Browse Definitions :

Browse Definitions by Alphabet

VOI - VSA

  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice authentication - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice control (voice assistance) - Voice control, also called voice assistance, is a user interface that allows hands-free operation of a digital device.
  • voice design - Voice design is the process of planning and mapping all the possible interactions that might occur between a voice assistant and an end user.
  • voice emulation (voice reproduction) - Voice emulation is the software-generated reproduction of an individual's speech.
  • voice enabled e mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice ID - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice identification - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • Voice Markup Language - VoxML (Voice Markup Language) is a technology from Motorola for creating a voice dialog with a Web site in which a user can call a Web site by phone and interact with it through speech recognition and Web site responses.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice of the customer (VOC) - Voice of the customer (VOC) is the component of customer experience that focuses on customer needs, wants, expectations and preferences.
  • Voice over Internet Protocol - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • Voice over Internet Protocol caller identification - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • Voice over IP - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • voice over LTE (VoLTE) - Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
  • Voice Over Misconfigured Internet Telephones - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • Voice over WLAN - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • voice phishing - Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.
  • voice portal - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice recognition - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice recognition (speaker recognition) - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice SEO - Voice SEO is the optimization of keywords and keyword phrases for searches through voice assistants.
  • voice signature - A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature.
  • voice spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-activated e-mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice-enabled e-mail - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • voicemail - Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients.
  • VoiceXML - VoiceXML is an application of the Extensible Markup Language (XML) which, when combined with voice recognition technology, enables interactive access to the Web through the telephone or a voice-driven browser.
  • VoIP - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP (voice over IP) - VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.
  • VoIP caller ID - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP caller ID (Voice over Internet Protocol caller identification) - VoIP caller ID (Voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in much the same way as caller ID on a conventional telephone line but with enhanced features and flexibility.
  • VoIP gateway - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • VoIP phishing - Vishing (voice or VoIP phishing) is an electronic fraud tactic in which individuals are tricked over the phone into revealing critical financial or personal information to unauthorized entities.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP security threats - As VoIP becomes increasingly prevalent, so do the threats aimed at subverting its security.
  • VoIP spam - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable.
  • volatile memory - Volatile memory is computer storage that only maintains its data while the device is powered.
  • Volcker rule - The Volcker rule is a section of the Dodd–Frank Act that restricts U.
  • volt - The volt (symbolized V) is the Standard International (SI) unit of electric potential or electromotive force.
  • volt ampere - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • volt per meter - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt per meter (V/m) - The standard unit of electric field (E-field) strength is the volt per meter (V/m).
  • volt-ampere - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • volt-ampere (VA) - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • voltage regulator module - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • VoltDB - VoltDB is an in-memory database.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume - Volume (symbolized V) is a three-dimensional quantity representing amount or extent of physical bulk.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • volume testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary botnet - A voluntary botnet is a distributed network of computers whose processing power is harnessed to carry out a political or socially-motivated denial of service (DoS) attack.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • volunteer cloud (peer-to-peer cloud, ad-hoc cloud) - Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • von Neumann, John - John von Neumann was the scientist who conceived a fundamental idea that serves all modern computers - that a computer's program and the data that it processes do not have to be fed into the computer while it is working, but can be kept in the computer's memory - a notion generally referred to as the stored-program computer.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • Vorbis - Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC.
  • vortal - Vortal is also short for voice portal.
  • vortal - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • Vouch by Reference - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VoWi-Fi - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN cellular - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VoxML - VoxML (Voice Markup Language) is a technology from Motorola for creating a voice dialog with a Web site in which a user can call a Web site by phone and interact with it through speech recognition and Web site responses.
  • VPD - A Virtual Private Database (VPD) makes the database tables seem like they belong to one user when multiple users may actually be using that table.
  • VPD - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPD (vital product data) - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPLS - Virtual private LAN service (VPLS) is a technology that makes it possible to connect geographically dispersed local area networks (LANs) logically over the Internet.
  • VPN - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VPN (virtual private network) - A virtual private network (VPN) is a service that creates a safe, encrypted online connection.
  • VPN appliance - A VPN (virtual private network) appliance is a network device equipped with enhanced security features.
  • VPN Reconnect - VPN Reconnect is a feature of Windows 7 and Windows Server 2008 R2 that allows a virtual private network (VPN) connection to remain open during a brief interruption of Internet service.
  • VPN routing and forwarding - Virtual routing and forwarding (VRF) is a technology included in Internet Protocol (IP) network routers that enables multiple instances of a routing table to exist in a virtual router and work simultaneously.
  • VPS - A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VRAM - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VRF - Virtual routing and forwarding (VRF) is a technology included in Internet Protocol (IP) network routers that enables multiple instances of a routing table to exist in a virtual router and work simultaneously.
  • VRM - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • VRM - Vendor risk management (VRM) is a comprehensive plan for identifying and decreasing potential business uncertainties and legal liabilities regarding the hiring of 3rd party vendors for IT products and services.
  • VRML - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VRML (Virtual Reality Modeling Language) - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VRRP - VRRP (Virtual Router Redundancy Protocol) is an Internet protocol that provides a way to have one or more backup routers when using a statically configured router on a local area network (LAN).
  • VSA - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close