Browse Definitions :

Browse Definitions by Alphabet

VMW - WHA

  • VMware Workspace ONE - VMware Workspace ONE is a management platform that allows IT administrators to centrally control end users' mobile devices and cloud-hosted virtual desktops and applications from the cloud or from an on-premises deployment.
  • VMware Workstation Pro - VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.
  • VMXNET Generation 3 (VMXNET3) - VMXNET Generation 3 (VMXNET3) is a virtual network adapter designed to deliver high performance in virtual machines (VMs) running on the VMware vSphere platform.
  • vNUMA (virtual NUMA) - vNUMA (virtual NUMA) is a memory-access optimization method for VMware virtual machines (VMs) that helps prevent memory-bandwidth bottlenecks.
  • vocoder - A vocoder is an audio processor that captures the characteristic elements of an an audio signal and then uses this characteristic signal to affect other audio signals.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice control (voice assistance) - Voice control, also called voice assistance, is a user interface that allows hands-free operation of a digital device.
  • voice design - Voice design is the process of planning and mapping all the possible interactions that might occur between a voice assistant and an end user.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice of the customer (VOC) - Voice of the customer (VOC) is the component of customer experience that focuses on customer needs, wants, expectations and preferences.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice SEO - Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.
  • voice signature - A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP (voice over Internet Protocol) - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP caller ID (voice over Internet Protocol caller identification) - VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is a type of memory that maintains its data only while the device is powered.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt per meter (V/m) - Volt per meter is the standard unit of electric field (E field) strength.
  • volt-ampere (VA) - A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • VoltDB - VoltDB is an in-memory database.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VPD (vital product data) - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPN (virtual private network) - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VPN appliance - A VPN (virtual private network) appliance is a network device equipped with enhanced security features.
  • VPN Reconnect - VPN Reconnect is a feature of Windows 7 and Windows Server 2008 R2 that allows a virtual private network (VPN) connection to remain open during a brief interruption of Internet service.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VRML (Virtual Reality Modeling Language) - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VSAM (Virtual Storage Access Method) - VSAM (Virtual Storage Access Method) is a file management system for IBM's larger operating systems now called z/OS.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSPEX - VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • vSphere CLI (vCLI) - VMware's vSphere CLI (vCLI) commands are used in a command line interface (CLI) when managing VMware ESX/ESXi infrastructures.
  • vSphere HA (VMware High Availability) - VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.
  • vSphere hot add - VMware vSphere hot add is a feature that allows an administrator to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime.
  • vSphere hot plug - vSphere hot plug is a function lets administrators add additional virtual hardware to running virtual machines (VMs).
  • vSphere Replication - VSphere Replication is a feature of vSphere 5.
  • VSTO (Visual Studio Tools for Office or Microsoft Visual Studio Tools) - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • vStorage API - A vStorage API is an application program interface (API) from VMware that enables third-party storage and backup vendors to integrate their products with VMware’s vSphere server virtualization platform.
  • vStorage APIs for Array Integration (VAAI) - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Storage Awareness (VASA) - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • vTax - VTax is the derogatory nickname the general public gave to a licensing change for VMware vSphere 5.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity -- qualities that make a situation or condition difficult to analyze, respond to or plan for.
  • vulnerability (information technology) - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability assessment (vulnerability analysis) - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability disclosure - Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware.
  • vulnerability management planning - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors.
  • VVOLS (Virtual Volumes) - VVOLs is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and managed.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • VXLAN gateway (Virtual Extensible VLAN gateway) - A VXLAN gateway is a solution that allows a virtual extensible LAN (VXLAN) to communicate with another network, particularly a virtual LAN (VLAN).
  • What is virtual desktop infrastructure? VDI explained - Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close