Browse Definitions :

Browse Definitions by Alphabet

Z - ZV

  • z coordinate - A z coordinate is the third-dimensional coordinate in a volume pixel, or voxel.
  • Z Object Publishing Environment - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.
  • z-buffering - Z-buffering is an algorithm used in 3-D graphics to ensure that perspective works the same way in the virtual world as it does in the real one: a solid object in the foreground will block the view of one behind it.
  • Z-modem - The protocols that modems agree on and use for checking and correcting transmission errors have evolved toward accuracy, speed, and efficiency since 1978 when the Xmodem protocol became a de facto standard.
  • Z-Wave - Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
  • z/OS - Z/OS is a 64-bit operating system (OS) developed by IBM for its family of z/Architecture enterprise mainframe computers, including the zEnterprise 196 and zEnterprise 114.
  • z/VM - VM (Virtual Machine), currently embodied in a product called VM/ESA, is a widely-installed operating system for mainframes from IBM that can host other operating systems, including MVS and Conversational Monitor System (CMS), so that each of the operating systems seems to have its own complete system of software and hardware resources (data storage, telecommunications, processor, and so forth).
  • Z39.50 - Z39.50 is a standard communications protocol for the search and retrieval of bibliographic data in online databases.
  • z990 - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.
  • z990 (T-Rex) - The z990, also known by its code name T-Rex, is a 64-bit mainframe computer from IBM that contains 32 processors, together capable of executing approximately 9,000 million instructions per second (MIPS), nearly three times the processing power.
  • Zabbix - Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.
  • Zachman framework - The Zachman framework is a logical structure intended to provide a comprehensive representation of an information technology enterprise.
  • Zadara Storage - Zadara Storage provides enterprise level primary and secondary storage-as-a-service (STaaS).
  • Zadara VPSA and ZIOS - Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.
  • zap - In general usage, zap (noun) is spiciness, kick, or a powerful force.
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainframe server.
  • Zbot - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • ZBR - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zebibyte (ZiB) - A zebibyte (ZiB) is a unit used to measure computing and storage capacity.
  • Zenoss - Zenoss is a company that develops hybrid IT monitoring analytics software for visibility in cloud, virtual and physical IT environments.
  • zenware - Zenware refers to application programs that function with a minimum of superfluous user intervention.
  • zero - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • zero (0) - In mathematics, zero, symbolized by the numeric character 0, is both a place indicator meaning "no units of this multiple" in a positional number system, and an independent value midway between +1 and -1.
  • Zero Administration - Zero Administration for Windows is Microsoft's initiative to help make its operating system easier to install and manage.
  • zero client - Zero client, also known as ultrathin client, is a server-based computing model in which the end user has no local software and very little hardware.
  • zero day - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • Zero Insertion Force socket - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • zero rating - Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).
  • zero tolerance - Zero tolerance is a hardline policy preventing or protecting against something that is undesirable in a given environment.
  • zero touch provisioning (ZTP) - Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.
  • zero-based thinking (ZBT) - Zero-based thinking (ZBT) is a decision-making process based on imagining yourself back at the point before particular decisions were made, and free to make those decisions with the knowledge that you have now about their outcome.
  • zero-day (computer) - A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.
  • zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • zero-hours contract - A zero-hours contract is an agreement stating that a given employer is not obligated to provide a worker with any minimum number of hours.
  • zero-sum game - A zero-sum game is a situation in which the potential gain for players remains constant.
  • zero-trust model (zero trust network) - The zero trust model is a security model used by IT professionals that requires strict identity and device verification regardless of the user’s location in relation to the network perimeter.
  • Zero-TV - Zero-TV is Nielsen's category for homes that neither subscribe to cable or satellite television services nor use an antenna to boost signals for over the air (OTA) broadcasts.
  • Zerto - Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and cloud environments.
  • zettabyte - A zettabyte is a measure of storage capacity and is 2 to the 70th power bytes, also expressed as 1021 or 1 sextillion bytes.
  • zettaflops - Zettaflop or (ZFlop) is a processing power of one septillion floating point operations per second (FLOPS).
  • Zeus Trojan - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse.
  • ZFS - ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.
  • ZIF - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • ZIF socket - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • ZIF socket (Zero Insertion Force socket) - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 486 and Pentium microprocessors up to Pentium II connect on the computer motherboard to the data bus.
  • Zigbee - Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  • Zimbra Collaboration Server - Zimbra is an open source server and client technology for enterprise messaging and collaboration.
  • Zimmermann Real Time Transport Protocol - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • Zimmermann Real-Time Transport Protocol - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc that form on the surfaces of objects that are electroplated, or galvanized, with zinc.
  • zine - The term ezine is short for "electronic magazine.
  • zip codes - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • zip codes (Zoning Improvement Plan codes) - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • Zip disk - A Zip drive is a small, portable disk drive used primarily for backing up and archiving personal computer files.
  • Zip drive - A Zip drive is a small, portable disk drive used primarily for backing up and archiving personal computer files.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.
  • zipping - Zipping is the act of packaging a set of files into a single file or archive that is called a zip file.
  • Zippo - Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.
  • Zmodem protocol - Zmodem is an error-correcting protocol for modems.
  • zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by William George Horner, was an early form of motion picture projector that consisted of a drum containing a set of still images, that was turned in a circular fashion in order to create the illusion of motion.
  • zombie - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.
  • zombie army - A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices, that are infected and controlled by a common type of malware, although users are often unaware of it.
  • zombie computer (zombie bot) - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.
  • zombie server (comatose server) - A zombie server, also known as a comatose server, is one that is plugged in and drawing power but not performing any work and possibly not detectable other than physically.
  • zombie VM - A zombie VM is a virtual machine that is created, often for a particular purpose, that is forgotten when it is no longer needed for that purpose.
  • zone - In general, a zone is an area of administration.
  • zone file - A zone file is a small set of instructions for resolving specified Internet domain names to the appropriate number form of an Internet Protocol address (an IP address).
  • zone recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zone-bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zone-density recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoned bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoned-bit recording - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoned-bit recording (ZBR) - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.
  • Zoning Improvement Plan codes - ZIP (Zoning Improvement Plan) codes are postal codes in the United States that identify preassigned geographic boundaries and make mail sorting and delivery more efficient.
  • zoo - A zoo is a collection of viruses and worms that exist only in virus and anti-virus labs.
  • Zoomed Video - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • Zoomed Video port - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • zoopraxiscope - The zoopraxiscope (pronounced ZOH-uh-PRACKS-uh-scohp), invented by British photographer Eadweard Muybridge and first shown in 1879, was a primitive version of later motion picture devices which worked by showing a sequence of still photographs in rapid succession.
  • Zope - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.
  • Zope (Z Object Publishing Environment) - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.
  • Zotob - Zotob is a computer worm used by an attacker to gather personal and financial information from computers running Microsoft Windows that have a buffer overflow vulnerability.
  • zphone - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • ZRTP - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • ZRTP (Zimmermann Real-Time Transport Protocol) - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.
  • zsh - Zsh is a shell (command interpreter) of the Bourne shell family, which also includes bash and the Korn shell (which zsh is said to resemble).
  • Zugata - Zugata is performance management software that helps employers to gather continuous feedback about individual employees in order to foster a corporate culture that empowers each employee to reach his or her full potential.
  • Zulu - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zulu time - Zulu (short for "Zulu time") is used in the military and in navigation generally as a term for Universal Coordinated Time (UCT), sometimes called Universal Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and formerly called Greenwich Mean Time.
  • Zune - The Zune is a portable digital media player from Microsoft.
  • Zuora - Zuora sells software that helps companies manage their cloud subscriptions, including sales, pricing, billing, collection and renewal.
  • ZV port - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.
  • ZV port (Zoomed Video port) - The Zoomed Video port (ZV port) is a technology that supports the delivery of full-screen motion video and multimedia to notebook computers.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

Close