Glosario KW | KW Glossary


Ontology Design

Navegue por el glosario usando este índice.

Especial | A | B | C | D | E | F | G | H | I | J | K | L | M | N | Ñ | O | P | Q | R | S | T | U | V | W | X | Y | Z | TODAS

Página: (Anterior)   1  ...  12  13  14  15  16  17  18  19  20  21
  TODAS

X

Imagen de System Administrator

X (OPEN SOURCE)

de System Administrator - miércoles, 10 de julio de 2013, 19:46
 
  • Xen - Xen is an open source virtual machine monitor for x86-compatible comput...
  • Xubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based ...
Imagen de System Administrator

X (PROGRAMMING)

de System Administrator - jueves, 11 de julio de 2013, 18:29
 
Imagen de System Administrator

X (WEB SERVICES)

de System Administrator - sábado, 1 de junio de 2013, 15:25
 
  • XML (Extensible Markup Language) - a flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere.
  • XML Core Services (formerly MSXML) - an application for processing Extensible Stylesheet Language Transformation (XSLT) in an XML file. Based on Microsoft's Component Object Model (COM), XML Core Services is essentially an application programming interface (API) to an XML parser and the XPath processor. The parser organizes the XML data into a tree structure for processing, and the processor converts the XML to HTML for display.
  • XPath - a language that describes a way to locate and process items in XML documents by using an addressing syntax based on a path through the document's logical structure or hierarchy.
  • XSL (Extensible Stylesheet Language) - a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • XSL Transformations (XSLT) - a standard way to describe how to transform (change) the structure of one XML document into an XML document with a different structure.

Y

Imagen de System Administrator

Y (BUSINESS)

de System Administrator - jueves, 2 de mayo de 2013, 21:56
 
Imagen de System Administrator

Y (ICT/TIC)

de System Administrator - jueves, 2 de mayo de 2013, 21:08
 
  • Y - Admittance (symbolized Y) is an expression of the ease with which alternati...
  • y coordinate - x, y coordinates are respectively the horizontal and ...
  • Y-modem - The protocols that modems agree on and use for checking and cor...
  • Y/C Video - S-Video (Super-Video, sometimes referred to as Y/C Video, o...
  • Y2K - Y2K is an abbreviation for "year 2000." As that year approached, many f...
  • Y2K (year 2000) - Y2K is an abbreviation for "year 2000." As that...
  • yacc - Yacc (for 'yet another compiler compiler' ) is the standard parser ge...
  • yacc (yet another compiler compiler) - Yacc ...
  • Yagi antenna - A Yagi antenna, also known as a Yagi-Uda array or sim...
  • Yagi antenna (Yagi-Uda array) - A Yagi antenna, als...
  • Yagi Uda array - A Yagi antenna, also known as a Yagi-Uda array or...
  • Yagi-Uda array - A Yagi antenna, also known as a Yagi-Uda array or...
  • Yahoo - Yahoo! is an Internet portal that incorporates a search engine and ...
  • yak shaving - Yak shaving is programming lingo for the seemingly endl...
  • Yammer - Yammer is a private microblogging and collaboration platform for ...
  • yard management system - A yard management system (YMS) is...
  • yard management system (YMS) - A yard management sys...
  • yc video - S-Video (Super-Video, sometimes referred to as Y/C Video, or ...
  • year 2000 - Y2K is an abbreviation for "year 2000." As that year approa...
  • Yellow Book - The Yellow Book is the informal name for Philips and So...
  • Yellowdog Updater Modified - Yellowdog Update, Modifie...
  • Yellowdog Updater, Modified (YUM) - Yellowdog U...
  • yet another compiler compiler - Yacc (for 'yet anot...
  • Ymodem - Ymodem is an error-correcting protocol for a modem that uses larg...
  • YMS - A yard management system (YMS) is a software system designed to oversee...
  • yotta - Prefix multipliers are used in data storage, data communications, e...
  • yottabyte - A yottabyte is a measure of theoretical storage capacity an...
  • Your PC Graveyards - Have you read our Fast Guide to Online Co...
  • YouTube - YouTube is a free video-hosting website that allows members to ...
  • Yukon - Yukon is the code name used for the beta version of Microsoft's SQL...
  • YUM - Yellowdog Update, Modified (YUM) is a program that manages installation...
Imagen de System Administrator

Y (OPEN SOURCE)

de System Administrator - miércoles, 10 de julio de 2013, 19:47
 
Imagen de System Administrator

Y (PROGRAMMING)

de System Administrator - jueves, 11 de julio de 2013, 18:30
 
  • yak shaving - Yak shaving is programming lingo for the seemingly endl...
Imagen de System Administrator

Yik Yak

de System Administrator - viernes, 20 de noviembre de 2015, 20:37
 

Yik Yak

Posted by Margaret Rouse

Yik Yak is a microblogging app that allows people to post messages (yaks) without user names; the mobile app aggregates and presents the posts of users within a 1.5 mile radius as a streaming data feed.

Users can reply to messages anonymously and vote posts and replies up or down. The app combines instant messaging and GPS technologies to enable posting within the specified geographical area. Geofencing be used to block Yik Yak within specified areas.

Yik Yak features include:

  • Yakarma: A numerical score based on upvotes and downvotes received and given.
  • Upvote/Downvote: User votes to raise or lower the score of a yak. The higher the score, the more it affects Yakarma. Yaks that reach a score of -5, on the other hand, are automatically deleted.
  • Peek: Enables view-only access to Yik Yak community feeds from other areas, such as college or university feeds.
  • New/Hot Tabs: The option to switch between a chronological feed and a feed of the most popular yaks, based on upvotes.
  • Other Top Yaks: The current Google image result page from searches for the word "yak". Typically all images of the animal.
  • My Herd: Allows users to designate an area such as their home, workplace or campus as their base camp and post to it even when they are not in range.
  • Photos: Allows users to include images in yaks. Photos are moderated for unacceptable content and displayed in grids of locally-posted images.

After Yik Yak launched in 2013, it was criticized for providing an anonymous channel forcyberbullying. Multiple high-profile incidents led the developers to block the app near high schools and middle schools the following year.

Although Yik Yak enables anonymous posting, that doesn't mean that messages can't be traced back to their sources. Users are required to provide a phone number for sign up and Yik Yak stipulates that they can provide police with user IP addresses, GPS coordinates, device details and data and time for each message if supported by a search warrant, court order or subpoena. As a result, Yik Yak users have been arrested for making threats of violence in their posts.

According to some security and privacy experts, what Yik Yak offers is really pseudoanonymity -- the appearance of anonymity, but not the reality.

See a brief introduction to Yik Yak:

Related Terms

DEFINITIONS

  • AirWatch MDM Agent

     - AirWatch Agent is mobile device management (MDM) software for mobile devices. The software was developed by AirWatch, a company that VMware acquired in 2014. (WhatIs.com)

  • liquid computing

     - Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop befo...(WhatIs.com)

  • smart home app (home automation app)

     - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, t... (WhatIs.com)

GLOSSARIES

  • Wireless and mobile

     - Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • Internet applications

     - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Z

Imagen de System Administrator

Z (BUSINESS)

de System Administrator - jueves, 2 de mayo de 2013, 21:57
 
Imagen de System Administrator

Z (DATA CENTER)

de System Administrator - jueves, 11 de julio de 2013, 17:28
 
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainfram...
  • zero client - Zero client, also known as ultrathin client, is a serve...
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc th...
Imagen de System Administrator

Z (ICT/TIC)

de System Administrator - jueves, 2 de mayo de 2013, 21:11
 
  • z coordinate - A z coordinate is the third-dimensional coordinate in...
  • Z Object Publishing Environment - Zope (Z Object ...
  • z-buffering - Z-buffering is an algorithm used in 3-D graphics to ens...
  • Z-modem - The protocols that modems agree on and use for checking and cor...
  • z/OS - z/OS is the computer operating system for IBM's zSeries 900 (z900) li...
  • z/VM - VM (Virtual Machine), currently embodied in a product called VM/ESA, ...
  • Z39.50 - Z39.50 is a standard communications protocol for the search and r...
  • z990 - The z990, also known by its code name T-Rex, is a 64-bit mainframe co...
  • z990 (T-Rex) - The z990, also known by its code name T-Rex, is a 64-...
  • Zabbix - Zabbix is an open-source tool designed to monitor networks, serve...
  • Zachman framework - The Zachman framework is a logical structur...
  • zap - In general usage, zap (noun) is spiciness, kick, or a powerful force.
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainfram...
  • Zbot - Zeus, also known as Zbot, is a malware toolkit that allows a cybercri...
  • ZBR - Zoned-bit recording (ZBR) is a method of physically optimizing the util...
  • zenware - Zenware refers to application programs that function with a min...
  • zero - In mathematics, zero, symbolized by the numeric character 0, is both ...
  • zero (0) - In mathematics, zero, symbolized by the numeric character 0, ...
  • Zero Administration - Zero Administration for Windows is Micr...
  • zero client - Zero client, also known as ultrathin client, is a serve...
  • zero day - A zero-day exploit is one that takes advantage of a security ...
  • Zero Insertion Force socket - A ZIF (Zero Insertion F...
  • zero-based thinking (ZBT) - Zero-based thinking (ZBT) i...
  • zero-day exploit - A zero-day exploit is one that takes advantag...
  • zettabyte - A zettabyte is a measure of storage capacity and is 2 to th...
  • Zeus Trojan - Zeus, also known as Zbot, is a malware toolkit that all...
  • Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware to...
  • ZIF - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 48...
  • ZIF socket - A ZIF (Zero Insertion Force) socket is the physical way t...
  • ZIF socket (Zero Insertion Force socket)
  • ZigBee - ZigBee is a specification for wireless personal area networks (WP...
  • Zimbra Collaboration Server - Zimbra is an open sourc...
  • Zimmermann Real Time Transport Protocol
  • Zimmermann Real-Time Transport Protocol
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc th...
  • zine - The term ezine is short for "electronic magazine.
  • zip codes - ZIP (Zoning Improvement Plan) codes are postal codes in the...
  • zip codes (Zoning Improvement Plan codes)
  • Zip disk - A Zip drive is a small, portable disk drive used primarily fo...
  • Zip drive - A Zip drive is a small, portable disk drive used primarily ...
  • zipping - Zipping is the act of packaging a set of files into a single fi...
  • Zippo - Ransomware is a type of malware used for data kidnapping, an exploi...
  • Zmodem protocol - Zmodem is an error-correcting protocol for modems.
  • zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by W...
  • zombie - A zombie (also known as a bot) is a computer that a remote attack...
  • zombie (bot) - A zombie (also known as a bot) is a computer that a r...
  • zombie army - A zombie army (also known as a botnet) is a number of I...
  • zone - In general, a zone is an area of administration.
  • zone file - A zone file is a small set of instructions for resolving sp...
  • zone recording - Zoned-bit recording (ZBR) is a method of physical...
  • zone-bit recording - Zoned-bit recording (ZBR) is a method of ...
  • zone-density recording - Zoned-bit recording (ZBR) is a me...
  • zoned bit recording - Zoned-bit recording (ZBR) is a method o...
  • zoned-bit recording - Zoned-bit recording (ZBR) is a method o...
  • zoned-bit recording (ZBR) - Zoned-bit recording (ZBR) i...
  • zoning - In a storage area network (SAN), zoning is the allocation of reso...
  • Zoning Improvement Plan codes - ZIP (Zoning Improve...
  • zoo - A zoo is a collection of viruses and worms that exist only in virus and...
  • Zoomed Video - The Zoomed Video port (ZV port) is a technology that ...
  • Zoomed Video port - The Zoomed Video port (ZV port) is a techno...
  • zoopraxiscope - The zoopraxiscope (pronounced ZOH-uh-PRACKS-uh-scoh...
  • Zope - Zope (Z Object Publishing Environment)is a Web site builder and serve...
  • Zope (Z Object Publishing Environment)
  • Zotob - Zotob is a computer worm used by an attacker to gather personal and...
  • zphone - ZRTP is an extension of the Real-Time Transport Protocol (RTP) th...
  • ZRTP - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that d...
  • ZRTP (Zimmermann Real-Time Transport Protocol)
  • zsh - Zsh is a shell (command interpreter) of the Bourne shell family, which ...
  • Zulu - Zulu (short for "Zulu time") is used in the military and in navigatio...
  • Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the m...
  • Zulu time - Zulu (short for "Zulu time") is used in the military and in...
  • Zune - The Zune is a portable digital media player from Microsoft.
  • ZV port - The Zoomed Video port (ZV port) is a technology that supports t...
  • ZV port (Zoomed Video port) - The Zoomed Video port (...
Imagen de System Administrator

Z (MARKETING)

de System Administrator - jueves, 2 de mayo de 2013, 22:40
 

 

Z

ZingZIPZona desmilitarizadaZooZoom.

 

=> Zing: Anuncio en la Red consistente en la aparición de un spot ocupando la pantalla completa, mientras el usuario espera que se cargue la URL o dirección del web que ha solicitado. Una vez que la página solicitada ha sido cargada, el zing desaparece para aparecer a continuación a modo de pequeño recuadro en la parte superior derecha de la pantalla.

=> ZIP: Formato de comprensión. También es la extensión de un archivo comprimido mediante una utilidad como pueda ser el programa shareware Winzip (http://www.winzip.com).

=> Zona desmilitarizada: Espacio extraño donde van a parar todos los que, con dudosas intenciones, se saltan un firewall o cortafuefos del servidor de una empresa. El término es del argot del sector de la seguridad informática, pero puede afactar y mucho a las actividades que una empresa realice por Internet.

=> Zoo: Sitio web cuyo contenido es una colección de virushoaxes y troyanos puestos a disposición de los internautas. En algunos países estos webs están prohibidos.

=> Zoom: En español: Ampliar, aumentar o aproximar. En una página web donde hay imágenes realizadas en VRML se acostumbra a añadir una opción de zoom mediante la cual, a golpe de clic, se ofrecen vistas a diferentes distancias. Es de mucha utilidad para presentar la imagen de un producto en la ficha del mismo en una tienda virtual.

Imagen de System Administrator

Z (OPEN SOURCE)

de System Administrator - miércoles, 10 de julio de 2013, 19:48
 
  • zsh - Zsh is a shell (command interpreter) of the Bourne shell family, which ...
Imagen de System Administrator

Z (PROGRAMMING)

de System Administrator - jueves, 11 de julio de 2013, 18:30
 
Imagen de System Administrator

Z-Wave

de System Administrator - jueves, 29 de enero de 2015, 13:08
 

Z-Wave

Posted by: Margaret Rouse

Z-Wave is a wireless communication technology that is used in security systems and also business and home automation.

Z-Wave is often used in locks, security systems, lighting, heating, cooling and home appliances. Support can be integrated in products or added by retrofitting standard electronics and devices.

Z-Wave communications use low-power radio signals in the 900MHz range, separated fromWi-Fi. The system supports automatic discovery of up to 230 devices per controller. Multiple controllers can also communicate with one another and pass commands to support additional devices. Z-wave is optimized for low latency, with data rates of up to 100KB/s.

Z-Wave is marketed primarily as a security product. However, vulnerabilities have been detected that allow attackers to spoof an access point to gain control, even on encrypted versions. Like most security automation products, Z-Wave increases a system’s attack surface because it adds connected devices and associated software. To prevent networked devices from increasing the overall vulnerability of a system, it’s important to consider the security of any connected element.

Over 80 percent of commercial home security systems use Z-Wave as the protocol by which their components communicate; the Z-Wave Alliance, a global consortium organized to bring compatible devices to market, includes more than 250 manufacturers among its members.

See a Black Hat conference video about hacking Z-Wave automation systems:

Link: http://whatis.techtarget.com

Imagen de System Administrator

ZigBee

de System Administrator - lunes, 16 de noviembre de 2015, 20:22
 

Definición de ZigBee

 

ZigBee es el nombre de la especificación de un conjunto de protocolos de alto nivel de comunicación inalámbrica para su utilización con radiodifusión digital de bajo consumo, basada en el estándar IEEE 802.15.4 de redes inalámbricas de área personal (wireless personal area networkWPAN). Su objetivo son las aplicaciones que requieren comunicaciones seguras con baja tasa de envío de datos y maximización de la vida útil de sus baterías.

En principio, el ámbito donde se prevé que esta tecnología cobre más fuerza es en domótica, como puede verse en los documentos de la ZigBee Alliance, en las referencias bibliográficas que se dan más abajo en el documento «ZigBee y Domótica». La razón de ello son diversas características que lo diferencian de otras tecnologías:

  • Su bajo consumo.
  • Su topología de red en malla.
  • Su fácil integración (se pueden fabricar nodos con muy poca electrónica).

More: https://es.wikipedia.org

ZigBee Definition

Posted by Margaret Rouse

ZigBee is a mesh network specification for low-power wireless local area networks (WLANs) that cover a large area.

ZigBee was designed to provide high data throughput in applications where the duty cycle is low and low power consumption is an important consideration. (Many devices that use ZigBee are powered by battery.) Because ZigBee is often used in industrial automation and physical plant operation, it is often associated with machine-to-machine (M2M) communication and the Internet of Things (IoT). 

ZigBee is based on the Institute of Electrical and Electronics Engineers Standards Association's 802.15 specification. It operates on the IEEE 802.15.4 physical radio specification and in unlicensed radio frequencybands, including 2.4 GHz, 900 MHz and 868 MHz. The specifications are maintained and updated by the ZigBee Alliance.

As of this writing, there are three ZigBee specifications: ZigBee, ZigBee IP and ZigBee RF4CE. ZigBee IP optimizes the standard forIPv6 full mesh networks and ZigBee RF4CE optimizes the standard for partial mesh networks.

Continue Reading About ZigBee

Link: http://searchmobilecomputing.techtarget.com


Página: (Anterior)   1  ...  12  13  14  15  16  17  18  19  20  21
  TODAS