All > Technology > Defense
Vulnerability and Hardening.
- Browse Related Terms: Rad Hard, RH, RH Electronics, RHD, V&H
All > Technology > Telecommunications
Synonym normalized frequency.
- Browse Related Terms: fractional frequency deviation, master oscillator, press-to-talk operation, press-to-type operation, radio frequency channel assignment, radio wave, scanning line rate, transverse offset loss, two-source frequency keying, V number, voice band
All > Technology > Telecommunications
The interface point in an ISDN environment between the line termination and the exchange termination.
- Browse Related Terms: attachment unit interface (AUI), medium interface connector (MIC), medium interface point (MIP), message register leads, originating connection, R interface, S interface, S reference point, T-interface, terminal adapter, Trunk Gateway, U reference point, V reference point, wireline access mode
All > Technology > Telecommunications
Sets of telecommunications protocols and interfaces defined by CCITT (now ITU-T) Recommendations. Note: Some of the more common V.-series Recommendations are:
- V.21: A CCITT Recommendation for modem communications over standard commercially available lines at 300 b/s. This protocol is generally not used in the United States.
- V.22bis: A CCITT Recommendation for modem communications over standard commercially available voice-grade channels at 2,400 b/s and below.
- V.32: A CCITT Recommendation for modem communications over standard commercially available voice-grade channels at 9.6 kb/s and below.
- V.32bis: A CCITT Recommendation for modem communication over standard commercially available voice-grade channels at 14.4 kb/s and below.
- V.34: An ITU-T Recommendation for modem communication over standard commercially available voice-grade channels at 28.8 kb/s and below.
- V.42: A CCITT Recommendation for error correction on modem communications.
- V.42bis: A CCITT Recommendation for data compression on a modem circuit.
- V.FAST: A new CCITT Recommendation for high-speed modems currently under development.
- Browse Related Terms: access node, Advanced Data Communication Control Procedures (ADCCP), binary synchronous (bi-sync) communication, cell header, communications protocol, encapsulation, Entity, NCI code, network interface device (NID), network termination, protocol abnormality, protocol data unit (PDU), protocol hierarchy, routing table, simplex protocol, synchronous data link control (SDLC), transmission frame, V-series Recommendations, virtual local area network (VLAN), wireless access mode
All > Technology > Defense
All > Technology > Programming > Perl
A "version" or "vector" "string" specified with a
v
followed by a series of decimal integers in dot notation, for instance,v1.20.300.4000
. Each number turns into a "character" with the specified ordinal value. (Thev
is optional when there are at least three integers.)- Browse Related Terms: character, collating sequence, comment, delimiter, LINE, null character, null string, Property, separator, stream, string, substring, terminator, text, transliterate, Unicode, v-string, virtual, whitespace, word
All > Technology > Defense
Verification and Validation. (See Verification, Validation, and IV&V.)
- Browse Related Terms: Block Check Character (BCC), IV&V, TAWG, v/v, VCRM, VV&A, VVIRF
Also listed in:
All > Technology > Virtualization
The operation of migrating an operating system and every application installed on it from a virtual machine or a partition to one or multiple physical computers, without reinstalling anything. The opposite of P2V (Physical to Virtual).
migrating an operating system its applications from a virtual machine or partition to a physical computer without modification. Compare to physical to virtual.
- Browse Related Terms: bare metal environment, clone, cloning, Cluster, hosted environment, P2V (Physical to Virtual) migration, V2P (Virtual to Physical) migration, V2V (Virtual to Virtual) migration, virtual appliance
All > Technology > Virtualization
migrating an operating system and its applications from a virtual machine or partition hosted in one virtual infrastructure to a virtual machine or partition hosted in a different virtual infrastructure, without modification.
The operation of migrating an operating system and every application installed on it from a virtual machine or partition hosted in a virtual infrastructure to another virtual machine or partition hosted in a different virtual infrastructure, without reinstalling anything. Mainly used when working with different virtualization technologies in the same environment.
- Browse Related Terms: bare metal environment, clone, cloning, Cluster, hosted environment, P2V (Physical to Virtual) migration, V2P (Virtual to Physical) migration, V2V (Virtual to Virtual) migration, virtual appliance
All > Technology > Telecommunications
A call-disposition category for a call attempt to an unassigned NPA (numbering plan area) or N. [T1.207-1998]
- Browse Related Terms: NC (no circuit), no circuit (NC), no circuit double prime (NC&qout;), no circuit prime (NC'), reorder (RO), vacant code (VC)
All > Technology > E-mail
This is an email that is automatically sent out from your account whenever an email is received, to the sender of the email. This is also known as an autoresponder. Some systems allow you to set up more than one vacation reply (autoresponder) and it will select which one to send out based on features of the incoming message, which you specify. For example, any messages from your colleagues may receive one message, whereas messages from external clients receive another.
- Browse Related Terms: Click-Through Rate (CTR), Definable Reply-To Address, Forwards, Mailto, Reminders, Signature, Signature Line, Vacation Reply
All > Technology > Telecommunications
Synonym anti-virus program.
- Browse Related Terms: compiler, executive program, nonoperational load, service program, service routine, supervisor, supervisory routine, tool, utility routine, vaccine program
All > Technology > Records Management
treatment of water-soaked documents by extracting the water under high vacuum to prevent further damage See also freeze drying.
- Browse Related Terms: audiovisual records, cartographic records, freeze drying, Open Access, vacuum drying, vacuum freeze drying, vacuum thermal drying
All > Technology > Records Management
process of stabilizing water-soaked documents by freezing them to prevent further damage from water in its liquid state and subsequently drying them under high vacuum with the controlled application of heat See also freeze drying.
- Browse Related Terms: audiovisual records, cartographic records, freeze drying, Open Access, vacuum drying, vacuum freeze drying, vacuum thermal drying
All > Technology > Records Management
treatment of water-soaked documents by drying under high vacuum and high temperature to prevent further damage See also freeze drying.
- Browse Related Terms: audiovisual records, cartographic records, freeze drying, Open Access, vacuum drying, vacuum freeze drying, vacuum thermal drying
All > Technology > Defense
Vandenberg Air Force Base, CA.
- Browse Related Terms: AAFCE, AF, AF SATCOM, AF/IN, AFAC, AFAE, AFAM, AFCC, AFOSH, AFPEO/SP, AFSARC, AFSATCOM, AFSB, AFSC, AFSCN, AFSSI, AFWAN, AFWL, AMOS, ASAF, ASAF (A), ATAF, CENTAF, CMAFB, COMAFFOR, Common Integration and Tasks Execution (CITE), Communications System Segment (CSS), CSAF, FAAWC, LAAFB, MAGTF, Navy FAAWC, PACAF, RAAF, RNLAF, SPO, TAF, TPWG, USAF, USAFE, USCENTAF, USPACAF, VAFB, WR/VAFB
All > Technology > Programming > Java
- A valid XML document, in addition to being well formed, conforms to all the constraints imposed by a DTD. It does not contain any tags that are not permitted by the DTD, and the order of the tags conforms to the DTD's specifications.
- Browse Related Terms: comment, content, DDP, Error, fatal error, JSP document, prolog, SAX, Schema, Simple API for XML, valid, validating parser, Warning, well-formed, XLink, XPath, XPointer
Also listed in:
- All > Law > Intellectual Property > Patent
All > Technology > Security
A payload, an associated data string, or a nonce that satisfies the restrictions of the formatting function.
- Browse Related Terms: Authentication Tag, Block Cipher Algorithm, Cryptographic Hash Function, Error Detection Code, Guessing Entropy, Hash Function, security attribute, Security Tag, Valid Data Element
All > Technology > Programming > Java
- A parser that ensures that an XML document is valid in addition to being well formed. See also parser.
- Browse Related Terms: comment, content, DDP, Error, fatal error, JSP document, prolog, SAX, Schema, Simple API for XML, valid, validating parser, Warning, well-formed, XLink, XPath, XPointer