Browse Definitions :

Browse Definitions by Alphabet

VMW - VOX

  • VMware VMCI (VMware Virtual Machine Communication Interface) - VMware VMCI (Virtual Machine Communication Interface) is a high-speed interface that virtual machines (VMs) on the same host use to communicate with each other and the host kernel modules.
  • VMware VMFS - VMware VMFS (Virtual Machine File System) is a cluster file system that facilitates storage virtualization for multiple installations of VMware ESX Server, a hypervisor that partitions physical servers into multiple virtual machines.
  • VMware VMFS (Virtual Machine File System) - VMware VMFS (Virtual Machine File System) is a cluster file system that facilitates storage virtualization for multiple installations of VMware ESX Server, a hypervisor that partitions physical servers into multiple virtual machines.
  • VMware VMmark - VMware VMmark is a free benchmarking utility that runs several workloads to measure the performance and scalability of multiple hosts in a virtualized environment.
  • VMware vRealize Code Stream - VMware vRealize Code Stream is an automated DevOps tool in the vRealize Suite that uses a dashboard and controls to manage the delivery of an application from development to testing to publication.
  • VMware vRealize Log Insight (formerly vCenter Log Insight) - VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.
  • VMware vRealize Operations for Horizon - VMware vRealize Operations for Horizon is a monitoring tool that tracks the health and performance of Horizon, Citrix XenDesktop and XenApp, and Remote Desktop Session Host deployments.
  • VMware vRealize Suite - VMware vRealize Suite, formerly called vCenter Operations Management Suite, is a software platform designed to help IT administrators build and manage heterogeneous, hybrid clouds.
  • VMware vSAN (formerly Virtual SAN) - VMware vSAN (formerly Virtual SAN) is a hyper-converged, software-defined storage (SDS) product developed by VMware that pools together direct-attached storage devices across a VMware vSphere cluster to create a distributed, shared data store.
  • VMware vShield - VMware vShield is a group of networking and security products for virtualized IT infrastructures, comprising vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint.
  • VMware vSphere - VMware vSphere -- formerly known as VMware Infrastructure -- is the brand name for VMware's suite of server virtualization products that includes its ESXi hypervisor and vCenter management software.
  • VMware vSphere 6 - VMware vSphere 6 is an enterprise-class virtualization platform intended to provision, manage, automate and pool the use of an organization’s virtualized computing resources.
  • VMware vSphere App HA - VMware vSphere App HA is virtual appliance introduced with vSphere 5.
  • VMware vSphere Big Data Extensions (BDE) - VMware vSphere Big Data Extensions (BDE) is a virtual appliance that enables administrators to deploy and manage the Hadoop clusters for big data analytics in the vSphere virtual infrastructure.
  • VMware vSphere Client - The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.
  • VMware vSphere Content Library - The vSphere Content Library is a centralized repository in vSphere 6 to help manage and distribute virtual machines, templates, ISO images, scripts, vApps and other files related to virtual machines.
  • VMware vSphere Data Protection Advanced (VMware VDPA) - VMware vSphere Data Protection Advanced (VMware VDPA) is a backup management, recovery and replication utility for virtual machines and applications that is based on EMC Avamar deduplication technology.
  • VMware vSphere Distributed Switch (VMware vDS) - A VMware vSphere Distributed Switch (VMware vDS) allows a single virtual switch to connect multiple hosts in a cluster or multiple clusters for centralized management of network configurations in a vSphere environment.
  • VMware vSphere Hypervisor - The VMware vSphere Hypervisor is a free, bare-metal hypervisor from VMware that allows users to virtualize their servers and consolidate applications.
  • VMware vSphere Integrated Containers (VIC) - VMware vSphere Integrated Containers allow an administrator to deploy and manage containers alongside their traditional VMs in vSphere.
  • VMware vSphere Loyalty Program - The VMware vSphere Loyalty Program is a program that allows VMware EVO:RAIL users to apply vSphere Enterprise Plus licenses to their VMware EVO:RAIL appliances instead of having to pay for double.
  • VMware vSphere Metro Storage Cluster (VMware vMSC) - VMware vSphere Metro Storage Cluster (VMware vMSC) is a configuration option, introduced in vSphere 5, that allows for the use of stretched clusters that are spread across geographical locations.
  • VMware vSphere Network I/O Control (NIOC) - VMware vSphere Network I/O Control (NIOC) allows administrator to set up rules and policies to prioritize bandwidth for different network resource pools on a vSphere distributed switch.
  • VMware vSphere PowerCLI - VMware vSphere PowerCLI is a command-line interface (CLI) tool for automating vSphere and vCloud management.
  • VMware vSphere Remote Office Branch Office - VMware vSphere Remote Office Branch Office is a new vSphere product announced by VMware at VMworld 2014.
  • VMware vSphere Security Hardening Guide - The VMware vSphere Security Hardening Guide is an Excel document provided by VMware that lists more than 150 recommendations to systems administrators to further secure their vSphere environment.
  • VMware vSphere Site Recovery Manager (SRM) - VMware vSphere Site Recovery Manager (SRM) is a disaster recovery management product from VMware that provides automated failover and disaster recovery testing.
  • VMware vSphere Storage Appliance (VSA) - VMware vSphere Storage Appliance (VSA) is software developed by VMware that pools disk space from ESXi hosts to provide high availability features without requiring additional storage hardware.
  • VMware vSphere Update Manager (VUM) - VMware vSphere Update Manager (VUM) is software that manages vSphere versions, installs and updates third-party ESX/ESXi host extensions, automates the patch and upgrade process on ESX/ESXi hosts, and performs upgrades to virtual appliances, VMware Tools and virtual machine hardware.
  • VMware vSphere Web Client plug-in - VMware vSphere Web Client plug-ins are programs that either come from VMware itself or from third-party developers and partners to extend the vSphere Web Client with custom menu selections and toolbar icons that provide access to custom capabilities and external functionality.
  • VMware vStorage Thin Provisioning - VMware vStorage Thin Provisioning increases virtual machine (VM) storage use through dynamic allocation and intelligent provisioning of physical storage capacity.
  • VMware Workspace ONE - VMware Workspace ONE is a management platform that allows IT administrators to centrally control end users' mobile devices and cloud-hosted virtual desktops and applications from the cloud or from an on-premises deployment.
  • VMware Workstation Pro - VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.
  • VMworld - VMworld is a conference covering virtualization and cloud computing technologies from VMware Inc and its partners and third-party vendors.
  • VMXNET Generation 3 (VMXNET3) - VMXNET Generation 3 (VMXNET3) is a virtual network adapter designed to deliver high performance in virtual machines (VMs) running on the VMware vSphere platform.
  • VNC - Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
  • vNUMA (virtual NUMA) - vNUMA (virtual NUMA) is a memory-access optimization method for VMware virtual machines (VMs) that helps prevent memory-bandwidth bottlenecks.
  • VOB - A Versioned Object Base (VOB) is a centralized database that stores version information about the files and folders in a software configuration management (SCM) system.
  • vocoder - A vocoder is an audio processor that captures the characteristic elements of an an audio signal and then uses this characteristic signal to affect other audio signals.
  • voice activation detection - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice control (voice assistance) - Voice control, also called voice assistance, is a user interface that allows hands-free operation of a digital device.
  • voice design - Voice design is the process of planning and mapping all the possible interactions that might occur between a voice assistant and an end user.
  • voice emulation (voice reproduction) - Voice emulation is the software-generated reproduction of an individual's speech.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice of the customer (VOC) - Voice of the customer (VOC) is the component of customer experience that focuses on customer needs, wants, expectations and preferences.
  • Voice over Internet Protocol - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • Voice over Internet Protocol caller identification - VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.
  • Voice over IP - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • voice phishing - Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.
  • voice recognition - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice SEO - Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.
  • voice signature - A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature.
  • voice spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP (voice over Internet Protocol) - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP caller ID - VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.
  • VoIP caller ID (voice over Internet Protocol caller identification) - VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.
  • VoIP gateway - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • VoIP phishing - Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is computer storage that only maintains its data while the device is powered.
  • Volcker rule - The Volcker rule is a section of the Dodd–Frank Act that restricts U.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt ampere - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • volt per meter - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt per meter (V/m) - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt-ampere - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • volt-ampere (VA) - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • VoltDB - VoltDB is an in-memory database.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • volume testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • volunteer cloud (peer-to-peer cloud, ad-hoc cloud) - Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • von Neumann, John - John von Neumann was the scientist who conceived a fundamental idea that serves all modern computers - that a computer's program and the data that it processes do not have to be fed into the computer while it is working, but can be kept in the computer's memory - a notion generally referred to as the stored-program computer.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • Vorbis - Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC.
  • Vouch by Reference - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VoWLAN - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN cellular - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close