Browse Definitions :

Browse Definitions by Alphabet

Y - YUM

  • Y - Admittance (symbolized Y) is an expression of the ease with which alternating current (AC) flows through a complex circuit or system.
  • y coordinate - x, y coordinates are respectively the horizontal and vertical addresses of any pixel or addressable point on a computer display screen.
  • Y-modem - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • Y/C Video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • Y2K - Y2K is an abbreviation for "year 2000.
  • yacc - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • yacc (yet another compiler compiler) - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • Yagi antenna - A Yagi antenna, also known as a Yagi-Uda array or simply a Yagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.
  • Yagi Uda array - A Yagi antenna, also known as a Yagi-Uda array or simply a Yagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.
  • Yagi-Uda array - A Yagi antenna, also known as a Yagi-Uda array or simply a Yagi, is a unidirectional antenna commonly used in communications when a frequency is above 10 MHz.
  • YAGNI principle ("You Aren't Gonna Need It") - YAGNI principle ("You Aren't Gonna Need It") is a practice in software development which states that features should only be added when required.
  • Yahoo - Yahoo! is an Internet portal that incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of topic categories.
  • yak shaving - Yak shaving is programming lingo for the seemingly endless series of small tasks that have to be completed before the next step in a project can move forward.
  • YAML (YAML Ain't Markup Language) - YAML (YAML Ain't Markup Language) is a data-oriented language structure used as the input format for diverse software applications.
  • Yammer - Yammer is a private microblogging and collaboration platform for enterprise social networking.
  • YANG (data modeling language) - YANG is a data modeling language for the NETCONF configuration management protocol.
  • yard management system - A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center.
  • yard management system (YMS) - A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center.
  • Yardi - Yardi is a software vendor that makes applications for all sizes of property management and real estate companies.
  • yc video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • year 2000 - Y2K is an abbreviation for "year 2000.
  • Yellowdog Updater Modified - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • yet another compiler compiler - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • Yet another Setup Tool (YaST) - YaST handles much of the administration load, offers a simple graphical interface and sets up setting system parameters easily.
  • Yik Yak - Yik Yak is a mobile app that allows users to post messages anonymously; the app aggregates and presents the posts of users within a particular geographical radius as a streaming data feed.
  • YMS - A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center.
  • yobibyte (YiB) - A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and storage capacity.
  • Yoda conditions (Yoda notation) - Yoda conditions, also known as Yoda notation, is a programming variation that reverses the standard order of a conditional statement.
  • yottabyte (YB) - A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 zettabytes, a trillion terabytes or a million trillion megabytes.
  • YouTube - YouTube is a free video-hosting website that allows members to store and serve video content.
  • YubiKey - YubiKey is an authentication device that allows users to securely log into their email, online services, computers and applications using one-time passwords, static passwords or FIDO-based public and private key pairs.
  • Yukon - Yukon is the code name used for the beta version of Microsoft's SQL Server 2005.
  • YUM - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close