Browse Definitions :

Browse Definitions by Alphabet

FRE - WHA

  • freemium - Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features.
  • FreeNAS Project - The FreeNAS storage operating system is compatible with most major protocols and storage hardware and provides file sharing in a NAS environment.
  • freeware - Freeware (not to be confused with free software) is programming that is offered at no cost and is a common class of small applications available for downloading and use in most operating systems.
  • frequency - For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction.
  • frequency division multiple access - .
  • frequency division multiplexing - In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.
  • frequency jammer - Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
  • frequency shift keying - Frequency-shift keying (FSK) is a method of transmitting digital signals.
  • frequency-division multiplexing - In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.
  • frequency-division multiplexing (FDM) - In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.
  • frequency-hopping spread spectrum (FHSS) - Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.
  • frequency-shift keying - Frequency-shift keying (FSK) is a method of transmitting digital signals.
  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
  • frequently questioned answers - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • fresh data - Fresh data is data that is current and immediately usable and useful.
  • frictionless checkout - Frictionless checkout is a collection of technologies and processes used to make online and retail shopping faster and easier for consumers.
  • frictionless commerce - Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.
  • friendly name - A friendly name is the title given to an application file, certificate or other IT asset so that a person easily understands and remembers it.
  • friendly virus - A friendly virus is malware that is designed to be helpful in some way rather than destructive or annoying, as is typically the case with conventional viruses.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • frontend - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the fiber-based connection of the cloud radio access network (C-RAN), a new type of cellular network architecture of centralized baseband units (BBUs) and remote radio heads (RRHs) at the access layer of the network.
  • Frost - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • FRR - In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
  • FRU - In electronic hardware, particularly computer systems, a field-replaceable unit (FRU) is a circuit board or part that can be quickly and easily removed and replaced by the user or by a technician without having to send the entire product or system to a repair facility.
  • fruit of a poisonous tree - Fruit of the poisonous tree is a legal doctrine according to which any secondary evidence obtained from a source accessed through through illicit means is inadmissible in court.
  • FSF - The Free Software Foundation (FSF) was founded in 1983 along with its demonstration GNU project.
  • FSK - Frequency-shift keying (FSK) is a method of transmitting digital signals.
  • FSO - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • ft s - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft sec - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft/s - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft/sec - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • FTAM - File Transfer Access and Management (FTAM) is an OSI application Layer 7 protocol that standardizes how files are accessed and managed in a distributed network file system.
  • FTC (Federal Trade Commission) - The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.
  • FTP - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FTS file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • FTTH - Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide high-speed internet access.
  • FTTP - Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide high-speed internet access.
  • FTTx - Fiber to the x (FTTx) is a collective term for various optical fiber delivery topologies that are categorized according to where the fiber terminates.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • Fuchsia OS - Fuchsia OS is a cross-device, open source operating system from Google.
  • fudge factor - A fudge factor is an element inserted into a calculation, formula or model to allow for error or uncertainty.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • Fujitsu Ltd. - Fujitsu Ltd.
  • Fulfillment by Amazon (FBA) - Fulfillment by Amazon (FBA) is an advanced service in which third-party vendors store their products in Amazon’s fulfillment centers and the e-commerce giant picks, sorts, packs, ships, keeps records, and handles returns and refunds for these products.
  • fulfillment center - A fulfillment center is a warehouse where incoming orders are received, processed and filled.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • full disk encryption - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • full HDTV (ultra-HD, true HDTV, 1080p) - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • full text search file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • full-disk encryption - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • full-text database - A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading.
  • full-text search file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • full-text search file (FTS file) - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • fullerene - A fullerene is a pure carbon molecule composed of at least 60 atoms of carbon.
  • fully qualified domain name - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • fully qualified domain name (FQDN) - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • function - In information technology, the term function (pronounced FUHNK-shun) has a number of meanings.
  • function as a service (FaaS) - Function as a service (FaaS) is a cloud computing model that enables users to develop applications and deploy functionalities without maintaining a server, increasing process efficiency.
  • functional programming - Functional programming is a style of programming that emphasizes the evaluation of expressions rather than the execution of commands.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • functional specification - A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application's intended requirements and specifications.
  • funnel analysis - Funnel analysis is a way to measure and improve the performance of customer interactions in a step-wise progression from the initial customer contact to a predetermined conversion metric.
  • future proofing - Future proofing is the attempt to make something impervious to the challenges that it is likely to encounter as time passes.
  • futzing - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • futzing (or futzing around) - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • futzing around - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • fuzz testing - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzing - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy logic - Fuzzy logic is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
  • fuzzy matching - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • fuzzy number - A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary" (single-valued) numbers.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • FYI - This term is included in our list of chat term and other chat acronyms.
  • NetApp FlexPod - NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.
  • What is failover? - Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
  • What is fog computing? - Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • information lifecycle management (ILM)

    Information lifecycle management (ILM) is a comprehensive approach to managing an organization's data and associated metadata, ...

  • WORM (write once, read many)

    In computer media, write once, read many, or WORM, is a data storage technology that allows data to be written to a storage ...

  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

Close