Browse Definitions :

End user hardware

Terms related to peripheral devices including definitions about keyboards or mice and words and phrases about printers, monitors, digital cameras and scanners.

WIN - ZON

  • Windows Hardware Quality Labs (WHQL) - Windows Hardware Quality Labs (WHQL) is a Microsoft procedure for certifying that the hardware for peripherals and other components is compatible (works as expected) with Microsoft Windows operating systems.
  • Windows key (Winkey) - The Windows key (Winkey) is a relatively new keyboard key sporting a specially-designed Microsoft Windows logo.
  • WORM (write once, read many) - In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
  • WXGA - WXGA, which stands for wide XGA, is a term used in product specifications to describe a display screen that is appropriate for business but is also suitable for watching DVDs.
  • X (compact disc access time) - In compact disc (CD) and digital versatile disc (DVD) technology, X is a base multiplier that expresses the speed with which data could be read (the read access time) from the compact disc in its original version, which was 150 kilobytes (KB) per second.
  • X-Box - X-Box is a game console developed by Microsoft to provide players with a more realistic and immediate interactive experience than current consoles and to gain Microsoft a leadership position in the game console market.
  • zoned-bit recording (ZBR) - Zoned-bit recording (ZBR) is a method of physically optimizing the utilization of a hard drive by placing more sectors in the outer tracks than in the inner tracks.
  • zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close