Browse Definitions :

Browse Definitions by Alphabet

ASH - AV

  • ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) - ASHRAE was formed in 1959 by the merger of the American Society of Heating and Air-Conditioning Engineers (ASHAE), founded in 1894, and the American Society of Refrigerating Engineers (ASRE), founded in 1904.
  • ASIC (application-specific integrated circuit) - An ASIC (application-specific integrated circuit) is a microchip designed for a special application, such as a particular kind of transmission protocol or a hand-held computer.
  • Asilomar AI Principles - Asilomar AI Principles are 23 main beliefs for guiding the research and development of artificial intelligence (AI).
  • ASIO (Audio Stream Input/Output) - ASIO (Audio Stream Input/Output), developed by Steinberg, is a cross-platform, multi-channel audio transfer protocol that is being adopted by many of the manufacturers of audio/MIDI sequencing applications.
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • aspect ratio - Aspect ratio is an image projection attribute that describes the proportional relationship between the width of an image and its height.
  • aspect-oriented programming (AOP) - Aspect-oriented programming (AOP) is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
  • assembler - An assembler is a program that takes basic computer instructions and converts them into a pattern of bits that the computer's processor can use to perform its basic operations.
  • assembly line - An assembly line is a manufacturing process in which interchangeable parts are assembled as they are passed in a direct line from workstation to workstation until a final product is produced.
  • asset liability management - Asset liability management (ALM) is the administration of policies and procedures that address financial risks associated with changing interest rates, foreign exchange rates and other factors that can affect a company’s liquidity.
  • asset management - Asset management is a financial service offered by professional firms for the holding, transferring, buying and selling of different types of cash and investments.
  • asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
  • asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
  • assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • ASSP (application-specific standard product) - In computers, an ASSP (application-specific standard product) is a semiconductor device integrated circuit (IC) product that is dedicated to a specific application market and sold to more than one user (and thus, "standard").
  • astronomical unit (AU) - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric cryptography (public key cryptography) - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
  • Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.
  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • ATAPI (AT Attachment Packet Interface) - ATAPI (AT Attachment Packet Interface) is an interface between your computer and attached CD-ROM drives and tape backup drives.
  • athenahealth Inc. - athenahealth Inc.
  • ATM black box attack - An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes into the top of the cash machine to gain access to its internal infrastructure.
  • ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
  • atom - An atom is a particle of matter that uniquely defines achemical element.
  • atomic - In ancient philosophy, an atom was the ultimate unit of matter on which more complex views of material reality were based.
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic force microscopy (AFM) - Atomic force microscopy (AFM) is a technique for analyzing the surface of a rigid material all the way down to the level of the atom.
  • atomic mass unit (AMU or amu) - The atomic mass unit (AMU or amu) of an element is a measure of its atomic mass.
  • attack surface - An attack surface is defined as the total number of all possible entry points for unauthorized access into any system.
  • attack surface analysis - An organization's attack surface includes all the exploitable vulnerabilities in its hardware, software, connections and even its employees, in the form of social engineering.
  • attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention management - Attention management is an area of endeavor seeking to optimize the way people allocate their limited capacity for focused mental engagement.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attribute - In general, an attribute is a property or characteristic.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • ATX - ATX is an industry-wide specification for a desktop computer's motherboard.
  • audio - Audio is sound within the acoustic range available to humans.
  • audio content - Audio content is any type of published material or information that is consumed through listening.
  • audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • audit trail - In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries.
  • AUFS (Advanced Multi-Layered Unification Filesystem) - Advanced multi-layered unification filesystem (AUFS) is a union filesystem sometimes used in platform-as-a-service environments to merge distinct directory hierarchies into a single directory.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is designed to supplement human intelligence rather than replace it.
  • augmented learning - Augmented learning (AL) is the use of real-life experiences, objects and elements that have been recreated on a computer or mobile device to enhance specific educational concepts.
  • augmented memory - Augmented memory is the practice of artificially increasing a person's ability to produce long term memories and retain information.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Unlike virtual reality gaming, which often requires a separate room or confined area to create an immersive environment, augmented reality gaming uses the existing environment and creates a playing field within it.
  • Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.
  • authentication factor - An authentication factor is a category of credential used for identity verification.
  • authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
  • authentication ticket or ticket-granting ticket (TGT) - An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • authorization - Authorization is the process of giving someone permission to do or have something.
  • authorized service provider (ASP) - An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
  • Automated Insights - Automated Insights is a company that makes artificial intelligence (AI) applications that can understand statistical, numeric and graphed data and present it in an articulate and understandable written format.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated machine learning (AutoML) - Automated machine learning is the process of applying machine learning models to real-world problems using automation.
  • automated meter reading (AMR) - Automated meter reading (AMR) is a technology used in utility meters for collecting the data that's needed for billing purposes.
  • automated provisioning - Automated provisioning is the ability to deploy an information technology or telecommunications service by using predefined procedures that are carried out electronically without requiring human intervention.
  • automated reasoning - Automated reasoning is the area of computer science that is concerned with applying reasoning in the form of logic to computing systems.
  • automated speech recognition (ASR) - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • automated storage tiering (AST) - Automated storage tiering (AST) is a storage software management feature that dynamically moves information between different disk types and RAID levels to meet space, performance and cost requirements.
  • automated storytelling - Automated storytelling is a process involving the use of artificial intelligence (AI) to create written stories.
  • automated test equipment (ATE) - Automated test equipment (ATE) is computer-controlled equipment that tests electronic devices for functionality and performance.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • automatic content classification - Automatic content classification is a process for managing text and unstructured information by categorizing or clustering text.
  • Automatic Data Processing Inc. (ADP) - Automatic Data Processing Inc.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • automotive IT - Automotive IT is any hardware or software designed to augment and support the experience of operating a motor vehicle.
  • autonomic computing - Autonomic computing is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system.
  • autonomous business process (ABP) - Autonomous Business Process (ABP) utilizes intelligent software agents to discover existing business processes to optimize their efficiency and performance.
  • autonomous ship - An autonomous ship is a water craft piloted by artificial intelligence (AI).
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autonomous transaction - In Oracle's database products, an autonomous transaction is an independent transaction that is initiated by another transaction.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
  • autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
  • AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment system and related product descriptions and reviews.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close