Browse Definitions :

Browse Definitions by Alphabet

K-1 - UNF

  • K-12 - K-12, a term used in education and educational technology in the United States, Canada and some other countries, is a short form for the publicly supported school grades prior to college.
  • Kaizen (continuous improvement) - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.
  • kanban - Kanban is a visual system used to manage and keep track of work as it moves through a process.
  • Karnaugh map (K-map) - A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex theorems or equation manipulations.
  • Kbps (kilobits per second) - In the U.S.
  • Kebab case - Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.
  • kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • Kerberos - Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet.
  • Kerckhoff's principle - Kerckhoff's principle is the concept that a cryptographic system should be secure, even if all its details are public knowledge except for the key.
  • kernel - The kernel is the essential foundation of a computer's operating system (OS).
  • kernel panic - A kernel panic refers to a computer error from which the system's operating system (OS) cannot quickly or easily recover.
  • Kessler Syndrome - The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.
  • key fob - A key fob is a small, programmable device that provides access to a physical object.
  • key performance indicators (KPIs) - Key performance indicators (KPIs) are quantifiable business metrics that corporate executives and other managers use to track and analyze factors deemed crucial to the success of an organization.
  • key results indicator (KRI) - A key result indicator (KRI) is a metric that measures the quantitative results of business actions to help companies track progress and reach organizational goals.
  • key risk indicator (KRI) - A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be successful.
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • keyboard wedge (KBW) - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
  • keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer.
  • keystone jack - A keystone jack is a female connector used in audio, video and data communications.
  • kibi, mebi, gibi, tebi, pebi and exbi - Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC).
  • kill switch - A kill switch in an IT context is a mechanism used to shut down or disable a device or program.
  • Kilo, mega, giga, tera, peta, exa, zetta and all that - Kilo, mega, giga, tera, peta, exa and zetta are among the binary prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.
  • kilobyte (KB or Kbyte) - A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage.
  • kilogram-meter per second - The kilogram-meter per second is the standard unit of momentum.
  • kinematics - Kinematics is the study of the motion of mechanical points, bodies and systems without consideration of their associated physical properties and the forces acting on them.
  • kinetic energy - Kinetic energy is the energy of motion, observable as the movement of an object or subatomic particle.
  • kiosk mode (Windows assigned access) - Kiosk mode is a feature in Windows operating system (OS) that allows a device to run only specified applications and settings.
  • KLOC (thousands of lines of code) - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • Klout score - A Klout score is a measure of a social influence that aggregates one's reach on various social media platforms.
  • Knative - Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the cloud, on premises or in a third-party data center.
  • knowledge base - In general, a knowledge base is a centralized repository of information.
  • knowledge engineering - Knowledge engineering is a field of artificial intelligence (AI) that tries to emulate the judgment and behavior of a human expert in a given field.
  • knowledge management (KM) - Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.
  • knowledge-based authentication - Knowledge-based authentication (KBA) is an authentication method in which users are asked to answer at least one secret question.
  • knowledge-based systems (KBSes) - Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to provide a method for problem-solving.
  • Kong - Kong is an open source API gateway and platform that acts as middleware between compute clients and the API-centric applications.
  • Korn shell (ksh) - The Korn shell (ksh) is an operating system (OS) command shell that was developed for Unix by David Korn at Bell Labs.
  • Kotlin - Kotlin is a statically typed, object-oriented programing language that is interoperable with the Java virtual machine, Java Class Libraries and Android.
  • Kryder's Law - Kryder's Law describes the rate at which former Seagate CTO Mark Kryder predicted disk drive density would grow.
  • Kubernetes - Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.
  • Kubernetes node - A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.
  • Kubernetes operator - A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.
  • Kubernetes pod - Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.
  • Kubernetes scheduler - The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.
  • Kubernetes volume - A Kubernetes volume is a directory containing data accessible to containers in a given pod, the smallest deployable unit in a Kubernetes cluster.
  • KVM hypervisor - KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM).
  • Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model) - Unfreeze, Change, Refreeze or Kurt Lewin's Change Management Model is a model to understand and manage organizational change.
Networking
  • top-of-rack switching

    Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other ...

  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

Security
  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an unwanted and uninvited user or group of such users interrupts online ...

  • CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • globalization

    Globalization is the process by which ideas, knowledge, information, goods and services spread around the world.

  • business process outsourcing (BPO)

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

  • localization

    Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its ...

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close