Browse Definitions :

Browse Definitions by Alphabet

4-D - WHA

  • 4-D printing (four-dimensional printing) - 4-D printing is additive manufacturing that prints objects capable of transformation and, in some cases, self-assembly.
  • 4-G - 4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).
  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • 401(k) plan - A 401(k) plan is a type of retirement savings account.
  • 404 - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
  • 404 (status code) - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
  • 404 error page - A 404 page is the webpage served to a user who tries to access a page that is unavailable.
  • 42 - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • 42 (h2g2, meaning of life, The Hitchhiker's Guide to the Galaxy) - In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the meaning of life, the universe, and everything") can be derived.
  • 4G - 4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).
  • 4G (fourth-generation wireless) - 4G is the short name for fourth-generation wireless, the stage of broadband mobile communications that supersedes 3G (third-generation wireless) and is the predecessor of 5G (fifth-generation wireless).
  • 4GL - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • 4K video resolution - 4K video resolution is high-definition (HD) video that has four times the resolution of 1080p HD video.
  • 4X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 5 things to think about before switching IT career paths - If you're thinking of changing career paths in IT, now could be the right time to do it.
  • 5 V's of big data - The 5 V's of big data are the five main and innate characteristics of big data.
  • 5 Whys (Five Whys) - Five Whys, sometimes written as '5 Whys,' is a guided team exercise for identifying the root cause of a problem.
  • 50X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 5G new radio (NR) - 5G new radio (5G NR) is a set of standards that replaces the LTE 4G wireless network communications standard.
  • 5G Quiz - Can you speak 5G? - Next-generation 5G wireless technology will offer faster speeds and increased capacity.
  • 5GL - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.
  • 6 lessons learned from 'The Phoenix Project' - In The Phoenix Project, a seminal business novel about a fictional American company working through its digital transformation, there is a wealth of insightful lessons about DevOps, IT and working for a modern corporation in general.
  • 6 Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • 64-bit - A 64-bit processor is a microprocessor with a word size of 64 bits, a requirement for memory and data intensive applications such as computer-aided design (CAD) applications, database management systems, technical and scientific applications, and high-performance servers.
  • 64-bit processor - A 64-bit processor is a microprocessor with a word size of 64 bits, a requirement for memory and data intensive applications such as computer-aided design (CAD) applications, database management systems, technical and scientific applications, and high-performance servers.
  • 7 days a week - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 70 percent rule for productivity - According to the 70 percent rule, which has its roots in athletics, employees are most productive when a majority of their time is spent working at a less intense pace.
  • 70-20-10 (70-20-10 rule) - 70-20-10 is a formula that describes how someone learns to do their job.
  • 720p - 720p is the standard high-definition (HD) display resolution of 1280x720 pixels, with progressive scanning, at a 16x9 aspect ratio.
  • 78 Questions to Ask About Any Technology - “78 Questions to Ask about Any Technology” is a list designed to inform users as to the advisability of developing or continuing to support a given technology, based on the answers to the questions.
  • 8 level vestigial sideband - 8-VSB (8-level vestigial sideband) is a standard radio frequency (RF) modulation format chosen by the Advanced Television Systems Committee (ATSC) for the transmission of digital television (DTV) to consumers in the United States and other adopting countries.
  • 8 VSB - 8-VSB (8-level vestigial sideband) is a standard radio frequency (RF) modulation format chosen by the Advanced Television Systems Committee (ATSC) for the transmission of digital television (DTV) to consumers in the United States and other adopting countries.
  • 8-bit grayscale - Grayscale is a range of shades of gray without apparent color.
  • 8-level vestigial sideband - 8-VSB (8-level vestigial sideband) is a standard radio frequency (RF) modulation format chosen by the Advanced Television Systems Committee (ATSC) for the transmission of digital television (DTV) to consumers in the United States and other adopting countries.
  • 8-track tape - An 8-track tape is a hard plastic cartridge about the size of an external modem that houses a continuous loop of non-digital (analog) audio data stored on magnetic tape.
  • 8-VSB - 8-VSB (8-level vestigial sideband) is a standard radio frequency (RF) modulation format chosen by the Advanced Television Systems Committee (ATSC) for the transmission of digital television (DTV) to consumers in the United States and other adopting countries.
  • 8-VSB (8-level vestigial sideband) - 8-VSB (8-level vestigial sideband) is a standard radio frequency (RF) modulation format chosen by the Advanced Television Systems Committee (ATSC) for the transmission of digital television (DTV) to consumers in the United States and other adopting countries.
  • 80 - If you occasionally see a mysterious "80" on the name of a Web server that is handling your request for Web pages, this is a bit of technical stuff showing through when perhaps it shouldn't.
  • 802.11 - 802.11 is an evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • 802.11 Fast Guide - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
  • 802.11ac (Gigabit Wi-Fi) - 802.11ac, also known as Gigabit Wi-Fi, is a proposed specification in the 802.
  • 802.11d - 802.11d is a communications specification for use in countries where systems using other standards in the 802.
  • 802.11h - The 802.11h specification is an addition to the 802.
  • 802.11i - 802.11i is a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.
  • 802.11n - 802.11n is an addition to the 802.
  • 802.11u - 802.11u is an amendment to the IEEE 802.
  • 802.11x - 802.11x refers to a group of evolving wireless local area network (WLAN) standards that are under development as elements of the IEEE 802.
  • 802.15 - 802.15 is a communications specification that was approved in early 2002 by the Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) for wireless personal area networks (WPANs).
  • 802.16c - 802.16c is a set of clarifications and updates to the 102.
  • 802.5 - A token ring is a data link for a local area network (LAN) in which all devices are connected in a ring or star topology and pass one or more tokens from host to host.
  • 8a firm - In defense contracting, a Certified 8(a) Firm is a firm that is eligible to receive eligible to receive federal contracts under the Small Business Administration's 8(a) Business Development Program because it is owned and operated by socially and economically disadvantaged individuals.
  • 8X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • 9000 - (For the business server line from Hewlett-Packard, see HP 9000.
  • 911 - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • 96-minute rule - The 96-minute rule is a productivity guideline derived from the Pareto principle.
  • @ - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • client side framework - There are two sides to web development – the server side and the client side.
  • cloud workload protection (cloud workload security) - Cloud workload protection is a process of safeguarding workloads spread out across multiple cloud environments.
  • CompTIA A+ practice test questions and answers - CompTIA's A+ is the most popular of all IT certification programs.
  • CompTIA ITF+ practice test questions and answers - CompTIA's IT Fundamentals+ certification demonstrates general knowledge of computer components, operating systems and networks.
  • credential theft - Credential theft is a type of cybercrime that involves stealing the proof of identity of the victim, which can be either an individual or a business.
  • customer insight (consumer insight) - Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and feedback into conclusions that can be used to improve product development and customer support.
  • Human Resource Certification Institute (HRCI) - HRCI (Human Resource Certification Institute) is a U.
  • Microsoft Technology Associate (MTA) certification - Microsoft Technology Associate (MTA) certification is the name of a suite of entry-level certifications offered by Microsoft that signify fundamental technology knowledge in those who earn it.
  • streaming network telemetry - Streaming network telemetry is a real-time data collection service in which network devices such as routers, switches and firewalls continuously push network health data and interface measurements to a centralized collector.
  • subscription management - Subscription management is the process of overseeing and controlling all aspects of products and services sold repeatedly through a weekly, monthly, quarterly or yearly subscription-based pricing model.
  • The origins of Agile software development - The small team models within the Scrum Framework are scalable, but large organizations often require additional help to manage dependencies and communication.
  • What is 5G? - Fifth-generation wireless (5G) is the latest iteration of cellular technology.
  • What is 6G? Overview of 6G networks & technology - 6G (sixth-generation wireless) is the successor to 5G cellular technology.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close