Glosario KW | KW Glossary


Ontology Design | Diseño de Ontologías

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  ...  13  14  15  16  17  18  19  20  21  22
  ALL

W

Picture of System Administrator

W (STORAGE)

by System Administrator - Friday, 31 May 2013, 11:21 PM
 
Picture of System Administrator

Walking Skeleton

by System Administrator - Thursday, 4 May 2017, 6:26 PM
 

Walking Skeleton

Posted by: Margaret Rouse

A walking skeleton, in a software development context, is a minimal initial implementation of an application's architecture that includes and connects the basic components of the system. As the name implies, the structure is in place and functional in a rudimentary way but the system is not fleshed out and does not provide the level of service required of the end product. Subsystems are incomplete but hooked together.

Walking skeletons are commonly used in test-driven development (TDD), in which in which unit testing is repeatedly done on source code. After each test, the code is refactored and retested until each unit is functioning according to the desired specifications. 

A walking skeleton must be able to carry out the basic functions required of the end system, such as querying data sources, requesting services and conducting functions. Any automations, such as exception handling and continuous integration (CI), should also be in place and all implemented components should be tested to ensure, for example, that a query returns data. Once all of the essential components of the system have been demonstrated to work, the TDD cycle can begin and the application’s architecture and functionality can be developed in parallel.

Alistair Cockburn, an American computer scientist and agile deveopment pioneer, coined the term walking skeleton when a project designer explained how the concept had been applied in a previous project.

Link: http://whatis.techtarget.com/definition/walking-skeleton

Continue Reading About walking skeleton

Picture of System Administrator

Web Server Security

by System Administrator - Wednesday, 15 July 2015, 2:00 AM
 

Web Server Security

Posted by Margaret Rouse

Web server security is the protection of information assets that can be accessed from a Web server.

Web server security is the protection of information assets that can be accessed from a Web server.

Web server security is important for any organization that has a physical or virtual Web server connected to the Internet. It requires a layered defense and is especially important for organizations with customer-facing websites.

Separate servers should be used for internal and external-facing applications and servers for external-facing applications should be hosted on a DMZ or containerized service network to prevent an attacker from exploiting a vulnerability to gain access to sensitive internal information.

Penetration tests should be run on a regular basis to identify potential attack vectors, which are often caused by out-of-date server modules, configuration or coding errors and poor patch management. Web site security logs should be audited on a continuous basis and stored in a secure location. Other best practices include using a separate development server for testing and debugging, limiting the number of superuser and administrator accounts and deploying an intrusion detection system (IDS) that includes monitoring and analysis of user and system activities, the recognition of patterns typical of attacks, and the analysis of abnormal activity patterns.

Continue Reading About web server security

 

Picture of System Administrator

Webify

by System Administrator - Saturday, 1 June 2013, 3:28 PM
 

Also see Webification.

1) To Webify is to convert some information content from its original format into a format capable of being displayed on the World Wide Web. Some conversion examples are:

  • Postscript source file or ASCII text to a Hypertext Markup Language (HTML) file
  • A Microsoft Word document to HTML (sometimes referred to as "DOC to HTML"). More recent versions of Microsoft Word include this capability.
  • Hard-copy print publication pages into files in the Portable Document Format (PDF) for viewing on the Web with Adobe's downloadable Acrobat viewer
  • A Lotus Notes database to HTML files
  • An image in a scanned-in or other format to a Web-ready image, either a GIF or a JPEGfile
  • A speech or interview into a file in the RealAudio format for playing as streaming soundon the Web
  • A video tape recording into a streaming video file

Using the File Transfer Protocol (FTP) from the Web browser, text pages (with files in theASCII TXT format) can also be "Webified" for display by Web users. Many Internet Request for Comment (Request for Comments) documents are available on the Web in the text format. The only Webification these files need is to simply make them available in a directory accessible to the FTP server.

2) Webify is the name of a program that makes a structured tree of HTML files and JPEG or GIF images from Postscript files.

Picture of System Administrator

Wexflow: Open source workflow engine in C#

by System Administrator - Thursday, 13 April 2017, 3:14 PM
 
Picture of System Administrator

Whaling

by System Administrator - Tuesday, 17 November 2015, 5:48 PM
 

Whaling

Posted by Margaret Rouse

Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities.

As with any phishing endeavor, the goal of whaling is to trick someone into disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts. The attacker may send his target an email that appears as if it's from a trusted source or lure the target to a website that has been created especially for the attack. Whaling emails and websites are highly customized and personalized, often incorporating the target's name, job title or other relevant information gleaned from a variety of sources. 

The term whaling is a play-on-words because an important person may also be referred to as a "big fish." In gambling, for examples, whales describe high-stakes rollers who are given special VIP treatment.

Due to their focused nature, whaling attacks are often harder to detect than standard phishing attacks. In the enterprise, security administrators can help prevent success whaling expeditions by encouraging corporate management staff to undergo information security awareness training.

See also: spear phishing

Continue Reading About whaling

Picture of System Administrator

Windows 10

by System Administrator - Tuesday, 14 October 2014, 8:12 PM
 

Everything you need to know about Windows 10

Here's everything we know about Windows 10: What's new, how it relates to the enterprise, when it's arriving, and how to get hold of it today.

Picture of System Administrator

Windows Nano Server

by System Administrator - Thursday, 16 July 2015, 8:36 PM
 

Is Windows Nano Server a data center game-changer?

By Jonathan Hassell

Windows 10 might be getting all the attention, but Microsoft’s new Nano Server could start a quiet revolution in server rooms across the globe.

Back in April, Microsoft somewhat quietly previewed what its Windows Server engineering teams had been working on for quite some time. While it would be easy to write it off as just another iteration in a long line of never-ending releases, Windows Nano Server has the potential to reinvent your data center.

What is Windows Nano Server?

Windows Nano Server is a project that was previously codenamed Tuva (although kudos to Microsoft for breaking the trend of having very cool codenames that turn into incredibly drab actual released product names) and is designed to be Windows without the GUI or legacy baggage. It’s different than Server Core, the GUI-less installation option introduced in Windows Server 2008, because Windows Nano Server strips out basically every part of Windows that is designed to ever service the GUI or a GUI oriented application.

Server Core merely takes off the GUI but leaves a lot of the underlying Win32 API surface area and structure so that when you put the GUI back on via a checkbox – at least in Windows Server 2012 and later – you don’t have to reinstall all of the plumbing that goes along with it. Windows Nano Server rids itself of all 32-bit application support, support for Microsoft Installer (MSI) applications and a lot more historical baggage that causes a lot more problems than it solves for machines running in the cloud.

Windows Nano Server is headless and sessionless. As mentioned, there is no GUI. But there’s also no local login, so there’s no point in attaching a keyboard or mouse or running this in any kind of Remote Desktop-oriented session. Consider it like a Linux box in the cloud that you don’t have SSH access to – you use it remotely, you manage it remotely, and all it does is run services and applications like an appliance would. It’s incredibly compact and has a very small surface area – just as much as is needed to fulfill its role as a specialty purpose server operating system.

The entire point of Windows Nano Server is that it should run applications designed for it – headless applications that provide their management tools for remote use, and that service end user requests over the wire without the need to populate a lot of user session interaction. These applications – which can be built for Nano Server and run inside containers – can be run via a variety of supported runtimes, including C#, Java, Node.js and Python for responsive, high quality Web applications.

[Related: What are containers and why do you need them?]

Windows Nano Server can also be used to run infrastructure services like a scale-out file server, DNS, DHCP, Hyper-V within a limited deployment scenario, Hyper-V failover clusters and others. There will be limited support for standard Windows APIs; basically the APIs that will work are the ones that don’t require user interaction or involve GUIs or 32-bit application support.

How much of an impact does stripping out all of that GUI application support framework make? A lot. There is a lot of cruft in the general purpose Windows Server release – even though in general the Server releases are very high quality – that simply does not exist within the Windows Nano Server environment. Here are some statistics to really drive this point home:

  • Microsoft expects that Windows Nano Server will have a 93 percent smaller installed footprint on a virtual machine than Windows Server Core, which was already meaningfully smaller than a full fat deployment of Windows.
  • The company expects that Windows Nano Server will have 92 percent fewer security bulletins and related patches deemed critical, which is the highest severity rating of all. Less attack surface and less code running equals less places for code to be exploited, and that translates into fewer bulletins and fewer patches required.
  • Windows Nano Server should feature 80 percent fewer reboots required for installations and updates, since a lot of the old Win32 code got initialized at startup and boot time. The newer core operating system code can be patched on the fly with zero downtime. This makes Windows Nano Server well suited for mission critical applications.
  • Windows Nano Server works within itself, so a Windows Nano Server host runs Hyper-V and within it can host Nano Server laden virtual machines. A single Windows Nano Server Hyper-V host can run up to 1,000 Windows Nano Server guest virtual machines with just one terabyte of RAM, a scale that is incomparable with today’s Windows Server – just try stuffing a thousand VMs onto one host and see how far you get.
  • Windows Nano Server will be managed entirely remotely using a combination of the time-tested Windows Management Instrumentation (WMI) and PowerShell, both of which are well supported by lots of management tools and third party system administration software. There will also be a new web management tool for Windows Nano Server.

Why is Windows Nano Server important?

For now, Windows Nano Server is designed to work in the cloud. But it’s to envision a deployment of a variety of Nano Server virtual machines running custom applications within containers like Docker that just get moved over the wire nearly instantaneously between Azure regions and your corporate datacenter. Especially since the footprint of these virtual machines from a storage perspective is almost a tenth of what it’s in big Windows Server images today.

Your developers and operations team can work even more closely together and use container technology to package applications and well configured versions of Nano Server together so that your applications just work, i.e., the whole platform works as one. For web applications and hardened infrastructure roles that could be served with the likes of an appliance, Windows Nano Server could be an intriguing choice come next year when it’s expected to be released alongside Windows Server 2016.

But perhaps more interestingly, and certainly from a longer-term perspective, Windows Nano Server represents the future of Windows: a future where there is clean break from the necessities to support past applications and legacy code, a future where Windows can work remotely in a very lightweight, scalable, supportable way.

[Related: First look: Windows Server 2016 goes on a cloud diet]

While Windows Nano Server is not intended to replace Windows Server 2012 R2 or Windows Server 2016 in any way, it’s easy to see how there would be much less of a need for a general purpose server release in the near future, especially as legacy code gets aged out of production and use cycles and more and more workloads move to the cloud. We could see a completely different world where Windows Server gets more like Windows 10: No major revisions or major n+1 style versions, but just solid updates coming fairly regularly out of Redmond that add functionality or remove old features that have been deprecated and replaced.

While Windows Nano Server is definitely a specialty move for now, it’s not hard to see how it will become the preferred operating system as time marches on, with the whole Windows Server operating system becoming an “if you must” type of option.

Link: http://www.cio.com

 

Picture of System Administrator

Windows PowerShell para administradores

by System Administrator - Friday, 31 March 2017, 10:29 PM
 

25 principales comandos de Windows PowerShell para administradores

A pesar de que Windows PowerShell ha estado alrededor por un tiempo, hay un montón de administradores que pueden no aventurarse voluntariamente en la línea de comandos, familiarizados con lo que es un cmdlet PowerShell. Pero a medida que Microsoft amplía la funcionalidad de PowerShell, los administradores deben interesarse por entender los fundamentos de sus capacidades.

Echemos un vistazo a 25 tareas muy comunes que puede lograr con Windows PowerShell. No solo son comunes las tareas mismas, sino que las estructuras de los comandos muestran la sintaxis y la estructura de otros comandos de PowerShell. Estos comandos básicos de PowerShell deben hacer que usted comience en la ruta para convertirse en un maestro.

Entradas communes (solo para empezar)

1. Navegue el Windows Registry como el sistema de archivos:
cd hkcu:

2. Busque recursivamente una determinada cadena dentro de los archivos:
dir –r | select string "searchforthis"

3. Encuentre los cinco procesos que usan más memoria: 
ps | sort –p ws | select –last 5

4. Haga un ciclo de un servicio (detenerlo, y luego reiniciarlo) como DHCP:
Restart-Service DHCP

5. Liste todos los elementos dentro de una carpeta:
Get-ChildItem – Force

6. Recurra sobre una serie de directorios o carpetas:
Get-ChildItem –Force c:\directory –Recurse

7. Elimine todos los archivos dentro de un directorio sin que se le pida entrar cada uno:
Remove-Item C:\tobedeleted –Recurse

8. Reinicie la computadora actual:
(Get-WmiObject -Class Win32_OperatingSystem -ComputerName .).Win32Shutdown(2)

Recolectar información

9. Obtenga información sobre la fabricación y modelo de una computadora:
Get-WmiObject -Class Win32_ComputerSystem

10. Obtenga información sobre la BIOS de la computadora actual:
Get-WmiObject -Class Win32_BIOS -ComputerName .

11. Lista de arreglos en caliente instalados – QFEs o archivos Windows Update:
Get-WmiObject -Class Win32_QuickFixEngineering -ComputerName .

12. Obtenga el nombre de usuario de la persona actualmente registrado en una computadora:
Get-WmiObject -Class Win32_ComputerSystem -Property UserName -ComputerName .

13. Encuentre solo los nombres de las aplicaciones instaladas en la computadora actual:
Get-WmiObject -Class Win32_Product -ComputerName . | Format-Wide -Column 1

14. Obtenga direcciones IP asignadas a la computadora actual:
Get-WmiObject -Class Win32_NetworkAdapterConfiguration -Filter IPEnabled=TRUE -ComputerName . | Format-Table -Property IPAddress

15. Obtenga un reporte de configuración IP más detallada para la máquina actual:
Get-WmiObject -Class Win32_NetworkAdapterConfiguration -Filter IPEnabled=TRUE -ComputerName . | Select-Object -Property [a-z]* -ExcludeProperty IPX*,WINS*

16. Encuentre las tarjetas de red con DHCP habilitado en la computadora actual:
Get-WmiObject -Class Win32_NetworkAdapterConfiguration -Filter "DHCPEnabled=true" -ComputerName .

17. Permita DHCP en todos los adaptadores de red en la computadora actual:
Get-WmiObject -Class Win32_NetworkAdapterConfiguration -Filter IPEnabled=true -ComputerName . | ForEach-Object -Process {$_.EnableDHCP()}

Gestión de software

18. Instale un paquete MSI en una computadora remota:
(Get-WMIObject -ComputerName TARGETMACHINE -List | Where-Object -FilterScript {$_.Name -eq "Win32_Product"}).Install(\\MACHINEWHEREMSIRESIDES\path\package.msi)

19. Actualice una aplicación instalada con un paquete de actualización de aplicaciones basada en MSI:
(Get-WmiObject -Class Win32_Product -ComputerName . -Filter "Name='name_of_app_to_be_upgraded'").Upgrade(\\MACHINEWHEREMSIRESIDES\path\upgrade_package.msi)

20. Elimine un paquete MSI de la computadora actual:
(Get-WmiObject -Class Win32_Product -Filter "Name='product_to_remove'" -ComputerName . ).Uninstall()

Gestión de la máquina

21. Remotamente apague otra máquina después de un minuto:
Start-Sleep 60; Restart-Computer –Force –ComputerName TARGETMACHINE

22. Añada una impresora:
(New-Object -ComObject WScript.Network).AddWindowsPrinterConnection("\\printerserver\hplaser3")

23. Elimine una impresora:
(New-Object -ComObject WScript.Network).RemovePrinterConnection("\\printerserver\hplaser3 ")

24. Entre en una sesión remota de PowerShell – usted debe tener habilitada la gestión remota:
enter-pssession TARGETMACHINE

25. Use el commando de invocación de PowerShell ejecute un script en un servidor remoto:
invoke-command -computername machine1, machine2 -filepath c:\Script\script.ps1

Comando bono

Para descartar un proceso, puede utilizar el ID del proceso o el nombre del proceso. El modificador -processname permite el uso de comodines. Aquí está cómo detener la calculadora:
Stop-Process -processname calc*

Próximos pasos

Quizás quiera revisar también:

Profundice más 
Picture of System Administrator

Windows' adaptive shell

by System Administrator - Thursday, 19 January 2017, 4:32 PM
 

Microsoft's new adaptive shell will help Windows 10 scale across PC, Mobile, and Xbox

Microsoft is about to take the next step with its "One Windows" vision by introducing an improved, adaptable Windows Shell that'll work across PC, Mobile and Xbox.

The Windows Shell is essentially the Windows environment we all know and love. In layman's terms, it gives us access to system elements and objects necessary for running applications, and houses features such as the Taskbar, Start Menu, Desktop and more. Currently, the Windows Shell is different depending on the version of Windows 10 you're using. For example, Mobile is using a different Windows Shell than desktop; but Microsoft is working to change and streamline that.

According to my sources, Microsoft is building an "adaptive shell" into Windows 10 that'll work across PCs and tablets, phones, HoloLens, and even Xbox. As it currently stands, the Windows Shell isn't a true universal element of Windows, unlike the OneCore subsystem and Universal Windows Apps. PCs and tablets share the same shell thanks to Continuum, but Mobile, HoloLens and Xbox have their own individual shells that are updated and maintained separately.

Over the next few Windows 10 releases however, Microsoft will be bringing each of these device categories under one Windows Shell, making for a true universal Windows 10 experience no matter what device you're using. Internally referred to as "Composable Shell" or "CSHELL", this new Windows Shell will be able to scale in real-time between all types of devices, similarly to how Continuum currently works between desktop mode and tablet mode, only this time it'll scale across Xbox and Mobile as well.

For our more techy readers, the Composable Shell is essentially a shell modularized into sub-components. The system can transition between each component if it is required, making for a much more flexible experience on devices like 2-in-1's or something that has multiple form-factors.

We're told that the Composable Shell will begin showing up over the next few major Windows 10 updates, for Mobile, then Desktop, and eventually Xbox too. In fact, Microsoft has already given us a glimpse of this Composable Shell in a demo a few months back detailing improvements upcoming to Continuum on Windows 10 Mobile. In the demo, Microsoft showed off a Continuum environment on phone that was extremely similar to the environment we know and love on actual Windows 10 PCs today. This is essentially the Composable Shell in its infancy.

That demo showed us that Microsoft is enhancing Continuum to go both ways. Windows 10 Mobile can expand into a full desktop environment, and eventually, Windows 10 desktop will be able to do the opposite or scale further for devices like HoloLens and Xbox.

 

A perfect example of this Composable Shell is with the rumored Surface phone and Windows 10 on ARM. We all want Microsoft to release a phone running full Windows 10 on ARM, but as it currently stands that would be impossible — full Windows 10 doesn't have a UI that adapts well to screen sizes of less than 6 inches. With this Composable Shell, that wouldn't be an issue because full Windows 10 would be able to switch into "phone-mode", providing an experience one would expect on a Windows 10 Mobile device, except powered by full Windows 10.

In addition, with the Surface phone also rumored to have a foldable screen, the Composable Shell would simply be able to adapt itself accordingly when folded out. When folded like a phone, Windows 10 will be in phone mode, but when folded out, it'll automatically switch into tablet/desktop mode. A full Windows 10 machine in your pocket, with a full Windows desktop environment and phone environment whenever needed; these are the kind of experiences this Composable Shell can enable.

Even if the fabled Surface phone ends up running Windows 10 Mobile rather than full Windows 10 on ARM, this Composable Shell will still be beneficial for future devices (like the rumored folding screens), as Microsoft is already working on the full desktop environment in Windows 10 Mobile Continuum anyway.

 

The other benefit of an adaptable shell is that Microsoft will no longer have to maintain and update each individual shell separately. The Composable Shell, being scalable across all kinds of Windows 10 devices, will be the same shell everywhere, meaning Microsoft won't need to worry about updating individual shell environments. Update once, deploy everywhere.

Now although this new shell is universal, that doesn't mean certain devices will be encumbered with features and behaviors they don't need or play well with. Xbox will still be primarily Xbox orientated, Mobile will be primarily Mobile orientated, and Desktop will be primarily Desktop orientated. That's the magic of Continuum and the Composable Shell. It adapts.

And in regards to the name "Composable Shell", why call it composable? Well, I think the definition of composability explains it perfectly. "A highly composable system provides recombinant components that can be selected and assembled in various combinations to satisfy specific user requirements." It's basically a fancy way of saying Continuum, if you think about it hard enough.

Of course, we're still a few major Windows 10 releases away before this new shell begins showing up across all versions of Windows 10, but assuming these plans don't get canceled, this is a very exciting concept for Windows 10 and one that will enable a whole new market of devices.

Best apps for Windows 10 PC: http://www.windowscentral.com

Link: http://www.windowscentral.com/microsoft-windows-10-composable-shell

 

X

Picture of System Administrator

X (BUSINESS)

by System Administrator - Thursday, 2 May 2013, 9:56 PM
 
Picture of System Administrator

X (ICT/TIC)

by System Administrator - Thursday, 2 May 2013, 9:06 PM
 
  • X - X is a shortened name for the X Window System.
  • X - In compact disc (CD) and digital versatile disc (DVD) technology, X is a ba...
  • X - The X Window System (sometimes referred to as "X" or as "XWindows") is an o...
  • X (compact disc access time) - In compact disc (CD) ...
  • x and y coordinates - x, y coordinates are respectively the h...
  • x coordinate - x, y coordinates are respectively the horizontal and ...
  • X dimension - In barcode technology, the X dimension is the narrowest...
  • X engineering - X-engineering (sometimes called cross-engineering) ...
  • X server - An X server is a server of connections to X terminals in a di...
  • X terminal - An X terminal is typically a diskless computer especially...
  • X Window System - The X Window System (sometimes referred to as "...
  • X Window System (X or XWindows) - The X Window Sy...
  • X Windows - The X Window System (sometimes referred to as "X" or as "XW...
  • X# - X# is the name that has been given to a "data-centric" programming langua...
  • X-Box - X-Box is a game console developed by Microsoft to provide players w...
  • X-engineering - X-engineering (sometimes called cross-engineering) ...
  • X-engineering (cross-engineering) - X-engineeri...
  • X-modem - The protocols that modems agree on and use for checking and cor...
  • X-off - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounc...
  • X-on - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced...
  • X-ray body scanning - Backscatter body scanning is an X-ray-b...
  • X.25 - The X.25 protocol, adopted as a standard by the Consultative Committe...
  • X.400 - X.400 is the messaging (notably e-mail) standard specified by the I...
  • X.500 - X.500 Directory Service is a standard way to develop an electronic ...
  • X11 license - The MIT License (also known as the X11 license or MITX ...
  • x2 - x2 is a technology from US Robotics (now 3Com) for the downstream transmi...
  • x86 - x86 is a generic name for the series of Intel microprocessor families t...
  • X9 - ASC X9, Inc. (X9) is the American National Standards Institute (ANSI) org...
  • X9 (ASC X9) - ASC X9, Inc. (X9) is the American National Standards In...
  • XaaS - XaaS is a collective term that stands for a number of things includin...
  • XaaS (anything as a service) - XaaS is a collective ...
  • XACL - XACML (Extensible Access Control Markup Language) is an open standard...
  • XACML - XACML (Extensible Access Control Markup Language) is an open standa...
  • XACML (Extensible Access Control Markup Language)
  • Xalan - Xalan is a specification for transforming Extensible Markup Languag...
  • XAML - XAML, Extensible Application Markup Language, is Microsoft's XML-base...
  • XAML (Extensible Application Markup Language)
  • Xanadu - Xanadu (TM) is a set of ideas and a software design project for a...
  • XBRL - XBRL (Extensible Business Reporting Language) is an XML-based compute...
  • XBRL (Extensible Business Reporting Language)
  • XCCDF - XCCDF (Extensible Configuration Checklist Description Format) is a ...
  • XCCDF (Extensible Configuration Checklist Descr...
  • XDMA - XDMA (Xing Distributed Media Architecture) is a network architecture ...
  • XDMA (Xing Distributed Media Architecture)
  • Xen - Xen is an open source virtual machine monitor for x86-compatible comput...
  • xenodochial - Xenodochial is an adjective describing something, such ...
  • Xeon - Xeon (pronounced ZEE-ahn) is a 400 MHz Pentium microprocessor from In...
  • Xerces - Xerces (the name comes from the Xerces blue butterfly) is a set o...
  • xerography - Test yourself. A WhatIs.com tech vocabulary quiz - printe...
  • xerography - Xerography, also known as electrophotography, is a printi...
  • xerography (electrophotography) - Xerography, als...
  • XFDL - Extensible Forms Description Language (XFDL) is a use of the Extensib...
  • XFDL (Extensible Forms Description Language)
  • XGA - XGA (Extended Graphics Array) is a high-resolution video display mode t...
  • XGA - The term display mode refers to the characteristics of a computer displ...
  • XGA 2 - XGA (Extended Graphics Array) is a high-resolution video display mo...
  • XGA and XGA-2 (Extended Graphics Array)
  • XGA-2 - XGA (Extended Graphics Array) is a high-resolution video display mo...
  • XGA2 - XGA (Extended Graphics Array) is a high-resolution video display mode...
  • XHR - XMLHttpRequest, also called XHR, is an application program interface (A...
  • XHTML - As the World Wide Web Consortium (W3C) describes it, XHTML (Extensi...
  • XHTML (Extensible Hypertext Markup Language)
  • XHTML Cheatsheet - Cheat sheet quick look-up for XHTML.
  • XING - XING is a European social networking website for business professionals.
  • Xing Distributed Media Architecture - XDMA (X...
  • XIPC - XIPC is a middleware product that manages interprocess communication ...
  • XJACK - XJACK is a type of connector for notebook computer modem that allow...
  • XMI - XMI (XML Metadata Interchange) is a proposed use of the Extensible Mark...
  • XMI (XML Metadata Interchange) - XMI (XML Metadata...
  • XML - XML (Extensible Markup Language) is a flexible way to create common inf...
  • XML (Extensible Markup Language) - XML (Extensib...
  • XML bomb - An XML (Extensible Markup Language) bomb is a small but dange...
  • XML Core Services - XML Core Services (formerly known as MSXML,...
  • XML information set - The XML information set, also called th...
  • XML infoset - The XML information set, also called the XML Infoset, i...
  • XML infoset (XML information set) - The XML inf...
  • XML Metadata Interchange - XMI (XML Metadata Interchange...
  • XML namespace - In general, a namespace uniquely identifies a set o...
  • XML pipeline - An XML pipeline is a formalized, logical expression o...
  • XML Pointer Language - XPointer is a language for locating d...
  • XML Query Language - XQL (XML Query Language) is a way to loca...
  • XML Schema Definition - XSD (XML Schema Definition), a Reco...
  • XMLHttpRequest - XMLHttpRequest, also called XHR, is an applicatio...
  • XMLNews - XMLNews is a set of specifications for exchanging news objects ...
  • Xmodem - Xmodem is an error-correcting protocol for modem that was created...
  • XMPP - XMPP (Extensible Messaging and Presence Protocol) is a protocol based...
  • XMPP (Extensible Messaging and Presence Protocol)
  • XMT - The XMT (Extensible MPEG-4 Textual) format is the use of a textual synt...
  • XMT (Extensible MPEG-4 Textual) - The XMT (Extens...
  • XNA Game Studio - XNA Game Studio is an integrated development en...
  • XNOR - A logic gate is an elementary building block of a digital circuit.
  • XNS - Extensible Name Service (XNS) is an open Extensible Markup Language (XM...
  • XO - XO is the first version of the $100 laptop expected to reach a substantia...
  • XO-I - XO is the first version of the $100 laptop expected to reach a substa...
  • Xoff - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced...
  • Xon - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced e...
  • Xon Xoff - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pr...
  • Xon/Xoff (X-on/X-off or XON/XOFF) - Xon/Xoff (s...
  • XOR - A logic gate is an elementary building block of a digital circuit.
  • XORP - XORP (Extensible Open Router Platform) is a project devoted to the cr...
  • XORP (Extensible Open Router Platform)
  • XP - Extreme Programming (XP) is a pragmatic approach to program development t...
  • XP key changer - XP key changer is a way to update the product act...
  • XPath - XPath is a language that describes a way to locate and process item...
  • XPath injection - XPath injection is an attack targeting Web site...
  • XPointer - XPointer is a language for locating data within an Extensible...
  • XPRL - XPRL (Extensible Public Relations Language) is an open specification ...
  • XPRL (Extensible Public Relations Language)
  • XQL - XQL (XML Query Language) is a way to locate and filter the elements (da...
  • XQL (XML Query Language) - XQL (XML Query Language) is a...
  • XQuery - XQuery is a specification for a query language that allows a user...
  • XrML - XrML (Extensible Rights Markup Language) is a proposed standard digit...
  • XrML (Extensible Rights Markup Language)
  • XSD - XSD (XML Schema Definition), a Recommendation of the World Wide Web Con...
  • XSD (XML Schema Definition) - XSD (XML Schema Definit...
  • XSL - XSL (Extensible Stylesheet Language), formerly called Extensible Style ...
  • XSL (Extensible Stylesheet Language) - XSL (...
  • XSL Transformations - XSL Transformations (XSLT) is a standar...
  • XSL Transformations (XSLT) - XSL Transformations (XSLT...
  • XSLT - XSL Transformations (XSLT) is a standard way to describe how to trans...
  • xSP - xSP is a generic term for any kind of service provider on the Internet.
  • XSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a ...
  • XSS - Cross-site scripting (XSS) is a security exploit in which the attacker ...
  • XSS hole - Cross-site scripting (XSS) is a security exploit in which the...
  • XST - Cross-site tracing (XST) is a sophisticated form of cross-site scriptin...
  • XTACACS - TACACS (Terminal Access Controller Access Control System) is an...
  • Xubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based ...
  • XUL - XUL (Extensible User-interface Language) is a standard way to exchange ...
  • XUL (Extensible User-interface Language)
  • XWindows - The X Window System (sometimes referred to as "X" or as "XWin...
  • XyWrite - XyWrite was a text editor from XYQuest that gained a following ...
Picture of System Administrator

X (MARKETING)

by System Administrator - Thursday, 2 May 2013, 10:39 PM
 

 

X

X-OpenXHTMLXingXMLXSL.

 

=> X-Open: Asociación internacional fundada en 1984 que tiene como objetivo el desarrollo y la promoción de los estándares en el campo de las Tecnologías de la Información y de la Comunicación (TIC's). Más información en:http://www.opengroup.org/.

=> XHTML: Lenguaje HTML reescrito en lenguaje XML. Esta transformación aporta dos ventajas: la primera es que el XML está concebido para que sea fácil de procesar por un programa, con lo que una página en XHTML es mas rápida de descargar que su equivalente HTML. La otra ventaja es que, al ser un documento XML, dentro de una página XHTML se pueden insertar otros documentos XML como, por ejemplo, un gráfico en formato SVG (http://www.w3.org/TR/SVG/) o una fórmula matemática en formato MATHML (http://www.w3.org/Math/). Además, en una página web en XHTML se pueden integrar incluso documentos XML de creación propia, siempre y cuando uno haya programado el plugin adecuado para el navegador. De todas formas, la cualidad más importante de XHTML es la modularidad, es decir, hay un XHTML básico, que deben reconocer absolutamente todos los navegadores (incluso los que integran los dispositivos móviles), y el resto de funcionalidades (formularios, tablas, frames, o applets de java) se definen cómo módulos de ampliación que pueden ser propios o desarrollados por terceros.

=> Xing: Red social profesional y de negocios nacida en Alemania como proyección virtual del club financiero de Hamburgo y otros. Con más de 4 millones de usuarios es la red de mayor influencia en Europa, entre otras razones, porque se presenta en 16 idiomas. En poco tiempo ha adquirido a: Neurona (una de las principales redes españolas con 850.000 miembros tanto de España como de Sudamérica), Econozco, otra red con fuerte implantación en el viejo continente y Cember.net la principal red social turca. Se encuentra en: http://www.xing.com.

=> XML: Siglas de las palabras inglesas: Extensible Markup Language que, en español, significan: "lenguaje de marcado ampliable o extensible". Es un lenguaje desarrollado por el World Wide Web Consortium(W3C). Se trata de un lenguaje de marcas que permite el etiquetado y estructuración de contenidos de manera muy sencilla y fácil de integrar con otras aplicaciones. Sin tolerancia a fallos, se ha convertido en el estándar para el intercambio de datos entre diversas aplicaciones.

=> XSL: Siglas de las palabras inglesas: "Extensible Stylesheet Language", que, en español, pueden traducise por: "lenguaje extensible de hojas de estilo". Setrata de una familia de lenguajes basados en el estándar xml que permite describir cómo la información contenida en un documento XML debe ser transformada (o formateada) para su presentación en un medio concreto. Es de mucho interés en el ámbito de desarrollo web y en especial en la de aquellos sitios web que se quieran preparar para ser vistos en diferentes dispositivos de navegación (Agendas electrónicas, navegadores de coche, etc.).

Picture of System Administrator

X (OPEN SOURCE)

by System Administrator - Wednesday, 10 July 2013, 7:46 PM
 
  • Xen - Xen is an open source virtual machine monitor for x86-compatible comput...
  • Xubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based ...
Picture of System Administrator

X (PROGRAMMING)

by System Administrator - Thursday, 11 July 2013, 6:29 PM
 
Picture of System Administrator

X (WEB SERVICES)

by System Administrator - Saturday, 1 June 2013, 3:25 PM
 
  • XML (Extensible Markup Language) - a flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere.
  • XML Core Services (formerly MSXML) - an application for processing Extensible Stylesheet Language Transformation (XSLT) in an XML file. Based on Microsoft's Component Object Model (COM), XML Core Services is essentially an application programming interface (API) to an XML parser and the XPath processor. The parser organizes the XML data into a tree structure for processing, and the processor converts the XML to HTML for display.
  • XPath - a language that describes a way to locate and process items in XML documents by using an addressing syntax based on a path through the document's logical structure or hierarchy.
  • XSL (Extensible Stylesheet Language) - a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • XSL Transformations (XSLT) - a standard way to describe how to transform (change) the structure of one XML document into an XML document with a different structure.
Picture of System Administrator

Xperia Touch

by System Administrator - Friday, 31 March 2017, 10:48 PM
 

Haz que las superficies cobren vida con el Xperia Touch: Un proyector táctil con Android

por Sebastian Manzanedo

Sony Mobile dió a conocer sus últimas innovaciones en productos que esperan que abran nuevos caminos en la tecnología de consumo.

“Xperia Touch es una interfaz revolucionaria”, afirmó Hiroki Totoki, Presidente y CEO de Sony Mobile Communications. “A un año de dar a conocer nuestra nueva dirección de marca y visión sobre el futuro de las comunicaciones, no sólo anunciamos Xperia XZ Premium, el dispositivo móvil equipado con las tecnologías más avanzadas para mejorar las funciones esenciales en los teléfonos inteligentes, sino que estamos creando nuevas experiencias interactivas de comunicación con nuestros productos inteligentes Xperia”.

 

XPERIA TOUCH: EL PROYECTO INTERACTIVO ANDROID

Xperia Touch es un proyector interactivo que convierte cualquier superficie plana en una pantalla táctil HD de 23” al ofrecer una proyección horizontal o vertical ultrashort-throw. La interfaz es veloz, fluida y receptiva al contacto físico: está basada en la tecnología de proyección SXRD de Sony, cuya función táctil es posible mediante una combinación de luz infrarroja y detección de tiempo real a través de su cámara incorporada, a una velocidad de 60 cuadros por segundo.

Gracias a Xperia Touch, la familia y los amigos podrán reunirse alrededor de una mesa, en la cocina o en la sala para disfrutar juegos, reproducir y ver videos en línea, así como comunicarse a través de aplicaciones de mensajería y redes sociales.

El elegante revestimiento de la pantalla inicial está diseñado específicamente para ser táctil: un estilo tanto minimalista como accesible en condiciones de oscuridad o mucha luz. Entrega información sobre el clima en tiempo real, e incluye un tablero para dibujos y videonotas; además, brinda acceso a un calendario y al portal de Skype™ para que puedas chatear por videollamada con tus colegas o seres queridos.

 

Xperia Touch no sólo es compatible con PlayStation 4 Remote Play, sino que también funcionará con cualquier aplicación o juego descargado de Google Play, lo cual establece un nuevo hito en las miles de formas en que ahora pueden disfrutarse las experiencias. La exclusiva capacidad táctil de proyección y la arquitectura del sensor ofrecerán a los programadores una plataforma completamente nueva en la cual basarse y crear.

 

XPERIA EAR: MANOS LIBRES. OJOS LIBRES. OÍDOS LIBRES:

 

El “CONCEPTO estilo abierto” de Xperia Ear se basa en una tecnología de audio “abierta” creada a través de la iniciativa Future Lab Program de Sony, una incubadora que permite a los consumidores probar prototipos de la división de I&D de Sony.

Se basa en investigaciones de Sony para ofrecer audífonos estéreo inalámbricos “abiertos”, de manera que los usuarios puedan escuchar música y recibir notificaciones, a la vez que oyen sonidos del ambiente. Ya sea que escuches música mientras haces ejercicio o de camino al trabajo, es una experiencia inédita para un dispositivo de este tipo.

El “CONCEPTO estilo abierto” de Xperia Ear radica en reinventar totalmente la experiencia cotidiana de audio y comunicación: sus dos conductores acústicos espaciales ultra potentes y los controladores funcionan a la par para transmitir los sonidos directamente al oído.

Al igual que Xperia Ear, Xperia Ear “CONCEPTO de estilo abierto” contará con Sony Agent Technology, un asistente personal que utiliza la interacción de voces en una conversación y los gestos de la cabeza para ayudarte a hacer cosas, acceder a información y comunicarte.

Sony Mobile seguirá desarrollando nuevas funciones para aumentar aún más la capacidad de los asistentes utilizados en el oído. Un ejemplo de esto es ‘Anytime Talk’ – un nuevo servicio de chat de voz que permitirá a los usuarios iniciar instantáneamente una conversación de grupo en tiempo real, sin la necesidad de buscar a través de contactos, ni de marcar; bastará una simple pulsación de botón o un movimiento de la cabeza.

Sony Mobile también está explorando una nueva colaboración con Sony Agent Technology en los productos inteligentes Xperia y la nueva plataforma Inteligencia Artificial en la nube de LINE Corporation, el grupo detrás de la popular aplicación de mensajería LINE, para desarrollar y co-crear una nueva experiencia de voz integrada.

CUATRO SMARTPHONES XPERIA TOTALMENTE NUEVOS

Sony Mobile también anunció la incorporación de cuatro dispositivos a su popular serie X, al mejorar los modelos premium y de gama media; además, seguirá ofreciendo diversas características para captar la atención de los consumidores.

Hideyuki Furumi, Vicepresidente Ejecutivo de Ventas y Mercadotecnia Globales de Sony Mobile señaló: “seguimos desarrollando y transformando nuestro portafolio de smartphones con una dedicación total para brindar la tecnología más avanzada en productos con un diseño elegante. Ya sea que se trate de un sistema de cámara apilado con memoria, capaz de capturar movimiento en súper cámara lenta o la primera pantalla 4K HDR del mundo, estamos ofreciendo experiencias que conectan a los usuarios de maneras emotivas y significativas como nunca antes”.

 

Xperia XZ Premium incorpora el nuevo sistema de cámara Motion Eye de Sony que ofrece funciones avanzadas y una excelente calidad de imagen, así como la primera pantalla 4K HDR del mundo4 (5.5”). La cámara Motion Eye proporciona una captura y reproducción de videos en súper cámara lenta a 960 cuadros por segundo, cuatro veces más lento que cualquier otro smartphone5. Xperia XZ Premium estará disponible a nivel mundial en los tonos cromado luminoso y negro profundo.

 

La variante insignia de Xperia XZs ofrece la misma cámara rediseñada Motion Eye en ciertos mercados en un factor de forma de 5.2” y estará disponible en los tonos azul claro, plata cálido y negro.

 

Basándose en el éxito de los modelos Xperia XA lanzados el año pasado, Xperia XA1 y el XA1 Ultra con una pantalla de 6”, ofrecen un atractivo diseño de pantalla sin bordes de extremo a extremo. Ambos modelos superarán las expectativas al contar con una cámara trasera de gama alta con sensores de 23 MP y un gran rendimiento en condiciones de poca luz, mientras que XA1 Ultra está diseñado específicamente para los amantes de las selfies con su cámara frontal de calidad superior de 16 MP.

Xperia XA1 y Xperia XA1 saldrán al mercado con la versión Android Nougat y estará disponible en varios acabados modernos como blanco, negro, rosa6 y dorado.

Link: http://www.itsitio.com

Y

Picture of System Administrator

Y (BUSINESS)

by System Administrator - Thursday, 2 May 2013, 9:56 PM
 
Picture of System Administrator

Y (ICT/TIC)

by System Administrator - Thursday, 2 May 2013, 9:08 PM
 
  • Y - Admittance (symbolized Y) is an expression of the ease with which alternati...
  • y coordinate - x, y coordinates are respectively the horizontal and ...
  • Y-modem - The protocols that modems agree on and use for checking and cor...
  • Y/C Video - S-Video (Super-Video, sometimes referred to as Y/C Video, o...
  • Y2K - Y2K is an abbreviation for "year 2000." As that year approached, many f...
  • Y2K (year 2000) - Y2K is an abbreviation for "year 2000." As that...
  • yacc - Yacc (for 'yet another compiler compiler' ) is the standard parser ge...
  • yacc (yet another compiler compiler) - Yacc ...
  • Yagi antenna - A Yagi antenna, also known as a Yagi-Uda array or sim...
  • Yagi antenna (Yagi-Uda array) - A Yagi antenna, als...
  • Yagi Uda array - A Yagi antenna, also known as a Yagi-Uda array or...
  • Yagi-Uda array - A Yagi antenna, also known as a Yagi-Uda array or...
  • Yahoo - Yahoo! is an Internet portal that incorporates a search engine and ...
  • yak shaving - Yak shaving is programming lingo for the seemingly endl...
  • Yammer - Yammer is a private microblogging and collaboration platform for ...
  • yard management system - A yard management system (YMS) is...
  • yard management system (YMS) - A yard management sys...
  • yc video - S-Video (Super-Video, sometimes referred to as Y/C Video, or ...
  • year 2000 - Y2K is an abbreviation for "year 2000." As that year approa...
  • Yellow Book - The Yellow Book is the informal name for Philips and So...
  • Yellowdog Updater Modified - Yellowdog Update, Modifie...
  • Yellowdog Updater, Modified (YUM) - Yellowdog U...
  • yet another compiler compiler - Yacc (for 'yet anot...
  • Ymodem - Ymodem is an error-correcting protocol for a modem that uses larg...
  • YMS - A yard management system (YMS) is a software system designed to oversee...
  • yotta - Prefix multipliers are used in data storage, data communications, e...
  • yottabyte - A yottabyte is a measure of theoretical storage capacity an...
  • Your PC Graveyards - Have you read our Fast Guide to Online Co...
  • YouTube - YouTube is a free video-hosting website that allows members to ...
  • Yukon - Yukon is the code name used for the beta version of Microsoft's SQL...
  • YUM - Yellowdog Update, Modified (YUM) is a program that manages installation...
Picture of System Administrator

Y (OPEN SOURCE)

by System Administrator - Wednesday, 10 July 2013, 7:47 PM
 
Picture of System Administrator

Y (PROGRAMMING)

by System Administrator - Thursday, 11 July 2013, 6:30 PM
 
  • yak shaving - Yak shaving is programming lingo for the seemingly endl...
Picture of System Administrator

Yik Yak

by System Administrator - Friday, 20 November 2015, 8:37 PM
 

Yik Yak

Posted by Margaret Rouse

Yik Yak is a microblogging app that allows people to post messages (yaks) without user names; the mobile app aggregates and presents the posts of users within a 1.5 mile radius as a streaming data feed.

Users can reply to messages anonymously and vote posts and replies up or down. The app combines instant messaging and GPS technologies to enable posting within the specified geographical area. Geofencing be used to block Yik Yak within specified areas.

Yik Yak features include:

  • Yakarma: A numerical score based on upvotes and downvotes received and given.
  • Upvote/Downvote: User votes to raise or lower the score of a yak. The higher the score, the more it affects Yakarma. Yaks that reach a score of -5, on the other hand, are automatically deleted.
  • Peek: Enables view-only access to Yik Yak community feeds from other areas, such as college or university feeds.
  • New/Hot Tabs: The option to switch between a chronological feed and a feed of the most popular yaks, based on upvotes.
  • Other Top Yaks: The current Google image result page from searches for the word "yak". Typically all images of the animal.
  • My Herd: Allows users to designate an area such as their home, workplace or campus as their base camp and post to it even when they are not in range.
  • Photos: Allows users to include images in yaks. Photos are moderated for unacceptable content and displayed in grids of locally-posted images.

After Yik Yak launched in 2013, it was criticized for providing an anonymous channel forcyberbullying. Multiple high-profile incidents led the developers to block the app near high schools and middle schools the following year.

Although Yik Yak enables anonymous posting, that doesn't mean that messages can't be traced back to their sources. Users are required to provide a phone number for sign up and Yik Yak stipulates that they can provide police with user IP addresses, GPS coordinates, device details and data and time for each message if supported by a search warrant, court order or subpoena. As a result, Yik Yak users have been arrested for making threats of violence in their posts.

According to some security and privacy experts, what Yik Yak offers is really pseudoanonymity -- the appearance of anonymity, but not the reality.

See a brief introduction to Yik Yak:

Related Terms

DEFINITIONS

  • AirWatch MDM Agent

     - AirWatch Agent is mobile device management (MDM) software for mobile devices. The software was developed by AirWatch, a company that VMware acquired in 2014. (WhatIs.com)

  • liquid computing

     - Liquid computing is the capacity for data and applications to remain consistent and current across multiple devices so that the user could, for example, stop working on a document on a desktop befo...(WhatIs.com)

  • smart home app (home automation app)

     - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, t... (WhatIs.com)

GLOSSARIES

  • Wireless and mobile

     - Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • Internet applications

     - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Z

Picture of System Administrator

Z (BUSINESS)

by System Administrator - Thursday, 2 May 2013, 9:57 PM
 
Picture of System Administrator

Z (DATA CENTER)

by System Administrator - Thursday, 11 July 2013, 5:28 PM
 
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainfram...
  • zero client - Zero client, also known as ultrathin client, is a serve...
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc th...
Picture of System Administrator

Z (ICT/TIC)

by System Administrator - Thursday, 2 May 2013, 9:11 PM
 
  • z coordinate - A z coordinate is the third-dimensional coordinate in...
  • Z Object Publishing Environment - Zope (Z Object ...
  • z-buffering - Z-buffering is an algorithm used in 3-D graphics to ens...
  • Z-modem - The protocols that modems agree on and use for checking and cor...
  • z/OS - z/OS is the computer operating system for IBM's zSeries 900 (z900) li...
  • z/VM - VM (Virtual Machine), currently embodied in a product called VM/ESA, ...
  • Z39.50 - Z39.50 is a standard communications protocol for the search and r...
  • z990 - The z990, also known by its code name T-Rex, is a 64-bit mainframe co...
  • z990 (T-Rex) - The z990, also known by its code name T-Rex, is a 64-...
  • Zabbix - Zabbix is an open-source tool designed to monitor networks, serve...
  • Zachman framework - The Zachman framework is a logical structur...
  • zap - In general usage, zap (noun) is spiciness, kick, or a powerful force.
  • zAware - zAware is a mainframe monitor for IBM’s zEnterprise EC12 mainfram...
  • Zbot - Zeus, also known as Zbot, is a malware toolkit that allows a cybercri...
  • ZBR - Zoned-bit recording (ZBR) is a method of physically optimizing the util...
  • zenware - Zenware refers to application programs that function with a min...
  • zero - In mathematics, zero, symbolized by the numeric character 0, is both ...
  • zero (0) - In mathematics, zero, symbolized by the numeric character 0, ...
  • Zero Administration - Zero Administration for Windows is Micr...
  • zero client - Zero client, also known as ultrathin client, is a serve...
  • zero day - A zero-day exploit is one that takes advantage of a security ...
  • Zero Insertion Force socket - A ZIF (Zero Insertion F...
  • zero-based thinking (ZBT) - Zero-based thinking (ZBT) i...
  • zero-day exploit - A zero-day exploit is one that takes advantag...
  • zettabyte - A zettabyte is a measure of storage capacity and is 2 to th...
  • Zeus Trojan - Zeus, also known as Zbot, is a malware toolkit that all...
  • Zeus Trojan (Zbot) - Zeus, also known as Zbot, is a malware to...
  • ZIF - A ZIF (Zero Insertion Force) socket is the physical way that Intel's 48...
  • ZIF socket - A ZIF (Zero Insertion Force) socket is the physical way t...
  • ZIF socket (Zero Insertion Force socket)
  • ZigBee - ZigBee is a specification for wireless personal area networks (WP...
  • Zimbra Collaboration Server - Zimbra is an open sourc...
  • Zimmermann Real Time Transport Protocol
  • Zimmermann Real-Time Transport Protocol
  • zinc whiskers - Zinc whiskers are tiny growths of elemental zinc th...
  • zine - The term ezine is short for "electronic magazine.
  • zip codes - ZIP (Zoning Improvement Plan) codes are postal codes in the...
  • zip codes (Zoning Improvement Plan codes)
  • Zip disk - A Zip drive is a small, portable disk drive used primarily fo...
  • Zip drive - A Zip drive is a small, portable disk drive used primarily ...
  • zipping - Zipping is the act of packaging a set of files into a single fi...
  • Zippo - Ransomware is a type of malware used for data kidnapping, an exploi...
  • Zmodem protocol - Zmodem is an error-correcting protocol for modems.
  • zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by W...
  • zombie - A zombie (also known as a bot) is a computer that a remote attack...
  • zombie (bot) - A zombie (also known as a bot) is a computer that a r...
  • zombie army - A zombie army (also known as a botnet) is a number of I...
  • zone - In general, a zone is an area of administration.
  • zone file - A zone file is a small set of instructions for resolving sp...
  • zone recording - Zoned-bit recording (ZBR) is a method of physical...
  • zone-bit recording - Zoned-bit recording (ZBR) is a method of ...
  • zone-density recording - Zoned-bit recording (ZBR) is a me...
  • zoned bit recording - Zoned-bit recording (ZBR) is a method o...
  • zoned-bit recording - Zoned-bit recording (ZBR) is a method o...
  • zoned-bit recording (ZBR) - Zoned-bit recording (ZBR) i...
  • zoning - In a storage area network (SAN), zoning is the allocation of reso...
  • Zoning Improvement Plan codes - ZIP (Zoning Improve...
  • zoo - A zoo is a collection of viruses and worms that exist only in virus and...
  • Zoomed Video - The Zoomed Video port (ZV port) is a technology that ...
  • Zoomed Video port - The Zoomed Video port (ZV port) is a techno...
  • zoopraxiscope - The zoopraxiscope (pronounced ZOH-uh-PRACKS-uh-scoh...
  • Zope - Zope (Z Object Publishing Environment)is a Web site builder and serve...
  • Zope (Z Object Publishing Environment)
  • Zotob - Zotob is a computer worm used by an attacker to gather personal and...
  • zphone - ZRTP is an extension of the Real-Time Transport Protocol (RTP) th...
  • ZRTP - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that d...
  • ZRTP (Zimmermann Real-Time Transport Protocol)
  • zsh - Zsh is a shell (command interpreter) of the Bourne shell family, which ...
  • Zulu - Zulu (short for "Zulu time") is used in the military and in navigatio...
  • Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the m...
  • Zulu time - Zulu (short for "Zulu time") is used in the military and in...
  • Zune - The Zune is a portable digital media player from Microsoft.
  • ZV port - The Zoomed Video port (ZV port) is a technology that supports t...
  • ZV port (Zoomed Video port) - The Zoomed Video port (...
Picture of System Administrator

Z (MARKETING)

by System Administrator - Thursday, 2 May 2013, 10:40 PM
 

 

Z

ZingZIPZona desmilitarizadaZooZoom.

 

=> Zing: Anuncio en la Red consistente en la aparición de un spot ocupando la pantalla completa, mientras el usuario espera que se cargue la URL o dirección del web que ha solicitado. Una vez que la página solicitada ha sido cargada, el zing desaparece para aparecer a continuación a modo de pequeño recuadro en la parte superior derecha de la pantalla.

=> ZIP: Formato de comprensión. También es la extensión de un archivo comprimido mediante una utilidad como pueda ser el programa shareware Winzip (http://www.winzip.com).

=> Zona desmilitarizada: Espacio extraño donde van a parar todos los que, con dudosas intenciones, se saltan un firewall o cortafuefos del servidor de una empresa. El término es del argot del sector de la seguridad informática, pero puede afactar y mucho a las actividades que una empresa realice por Internet.

=> Zoo: Sitio web cuyo contenido es una colección de virushoaxes y troyanos puestos a disposición de los internautas. En algunos países estos webs están prohibidos.

=> Zoom: En español: Ampliar, aumentar o aproximar. En una página web donde hay imágenes realizadas en VRML se acostumbra a añadir una opción de zoom mediante la cual, a golpe de clic, se ofrecen vistas a diferentes distancias. Es de mucha utilidad para presentar la imagen de un producto en la ficha del mismo en una tienda virtual.

Picture of System Administrator

Z (OPEN SOURCE)

by System Administrator - Wednesday, 10 July 2013, 7:48 PM
 
  • zsh - Zsh is a shell (command interpreter) of the Bourne shell family, which ...
Picture of System Administrator

Z (PROGRAMMING)

by System Administrator - Thursday, 11 July 2013, 6:30 PM
 
Picture of System Administrator

Z-Wave

by System Administrator - Thursday, 29 January 2015, 1:08 PM
 

Z-Wave

Posted by: Margaret Rouse

Z-Wave is a wireless communication technology that is used in security systems and also business and home automation.

Z-Wave is often used in locks, security systems, lighting, heating, cooling and home appliances. Support can be integrated in products or added by retrofitting standard electronics and devices.

Z-Wave communications use low-power radio signals in the 900MHz range, separated fromWi-Fi. The system supports automatic discovery of up to 230 devices per controller. Multiple controllers can also communicate with one another and pass commands to support additional devices. Z-wave is optimized for low latency, with data rates of up to 100KB/s.

Z-Wave is marketed primarily as a security product. However, vulnerabilities have been detected that allow attackers to spoof an access point to gain control, even on encrypted versions. Like most security automation products, Z-Wave increases a system’s attack surface because it adds connected devices and associated software. To prevent networked devices from increasing the overall vulnerability of a system, it’s important to consider the security of any connected element.

Over 80 percent of commercial home security systems use Z-Wave as the protocol by which their components communicate; the Z-Wave Alliance, a global consortium organized to bring compatible devices to market, includes more than 250 manufacturers among its members.

See a Black Hat conference video about hacking Z-Wave automation systems:

Link: http://whatis.techtarget.com

Picture of System Administrator

ZigBee

by System Administrator - Monday, 16 November 2015, 8:22 PM
 

Definición de ZigBee

 

ZigBee es el nombre de la especificación de un conjunto de protocolos de alto nivel de comunicación inalámbrica para su utilización con radiodifusión digital de bajo consumo, basada en el estándar IEEE 802.15.4 de redes inalámbricas de área personal (wireless personal area networkWPAN). Su objetivo son las aplicaciones que requieren comunicaciones seguras con baja tasa de envío de datos y maximización de la vida útil de sus baterías.

En principio, el ámbito donde se prevé que esta tecnología cobre más fuerza es en domótica, como puede verse en los documentos de la ZigBee Alliance, en las referencias bibliográficas que se dan más abajo en el documento «ZigBee y Domótica». La razón de ello son diversas características que lo diferencian de otras tecnologías:

  • Su bajo consumo.
  • Su topología de red en malla.
  • Su fácil integración (se pueden fabricar nodos con muy poca electrónica).

More: https://es.wikipedia.org

ZigBee Definition

Posted by Margaret Rouse

ZigBee is a mesh network specification for low-power wireless local area networks (WLANs) that cover a large area.

ZigBee was designed to provide high data throughput in applications where the duty cycle is low and low power consumption is an important consideration. (Many devices that use ZigBee are powered by battery.) Because ZigBee is often used in industrial automation and physical plant operation, it is often associated with machine-to-machine (M2M) communication and the Internet of Things (IoT). 

ZigBee is based on the Institute of Electrical and Electronics Engineers Standards Association's 802.15 specification. It operates on the IEEE 802.15.4 physical radio specification and in unlicensed radio frequencybands, including 2.4 GHz, 900 MHz and 868 MHz. The specifications are maintained and updated by the ZigBee Alliance.

As of this writing, there are three ZigBee specifications: ZigBee, ZigBee IP and ZigBee RF4CE. ZigBee IP optimizes the standard forIPv6 full mesh networks and ZigBee RF4CE optimizes the standard for partial mesh networks.

Continue Reading About ZigBee

Link: http://searchmobilecomputing.techtarget.com


Page: (Previous)   1  ...  13  14  15  16  17  18  19  20  21  22
  ALL