Browse Definitions :

Browse Definitions by Alphabet

VMW - VOL

  • VMware Virtual SMP - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • VMware Virtual SMP (Symmetric Multi-Processing) - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • VMware vLockstep - VMware vLockstep is the technology supporting VMware's Fault Tolerance (FT) high-availability software feature.
  • VMware VMCI (VMware Virtual Machine Communication Interface) - VMware VMCI (Virtual Machine Communication Interface) is a high-speed interface that virtual machines (VMs) on the same host use to communicate with each other and the host kernel modules.
  • VMware VMFS - VMware VMFS (Virtual Machine File System) is a cluster file system that facilitates storage virtualization for multiple installations of VMware ESX Server, a hypervisor that partitions physical servers into multiple virtual machines.
  • VMware VMFS (Virtual Machine File System) - VMware VMFS (Virtual Machine File System) is a cluster file system that facilitates storage virtualization for multiple installations of VMware ESX Server, a hypervisor that partitions physical servers into multiple virtual machines.
  • VMware VMmark - VMware VMmark is a free benchmarking utility that runs several workloads to measure the performance and scalability of multiple hosts in a virtualized environment.
  • VMware vRealize Code Stream - VMware vRealize Code Stream is an automated DevOps tool in the vRealize Suite that uses a dashboard and controls to manage the delivery of an application from development to testing to publication.
  • VMware vRealize Log Insight (formerly vCenter Log Insight) - VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.
  • VMware vRealize Operations for Horizon - VMware vRealize Operations for Horizon is a monitoring tool that tracks the health and performance of Horizon, Citrix XenDesktop and XenApp, and Remote Desktop Session Host deployments.
  • VMware vRealize Suite - VMware vRealize Suite, formerly called vCenter Operations Management Suite, is a software platform designed to help IT administrators build and manage heterogeneous, hybrid clouds.
  • VMware vSAN (formerly Virtual SAN) - VMware vSAN (formerly Virtual SAN) is a hyper-converged, software-defined storage (SDS) product developed by VMware that pools together direct-attached storage devices across a VMware vSphere cluster to create a distributed, shared data store.
  • VMware vShield - VMware vShield is a group of networking and security products for virtualized IT infrastructures, comprising vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint.
  • VMware vSphere - VMware vSphere -- formerly known as VMware Infrastructure -- is the brand name for VMware's suite of server virtualization products that includes its ESXi hypervisor and vCenter management software.
  • VMware vSphere 6 - VMware vSphere 6 is an enterprise-class virtualization platform intended to provision, manage, automate and pool the use of an organization’s virtualized computing resources.
  • VMware vSphere App HA - VMware vSphere App HA is virtual appliance introduced with vSphere 5.
  • VMware vSphere Big Data Extensions (BDE) - VMware vSphere Big Data Extensions (BDE) is a virtual appliance that enables administrators to deploy and manage the Hadoop clusters for big data analytics in the vSphere virtual infrastructure.
  • VMware vSphere Client - The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.
  • VMware vSphere Content Library - The vSphere Content Library is a centralized repository in vSphere 6 to help manage and distribute virtual machines, templates, ISO images, scripts, vApps and other files related to virtual machines.
  • VMware vSphere Data Protection Advanced (VMware VDPA) - VMware vSphere Data Protection Advanced (VMware VDPA) is a backup management, recovery and replication utility for virtual machines and applications that is based on EMC Avamar deduplication technology.
  • VMware vSphere Distributed Switch (VMware vDS) - A VMware vSphere Distributed Switch (VMware vDS) allows a single virtual switch to connect multiple hosts in a cluster or multiple clusters for centralized management of network configurations in a vSphere environment.
  • VMware vSphere Hypervisor - The VMware vSphere Hypervisor is a free, bare-metal hypervisor from VMware that allows users to virtualize their servers and consolidate applications.
  • VMware vSphere Integrated Containers (VIC) - VMware vSphere Integrated Containers allow an administrator to deploy and manage containers alongside their traditional VMs in vSphere.
  • VMware vSphere Loyalty Program - The VMware vSphere Loyalty Program is a program that allows VMware EVO:RAIL users to apply vSphere Enterprise Plus licenses to their VMware EVO:RAIL appliances instead of having to pay for double.
  • VMware vSphere Metro Storage Cluster (VMware vMSC) - VMware vSphere Metro Storage Cluster (VMware vMSC) is a configuration option, introduced in vSphere 5, that allows for the use of stretched clusters that are spread across geographical locations.
  • VMware vSphere Mobile Watchlist - The VMware vSphere Mobile Watchlist is a free application that allows administrators with an Android or iOS smartphone to monitor and correct issues with virtual machines (VM) on an infrastructure running on vSphere 5.
  • VMware vSphere Network I/O Control (NIOC) - VMware vSphere Network I/O Control (NIOC) allows administrator to set up rules and policies to prioritize bandwidth for different network resource pools on a vSphere distributed switch.
  • VMware vSphere PowerCLI - VMware vSphere PowerCLI is a command-line interface (CLI) tool for automating vSphere and vCloud management.
  • VMware vSphere Remote Office Branch Office - VMware vSphere Remote Office Branch Office is a new vSphere product announced by VMware at VMworld 2014.
  • VMware vSphere Security Hardening Guide - The VMware vSphere Security Hardening Guide is an Excel document provided by VMware that lists more than 150 recommendations to systems administrators to further secure their vSphere environment.
  • VMware vSphere Site Recovery Manager (SRM) - VMware vSphere Site Recovery Manager (SRM) is a disaster recovery management product from VMware that provides automated failover and disaster recovery testing.
  • VMware vSphere Storage Appliance (VSA) - VMware vSphere Storage Appliance (VSA) is software developed by VMware that pools disk space from ESXi hosts to provide high availability features without requiring additional storage hardware.
  • VMware vSphere Update Manager (VUM) - VMware vSphere Update Manager (VUM) is software that manages vSphere versions, installs and updates third-party ESX/ESXi host extensions, automates the patch and upgrade process on ESX/ESXi hosts, and performs upgrades to virtual appliances, VMware Tools and virtual machine hardware.
  • VMware vSphere Web Client plug-in - VMware vSphere Web Client plug-ins are programs that either come from VMware itself or from third-party developers and partners to extend the vSphere Web Client with custom menu selections and toolbar icons that provide access to custom capabilities and external functionality.
  • VMware vStorage Thin Provisioning - VMware vStorage Thin Provisioning increases virtual machine (VM) storage use through dynamic allocation and intelligent provisioning of physical storage capacity.
  • VMware Workspace ONE - VMware Workspace ONE is a centralized management platform that combines the company's enterprise mobility management, cloud-based desktop management and identity management products to manage and secure end-user computing devices.
  • VMware Workstation Pro - VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.
  • VMworld - VMworld is a conference covering virtualization and cloud computing technologies from VMware Inc and its partners and third-party vendors.
  • VMXNET Generation 3 (VMXNET3) - VMXNET Generation 3 (VMXNET3) is a virtual network adapter designed to deliver high performance in virtual machines (VMs) running on the VMware vSphere platform.
  • VNC - Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
  • vNUMA (virtual NUMA) - vNUMA (virtual NUMA) is a memory-access optimization method for VMware virtual machines (VMs) that helps prevent memory-bandwidth bottlenecks.
  • VOB - A Versioned Object Base (VOB) is a centralized database that stores version information about the files and folders in a software configuration management (SCM) system.
  • vocoder - A vocoder is an audio processor that captures the characteristic elements of an an audio signal and then uses this characteristic signal to affect other audio signals.
  • voice activated e mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice activation detection - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice assistant - A voice assistant is a digital assistant that uses voice recognition, natural language processing and speech synthesis to provide aid to users through phones and voice recognition applications.
  • voice authentication - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice commerce - Voice commerce (sometimes known as vCommerce) is user interaction with a commercial Web site that incorporates voice recognition technology.
  • voice design - Voice design is the process of planning and mapping all the possible interactions that might occur between a voice assistant and an end user.
  • voice dial - Voice dial is a telephone feature that initiates a call when the user says a contact name or the digits in a phone number.
  • voice emulation (voice reproduction) - Voice emulation is the software-generated reproduction of an individual's speech.
  • voice enabled e mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice ID - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice ID (voice authentication) - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice identification - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice of the customer (VOC) - Voice of the customer (VOC) is the component of customer experience (CX) and customer satisfaction (CSAT) that focuses on the perception of a customer's needs, wants, expectations and preferences.
  • Voice over Internet Protocol - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • Voice over Internet Protocol caller identification - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • Voice over IP - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • Voice over IP Security Alliance - VOIPSA (Voice over IP Security Alliance) is a cross-industry coalition of individuals and organizations from the security and VoIP communications sectors.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • Voice Over Misconfigured Internet Telephones - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • Voice over WLAN - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • voice phishing - Vishing is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.
  • voice portal - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice portal (vortal) - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice SEO - Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.
  • voice signature - A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature.
  • voice spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-activated e-mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice-enabled e-mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice-enabled e-mail (voice-activated e-mail) - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • voicemail preview - Voicemail preview is a feature of unified messaging, and in particular voice-to-text messaging programs such as Microsoft Exchange.
  • voiceprint - A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • VoIP (voice over IP) - VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
  • VoIP caller ID - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP caller ID (Voice over Internet Protocol caller identification) - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP gateway - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • VoIP phishing - Vishing is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • VoIP: Glossary - This handy glossary will assist you with terminology related specifically to voice over IP.
  • VOIPSA - VOIPSA (Voice over IP Security Alliance) is a cross-industry coalition of individuals and organizations from the security and VoIP communications sectors.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is computer storage that only maintains its data while the device is powered.
  • Volcker rule - The Volcker rule is a section of the Dodd–Frank Act that restricts U.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt ampere - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close