V

Validation Set

A subset of data used during the training process to tune hyperparameters and provide an unbiased evaluation of a model while it is being built.

ai

Validator

A node in a proof-of-stake or other consensus-based network that is responsible for verifying transactions and proposing new blocks.

web

Value Stream Mapping(VSM)

A lean management method for analyzing the current state and designing a future state for the series of events that take a product or service from its beginning through to the customer.

dev

Variance

A measure of how far a set of numbers is spread out from their average value.

ai

Variational Autoencoder(VAE)

A type of generative model that learns to map input data to a probabilistic latent space, allowing for the generation of new, similar data points.

ai

Vector Database

A specialized database designed to store and query high-dimensional vector embeddings, commonly used in RAG systems.

ai

Vector Processor

A CPU designed to handle mathematical operations on entire vectors (arrays of data) in a single instruction.

hardware

Verifiable Credentials(VC)

A digital standard for credentials that are cryptographically secure, privacy-preserving, and machine-verifiable.

web

Version Control System(VCS)

A software tool that helps software teams manage changes to source code over time.

dev

Vertical Pod Autoscaler(VPA)

A Kubernetes feature that automatically sets the CPU and memory reservations for Pods based on their actual usage.

cloud

VGA(VGA)

Video Graphics Array; an analog display standard for computer monitors.

hardware

Vibration API

A browser API that allows web applications to provide haptic feedback by vibrating the user's device.

web

Victim Cache

A small, specialized cache used to store blocks that have been recently evicted from the main cache due to a conflict or capacity miss.

hardware

Virtual CISO (vCISO)(vCISO)

An outsourced security practitioner who provides the expertise and leadership of a Chief Information Security Officer on a part-time or project basis.

security

Virtual Machine(VM)

A software-based emulation of a physical computer that runs an operating system and applications.

cloud

Virtual Memory

A memory management technique that provides an 'idealized' view of storage to applications, using both RAM and disk space.

hardware

Virtual Private Cloud(VPC)

A private, isolated section of a public cloud where users can launch resources in a virtual network.

cloud

Virtual Private Network(VPN)

A secure, encrypted connection between two networks or between an individual user and a network over the public internet.

cloud

Virtual RAN(vRAN)

A way of implementing the Radio Access Network (RAN) where some or all of the baseband functions are run as software on general-purpose servers.

network

Virtual Reality (VR) in Web3(VR)

The use of immersive computer-generated environments within decentralized ecosystems, where users can interact with 3D spaces and own virtual assets.

web

Vishing

A form of phishing that uses voice calls or VoIP (Voice over IP) to manipulate victims into disclosing sensitive information.

security

Vision Transformer(ViT)

An architecture that applies the Transformer model, originally designed for NLP, to image recognition tasks by treating image patches as tokens.

ai

Vite

A modern, lightning-fast frontend build tool that significantly improves the developer experience.

web

VLAN(VLAN)

A logical subnetwork that groups together a collection of devices from different physical LANs.

network

VLIW(VLIW)

Very Long Instruction Word; a CPU architecture where the compiler bundles multiple independent operations into a single, very long instruction.

hardware

VLSI(VLSI)

Very Large Scale Integration; the process of creating an integrated circuit by combining millions or billions of transistors onto a single chip.

hardware

VMware vSphere

A commercial enterprise-grade virtualization platform for building and managing cloud infrastructures.

cloud

Von Neumann Architecture

A computer architecture based on the concept where program instructions and data are stored in the same memory unit.

hardware

VRRP(VRRP)

An open-standard redundancy protocol that provides high availability for default gateways, similar to HSRP.

network

VTP(VTP)

A Cisco proprietary protocol used to synchronize VLAN configurations across multiple switches in a network.

network

Vue.js

A progressive JavaScript framework for building user interfaces, designed to be incrementally adoptable.

web

Vulnerability Assessment

The process of identifying, quantifying, and prioritizing vulnerabilities in a system.

security

Vulnerability Disclosure Program (VDP)(VDP)

A formal process established by an organization to allow security researchers to safely and legally report security vulnerabilities they find in the organization's products or services.

security

Vulnerability Management

The continuous process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software.

security