Browse Definitions :

Browse Definitions by Alphabet

  • validated learning - Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful.
  • validation set - A validation set is a set of data used to train artificial intelligence (AI) with the goal of finding and optimizing the best model to solve a given problem.
  • value chain - A value chain is a concept describing the full chain of a business's activities in creating a product or service -- from initial receipt of materials through its delivery to market.
  • value driver - A value driver is an activity or capability that adds worth to a product, service or brand.
  • value proposition - A value proposition is a statement that clearly identifies the benefits a company's products and services will deliver to its customers.
  • value stream management - Value stream management is an emerging business process intended to gauge the flow of value into business resources and activities, as well as the flow of value back into the business.
  • value stream mapping - Value stream mapping is a lean manufacturing tool that visualizes every repeatable step required to deliver a product or service to the customer.
  • value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells software, hardware, and other products and services that provide value beyond the original order fulfillment.
  • value-based healthcare - Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing quality care to patients.
  • value-sensitive design (VSD) - Value-sensitive design (VSD) is a concept that advocates the consideration of human principles and standards when planning technology.
  • vanity URL (vanity uniform resource locator) - A vanity URL (vanity uniform resource locator) is a simplified version of a URL that users enter into their browsers in place of the original URL.
  • variable - In programming, a variable is a value that can change, depending on conditions or on information passed to the program.
  • Variable Length Subnet Mask (VLSM) - Variable Length Subnet Mask (VLSM) is a subnet -- a segmented piece of a larger network -- design strategy where all subnet masks can have varying sizes.
  • variational autoencoder (VAE) - A variational autoencoder (VAE) is a generative AI algorithm that uses deep learning to generate new content, detect anomalies and remove noise.
  • Vblock (VCE Vblock) - Vblock is VCE’s hyper-converged infrastructure (HCI) product family.
  • VBScript - VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by Microsoft's Internet Explorer (IE) web browser.
  • vCard - A vCard is an electronic business or personal card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards.
  • vCIO (virtual CIO) - A vCIO, or virtual CIO, is a contractor or company that serves as an organization's chief information officer.
  • vector - A vector is a quantity or phenomenon that has two independent properties: magnitude and direction.
  • vector embeddings - Vector embeddings are numerical representations that capture the relationships and meaning of words, phrases and other data types.
  • vector graphics - Vector graphics are computer images created through a sequence of commands or mathematical statements that place lines and shapes in a two-dimensional or three-dimensional space.
  • vector search - Vector search, sometimes referred to as vector similarity search, is a technique that uses vectors -- numerical representations of data -- as the basis to conduct searches and identify relevance.
  • Veeam Backup & Replication - Veeam Backup & Replication is a software product developed by Veeam Software to back up, restore and replicate data on virtual machines (VMs).
  • velocity - Velocity is a vector expression of the displacement that an object or particle undergoes with respect to time.
  • vendor - A vendor is an individual or company that sells goods or services to somone else in the economic production chain.
  • vendor lock-in - Vendor lock-in is a situation in which a customer using a product or service cannot easily transition to a competitor's product or service.
  • vendor management system (VMS) - A vendor management system (VMS) is an enterprise software platform that helps companies control the process of procuring and managing a flexible workforce.
  • vendor neutral archive (VNA) - A vendor neutral archive (VNA) is a technology that stores medical images in a standard format and interface, making them accessible to healthcare professionals regardless of what proprietary system created the images.
  • vendor-managed inventory (VMI) - Vendor-managed inventory (VMI) is an inventory management technique in which the supplier of goods, usually the manufacturer, is responsible for optimizing the inventory a distributor holds.
  • Venmo - Venmo is a smartphone app that designed to transfer payments from one user to another through connected bank accounts.
  • VeriChip - VeriChip is an injectable identification chip that can be inserted under the skin of a human being to provide biometric verification.
  • Veritas NetBackup (Symantec NetBackup) - Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.
  • version control - Version control (also known as revision control or source control) is a category of processes and tools designed to keep track of multiple different versions of software, content, documents, websites and other information in development.
  • versioning - Versioning is the creation and management of multiple releases of a product, all of which have the same general function, but are improved, upgraded or customized.
  • vertical bar - The vertical bar ( | ) is a symbol used in mathematics, computing and other areas to represent a specific type of logic or operation, depending on its context.
  • vertical cloud - A vertical cloud is a set of cloud computing services optimized for use in a particular industry, or for a specific business model.
  • vertical market - A vertical market is made up of companies that offer goods and services to meet the needs of customers in a specific industry or niche market.
  • vertical SaaS (software as a service) - Vertical SaaS describes a type of software as a service solution created for a specific industry, such as retail, financial services, insurance, healthcare or manufacturing.
  • vertical takeoff and landing (VTOL) aircraft - A vertical takeoff and landing (VTOL) aircraft is a vehicle that can depart, hover and land vertically.
  • Viber - Viber is a VoIP and instant messaging application with cross-platform capabilities that allows users to exchange audio and video calls, stickers, group chats, and instant voice and video messages.
  • video conferencing - Video conferencing is live, visual connection between two or more remote parties over the internet that simulates a face-to-face meeting.
  • video interview - A video interview is a job interview that takes place remotely and uses video technology as the communication medium.
  • video marketing - Video marketing is the use of video content to promote a brand, product or service.
  • video streaming - Video streaming is a continuous transmission of video files from a server to a client.
  • video streaming service - A video streaming service is an on-demand online entertainment source for TV shows, movies and other streaming media.
  • Vimeo - Vimeo is a U.
  • VIPER (View, Interactor, Presenter, Entity and Router) - VIPER (View, Interactor, Presenter, Entity and Router) is a design pattern for software development that develops modular code based on clean design architecture.
  • virtual - In computing, the term virtual refers to a digitally replicated version of something real, whether it's a machine, a switch, memory or even reality.
  • virtual address - A virtual address is a binary number in virtual memory that lets a process use a location in primary storage (main memory) or, in some cases, secondary storage.
  • virtual agent - A virtual agent -- sometimes called an intelligent virtual agent, virtual rep or chatbot -- is a software program that uses scripted rules and, increasingly, artificial intelligence (AI) applications to provide automated service or guidance to humans.
  • virtual appliance - Considered a software equivalent of a hardware device, a virtual appliance (VA) is a preconfigured software solution.
  • virtual asset - A virtual asset is a digital representation of an item that has value in a specific environment.
  • virtual assistant (AI assistant) - A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural language voice commands and completes tasks for the user.
  • virtual call center - A virtual call center -- or virtual contact center (VCC) -- is a call center in which the organization's representatives are geographically dispersed, rather than situated at workstations in one location.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual CPU (vCPU) - A virtual CPU (vCPU) is the processor of a virtual machine (VM).
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual disaster recovery - Virtual disaster recovery is a type of DR that typically involves replication and enables a user to fail over to virtualized workloads.
  • virtual firewall - A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.
  • virtual hard disk (VHD) - A virtual hard disk (VHD) is a disk image file format for storing the entire contents of a computer's hard drive.
  • virtual hard drive - A virtual hard drive file is a container file that acts similar to a physical hard drive.
  • virtual local area network hopping (VLAN hopping) - Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of a VLAN by sending packets to a port not usually accessible from an end system.
  • virtual LUN (virtual logical unit number) - A virtual LUN (virtual logical unit number) is a representation of a storage area that is not tied to any physical storage allocation.
  • virtual machine (VM) - A virtual machine (VM) is an operating system (OS) or application environment installed on software that imitates dedicated hardware.
  • virtual machine configuration - Virtual machine configuration is the arrangement of resources assigned to a virtual machine.
  • Virtual Machine Disk format (VMDK) - VMware Virtual Machine Disk format (VMDK) is a format specification for virtual machine (VM) disk image files.
  • virtual machine escape - Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor.
  • Virtual Machine Management Service - Virtual Machine Management Service, also known as VMMS or vmms.
  • virtual machine replication - Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.
  • virtual memory - Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.
  • virtual network adapter - A virtual network adapter is software that operates like a physical network adapter within the host operating system (OS) or through an application installed on the endpoint or server.
  • virtual network functions (VNFs) - Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
  • virtual networking - Virtual networking is the abstraction of network resources from the underlying physical network infrastructure.
  • virtual phone number - A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.
  • virtual presence - Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR).
  • virtual private cloud (VPC) - A virtual private cloud (VPC) is the logical division of a service provider's public cloud multi-tenant architecture to support private cloud computing.
  • virtual private server (VPS) or virtual dedicated server (VDS) - A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.
  • virtual reality - Virtual reality is a simulated 3D environment that enables users to explore and interact with a virtual surrounding in a way that approximates reality, as it is perceived through the users' senses.
  • virtual reality cloud (VR cloud) - Virtual reality cloud is the application of cloud computing to create VR environments and experiences.
  • virtual reality gaming (VR gaming) - Virtual reality gaming (VR gaming) is the application of a three-dimensional (3D) artificial environment to computer games.
  • virtual reality sickness (VR motion sickness) - Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.
  • virtual routing and forwarding (VRF) - Virtual routing and forwarding (VRF) is a technology included in Internet Protocol (IP) network routers that enables multiple instances of a routing table to exist in a virtual router and work simultaneously.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • virtual server - A virtual server, also known as a virtual machine (VM), is a partitioned space inside a real server and is transparent to users, replicating the functionality of a dedicated physical server.
  • virtual server farm - A virtual server farm is a networking environment that employs multiple application and infrastructure servers running on two or more physical servers using a server virtualization program such as VMware or Microsoft Virtual Server.
  • virtual storage area network (VSAN) - A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN).
  • virtual switch (vSwitch) - A virtual switch (vSwitch) is a software program that enables one virtual machine (VM) to communicate with another.
  • virtual to physical (V2P) - Virtual to physical (V2P) involves transferring or porting a virtual machine (VM) onto a physical machine.
  • virtual to virtual (V2V) - Virtual to virtual (V2V) refers to the migration of an operating system (OS), application program and data from a virtual machine (VM) or disk partition to another virtual machine or disk partition.
  • virtualization - Virtualization is the creation of a virtual -- rather than actual -- version of something, such as an operating system (OS), a server, a storage device or network resources.
  • virtualization architecture - A virtualization architecture is a conceptual model of a virtual infrastructure that is most frequently applied in cloud computing.
  • virtualization sprawl (VM sprawl) - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively.
  • virtualization-based security (VBS) - Virtualization-based security (VBS) is a technology that abstracts computer processes from the underlying operating system (OS) and, in some cases, hardware.
  • virus (computer virus) - A computer virus is a type of malware that attaches itself to a program or file.
  • virus hoax - A virus hoax is a false warning about a computer virus.
  • virus signature (virus definition) - A virus signature, also known as a 'virus definition,' is a piece of code with a unique binary pattern that identifies a computer virus or family of viruses.
  • vishing (voice or VoIP phishing) - Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
  • vision statement - A vision statement is an organization's declaration of its mid-term and long-term goals, stating what they want to become in the future.
  • visitor-based networking (visitor-based network) - Visitor-based networking (VBN) is a computer network with high-speed internet access provided by an organization for temporary use by visitors, guests or other users in a public area.
  • VistA EHR - VistA EHR, more formally known as the VistA Computerized Patient Record System, is an open source electronic health record (EHR) system developed by the United States Department of Veterans Affairs (VA).
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close