Browse Definitions :

Browse Definitions by Alphabet

  • fiscal year - A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.
  • fishbone diagram (Ishikawa cause and effect) - A fishbone diagram is a visualization tool for categorizing the potential root causes of a problem.
  • fist to five (fist of five) - Fist to five, or fist of five, is a consensus-building technique used by Agile software development teams to poll team members and come to an agreement.
  • Five Eyes Alliance - The Five Eyes Alliance (abbreviated as FVEY in government documents) is a cooperative intelligence network that monitors the electronic communications of citizens and foreign governments.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed wireless - Fixed wireless networking refers to the operation of wireless devices in fixed locations such as homes and offices.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • fixed-mobile convergence (FMC) - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flaky test - A flaky test is a quality assurance (QA) test that fails to produces consistent results.
  • flash controller (flash memory controller) - A flash controller is the part of solid-state flash memory that communicates with the host device and manages the flash file system directory.
  • flash memory - Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks and rewrites data at the byte level.
  • flash memory card - A flash memory card -- sometimes called a storage card -- is a small storage device that uses non-volatile semiconductor memory to store data on portable or remote computing devices.
  • flash solid-state drive (SSD) - A flash solid-state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to write and store data for an extended period.
  • flat file - A flat file is a collection of data stored in a two-dimensional database in which similar yet discrete strings of information are stored as records in a table.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • floating gate transistor (FGT) - A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.
  • floating-point operations per second (FLOPS) - Floating-point operations per second (FLOPS) is a measure of a computer's performance based on the number of floating-point arithmetic calculations that the processor can perform within a second.
  • flooding (network) - In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.
  • flow (psychology) - Flow, in the context of psychology, is a state of intense engagement, focus and contentment in the present moment and current activity.
  • flow control - Flow control is a technique used to regulate data transfer between computers or other nodes in a network.
  • flow routing - Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.
  • flowchart - A flowchart is a formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
  • flux - In physics, flux is a measure of the number of electric or magnetic field lines passing through a surface in a given amount time.
  • FMEA (Failure Mode and Effects Analysis) - FMEA (failure mode and effects analysis) is a step-by-step approach for collecting knowledge about possible points of failure in a design, manufacturing process, product or service.
  • FOMO (fear of missing out) - The fear of missing out (FOMO) is an emotional response to the belief that other people are living better, more satisfying lives or that important opportunities are being missed.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • foo (in software programming) - Foo (pronounced FOO) is a term used by programmers as a placeholder for a value that can change depending on conditions or on information passed to the program.
  • foot cubed (cubic foot) - The foot cubed, also called the cubic foot, is the unit of volume in the English foot-pound-second (fps) system.
  • foot per second (ft/s or ft/sec) - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • foot-pound-second system of units (fps system of units) - The foot-pound-second (fps) system of units is a scheme for measuring dimensional and material quantities.
  • footprinting - Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them.
  • for your information (FYI) - In both chat acronyms and in IT acronyms, FYI is the abbreviation for 'for your information.
  • foreign key - A foreign key is a column or columns of data in one table that refers to the unique data values -- often the primary key data -- in another table.
  • forensic image - A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage device, including all files, folders and unallocated, free and slack space.
  • form factor - In computers, the form factor is the size, configuration, or physical arrangement of a computing device.
  • Fortran - Fortran is an imperative programming language used for more than 60 years to create powerful, efficient and accurate applications, particularly in scientific fields.
  • forward chaining - Forward chaining is the logical process of inferring unknown truths from known data and moving forward using determined conditions and rules to find a solution.
  • forward error correction (FEC) - Forward error correction (FEC) is a method for obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • four-factor authentication (4FA) - Four-factor authentication (4FA) is the use of four types of identity-confirming credentials, typically categorized as knowledge, possession, inherence and location factors.
  • Fourth Industrial Revolution - The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI) are changing the way modern people live and work.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FPV drone (first-person view drone) - An FPV drone is an unmanned aerial vehicle (UAV) with a camera that wirelessly transmits video feed to goggles, a headset, a mobile device or another display.
  • FQA (frequently questioned answers) - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • frame relay - Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • fraud detection - Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.
  • free cooling - Free cooling is an approach to lowering the air temperature in a building or data center by using naturally cool air or water instead of mechanical refrigeration.
  • free-space optics (FSO) - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • freemium - Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features.
  • freeware - Freeware (not to be confused with free software) is a type of proprietary software that is released without charge to the public.
  • frequency - For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction.
  • frequency band - In telecommunications, a frequency band -- sometimes called a band -- refers to a specific range of frequencies in the electromagnetic frequency spectrum assigned to certain applications.
  • frequency jammer - Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
  • frequency-division multiplexing (FDM) - In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.
  • frequency-hopping spread spectrum (FHSS) - Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.
  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
  • friendly name - A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the fiber-based connection of the cloud radio access network (C-RAN), a new type of cellular network architecture of centralized baseband units (BBUs) and remote radio heads (RRHs) at the access layer of the network.
  • Fréchet inception distance (FID) - Fréchet inception distance (FID) is a metric for quantifying the realism and diversity of images generated by generative adversarial networks (GANs).
  • FTC (Federal Trade Commission) - The FTC, or Federal Trade Commission, is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • Fujitsu Ltd. - Fujitsu Ltd.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • full-disk encryption (FDE) - Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • fully qualified domain name (FQDN) - A fully qualified domain name (FQDN) is the complete address of an internet host or computer.
  • function as a service (FaaS) - Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes.
  • functional programming - Functional programming is a programming paradigm that uses functions to construct programs and control how those programs operate.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • functional specification - A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application's intended requirements and specifications.
  • functionality - In information technology, functionality (from Latin functio meaning "to perform") is the sum or any aspect of what a product, such as a software application or computing device, can do for a user.
  • funnel analysis - Funnel analysis is a way to measure and improve the performance of customer interactions in a step-wise progression from the initial customer contact to a predetermined conversion metric.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a quality assurance technique used to discover coding errors or bugs and security loopholes in software, operating systems and networks.
  • fuzzy logic - Fuzzy logic is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • NetApp FlexPod - NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.
  • What is fog computing? - Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close