V
Validation Set
A subset of data used during the training process to tune hyperparameters and provide an unbiased evaluation of a model while it is being built.
aiValidator
A node in a proof-of-stake or other consensus-based network that is responsible for verifying transactions and proposing new blocks.
webValue Stream Mapping(VSM)
A lean management method for analyzing the current state and designing a future state for the series of events that take a product or service from its beginning through to the customer.
devVariance
A measure of how far a set of numbers is spread out from their average value.
aiVariational Autoencoder(VAE)
A type of generative model that learns to map input data to a probabilistic latent space, allowing for the generation of new, similar data points.
aiVector Database
A specialized database designed to store and query high-dimensional vector embeddings, commonly used in RAG systems.
aiVector Processor
A CPU designed to handle mathematical operations on entire vectors (arrays of data) in a single instruction.
hardwareVerifiable Credentials(VC)
A digital standard for credentials that are cryptographically secure, privacy-preserving, and machine-verifiable.
webVersion Control System(VCS)
A software tool that helps software teams manage changes to source code over time.
devVertical Pod Autoscaler(VPA)
A Kubernetes feature that automatically sets the CPU and memory reservations for Pods based on their actual usage.
cloudVGA(VGA)
Video Graphics Array; an analog display standard for computer monitors.
hardwareVibration API
A browser API that allows web applications to provide haptic feedback by vibrating the user's device.
webVictim Cache
A small, specialized cache used to store blocks that have been recently evicted from the main cache due to a conflict or capacity miss.
hardwareVirtual CISO (vCISO)(vCISO)
An outsourced security practitioner who provides the expertise and leadership of a Chief Information Security Officer on a part-time or project basis.
securityVirtual Machine(VM)
A software-based emulation of a physical computer that runs an operating system and applications.
cloudVirtual Memory
A memory management technique that provides an 'idealized' view of storage to applications, using both RAM and disk space.
hardwareVirtual Private Cloud(VPC)
A private, isolated section of a public cloud where users can launch resources in a virtual network.
cloudVirtual Private Network(VPN)
A secure, encrypted connection between two networks or between an individual user and a network over the public internet.
cloudVirtual RAN(vRAN)
A way of implementing the Radio Access Network (RAN) where some or all of the baseband functions are run as software on general-purpose servers.
networkVirtual Reality (VR) in Web3(VR)
The use of immersive computer-generated environments within decentralized ecosystems, where users can interact with 3D spaces and own virtual assets.
webVishing
A form of phishing that uses voice calls or VoIP (Voice over IP) to manipulate victims into disclosing sensitive information.
securityVision Transformer(ViT)
An architecture that applies the Transformer model, originally designed for NLP, to image recognition tasks by treating image patches as tokens.
aiVite
A modern, lightning-fast frontend build tool that significantly improves the developer experience.
webVLAN(VLAN)
A logical subnetwork that groups together a collection of devices from different physical LANs.
networkVLIW(VLIW)
Very Long Instruction Word; a CPU architecture where the compiler bundles multiple independent operations into a single, very long instruction.
hardwareVLSI(VLSI)
Very Large Scale Integration; the process of creating an integrated circuit by combining millions or billions of transistors onto a single chip.
hardwareVMware vSphere
A commercial enterprise-grade virtualization platform for building and managing cloud infrastructures.
cloudVon Neumann Architecture
A computer architecture based on the concept where program instructions and data are stored in the same memory unit.
hardwareVRRP(VRRP)
An open-standard redundancy protocol that provides high availability for default gateways, similar to HSRP.
networkVTP(VTP)
A Cisco proprietary protocol used to synchronize VLAN configurations across multiple switches in a network.
networkVue.js
A progressive JavaScript framework for building user interfaces, designed to be incrementally adoptable.
webVulnerability Assessment
The process of identifying, quantifying, and prioritizing vulnerabilities in a system.
securityVulnerability Disclosure Program (VDP)(VDP)
A formal process established by an organization to allow security researchers to safely and legally report security vulnerabilities they find in the organization's products or services.
securityVulnerability Management
The continuous process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software.
security