Hypertext Markup Language (HTML) and other Web standards and recommendations of the World Wide Consortium (W3C).
  • Web-Based Enterprise Management (WBEM) - Web-Based Enterprise Management (WBEM) is a set of industry standards that an enterprise can use to manage its information operations in the distributed computing environment of the Internet.
  • weight (w) - Weight (symbolized w) is a quantity representing the force exerted on a particle or object by an acceleration field, particularly the gravitational field of the Earth at the surface.
  • well-known port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • What is cybersecurity? - Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.
  • Wien's constant - Wien's constant is a physical constant that defines the relationship between the thermodynamic temperature of a black body (an object that radiates electromagnetic energy perfectly) and the wavelength at which the intensity of the radiation is the greatest.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
  • Wireless Application Protocol (WAP) - Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for internet access, including email, the web, newsgroups and instant messaging.
  • WLAN Authentication and Privacy Infrastructure (WAPI) - WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.
  • Words-to-Go: Voice over IP - Internet Protocol (IP) - method or protocol by which data is sent from one computer to another on the Internet.
  • work - Work is force applied over distance.
  • working draft (draft document) - A working draft (sometimes called a draft document) is a type of technical report that is a work in progress, a preliminary form of a possible future document.
  • World Wide Web (WWW) - The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • X.400 - X.400 is the messaging (notably e-mail) standard specified by the ITU-TS (International Telecommunications Union - Telecommunication Standard Sector).
  • X9 (ASC X9) - ASC X9, Inc.
  • XCCDF (Extensible Configuration Checklist Description Format) - XCCDF (Extensible Configuration Checklist Description Format) is a specification language for writing security checklists, benchmarks and related types of documents.
  • XGA and XGA-2 (Extended Graphics Array) - XGA (Extended Graphics Array) is a high-resolution video display mode that provides screen pixel resolution of 1,024 by 768 in 256 colors or 640 by 480 in high (16-bit) color.
  • XML (Extensible Markup Language) - XML (Extensible Markup Language) is used to describe data.
  • XML Schema Definition (XSD) - XML Schema Definition or XSD is a recommendation by the World Wide Web Consortium (W3C) to describe and validate the structure and content of an XML document.
  • Xon/Xoff (X-on/X-off or XON/XOFF) - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced eks-AWN eks-AWF) is a protocol for controlling the flow of data between computers and other devices on an asynchronous serial connection.
  • yottabyte (YB) - A yottabyte (YB) is a measure of theoretical storage capacity and data volumes equal to 2 to the 80th power bytes, or approximately a million trillion megabytes (MB).
  • Zigbee - Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • Zulu (Zulu time) - Zulu (Zulu time) is used in the military and navigation for timekeeping purposes to avert confusion when coordinating with countries using other time standards.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close