Browse Definitions :

Browse Definitions by Alphabet

OUT - OWN

  • out of the box - "Out of the box" is an expression that describes nonconformal, creative thinking.
  • out-of-band authentication - Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • out-of-band signaling - Out-of-band signaling is telecommunication signaling (exchange of information in order to control a telephone call) that is done on a channel that is dedicated for the purpose and separate from the channels used for the telephone call.
  • out-of-order execution - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • out-of-order execution (OoOE) - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • outbound call - An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.
  • outbound call center - An outbound call center is one in which call center agents make outbound calls to customers on behalf of a business or client.
  • outbound marketing - Outbound marketing is a traditional form of marketing and in which a company initiates contact with potential customers, or leads.
  • outcome economy - Outcome economy describes an economy based on the marketing, pricing and selling of the results provided by goods and services rather than their face value.
  • outlet - A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors (male connector) can be inserted snugly into it to ensure a reliable physical and electrical connection.
  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • outline - An outliner application is a text editor that gives the user control of the visible level of detail of a textual outline, allowing browsing and reorganization of the content according to its structure.
  • Outline Processor Markup Language - Outline Processor Markup Language (OPML) is an XML file format used for creating outlines.
  • Outliner - An outliner application is a text editor that gives the user control of the visible level of detail of a textual outline, allowing browsing and reorganization of the content according to its structure.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • Outlook Cheat Sheets - We've gathered resources from around the Web to help you work more effectively in Outlook.
  • Outlook Web App - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • output feedback - In cryptography, output feedback (OFB) is a mode of operation for a block cipher.
  • output feedback (OFB) - In cryptography, output feedback (OFB) is a mode of operation for a block cipher.
  • outsource - Outsourcing is a business practice in which a company hires another company or an individual to perform tasks, handle operations or provide services that are either usually executed or had previously been done by the company's own employees.
  • outsourcing - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • Outsourcing: Glossary - This is a glossary of terms related both to offshore outsourcing and outsourcing in general.
  • over provisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • Over the Air - Over The Air (OTA) (or Over-The-Air) is a standard for the transmission and reception of application-related information in a wireless communications system.
  • Over the Air (OTA) - Over The Air (OTA) (or Over-The-Air) is a standard for the transmission and reception of application-related information in a wireless communications system.
  • Over-the-Air - Over The Air (OTA) (or Over-The-Air) is a standard for the transmission and reception of application-related information in a wireless communications system.
  • over-the-top (OTT) - Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.
  • overall equipment effectiveness (OEE) - Overall equipment effectiveness is a measure of manufacturing operations performance and productivity, expressed in a percentage.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overcommitment - Memory overcommit (or overcommitment) is a hypervisor feature that allows a virtual machine (VM) to use more memory space than the physical host has available.
  • overfitting - Overfitting is the incorrect optimizing of an artificial intelligence (AI) model, where the seeking of accuracy goes too far and may result in false positives.
  • overhead - In business accounting, overhead is general operating expenses, including such items as heat and electricity for the premises, that have no direct relationship to the production or selling of a company's goods and services.
  • Overheard in the tech blogosphere (July 2008) - A quiz about blog quotes: Who said 'Microsoft would have us believe that helping your neighbor is the equivalent of attacking a ship?'.
  • overlay network - An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • oversharing - Oversharing is the disclosure of an inappropriate amount of detail.
  • overstuffing - Spamdexing, coined from spam and index, is the practice of including information in a Web page that causes search engines to index it in some way that produces results that satisfy the spamdexer but usually dissatisify the search engine providers and users.
  • oversubscription - Oversubscription, in a SAN (storage area network) switching environment, is the practice of connecting multiple devices to the same switch port to optimize switch use.
  • oVirt - OVirt is an open source data center virtualization platform developed and promoted by Red Hat.
  • OVSDB (Open vSwitch Database Management Protocol) - The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.
  • OWA - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • OWASP - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP (Open Web Application Security Project) - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP Top Ten - The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • owned media/earned media/paid media - Owned, earned and paid media are three different types of advertising content used by digital marketing teams to create a complete and effective marketing strategy.
  • ownership tag - An ownership tag is a security feature on Compaq computers, consisting of an encrypt ed text string that displays at startup to uniquely identify a computer.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close