Browse Definitions :

Browse Definitions by Alphabet

VOL - VVO

  • volt-ampere (VA) - Volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
  • voltage - Voltage, also called electromotive force, is a quantitative expression of the potential difference in charge between two points in an electrical field.
  • voltage reference - A voltage reference is an electronic component or circuit that produces a constant DC (direct-current) output voltage regardless of variations in external conditions such as temperature, barometric pressure, humidity, current demand, or the passage of time.
  • voltage regulator module - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • voltage regulator module (VRM) - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • VoltDB - VoltDB is an in-memory database.
  • voltmeter - A voltmeter, also known as a voltage meter, is an instrument used for measuring the potential difference, or voltage, between two points in an electrical or electronic circuit.
  • volume - Volume (symbolized V) is a three-dimensional quantity representing amount or extent of physical bulk.
  • volume (amount of physical bulk) - Volume (symbolized V) is a three-dimensional quantity representing amount or extent of physical bulk.
  • volume manager - A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.
  • Volume Shadow Copy Service-based backup - A Volume Shadow Copy Service-based backup operates at the block level of the file system to create application-consistent backups through a VSS writer and VSS requestor.
  • volume testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • voluntary benefits - Voluntary benefits are optional, employee-paid benefits.
  • voluntary botnet - A voluntary botnet is a distributed network of computers whose processing power is harnessed to carry out a political or socially-motivated denial of service (DoS) attack.
  • voluntary severance package - A voluntary severance package is a financial and benefits-based incentive offered to motivate employees to leave a company of their own accord.
  • volunteer cloud (peer-to-peer cloud, ad-hoc cloud) - Volunteer cloud, also known as peer-to-peer cloud and ad-hoc cloud, is the coordination of members’ computing resources to amass a cloud architecture for a single purpose.
  • vomit - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.
  • von Neumann, John - John von Neumann was the scientist who conceived a fundamental idea that serves all modern computers - that a computer's program and the data that it processes do not have to be fed into the computer while it is working, but can be kept in the computer's memory - a notion generally referred to as the stored-program computer.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • Vorbis - Vorbis is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats, such as MP3, VQF, and AAC.
  • vortal - Vortal is also short for voice portal.
  • vortal - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • Vouch by Reference - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VoWi-Fi - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN (Voice over WLAN) - VoWLAN (Voice over WLAN) is a method of sending voice information in digital form over a wireless broadband network.
  • VoWLAN cellular - A Wi-Fi cell phone (also called a cellular-Internet phone or cell-Internet phone) is a wireless telephone set that can automatically switch between conventional cellular and Wi-Fi VoIP modes, even during the course of a conversation.
  • voxel - A voxel is a unit of graphic information that defines a point in three-dimensional space.
  • VoxML (Voice Markup Language) - VoxML (Voice Markup Language) is a technology from Motorola for creating a voice dialog with a Web site in which a user can call a Web site by phone and interact with it through speech recognition and Web site responses.
  • VPD - A Virtual Private Database (VPD) makes the database tables seem like they belong to one user when multiple users may actually be using that table.
  • VPD - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPD (vital product data) - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPLS - Virtual private LAN service (VPLS) is a technology that makes it possible to connect geographically dispersed local area networks (LANs) logically over the Internet.
  • VPN - A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.
  • VPN (virtual private network) - A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet.
  • VPN appliance - A VPN (virtual private network) appliance is a network device equipped with enhanced security features.
  • VPN Reconnect - VPN Reconnect is a feature of Windows 7 and Windows Server 2008 R2 that allows a virtual private network (VPN) connection to remain open during a brief interruption of Internet service.
  • VPS - A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.
  • VR headset (virtual reality headset) - A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV).
  • VR locomotion (virtual reality locomotion) - VR locomotion is technology that enables movement from one place to another (locomotion) within a virtual reality environment.
  • VR room (virtual reality room) - Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience.
  • VRAM - VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.
  • VRAM (video RAM) - VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.
  • VRM - A voltage regulator module (VRM) is an installable module that senses a computer's microprocessor voltage requirements and ensures that the correct voltage is maintained.
  • VRM - Vendor risk management (VRM) is a comprehensive plan for identifying and decreasing potential business uncertainties and legal liabilities regarding the hiring of 3rd party vendors for IT products and services.
  • VRML - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VRML (Virtual Reality Modeling Language) - VRML (Virtual Reality Modeling Language) is a language for describing three-dimensional (3-D) image sequences and possible user interactions to go with them.
  • VRRP - VRRP (Virtual Router Redundancy Protocol) is an Internet protocol that provides a way to have one or more backup routers when using a statically configured router on a local area network (LAN).
  • VRRP (Virtual Router Redundancy Protocol) - VRRP (Virtual Router Redundancy Protocol) is an Internet protocol that provides a way to have one or more backup routers when using a statically configured router on a local area network (LAN).
  • VSA - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • VSAM - VSAM (Virtual Storage Access Method ) is a file management system for IBM's larger operating systems, including its primary mainframe operating system, MVS, now called OS/390.
  • VSAM (Virtual Storage Access Method ) - VSAM (Virtual Storage Access Method ) is a file management system for IBM's larger operating systems, including its primary mainframe operating system, MVS, now called OS/390.
  • VSAN - A virtual storage area network (VSAN) is a logical partition in a storage area network (SAN).
  • VSAT - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • VSB - Vestigial sideband (VSB) is a type of amplitude modulation (AM) technique (sometimes called VSB-AM) that encodes data by varying the amplitude of a single carrier frequency.
  • VSE - Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset.
  • VSM - Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual area networks (VANs), virtual private networks (VPNs), virtual network computing (VNC) and virtual servers.
  • VSMP - VSMP (virtual symmetric multiprocessing) is a method of SMP (symmetric multiprocessing) in which two or more virtual processors are mapped inside a single virtual machine or partition.
  • VSMP (virtual symmetric multiprocessing) - VSMP (virtual symmetric multiprocessing) is a method of SMP (symmetric multiprocessing) in which two or more virtual processors are mapped inside a single virtual machine or partition.
  • VSP - Another meaning for VSP is vertical solutions provider.
  • VSP - On the Internet, a vertical solutions provider (VSP) is a company that focuses on delivering industry-specific application hosting services to customers in a specific vertical market such as manufacturing, health care, retailing, or financial service.
  • VSPEX - VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
  • VSPEX BLUE - VSPEX™ BLUE is a hyper-converged appliance from EMC Corporation that includes compute, memory and storage resources in a single device.
  • vSphere CLI (vCLI) - VMware's vSphere CLI (vCLI) commands are used in a command line interface (CLI) when managing VMware ESX/ESXi infrastructures.
  • vSphere HA (VMware High Availability) - VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.
  • vSphere hot add - VMware vSphere hot add is a feature that allows an administrator to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime.
  • vSphere hot plug - vSphere hot plug is a function lets administrators add additional virtual hardware to running virtual machines (VMs).
  • vSphere OpenStack Virtual Appliance (VOVA) - vSphere OpenStack Virtual Appliance (VOVA) is an unsupported OVF virtual appliance that offers central management of OpenStack services running on top of vSphere.
  • vSphere Replication - VSphere Replication is a feature of vSphere 5.
  • VSTO - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • VSTO (Visual Studio Tools for Office or Microsoft Visual Studio Tools) - VSTO, or Visual Studio Tools for Office, or Microsoft Visual Studio Tools is part of Microsoft's Visual Studio.
  • vStorage API - A vStorage API is an application program interface (API) from VMware that enables third-party storage and backup vendors to integrate their products with VMware’s vSphere server virtualization platform.
  • vStorage API for Multipathing - vStorage API for Multipathing (VAMP) is a set of application program interfaces (APIs) from VMware that help to control I/O path selection in a host to storage devices.
  • vStorage API for Multipathing (VAMP) - vStorage API for Multipathing (VAMP) is a set of application program interfaces (APIs) from VMware that help to control I/O path selection in a host to storage devices.
  • vStorage APIs for Array Integration - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Array Integration (VAAI) - vStorage API for Array Integration (VAAI) is an application program interface (API) framework from VMware that enables certain storage tasks, such as thin provisioning, to be offloaded from the VMware server virtualization hardware to the storage array.
  • vStorage APIs for Storage Awareness - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • vStorage APIs for Storage Awareness (VASA) - vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs), released with VMware’s vSphere 5, that enables vSphere vCenter to recognize the capabilities of storage arrays that support the API.
  • VSTS - Visual Studio Team Services (VSTS) is an extension of the Microsoft Visual Studio architecture that allows it to encompass development teams, with special roles and tools for software architects, developer specialties and testers.
  • VT - Also see cathode ray tube (CRT), the specialized kind of vacuum tube that is in most desktop display monitors.
  • VTAM - VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users.
  • VTAM (Virtual Telecommunications Access Method) - VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users.
  • vTax - VTax is the derogatory nickname the general public gave to a licensing change for VMware vSphere 5.
  • VUCA (volatility, uncertainty, complexity and ambiguity) - VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize the nature of some difficult conditions and situations.
  • Vulcan nerve pinch - In a personal computer with the Windows operating system, Ctrl-Alt-Delete is the combination of keyboard keys that the computer user can press at the same time to terminate an application task or to reboot the operating system (have it shut down and restart itself).
  • vulnerability (information technology) - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network.
  • vulnerability analysis - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability assessment - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.
  • vulnerability assessment (vulnerability analysis) - A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.
  • vulnerability disclosure - Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines for doing so.
  • Vulnerability Discovery and Remediation - The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code.
  • vulnerability management - Vulnerability management is a pro-active approach to managing network security through reducing the likelihood that flaws in code or design compromise the security of an endpoint or network.
  • vulnerability management planning - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors.
  • vulnerability scanner - A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis, also known as vulnerability assessment.
  • vulture capital - Vulture capital is funds invested to profit from unsuccessful enterprises and individuals or organizations that lack the resources to achieve success.
  • VVOLS (Virtual Volumes) - VVOLs is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and managed.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close