Browse Definitions :

Browse Definitions by Alphabet

VSA - WHA

  • VSAM - VSAM (Virtual Storage Access Method ) is a file management system for IBM's larger operating systems, including its primary mainframe operating system, MVS, now called OS/390.
  • VSAM (Virtual Storage Access Method) - VSAM (Virtual Storage Access Method) is a file management system for IBM's larger operating systems now called z/OS.
  • VSAN - A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN).
  • VSAT - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSB - Vestigial sideband (VSB) is a type of amplitude modulation (AM) technique (sometimes called VSB-AM) that encodes data by varying the amplitude of a single carrier frequency.
  • VSE - Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset.
  • VSM - Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual area networks (VANs), virtual private networks (VPNs), virtual network computing (VNC) and virtual servers.
  • VSMP - VSMP (virtual symmetric multiprocessing) is a method of SMP (symmetric multiprocessing) in which two or more virtual processors are mapped inside a single virtual machine or partition.
  • VSMP (virtual symmetric multiprocessing) - VSMP (virtual symmetric multiprocessing) is a method of SMP (symmetric multiprocessing) in which two or more virtual processors are mapped inside a single virtual machine or partition.
  • VSP - Another meaning for VSP is vertical solutions provider.
  • VSP - On the Internet, a vertical solutions provider (VSP) is a company that focuses on delivering industry-specific application hosting services to customers in a specific vertical market such as manufacturing, health care, retailing, or financial service.
  • VSPEX - VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • vSphere CLI (vCLI) - VMware's vSphere CLI (vCLI) commands are used in a command line interface (CLI) when managing VMware ESX/ESXi infrastructures.
  • vSphere HA (VMware High Availability) - VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.
  • vSphere hot add - VMware vSphere hot add is a feature that allows an administrator to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime.
  • vSphere hot plug - vSphere hot plug is a function lets administrators add additional virtual hardware to running virtual machines (VMs).
  • vSphere Replication - VSphere Replication is a feature of vSphere 5.
  • VSTO - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • VSTO (Visual Studio Tools for Office or Microsoft Visual Studio Tools) - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • vStorage API - A vStorage API is an application program interface (API) from VMware that enables third-party storage and backup vendors to integrate their products with VMware’s vSphere server virtualization platform.
  • vStorage API for Multipathing - vStorage API for Multipathing (VAMP) is a set of application program interfaces (APIs) from VMware that help to control I/O path selection in a host to storage devices.
  • vStorage API for Multipathing (VAMP) - vStorage API for Multipathing (VAMP) is a set of application program interfaces (APIs) from VMware that help to control I/O path selection in a host to storage devices.
  • vStorage APIs for Array Integration - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Array Integration (VAAI) - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Storage Awareness - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • vStorage APIs for Storage Awareness (VASA) - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • VSTS - Visual Studio Team Services (VSTS) -- rebranded as Azure DevOps in 2018 -- is an Azure cloud-hosted extension of Microsoft's Team Foundation Server (TFS) -- now called Azure DvOps -- that assist development teams with special tools and services for software programmers, analysts and testers as well as IT project or team managers.
  • VT - Also see cathode ray tube (CRT), the specialized kind of vacuum tube that is in most desktop display monitors.
  • VTAM - VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users.
  • vTax - VTax is the derogatory nickname the general public gave to a licensing change for VMware vSphere 5.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize the nature of some difficult conditions and situations.
  • Vulcan nerve pinch - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • vulnerability (information technology) - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network.
  • vulnerability analysis - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability assessment - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability assessment (vulnerability analysis) - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability disclosure - Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines for doing so.
  • Vulnerability Discovery and Remediation - The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code.
  • vulnerability management - Vulnerability management is a pro-active approach to managing network security through reducing the likelihood that flaws in code or design compromise the security of an endpoint or network.
  • vulnerability management planning - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors.
  • vulture capital - Vulture capital is funds invested to profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success.
  • VVOLS (Virtual Volumes) - VVOLs is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and managed.
  • VWSR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • VXLAN gateway (Virtual Extensible VLAN gateway) - A VXLAN gateway is a solution that allows a virtual extensible LAN (VXLAN) to communicate with another network, particularly a virtual LAN (VLAN).
  • What is virtual desktop infrastructure? VDI explained - Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close