A new version of a software or hardware product designed to replace an older version of the same product. Typically, software companies sell upgrades at a discount to prevent users from switching to other products. In most cases, you must prove you own an older version of the product to qualify for the upgrade price. In addition, the installation routines for upgrades often check to make sure that an older version is already installed on your computer; if not, you cannot install the upgrade.
In the 90s, software companies began offering competitive upgrades, which means that you can buy a program at a discount if you can prove that you own a competing program.
Short for very high-speed Backbone Network Service, an experimental wide-area network backbone sponsored by the National Science Foundation (NSF) and implemented by MCI. vNBS has replaced NSFnet and is designed to serve as a platform for testing new, high-speed Internet technologies and protocols. It currently links several Supercomputer Centers (SCCs) and Network Access Points (NAPs) […]
Short for virtual Card (also called electronic card), vCard is a specification that defines the format of an “Electronic Business Card.” vCards are often attached in e-mail messages, but can also be exchanged through other ways on the World Wide Web. Usually a vCard will contain a business name, address, phone number, URL, logo and […]
A 1Vision Software Inc., product that manages network-attached storage (NAS) to bring all storage volumes together into a single environment that looks and behaves like a single storage device.
A 1Vision Software Inc., product that provides server and network-attached storage (NAS) aggregation. Using vSERV, all user data from server storage systems and any attached NAS devices merged into a single directory structure to work as if it were one virtual device.
(n.) Verification that something is correct or conforms to a certain standard. In data collection or data entry, it is the process of ensuring that the data that are entered fall within the accepted boundaries of the application collecting the data. For example, if a program is collecting last names to be entered in a […]