Browse Definitions :

Browse Definitions by Alphabet

OSP - OWN

  • OSPF - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • OSPF (Open Shortest Path First) - The OSPF router protocol is used to find the best path for packets as they pass through a set of connected networks.
  • OSS - An operational support system (OSS) is a set of programs that help a communications service provider monitor, control, analyze and manage a telephone or computer network.
  • ost - An OST file is an offline folder file in Microsoft Outlook.
  • OST file - An OST file is an offline folder file in Microsoft Outlook.
  • OST file (.ost) - An OST file is an offline folder file in Microsoft Outlook.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • OTC - Order to cash (OTC or O2C) is a set of business processes that involve receiving and fulfilling customer requests for goods or services.
  • OTFT - Organic thin-film transistor (OTFT) technology involves the use of organic semiconducting compounds in electronic components, notably computer displays.
  • OTS - A common test platform (CTP), also called an open test standard (OTS), is a set of specifications defining test methods for diverse components of computer and electronic systems to be marketed as complete products.
  • OTTO protocol - OTTO (OUCH To Trade Options) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • OTTO protocol (OUCH To Trade Options) - OTTO (OUCH To Trade Options) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • OUCH protocol - OUCH is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • OUCH To Trade Options - OTTO (OUCH To Trade Options) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Ouch to Trade Options protocol - OTTO (OUCH To Trade Options) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Our Favorite Cheat Sheets - A collection of our favorite IT cheatsheets, tips and tricks.
  • Our Favorite IT Sniglets - A sniglet is a word that should be in the dictionary but isn't.
  • Our Favorite Technology Blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
  • Oura ring - Oura ring is a wearable device made to measure the quality of the wearer’s sleep.
  • out of order execution - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • out-of-band authentication - Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • out-of-order execution - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • out-of-order execution (OoOE) - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • outbound call - An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.
  • outbound call center - An outbound call center is one in which call center agents make outbound calls to customers on behalf of a business or client.
  • outbound marketing - Outbound marketing is a traditional form of marketing and in which a company initiates contact with potential customers, or leads.
  • outcome economy - Outcome economy describes an economy based on the marketing, pricing and selling of the results provided by goods and services rather than their face value.
  • outlet - A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors (male connector) can be inserted snugly into it to ensure a reliable physical and electrical connection.
  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • Outline Processor Markup Language - Outline Processor Markup Language (OPML) is an XML file format used for creating outlines.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • Outlook Web App - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • outsource - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • outsourcing - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • over provisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • over-the-top (OTT) - Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.
  • overall equipment effectiveness (OEE) - Overall equipment effectiveness is a measure of manufacturing operations performance and productivity, expressed in a percentage.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overcommitment - Memory overcommit (or overcommitment) is a hypervisor feature that allows a virtual machine (VM) to use more memory space than the physical host has available.
  • overfitting - Overfitting is the incorrect optimizing of an artificial intelligence (AI) model, where the seeking of accuracy goes too far and may result in false positives.
  • overhead - In business accounting, overhead is general operating expenses, including such items as heat and electricity for the premises, that have no direct relationship to the production or selling of a company's goods and services.
  • Overheard in the tech blogosphere (July 2008) - A quiz about blog quotes: Who said 'Microsoft would have us believe that helping your neighbor is the equivalent of attacking a ship?'.
  • overlay network - An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • oversharing - Oversharing is the disclosure of an inappropriate amount of detail.
  • oversubscription - Oversubscription, in a SAN (storage area network) switching environment, is the practice of connecting multiple devices to the same switch port to optimize switch use.
  • oVirt - OVirt is an open source data center virtualization platform developed and promoted by Red Hat.
  • OVSDB (Open vSwitch Database Management Protocol) - The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.
  • OWA - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • OWASP - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP (Open Web Application Security Project) - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP Top Ten - The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • owned media/earned media/paid media - Owned, earned and paid media are three different types of advertising content used by digital marketing teams to create a complete and effective marketing strategy.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

  • click fraud (pay-per-click fraud)

    Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close