Showing terms starting with Z (57 terms)
Z-Order
A programming concept determining the order in which objects are rendered or stacked on a screen.
Commonly used in General IT, Development
Z-Wave
Z-Wave is a wireless communication protocol primarily used for home automation and IoT devices.
Commonly used in IoT
Z-Wave Plus
An advanced version of the Z-Wave protocol for smart home devices, offering improved range and battery life.
Commonly used in Networking, IoT
Z-Wave Plus 2
The latest enhancement of the Z-Wave protocol for smart home devices, focusing on increased efficiency and security.
Commonly used in IoT, Networking
Zabbix
An open-source monitoring software tool for diverse IT components, including networks, servers, and applications.
Commonly used in Networking, Security
Zadara Storage
A provider of enterprise storage as a service (STaaS), offering cloud and on-premises data storage solutions.
Commonly used in Cloud Computing, Storage
ZAPI
Zimbra Application Programming Interface, enabling developers to create custom applications and services that interface with Zimbra Collaboration Suite.
Commonly used in Development, Email Solutions
Zebra Programming Language (ZPL)
A programming language for Zebra label printers, used to create label designs and control printer settings.
Commonly used in Development, Hardware
Zend Framework
An open-source, object-oriented web application framework implemented in PHP.
Commonly used in Development, Web Applications
Zero Day
A zero-day refers to a software vulnerability that is exploited by hackers before the vendor becomes aware of it and releases a patch.
Commonly used in Cybersecurity
Zero Knowledge Authentication
Zero Knowledge Authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without the prover revealing any specific information about their identity.
Commonly used in Security
Zero Knowledge Proof
Zero Knowledge Proof is a cryptographic method where one party (the prover) can prove to another party (the verifier) that a statement is true without revealing any information apart from the fact that the statement is indeed true.
Commonly used in Cryptography
Zero Trust
Zero Trust is a security model that assumes no trust within the network and requires strict authentication and authorization for every user and device attempting to connect.
Commonly used in Cybersecurity, Networking
Zero Trust Architecture
Zero Trust Architecture (ZTA) is a security model based on the principle of “never trust, always verify,” where access to resources and systems is continuously authenticated and authorized based on multiple factors and risk assessments.
Commonly used in Cybersecurity, Security Architecture, Network Security
Zero Trust Security
A security model based on the principle of “never trust, always verify,” requiring strict identity verification for all users and devices attempting to access resources.
Commonly used in Cybersecurity
Zero-Configuration Networking
Zero-configuration networking (Zeroconf) is a set of protocols that enables devices to automatically discover and connect to each other on a local network without manual configuration or intervention, facilitating easy setup and connectivity.
Commonly used in Networking, IoT
Zero-Configuration Networking (Zeroconf)
Zeroconf refers to a set of technologies that automatically configure devices and services on a network without the need for manual configuration or a centralized server.
Commonly used in Networking
Zero-Configuration VPN
Zero-configuration VPN refers to a type of virtual private network (VPN) that automatically configures and connects without the need for manual intervention by the user.
Commonly used in Networking, Security
Zero-Coupon
A zero-coupon bond is a type of bond that does not pay periodic interest payments, but instead is issued at a discount to its face value and redeemed at its face value upon maturity.
Commonly used in Finance
Zero-Day Attack
A zero-day attack is a cyberattack that occurs on the same day a vulnerability is discovered, exploiting the vulnerability before a patch or fix is available from the software vendor.
Commonly used in Cybersecurity
Zero-Day Exploit
A zero-day exploit is a cyber attack targeting a software vulnerability that is unknown to the software vendor or security community, allowing attackers to exploit the vulnerability before a patch or fix is available.
Commonly used in Cybersecurity, Vulnerability, Exploitation
Zero-Day Vulnerability
A zero-day vulnerability is a security flaw in software or hardware that is unknown to the vendor or to the public and can be exploited by attackers to compromise systems or steal data.
Commonly used in Cybersecurity
Zero-Downtime Deployment
Zero-downtime deployment is a software deployment strategy that ensures continuous availability of a system or service during the deployment process, minimizing or eliminating downtime for users.
Commonly used in System Administration
Zero-Knowledge Authentication
Zero-knowledge authentication is a method of authentication where one party (the verifier) can verify the identity of another party (the prover) without receiving or storing any information about the prover’s identity, thus preserving privacy and security.
Commonly used in Security, Authentication
Zero-Knowledge Protocol
Zero-knowledge protocol is a method in cryptography where one party (the prover) can prove to another party (the verifier) that they have certain information without revealing the information itself, ensuring privacy and security.
Commonly used in Cryptography
Zero-Touch Deployment
Zero-touch deployment is a method of deploying devices or software applications automatically without any manual intervention, typically used in large-scale IT environments.
Commonly used in Networking, System Administration
Zero-Trust Architecture
Zero Trust Architecture is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of their location or network.
Commonly used in Cybersecurity, Networking
Zero-Width Space (ZWSP)
A non-printing character used in computerized text processing to indicate line break opportunities among other things.
Commonly used in General IT, Text Processing
Zeta Architecture
An architectural concept in big data that combines technologies and methodologies from various big data ecosystems to solve scalability and performance issues.
Commonly used in Big Data, Architecture
Zettabyte
A zettabyte is a unit of digital information storage equal to 1 sextillion bytes or 10^21 bytes.
Commonly used in Data Storage
Zettajoule
A zettajoule is a unit of energy equal to one sextillion joules (10^21 joules).
Commonly used in Energy
ZFS
ZFS, or Zettabyte File System, is a combined file system and logical volume manager designed by Sun Microsystems (now Oracle). It offers features like data integrity verification, RAID-Z, and snapshots.
Commonly used in Data Storage
ZFS (Zettabyte File System)
A combined file system and logical volume manager designed to provide storage management features such as pooled storage, snapshots, and data integrity verification.
Commonly used in General IT
Zigbee
Zigbee is a wireless communication standard used for short-range, low-power devices in IoT applications.
Commonly used in IoT
Zigzag Coding
A technique used in data compression and encryption, organizing data in a zigzag pattern to improve efficiency or security.
Commonly used in Security, Data Compression
Zimbra
Zimbra is an email and collaboration platform that provides features such as email, calendar, and file sharing, often used by businesses and organizations.
Commonly used in General IT
Zimlet
A Zimlet is a plugin or extension for the Zimbra email and collaboration platform, allowing users to add custom features, integrations, or functionalities to their Zimbra experience.
Commonly used in General IT, Collaboration
ZIP (Zone Improvement Plan)
A format used for compressing files and data to reduce file size and facilitate easier transfer.
Commonly used in General IT
Zip file
A zip file is a compressed archive file format that stores one or more files or directories in a compressed format.
Commonly used in Data Storage
Zoho CRM
A cloud-based customer relationship management platform for managing sales, marketing, and support in a single system.
Commonly used in CRM, Cloud Computing
Zombie
In the context of cybersecurity, a zombie refers to a compromised computer or device under the control of a hacker without the user’s knowledge, typically used for malicious purposes such as launching DDoS attacks.
Commonly used in Cybersecurity
Zombie Code
Zombie code refers to sections of code within a software program that are no longer executed but remain in the codebase, often as a result of incomplete cleanup or refactoring.
Commonly used in Software Development
Zombie Process
In operating systems, a zombie process is a process that has completed execution but still has an entry in the process table, typically waiting for its parent process to retrieve its exit status.
Commonly used in Operating Systems
Zombie VM
A zombie VM (Virtual Machine) refers to a virtual machine instance that continues to consume resources despite being inactive or unused, often due to administrative oversight or misconfiguration.
Commonly used in Virtualization
Zonal Isolation
A networking concept in cloud environments that restricts resource visibility and access within specific zones for security and management.
Commonly used in Cloud Computing, Networking, Security
Zone
In IT, a zone refers to a logical division of a network where certain security policies and settings are applied.
Commonly used in Networking, Security
Zone File
A file stored on a server that contains mappings between domain names and IP addresses, crucial for DNS functioning.
Commonly used in Networking, DNS
Zoning
Zoning in IT refers to the process of dividing a storage area network (SAN) into smaller segments or zones to improve security and manageability.
Commonly used in Networking, Storage
Zoning Map
A zoning map is a graphical representation of the zoning regulations and designations within a geographical area, specifying how land can be used for different purposes such as residential, commercial, or industrial.
Commonly used in Geographic Information Systems (GIS)
Zoning Policy
Zoning policy refers to the set of rules and configurations that determine how zoning is implemented within a storage area network (SAN), specifying which devices can communicate with each other and restricting access between zones.
Commonly used in Networking, Security