Browse Definitions :

Browse Definitions by Alphabet

FRI - WHA

  • friendly name - A friendly name is the title given to an application file, certificate or other IT asset so that a person easily understands and remembers it.
  • friendly virus - A friendly virus is malware that is designed to be helpful in some way rather than destructive or annoying, as is typically the case with conventional viruses.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the fiber-based connection of the cloud radio access network (C-RAN), a new type of cellular network architecture of centralized baseband units (BBUs) and remote radio heads (RRHs) at the access layer of the network.
  • FTC (Federal Trade Commission) - The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • Fuchsia OS - Fuchsia OS is a cross-device, open source operating system from Google.
  • fudge factor - A fudge factor is an element inserted into a calculation, formula or model to allow for error or uncertainty.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • Fujitsu Ltd. - Fujitsu Ltd.
  • Fulfillment by Amazon (FBA) - Fulfillment by Amazon (FBA) is an advanced service in which third-party vendors store their products in Amazon’s fulfillment centers and the e-commerce giant picks, sorts, packs, ships, keeps records, and handles returns and refunds for these products.
  • fulfillment center - A fulfillment center is a warehouse where incoming orders are received, processed and filled.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • full HDTV (ultra-HD, true HDTV, 1080p) - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • full-text database - A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading.
  • full-text search file (FTS file) - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • fullerene - A fullerene is a pure carbon molecule composed of at least 60 atoms of carbon.
  • fully qualified domain name (FQDN) - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • function - In information technology, the term function (pronounced FUHNK-shun) has a number of meanings.
  • function as a service (FaaS) - Function as a service (FaaS) is a cloud computing model that enables users to develop applications and deploy functionalities without maintaining a server, increasing process efficiency.
  • functional programming - Functional programming is a style of programming that emphasizes the evaluation of expressions rather than the execution of commands.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • functional specification - A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application's intended requirements and specifications.
  • functionality - In information technology, functionality (from Latin functio meaning "to perform") is the sum or any aspect of what a product, such as a software application or computing device, can do for a user.
  • future proofing - Future proofing is the attempt to make something impervious to the challenges that it is likely to encounter as time passes.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy logic - Fuzzy logic is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
  • fuzzy number - A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary" (single-valued) numbers.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • NetApp FlexPod - NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.
  • What is failover? - Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
  • What is fog computing? - Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close