Browse Definitions :

Browse Definitions by Alphabet

FIR - FLE

  • firefighting - Firefighting is an emergency allocation of resources, required to deal with an unforeseen problem.
  • Firefox - Firefox is a Web browser that is smaller, faster, and in some ways more secure than the Netscape browser from which much of its code was derived.
  • Firefox 3 - Firefox 3 (Fx3 or FF3) is the third version of the popular Web browser released by the Mozilla Corporation.
  • Firefox 3 (Fx3 or FF3) - Firefox 3 (Fx3 or FF3) is the third version of the popular Web browser released by the Mozilla Corporation.
  • Firefox 3.5 - Firefox 3.5 is a version of the Mozilla Foundation's Web browser that was released in June 2009.
  • Firefox OS - Firefox OS is a Linux-based mobile operating system designed for smartphones, tablets and smart TVs.
  • Firefox Reality - Firefox Reality is a multi-platform browser optimized for standalone VR (virtual reality), AR (augmented reality) and MR (mixed reality) headsets.
  • firehose effect - A firehose effect occurs in a network when the source (transmitting) computer or terminal sends data too fast for a destination (receiving) computer or terminal to deal with it.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • Firestarter - Firestarter is an open source firewall program for personal computers and servers that support Linux kernels 2.
  • firewall - A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a computer network.
  • Firewall Builder - Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipfilter.
  • Firewall Builder (Fwbuilder) - Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipfilter.
  • FirewallD - FirewallD, also known as Dynamic Firewall, replaces Fedora's old firewall tool, iptables, and allows for easier configuration and interface.
  • FireWire - FireWire is Apple Computer's version of a standard, IEEE 1394, High Performance Serial Bus, for connecting devices to your personal computer.
  • firmographic data - Firmographic data is types of information that can be used to categorize organizations, such as location, name, number of clients, industry and so on.
  • firmware - Firmware is programming that's written to the non-volatile memory of a hardware device.
  • First Amendment of the Internet - Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
  • First Amendment to the Constitution - The First Amendment to the United States Constitution is one of a group of ten additions to the original document that provided a framework for law within the country.
  • first call resolution (FCR) - In customer relationship management (CRM), first call resolution is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call.
  • first computer virus - Elk Cloner was the first computer virus known to have spread in the wild.
  • first follower theory - First follower theory is the concept that attracting an adherent to some kind of view or initiative is the first step toward beginning a movement, no matter how unusual or out-of-step with the surrounding culture it may seem to the general population.
  • first in first out - In computer programming, FIFO (first-in, first-out) is an approach to handling program work requests from queues or stacks so that the oldest request is handled next.
  • first law of thermodynamics - Energy is neither created nor destroyed.
  • first mover - In the business world, a first mover is a company that aims to gain an advantageous and perhaps insurmountable market position by being the first to establish itself in a given market.
  • first-order logic - First-order logic is symbolized reasoning in which each sentence, or statement, is broken down into a subject and a predicate.
  • first-order predicate calculus - Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.
  • first-person view (FPV) - First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.
  • Firstsource Solutions - Firstsource Solutions (BSE / NSE: FSL) is a Mumbai-based provider of business process outsourcing (BPO) services.
  • fiscal quarter - A fiscal quarter is one of the four three-month periods that make up an organization’s fiscal year.
  • fiscal year - A fiscal year is the twelve-month period that an organization uses for budgeting, forecasting and reporting.
  • fishbone diagram (Ishikawa cause and effect) - A fishbone diagram is a visualization tool for categorizing the potential causes of a problem in order to identify its root causes.
  • fishing - Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.
  • FISMA - The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats.
  • fist of five - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • fist to five - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • fist to five (fist of five) - Fist to five, also called fist of five, is a technique used by agile software development teams to poll team members and help achieve consensus.
  • FITCE - FITCE (Federation of Telecommunications Engineers of the European Community) is an international association that is committed to affecting telecommunication developments in a positive and constructive manner throughout Europe and the rest of the world.
  • five 9s - In computers, 99.
  • five nines - In computers, 99.
  • Five Steps to Incident Management in a Virtualized Environment - Incident management (IM) is a necessary part of a security program.
  • fix - A software patch or fix helps resolve issues that crop up in different programs.
  • FIX protocol - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • fixed data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • fixed data (permanent data, reference data, archival data, or fixed-content data) - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • fixed length subnet mask - A fixed-length subnet mask (FLSM) is a sequence of numbers of unchanging length that streamlines packet routing within the subnets of a proprietary network.
  • fixed mobile convergence - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • fixed mobile substitution - Fixed-mobile substitution (FMS) is the tendency for consumers and businesses to increasingly substitute cellular telephones for hard-wired or cordless landline sets.
  • fixed price - A fixed price is a non-negotiable sum charged for a product, service or piece of work.
  • fixed price contract - A fixed-price contract, also known as a lump sum contract, is an agreement between a vendor or seller and a client that stipulates goods and/or services that will be provided and the price that will be paid for them.
  • fixed wireless - Fixed wireless refers to the operation of wireless devices or systems in fixed locations such as homes and offices.
  • fixed-content data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • fixed-length subnet mask - A fixed-length subnet mask (FLSM) is a sequence of numbers of unchanging length that streamlines packet routing within the subnets of a proprietary network.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) is a sequence of numbers of unchanging length that streamlines packet routing within the subnets of a proprietary network.
  • fixed-mobile convergence - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • fixed-mobile convergence (FMC) - Fixed-mobile convergence (FMC) is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
  • fixed-mobile substitution - Fixed-mobile substitution (FMS) is the tendency for consumers and businesses to increasingly substitute cellular telephones for hard-wired or cordless landline sets.
  • fixed-mobile substitution (FMS) - Fixed-mobile substitution (FMS) is the tendency for consumers and businesses to increasingly substitute cellular telephones for hard-wired or cordless landline sets.
  • Fizt - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flag - In programming, a flag is a predefined bitor bit sequence that holds a binary value.
  • flaky test - A flaky test is a quality assurance (QA) test that fails to produces consistent results.
  • flamebait - On the Internet, flamebait is a "posting" or note on a Web site discussion forum, an online bulletin board, a Usenet newsgroup, or other public forum that is intended to elicit the extremely strong responses characteristic of flaming and active public discussions.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • flanging - Flanging is an audio process that combines two copies of the same signal, with the second delayed slightly, to produce a swirling effect.
  • FLAPE - FLAPE (flash plus tape) is an approach to tiered storage that allows administrators to archive data as soon as it is written.
  • Flash - Flash, a popular authoring software developed by Macromedia, is used to create vector graphics-based animation programs with full-screen navigation interfaces, graphic illustrations, and simple interactivity in an antialiased, resizable file format that is small enough to stream across a normal modem connection.
  • Flash ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • flash cache appliance - A NAND flash cache appliance is a dedicated network appliance that resides between the hosts and underlying storage arrays.
  • flash controller (flash memory controller) - A flash controller is the part of solid-state flash memory that communicates with the host device and manages the flash file system directory.
  • Flash cookie - Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.
  • Flash drive - A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash memory and can attach to a keychain.
  • flash drive - A flash solid state drive (SSD)  is a non-volatile storage device that stores persistent data in flash memory.
  • flash file system - Flash file systems are designed specifically for memory devices.
  • flash memory - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • flash memory - Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.
  • flash memory card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • flash memory card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • flash mob - A flash mob is a group of strangers who organize themselves, using electronic media such as cell phones or the Internet, to gather together in a public place, behave in a predetermined (and often silly) manner for a predetermined amount of time, and then quickly disperse.
  • flash RAM - Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.
  • flash rob - A flash rob (or flash robbery) is a crime in which a large group of people - usually teenagers - converges to steal items from a store and then disperses as suddenly as they gathered.
  • flash rob (flash robbery) - A flash rob (or flash robbery) is a crime in which a large group of people - usually teenagers - converges to steal items from a store and then disperses as suddenly as they gathered.
  • flash robbery - A flash rob (or flash robbery) is a crime in which a large group of people - usually teenagers - converges to steal items from a store and then disperses as suddenly as they gathered.
  • flash storage - Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.
  • flash-based solid state drive (SSD) - A flash solid state drive (SSD)  is a non-volatile storage device that stores persistent data in flash memory.
  • flashmob - A flash mob is a group of strangers who organize themselves, using electronic media such as cell phones or the Internet, to gather together in a public place, behave in a predetermined (and often silly) manner for a predetermined amount of time, and then quickly disperse.
  • FlashMob supercomputer - A FlashMob supercomputer is a group of computer enthusiasts who gather together in one physical location for a brief time period in order to function as a supercomputer and work on a single problem.
  • flat address space - 1. A flat address space is a set of addresses arranged on a single level.
  • flat backup - Flat backup uses snapshots to protect data without traditional backup software.
  • flat design - Flat design is a simple, graphic style common in user interface (UI), software and Web design.
  • flat file - A flat file contains records that have no structured interrelationship.
  • flat file system - A flat file system is a system of files in which every file in the system must have a different name.
  • Flat-panel TV Glossary - A glossary with terms related to flat-panel TVs.
  • Flat-panel TV Guide - Benefits of flat-panel TVs | Flat-panel features to considerA quick comparison of LCD, LED, OLED and plasma TVsFlat-panel TV technologies: LCD | LED | Plasma | OLEDMore informationA flat-panel TV is a television set that uses one of several different technologies for display in a flat, thin format.
  • fleet management - Fleet management is an administrative approach that allows companies to organize and coordinate work vehicles with the aim to improve efficiency, reduce costs, and provide compliance with government regulations.
  • fleet management software - Fleet management software is an application that helps companies organize, manage and coordinate work vehicles from a central information system to keep the overall fleet operation running smoothly.
  • Flex - Flex is an open source program designed to automatically and quickly generate scanners, also known as tokenizers, which recognize lexical patterns in text.
  • flexfield - In an Oracle environment, a flexfield is a database field that has flexibility built into it so that users can define reporting structures that are relevant to their specific organizations.
  • Flexible Mandatory Access Control - Flexible Mandatory Access Control (FMAC) is an ongoing project intended to enhance the Sun Microsystems OpenSolaris operating platform by adding two security technologies: Flux Advanced Security Kernel (Flask) and Type Enforcement (TE).

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close