Browse Definitions :

Browse Definitions by Alphabet

  • organic search results - Organic search results are the unpaid listings that appear on a search engine results page (SERP).
  • organization resilience - Organizational resilience is an organization's ability to anticipate issues ahead of time and develop a plan for handling identified problems.
  • organizational change management (OCM) - Organizational change management (OCM) is a type of change management framework for managing the effect of new business processes, changes in organizational structure, or cultural changes within an enterprise.
  • organizational goals - Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide employees' efforts.
  • organizational network analysis (ONA) - Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, decisions and resources flow through an organization.
  • organizational unit (OU) - An organizational unit (OU) can refer to different things depending on the context, such as an organizational group within a company that is intended to accomplish a specific business function.
  • orphan account - An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, services and applications but does not have a valid owner.
  • orthogonal - Orthogonal concepts have their roots in advanced mathematics.
  • orthogonal frequency-division multiplexing (OFDM) - Orthogonal frequency-division multiplexing (OFDM) is a method of data transmission where a single information stream is split among several closely spaced narrowband subchannel frequencies instead of a single wideband channel frequency.
  • OS X - OS X, also referred to as macOS X or Mac OS X, is Apple's proprietary, Unix-based operating system.
  • oscillator - An oscillator is a mechanical or electronic device that works on the principles of oscillation: a periodic fluctuation between two things based on changes in energy.
  • oscilloscope - An oscilloscope is a laboratory instrument commonly used to display and analyze the waveform of electronic signals.
  • OSGi (Open Service Gateway Initiative) - The OSGi (Open Service Gateway Initiative) specification is a Java framework for developing and deploying modular software programs and libraries.
  • OSI model (Open Systems Interconnection) - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • OST file (.ost) - An OST file (.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware or other data to mobile devices.
  • out-of-band authentication - Out-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a separate communication channel along with the typical ID and password.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • out-of-order execution (OoOE) - Out-of-order execution (OoOE) is an approach to processing that allows instructions for high-performance microprocessors to begin execution as soon as their operands are ready.
  • outbound call - An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.
  • outbound marketing - Outbound marketing is a traditional form of marketing in which an organization initiates contact with potential customers, or leads.
  • outlier - An outlier is a single data point that goes far outside the average value of a group of statistics.
  • Outlook Anywhere - Microsoft Outlook Anywhere is a software feature that lets clients using Outlook 2010, Outlook 2007, or Outlook 2003 connect to the Microsoft Exchange server and access their email from outside the corporate domain without having to use a virtual private network (VPN).
  • outsourcing - Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services for the company.
  • over sampling and under sampling - Over sampling and under sampling are techniques used in data mining and data analytics to modify unequal data classes to create balanced data sets.
  • overclocking - Overclocking is resetting some computer component so that it runs faster than the manufacturer-specified speed.
  • overfitting in machine learning - Overfitting in machine learning occurs when a model excessively fits the training data, capturing both relevant patterns and inconsequential noise, resulting in inaccurate predictions of new data.
  • overlay network - An overlay network is a virtual or logical network that is created on top of an existing physical network.
  • overprovisioning (SSD overprovisioning) - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a solid-state drive.
  • oversubscription - Oversubscription in a storage area network (SAN) is the practice of committing more network bandwidth to devices connected to that network than what is physically available.
  • What is observability? A beginner's guide - Observability is a management strategy focused on keeping the most relevant, important and core issues at or near the top of an operations process flow.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close