Browse Definitions :

Browse Definitions by Alphabet

FRE - NET

  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals.
  • frequently asked questions - The FAQ (pronounced FAK) or list of "frequently-asked questions" (and answers) has become a feature of the Internet.
  • frequently questioned answers - FQA (frequently questioned answers) are conventions or mandates scrutinized by individuals or groups who doubt their validity.
  • frequently-asked questions - The FAQ (pronounced FAK) or list of "frequently-asked questions" (and answers) has become a feature of the Internet.
  • fresh data - Fresh data is data that is current and immediately usable and useful.
  • fresh out of the box - Fresh out of the box (FOB) is a term used in solid state storage (SSS) to describe a flash memory device that has experienced few or no program/erase (P/E) cycles since the device was manufactured.
  • fresh out of the box (FOB) - Fresh out of the box (FOB) is a term used in solid state storage (SSS) to describe a flash memory device that has experienced few or no program/erase (P/E) cycles since the device was manufactured.
  • frictionless checkout - Frictionless checkout is a collection of technologies and processes used to make online and retail shopping faster and easier for consumers.
  • frictionless commerce - Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.
  • friendly name - A friendly name is the title given to an application file, certificate or other IT asset so that a person easily understands and remembers it.
  • friendly virus - A friendly virus is malware that is designed to be helpful in some way rather than destructive or annoying, as is typically the case with conventional viruses.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • frontend - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the connection of the C-RAN, a new type of cellular network architecture of centralized baseband units (BBU), at the access layer of the network to remote standalone radio heads at cell sites.
  • frontside bus - See also: backside busIn a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • frontside bus (FSB) - See also: backside busIn a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • Frost - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • FRR - In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
  • FRU - In electronic hardware, particularly computer systems, a field-replaceable unit (FRU) is a circuit board or part that can be quickly and easily removed and replaced by the user or by a technician without having to send the entire product or system to a repair facility.
  • fruit of a poisonous tree - Fruit of the poisonous tree is a legal doctrine according to which any secondary evidence obtained from a source accessed through through illicit means is inadmissible in court.
  • FSA - The FSA (Financial Services Authority) is an independent, non-governmental body that regulates the financial services industry in the UK, including most financial services markets, exchanges and firms.
  • FSB - See also: backside busIn a personal computer with an Intel processor chipset that includes a Dual Independent Bus (DIB), the frontside bus is the data path and physical interface between the processor and the main memory (RAM).
  • FSF - The Free Software Foundation (FSF) was founded in 1983 along with its demonstration GNU project.
  • FSK - Frequency-shift keying (FSK) is a method of transmitting digital signals.
  • FSO - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • FSP - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • FSP (full-service provider) - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • ft - The foot (symbolized ft) is the unit of displacement or length in the English foot-pound-second (fps) system.
  • ft s - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft sec - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft/s - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • ft/sec - The foot per second (symbolized ft/s or ft/sec) is the unit of linear speed in the foot-pound-second (fps) or English system.
  • FTAM - File Transfer Access Method (FTAM), also known as File Transfer Access and Management or Electronic File Transfer Access Method (EFTAM), is an ISO standard that specifies methods of transfering files between networked computers.
  • FTAM (File Transfer Access Method) - File Transfer Access Method (FTAM), also known as File Transfer Access and Management or Electronic File Transfer Access Method (EFTAM), is an ISO standard that specifies methods of transfering files between networked computers.
  • FTC (Federal Trade Commission) - The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.
  • FTP (File Transfer Protocol) - File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.
  • FTP cable - FTP (foil screened twisted pair) cable is a cable containing multiple pairs of copper wire enclosed in a sheath of aluminum foil.
  • FTP cable (foil screened twisted pair cable) - FTP (foil screened twisted pair) cable is a cable containing multiple pairs of copper wire enclosed in a sheath of aluminum foil.
  • FTS file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • FTSE 100 - FTSE 100 is an index of the financial performance of the100 largest companies in the UK.
  • FTTC - Fiber to the curb (FTTC) refers to the installation and use of optical fiber cable directly to the curbs near homes or any business environment as a replacement for "plain old telephone service" (POTS).
  • FTTH - Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide unprecedented high-speed Internet access.
  • FTTP - Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide unprecedented high-speed Internet access.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • Fuchsia OS - Fuchsia OS is a cross-device, open source operating system from Google.
  • FUD - FUD (Fear, Uncertainty, and Doubt) is the term for any strategy intended to make a company's customers insecure about future product plans with the purpose of discouraging them from adopting competitors' products.
  • FUD (Fear, Uncertainty, and Doubt) - FUD (Fear, Uncertainty, and Doubt) is the term for any strategy intended to make a company's customers insecure about future product plans with the purpose of discouraging them from adopting competitors' products.
  • fudge factor - A fudge factor is an element inserted into a calculation, formula or model to allow for error or uncertainty.
  • fuel cell - A fuel cell is an electrochemical cell that derives its energy from combustible substances such as hydrogen, methane, propane, methanol, diesel fuel or even gasoline.
  • Fujitsu Ltd. - Fujitsu Ltd.
  • Fulfillment by Amazon (FBA) - Fulfillment by Amazon (FBA) is an advanced service in which third-party vendors store their products in Amazon’s fulfillment centers and the e-commerce giant picks, sorts, packs, ships, keeps records, and handles returns and refunds for these products.
  • fulfillment center - A fulfillment center is a warehouse where incoming orders are received, processed and filled.
  • full and open competition - With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete.
  • Full Backup - A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.
  • full disk encryption - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full HDTV - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • full HDTV (ultra-HD, true HDTV, 1080p) - Full HDTV, also referred to as ultra-HD, true HDTV, and 1080p, is a television (TV) display technology specification that surpasses the quality over the original 720p high-definition television (HDTV) technology specification, providing an image resolution of 1920 by 1080 pixels.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • full service provider - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • full text search file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • full-disk encryption - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • full-service provider - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • full-text database - A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading.
  • full-text search file - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • full-text search file (FTS file) - An FTS file (full-text search file) is created the first time you select the Find tab from a Help window in Windows 95 or later systems.
  • fullerene - A fullerene is a pure carbon molecule composed of at least 60 atoms of carbon.
  • fully qualified domain name - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • fully qualified domain name (FQDN) - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • function - In information technology, the term function (pronounced FUHNK-shun) has a number of meanings.
  • function as a service (FaaS) - Function as a service (FaaS) is a cloud computing model that enables users to develop applications and deploy functionalities without maintaining a server, increasing process efficiency.
  • function key - On a computer keyboard, a function key is one of a sequence of special keys labeled "F1" or higher (usually up to "F12" on most keyboards) that can be assigned a specific use in order to save a user time.
  • functional programming - Functional programming is a style of programming that emphasizes the evaluation of expressions rather than the execution of commands.
  • functional requirements - Functional requirements are the desired operations of a program, or system as defined in software development and systems engineering.
  • functional specification - A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application’s intended requirements.
  • functionality - In information technology, functionality (from Latin functio meaning "to perform") is the sum or any aspect of what a product, such as a software application or computing device, can do for a user.
  • funnel analysis - Funnel analysis is a way to measure and improve the performance of customer interactions in a step-wise progression from the initial customer contact to a predetermined conversion metric.
  • Furby - Furby (pronounced FURR-bee) is the name of an electronic toy, five inches tall, that is covered with simulated fur, has big eyes and ears, a vocabulary of over 200 words, and a limited ability to react to its environment.
  • futzing - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • futzing (or futzing around) - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • futzing around - Futzing or "futzing around" is unstructured, playful, often experimental interaction between a human being and a computer, product, or any technology, sometimes but not always with a productive purpose in mind.
  • fuzz testing - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzing - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy logic - Fuzzy logic is an attempt to use more human-like reasoning and better reflect reality through employing"degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
  • fuzzy matching - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • fuzzy number - A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary" (single-valued) numbers.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • Fwbuilder - Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipfilter.
  • Fx3 - Firefox 3 (Fx3 or FF3) is the third version of the popular Web browser released by the Mozilla Corporation.
  • FYI - This term is included in our list of chat term and other chat acronyms.
  • NetApp FlexPod - NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close