Browse Definitions :

Browse Definitions by Alphabet

WOR - WYS

  • workplace - In a computer user interface, a workplace is a personalized view of a company and its processes that builds on the popular desktop metaphor.
  • Workplace - Lotus Workplace is a set of customizable online work collaboration products from IBM's Lotus division.
  • Workplace Join - Workplace Join is a tool in Windows Server 2012 R2 that allows a Windows 8.
  • workplace positive psychology - Workplace positive psychology is a subset of Industrial and Organizational (I/O) psychology that seeks optimization of the work experience from the employee’s perspective.
  • workstation - A workstation is a computer intended for individual use that is faster and more capable than a personal computer.
  • World Wide Name - A World Wide Name (WWN) is a unique identifier that is assigned to a manufacturer by the Institute of Electrical and Electronic Engineers (IEEE) and hard-coded into a Fibre Channel (FC) device.
  • World Wide Name (WWN) - A World Wide Name (WWN) is a unique identifier that is assigned to a manufacturer by the Institute of Electrical and Electronic Engineers (IEEE) and hard-coded into a Fibre Channel (FC) device.
  • World Wide Web - The World Wide Web is the combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).
  • World Wide Web (WWW) - The World Wide Web is the combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).
  • World Wide Web Consortium - The W3C is an industry consortium which seeks to promote standards for the evolution of the Web and interoperability between WWW products by producing specifications and reference software.
  • World Wide Web Distributed Authoring and Versioning - WebDAV (World Wide Web Distributed Authoring and Versioning) is the Internet Engineering Task Force (IETF) standard for collaborative authoring on the Web: a set of extensions to the Hypertext Transfer Protocol (HTTP) that facilitates collaborative editing and file management between users located remotely from each other on the Internet.
  • World's Most Ethical (WME) - The World’s Most Ethical Companies (WME) is an unranked list published annually by the Ethisphere Institute in New York.
  • Worldwide Interoperability for Microwave Access - WiMAX is a wireless industry coalition whose members organized to advance IEEE 802.
  • WORM - In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
  • WORM (write once, read many) - In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
  • Worse is Better - Worse is Better is a software design principle that states that software quality is not wholly dependent on the number features of functions and that less is often more.
  • worst case execution time - Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform.
  • worst-case execution time - Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform.
  • worst-case execution time (WCET) - Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform.
  • WPA - Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.
  • WPA - Windows Product Activation (WPA) is the mandatory product registration system included in Microsoft's Windows XP, Office XP, and recent Office products (such as Word 2002 or Excel 2002) as a means of enforcing compliance with the company's End User License Agreement (EULA).
  • WPA3 - WPA3 is a security certification program developed by the Wi-Fi Alliance to ensure Wi-Fi related products meet a common standard.
  • WPAD - Web Proxy Autodiscovery (WPAD) is a proposed Internet protocol that allows a client, such as a Web browser or a streaming media application, to automatically locate and interface with cache services in a network so that information can be delivered more quickly to the user.
  • WPAN - A WPAN (wireless personal area network) is a personal area network - a network for interconnecting devices centered around an individual person's workspace - in which the connections are wireless.
  • WPAN (wireless personal area network) - A WPAN (wireless personal area network) is a personal area network - a network for interconnecting devices centered around an individual person's workspace - in which the connections are wireless.
  • WPF - Windows Presentation Foundation, or WPF, is Microsoft's development tool for Web applications and rich client applications.
  • WPOS - Wireless point of sale (wireless POS or WPOS) is the use of wireless devices in retail establishments to facilitate payment for products or services.
  • WRAM - Window RAM (WRAM), unrelated to Microsoft Windows, is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less.
  • WRAM - Window RAM (WRAM), unrelated to Microsoft Windows, is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less.
  • WRAM (Window RAM) - Window RAM (WRAM), unrelated to Microsoft Windows, is very high-performance video RAM that is dual-ported and has about 25% more bandwidth than VRAM but costs less.
  • WRAN (wireless regional area network) - A wireless regional area network (WRAN) is techology based on IEEE 802.
  • wrap plug - A wrap plug, also known as a loopback plug, is a special plug that can be inserted into a port on a communications device to perform a diagnostic test called a loopback test.
  • wrapper - In information technology, a wrapper is data that precedes or frames the main data or a program that sets up another program so that it can run successfully.
  • writable DVD - Recordable DVD (sometimes called writable DVD) is a DVD technology that allows a PC user to write data one or more times to a DVD with the PC's DVD drive.
  • write amplification - Write amplification is an issue that occurs in solid state storage devices that can decrease the lifespan of the device and impact performance.
  • write amplification factor - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid state storage controller has to write in relation to the amount of data that the host’s flash controller has to write.
  • write amplification factor (WAF) - Write amplification factor (WAF) is a numerical value that represents the amount of data a solid state storage controller has to write in relation to the amount of data that the host’s flash controller has to write.
  • write back - Write back is a storage method in which data is written into the cache every time a change occurs, but is written into the corresponding location in main memory only at specified intervals or under certain conditions.
  • write endurance - Write endurance is the number of program/erase (P/E cycles) that can be applied to a block of flash memory before the storage media becomes unreliable.
  • write once read many - In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
  • write once, read many - In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
  • write once, run anywhere (WORA) - Write once, run anywhere (WORA) is a term that refers to a particular program's supposed ability to run on all common OSs (operating systems).
  • write through - Write through is a storage method in which data is written into the cache and the corresponding main memory location at the same time.
  • writing tablet - The Big Chief tablet was for many years the most popular brand of paper writing tablet among school children.
  • WS AT - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS AtomicTransaction - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS Coordination - WS-Coordination (Web Services Coordination) is a proposed IT industry standard for how individual Web services can interact in order to accomplish an application task.
  • WS I Organization - The WS-I (Web Services Interoperability) Organization is an association of IT industry companies, including IBM and Microsoft, that aim to create Web services specifications that all companies can use.
  • WS Policy - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WS SecureConversation - WS-SecureConversation, also called Web Services Secure Conversation Language, is a specification that provides secure communication between Web services using session keys.
  • WS Security - WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service.
  • WS Trust - Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments.
  • WS-AT - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-AtomicTransaction - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-Coordination - WS-Coordination (Web Services Coordination) is a proposed IT industry standard for how individual Web services can interact in order to accomplish an application task.
  • WS-I - The WS-I (Web Services Interoperability) Organization is an association of IT industry companies, including IBM and Microsoft, that aim to create Web services specifications that all companies can use.
  • WS-I Organization - The WS-I (Web Services Interoperability) Organization is an association of IT industry companies, including IBM and Microsoft, that aim to create Web services specifications that all companies can use.
  • WS-Policy - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WS-Policy (Web Services Policy Framework specifications) - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WS-SecureConversation - WS-SecureConversation, also called Web Services Secure Conversation Language, is a specification that provides secure communication between Web services using session keys.
  • WS-SecureConversation (Web Services Secure Conversation Language) - WS-SecureConversation, also called Web Services Secure Conversation Language, is a specification that provides secure communication between Web services using session keys.
  • WS-Security - WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service.
  • WS-Trust - Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments.
  • WSAN (wireless sensor and actuator network) - A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them.
  • WSCI - Web Service Choreography Interface (WSCI) is a programming language that provides a global, message-oriented view of processes involving multiple Web services.
  • WSD - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • WSDL - The Web Services Description Language (WSDL) is an XML-based language used to describe the services a business offers and to provide a way for individuals and other businesses to access those services electronically.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
  • WSO2 - WSO2 is a middleware vendor that sells open source application program interface (API) management software.
  • WSP - A wireless service provider (WSP) is a company that offers transmission services to users of wireless devices (handheld computers and telephones) through radio frequency (RF) signals rather than through end-to-end wire communication.
  • WSS - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • WSTx - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • WSUS - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • WTLS - Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.
  • WTS - The Microsoft Windows Terminal Server (WTS) is a server program running on its Windows NT 4.
  • WUE (water usage effectiveness) - WUE (water usage effectiveness) is a metric developed by The Green Grid nonprofit consortium to help data centers measure how much water a facility uses for cooling and other building needs.
  • WUS - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
  • WUSB - Wireless USB (WUSB) is a form of Universal Serial Bus (USB) technology that uses radio-frequency (RF) links rather than cables to provide the interfaces between a computer and peripherals, such as monitors, printers, external drives, head sets, MP3 players and digital cameras.
  • WWN - A World Wide Name (WWN) is a unique identifier that is assigned to a manufacturer by the Institute of Electrical and Electronic Engineers (IEEE) and hard-coded into a Fibre Channel (FC) device.
  • WWW - The World Wide Web is the combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • WYSIWYG - A WYSIWYG (pronounced "wiz-ee-wig") editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created.
  • WYSIWYG (what you see is what you get) - A WYSIWYG (pronounced "wiz-ee-wig") editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created.
  • WYSIWYP - WYSIWYP (pronounced wizzy-whip and standing for what you see is what you print) is the ability of an application program, such as a word processor, to generate print versions of content that match what the user sees on the screen.
  • WYSIWYP (what you see is what you print) - WYSIWYP (pronounced wizzy-whip and standing for what you see is what you print) is the ability of an application program, such as a word processor, to generate print versions of content that match what the user sees on the screen.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close