Browse Definitions :

Browse Definitions by Alphabet

OUT - OWN

  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • outline - An outliner application is a text editor that gives the user control of the visible level of detail of a textual outline, allowing browsing and reorganization of the content according to its structure.
  • Outline Processor Markup Language - Outline Processor Markup Language (OPML) is an XML file format used for creating outlines.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that allows end users with Microsoft Office Outlook 2010, Outlook 2007 or Outlook 2003 to access corporate email and calendars over the Internet from outside the corporate domain without having to log into a virtual private network (VPN).
  • Outlook Cheat Sheets - We've gathered resources from around the Web to help you work more effectively in Outlook.
  • Outlook Web App - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • output feedback - In cryptography, output feedback (OFB) is a mode of operation for a block cipher.
  • outsource - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • outsourcing - Outsourcing is a business practice in which a company hires a third-party to perform tasks, handle operations or provide services for the company.
  • over provisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • Over the Air - Over The Air (OTA) (or Over-The-Air) is a standard for the transmission and reception of application-related information in a wireless communications system.
  • Over-the-Air - Over The Air (OTA) (or Over-The-Air) is a standard for the transmission and reception of application-related information in a wireless communications system.
  • over-the-top (OTT) - Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.
  • overall equipment effectiveness (OEE) - Overall equipment effectiveness is a measure of manufacturing operations performance and productivity, expressed in a percentage.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overcommitment - Memory overcommit (or overcommitment) is a hypervisor feature that allows a virtual machine (VM) to use more memory space than the physical host has available.
  • overfitting - Overfitting is the incorrect optimizing of an artificial intelligence (AI) model, where the seeking of accuracy goes too far and may result in false positives.
  • overhead - In business accounting, overhead is general operating expenses, including such items as heat and electricity for the premises, that have no direct relationship to the production or selling of a company's goods and services.
  • Overheard in the tech blogosphere (July 2008) - A quiz about blog quotes: Who said 'Microsoft would have us believe that helping your neighbor is the equivalent of attacking a ship?'.
  • overlay network - An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • oversharing - Oversharing is the disclosure of an inappropriate amount of detail.
  • overstuffing - Spamdexing, coined from spam and index, is the practice of including information in a Web page that causes search engines to index it in some way that produces results that satisfy the spamdexer but usually dissatisify the search engine providers and users.
  • oversubscription - Oversubscription, in a SAN (storage area network) switching environment, is the practice of connecting multiple devices to the same switch port to optimize switch use.
  • oVirt - OVirt is an open source data center virtualization platform developed and promoted by Red Hat.
  • OVSDB (Open vSwitch Database Management Protocol) - The Open vSwitch Database Management Protocol (OVSDB) is an OpenFlow configuration protocol that is designed to manage Open vSwitch implementations.
  • OWA - Outlook on the web is the browser-based email client for users to access email, calendars, tasks and contacts from Microsoft's on-premises Exchange Server and cloud-based Exchange Online.
  • OWASP - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP (Open Web Application Security Project) - The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.
  • OWASP Top Ten - The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.
  • owned - Owned, in common slang, means decisively defeated, with the implication of domination and possession.
  • owned media/earned media/paid media - Owned, earned and paid media are three different types of advertising content used by digital marketing teams to create a complete and effective marketing strategy.
  • ownership tag - An ownership tag is a security feature on Compaq computers, consisting of an encrypt ed text string that displays at startup to uniquely identify a computer.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close