Browse Definitions :

Browse Definitions by Alphabet

WHA - ZV

  • What is zero trust? Ultimate guide to the network security model - Zero trust is a security strategy that assumes all users, devices and transactions are already compromised.
  • z coordinate - A z coordinate is the third-dimensional coordinate in a volume pixel, or voxel.
  • Z Object Publishing Environment - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.
  • Z-modem - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • Z-Wave - Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
  • z/OS - Z/OS is a 64-bit operating system (OS) developed by IBM for its family of z/Architecture enterprise mainframe computers, including the zEnterprise 196 and zEnterprise 114.
  • z/VM - VM (Virtual Machine), currently embodied in a product called VM/ESA, is a widely-installed operating system for mainframes from IBM that can host other operating systems, including MVS and Conversational Monitor System (CMS), so that each of the operating systems seems to have its own complete system of software and hardware resources (data storage, telecommunications, processor, and so forth).
  • z990 - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • Zadara Storage - Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS).
  • Zadara VPSA and ZIOS - Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.
  • Zbot - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • ZBR - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zebibyte (ZiB) - A zebibyte (ZiB) is a unit used to measure computing and storage capacity.
  • Zenoss - Zenoss is a company that develops hybrid IT monitoring analytics software for visibility in cloud, virtual and physical IT environments.
  • zenware - Zenware refers to application programs that function with a minimum of superfluous user intervention.
  • zero - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • zero (0) - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.
  • zero day - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • Zero Insertion Force socket - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • zero rating - Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).
  • zero tolerance - Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.
  • zero-based thinking (ZBT) - Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.
  • zero-day (computer) - Zero-day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.
  • zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • zero-hours contract - A zero-hours contract is an agreement stating that a given employer is not obligated to provide a worker with any minimum number of hours.
  • zero-sum game - A zero-sum game is a situation in which the potential gain for players remains constant.
  • zero-touch provisioning (ZTP) - Zero-touch provisioning (ZTP) is a method of setting up devices that automatically configures the device using a switch feature.
  • Zero-TV - Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts.
  • Zerto - Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.
  • zettabyte - A zettabyte is a unit of measurement used by technology professionals and the general public to describe a computer or other device's storage capacity.
  • Zettabyte Era - The Zettabyte Era is the current age in terms of digital data.
  • zettaflops - Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS).
  • Zeus Trojan - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • ZFS - ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.
  • ZIF - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • ZIF socket - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • Zigbee - Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • Zimbra Collaboration Server - Zimbra is an open source server and client technology for enterprise messaging and collaboration.
  • Zimmermann Real Time Transport Protocol - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • Zimmermann Real-Time Transport Protocol - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • zine - The term ezine is short for "electronic magazine.
  • zip codes - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • zip codes (Zoning Improvement Plan codes) - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • Zip disk - A Zip drive is a small, portable disk drive used primarily for backing up and archiving personal computer files.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.
  • zipping - Zipping is the act of packaging a set of files into a single file or archive that is called a zip file.
  • Zippo - Ransomware is a subset of malware in which the data on a victim's computer is locked -- typically by encryption -- and payment is demanded before the ransomed data is decrypted and access is returned to the victim.
  • zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by William George Horner, was an early form of motion picture projector that consisted of a drum containing a set of still images, that was turned in a circular fashion in order to create the illusion of motion.
  • zombie - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.
  • zombie army - A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.
  • zombie VM - A zombie VM is a virtual machine that is created, often for a particular purpose, that is forgotten when it is no longer needed for that purpose.
  • zone recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zone-bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zone-density recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoned bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoned-bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.
  • Zoning Improvement Plan codes - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • Zoom fatigue (virtual meeting fatigue) - Zoom fatigue, also known as virtual meeting fatigue, is the feeling of exhaustion that often occurs after attending a series of virtual video meetings.
  • Zoombombing - Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online meetings over the Zoom video conference app.
  • Zoomed Video - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • Zoomed Video port - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • zoopraxiscope - The zoopraxiscope (pronounced ZOH-uh-PRACKS-uh-scohp), invented by British photographer Eadweard Muybridge and first shown in 1879, was a primitive version of later motion picture devices which worked by showing a sequence of still photographs in rapid succession.
  • Zope - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.
  • zphone - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • ZRTP - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • Zugata - Zugata is performance management software that helps employers to gather continuous feedback about individual employees in order to foster a corporate culture that empowers each employee to reach his or her full potential.
  • Zulu - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zulu time - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zuora - Zuora sells software that helps companies manage their cloud subscriptions, including sales, pricing, billing, collection and renewal.
  • ZV port - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • ZV port (Zoomed Video port) - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close