Glossary Letter S
s - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
S corporation (S corp) - Like a C corporation, the S corp is considered a separate entity under the law.
S HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
S&OP - Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.
S-HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
S-HTTP (Secure HTTP) - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
S-Video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
S-Video (Super-Video, Y/C Video, component video) - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
S. 877 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
S.M.A.R.T. - Self-Monitoring Analysis and Reporting Technology (S.
S/390 - S/390 is IBM's large server (or mainframe) line of computer systems, which are marketed to the world's Fortune 1000 and many mid-size companies as a "tried-and-true" system with a history that stretches back to the System/360 of the early 1960s.
S/MIME - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
S/MIME (Secure Multi-Purpose Internet Mail Extensions) - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
S/N - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
S/PDIF - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
S/PDIF - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
S/PDIF (Sony/Philips Digital Interface) - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
S3 Intelligent-Tiering - S3 Intelligent-Tiering is an Amazon S3 storage class that analyzes an AWS user's stored data and automatically moves it between storage tiers based on usage frequency.
S4L - S4L is an online chat acronyms for "spam for life," the possible result of subscribing to an online service or becoming anyone's customer or client.
SA - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
SAA - Systems Application Architecture (SAA) was IBM's strategy for enterprise computing in the late 1980s and early 1990s.
SAA (Systems Application Architecture) - Systems Application Architecture (SAA) was IBM's strategy for enterprise computing in the late 1980s and early 1990s.
SaaS - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
SaaS - Security-as-a-service (SaaS) is an outsourcing model for security management.
SaaS - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
SaaS BI - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
SaaS ERP - SaaS ERP is a type of cloud-based enterprise resource planning (ERP) software that runs on the vendor's or cloud provider's servers, is sold through subscription and delivered as a service over the internet.
SaaS ERP - SaaS ERP is a type of cloud-based enterprise resource planning (ERP) software that runs on the vendor's or cloud provider's servers, is sold through subscription and delivered as a service over the internet.
SaaS on demand - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
saas paas iaas - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
SaaSgrid - SaaSGrid is an application server and integrated framework for software as a service (SaaS) applications.
Sable - Sable is a set of markup codes and symbols that describes spoken text in text-to-speech (TTS) applications for voice-enabled Web browsers and voice enabled e-mail.
SACD - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
SAE International - SAE International is a professional association and standards development organization for the engineering industry, with a special focus on transport sectors such as automotive, aerospace and commercial vehicles.
Safari - Safari is Apple's default Web browser for OS X and iOS-based devices.
SAFe (Scaled Agile Framework) - The Scaled Agile Framework (SAFe) is a framework for scaling Agile across the enterprise.
safe mode - Safe mode is an alternate boot method for Windows operating systems that makes it easier to diagnose problems.
SafeSquid - SafeSquid is an HTTP 1.
SafeWeb - Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited.
Sage CRM - Sage CRM is a line of software products for customer relationship management in the small-to-medium size business market.
Sage Group plc - Sage Group plc is a global enterprise software vendor.
Sage Timberline Office - Sage Timberline Office is Sage Software Inc.
sales and operations planning - Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.
sales and operations planning (S&OP) - Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.
sales automation tools - Sales automation tools relieve sales agents of tasks that take them away from interacting with current and potential customers.
sales certification - A sales certification is a designation given to a channel professional once he or she has gained an amount of expertise that a vendor considers necessary to sell a given product.
sales cycle - The sales cycle is the sequence of phases that a typical customer goes through when deciding to buy something.
Sales Development Representative (SDR) - A sales development representative (SDR) is an individual who focuses on prospecting, moving, and qualifying leads through the sales pipeline and then delivers those leads to individuals who are responsible for closing sales.
sales enablement - Sales enablement gives sales representatives strategies, tools and processes to boost their productivity and revenue generation.
sales force automation - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
sales force automation (SFA) - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
sales force automation software - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
sales forecast - A sales forecast is a projection of achievable revenue.
sales funnel - A sales funnel, also called a purchase funnel, is the visual representation of the customer journey, depicting the sales process from awareness to action.
sales lead - A sales lead is a potential sales contact, individual or organization that expresses an interest in your goods or services.
sales motion - A sales motion is the particular sales method an organization uses to deliver a product or a service to its customers.
sales performance incentive fund - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
sales performance management (SPM) - Sales performance management (SPM) is the practice of monitoring and guiding personnel to improve their ability to sell products or services.
sales pipeline - A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.
sales-qualified lead (SQL) - A sales-qualified lead (SQL) is a prospective customer that has been handed off to sales teams for further nurturing after showing enough interest in a company's products.
Salesforce App Cloud - The Salesforce App Cloud offers developers a series of frameworks and tools to create applications within the Salesforce platform or to create third-party apps on top of it.
Salesforce AppExchange - Salesforce AppExchange is Salesforce.
Salesforce Blockchain - Salesforce Blockchain is a distributed ledger platform designed for customer relationship management (CRM).
Salesforce Commerce Cloud - Salesforce Commerce Cloud, formerly called Demandware, is a cloud-based service for unifying the way businesses engage with customers over any channel or device.
Salesforce Community Cloud (Community Cloud) - Community Cloud is a social platform from Salesforce.
Salesforce Customer 360 - Salesforce Customer 360 is a cross-cloud customer data platform used to improve the consistency and collaboration among B2C marketing, commerce and service applications.
Salesforce Customer Success Platform - The Salesforce Customer Success Platform is the official name of the Salesforce portfolio of products.
Salesforce Data.com - Data.com is the sales and lead generation component of Salesforce.
Salesforce Dreamforce conference - Dreamforce is a annual user conference hosted by Salesforce in downtown San Francisco.
Salesforce DX - Salesforce DX is a Salesforce product in the App cloud that allows users to develop and manage Salesforce apps throughout the entire platform in a more direct and efficient way.
Salesforce Einstein - Salesforce Einstein is an artificial intelligence (AI) technology that has been developed for the Salesforce Customer Success Platform.
Salesforce Einstein Bot - Salesforce Einstein Bot is a natural language processing (NLP) and natural language understanding (NLU) chatbot developed with Salesforce Einstein artificial intelligence (AI) technology.
Salesforce Engage - Salesforce Engage is a marketing personalization feature that is part of the Salesforce Marketing Cloud.
Salesforce Health Cloud - Salesforce Health Cloud is a health IT CRM system that incorporates doctor-patient relationship and record management services.
Salesforce IdeaExchange - The Salesforce IdeaExchange is an online community where customers can interact with one another, engage with the company to suggest and vote on new features, and gain insights into upcoming releases.
Salesforce Journey Builder - Salesforce Journey Builder is a feature of the company's Marketing Cloud that manages the customer life cycle: the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service.
Salesforce Knowledge Sidebar - A Knowledge Sidebar in a Salesforce Console displays titles of Salesforce Knowledge articles that are related to the specified subject.
Salesforce Marketing Cloud - Salesforce Marketing Cloud is a customer relationship management (CRM) platform for marketers that integrates email, social media and advertising communications and collaboration.
Salesforce Sales Cloud - Salesforce Sales Cloud is a customer relationship management (CRM) platform for sales, marketing and customer support in both business-to-business (B2B) and business-to-customer (B2C) contexts.
Salesforce Service Cloud - Salesforce Service Cloud is a customer relationship management (CRM) platform for customer service and support, based on the company's CRM software for sales professionals.
Salesforce Service Console - The Salesforce Service Console is the centralized interface in the Salesforce Service Cloud with which agents can view all relevant customer information related to a case, as well as their call queue and more.
Salesforce Solution Architect - A Salesforce Solution Architect is someone who has been certified for demonstrating the capabilities to build and design solutions across Salesforce platforms.
Salesforce Trailhead - Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to code for the Salesforce platform.
Salesforce Wave Analytics (Analytics Cloud) - Salesforce Wave Analytics, also called Analytics Cloud, is a business intelligence (BI) application that is optimized for mobile access and data visualization.
Salesforce Work.com - Work.com is a corporate performance management platform for sales representatives with a user interface (UI) that resembles a social networking website.
Salesforce.com - Salesforce.com is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.
Salesforce.org - Salesforce.org is a social enterprise from American based cloud computing company Salesforce.
Salesforce1 Platform - Salesforce1 enables the building of applications in the Salesforce Customer Success Platform, in conjunction with the Lightning development platform.
SalesforceIQ - SalesforceIQ is customer relationship management (CRM) software from Salesforce.
salt - In password protection, salt is a random string of data used to modify a password hash.
SaltStack - SaltStack, often referred to as simply "Salt," is an open source configuration management and orchestration tool for automating repeated system administrative and code deployment tasks.
SAM - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
SAM - Storage area management (SAM) is a still-evolving set of procedures, services, and standards for comprehensively managing the infrastructure of a storage area network (SAN), including all components within all servers, the disk arrays, the tape libraries, the switches, the routers, and the programs.
Samba - Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet.
Same Origin Policy - The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.
Same Origin Policy (SOP) - The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.
Same Time - Sametime is software from Lotus for group collaboration over the Internet.
Sametime - Sametime is software from Lotus for group collaboration over the Internet.
SAML - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
SAML (Security Assertion Markup Language) - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
sample - A sample, in the context of scientific research and statistics, is a representative subset of a population.
sample rate - In developing an audio sound for computers or telecommunication, the sample rate is the number of samples of a sound that are taken per second to represent the event digitally.
sampling error - A sampling error is a problem in the way that members of a population are selected for research or data collection, which impacts the validity of results.
Samsung for Enterprise (SAFE) - Samsung for Enterprise (SAFE) is a line of smartphones and tablets manufactured to meet specific enterprise management and security criteria, including interoperability with third-party mobile device management (MDM) and virtual private network (VPN) software.
Samsung Galaxy - Samsung Galaxy is Samsung Electronics' flagship line of Android smartphones and tablets.
Samsung Galaxy Note (Samsung GN) - Samsung Galaxy Note is a large Android smartphone with a touchscreen and stylus that is manufactured by Samsung Electronics.
Samsung KNOX - Samsung KNOX is a set of enterprise mobility management services that offers mobile device and data protection and management.
Samsung Tizen - Samsung Tizen is Samsung's implementation of Tizen, an open source mobile operating system.
SAN - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
SAN switch (storage area network switch) - A storage area network (SAN) switch is a device that connects servers and shared pools of storage devices and is dedicated to moving storage traffic.
SAN-in-a-box - A SAN-in-a-box, also known as a SAN-in-a-can or a SAN kit, is a data storage device that includes all the basic SAN components are in a single package.
SAN/NAS convergence - SAN/NAS convergence is the merging of network attached storage (NAS) with storage area network (SAN) technologies through the use of newer techniques that overcome incompatibilities between the two.
sandbox (software testing and security) - A sandbox is an isolated testing environment that enables users to run programs or execute files without affecting the application, system or platform on which they run.
SANS Institute - The SANS Institute maintains the largest repository of security information in the world and is also the largest certification body.
SAP Afaria - Afaria is a mobile device management (MDM) and mobile application management (MAM) software platform.
SAP Analytics Cloud - SAP Analytics Cloud (or SAP Cloud for Analytics) is a software as a service (SaaS) business intelligence (BI) platform designed by SAP.
SAP Anywhere - SAP Anywhere is a mobile-first, cloud-first, front-office platform aimed at very small businesses that combines sales, inventory management, order processing, commerce, marketing programs, mobile point of sale, customer support and engagement functions in one application.
SAP Basis - Basis is a set of middleware programs and tools from SAP, the German company whose comprehensive R/3 product is used to help manage large corporations.
SAP Beyond CRM - SAP Beyond CRM connects a customer's interactions and data, regardless of where transactions take place.
SAP Business ByDesign - SAP Business ByDesign is a cloud-based ERP system designed for the middle and upper range of the SME market, as well as for subsidiaries of large enterprises in a two-tier ERP scenario.
SAP Business One - SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).
SAP Business Suite - SAP Business Suite is a bundle of end-to-end enterprise software applications that integrate data, processes and functions for important areas such as finance, sales and HR, as well as industry-focused features.
SAP BusinessObjects BI - SAP BusinessObjects BI (SAP BO) is a centralized suite of reporting and analytics tools for business intelligence (BI) platforms.
SAP BW - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
SAP C/4HANA - SAP C/4HANA is a cloud-based customer experience and e-commerce platform.
SAP Cloud for Customer (SAP C4C) - SAP Cloud for Customer (SAP C4C) is a cloud-based software as a service (SaaS) platform for sales and service professionals, comprised of SAP Cloud for Sales and SAP Cloud for Service, which are marketed as separate entities by SAP.
SAP Cloud Platform - SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) product that provides a development and runtime environment for cloud applications.
SAP Cloud Platform ABAP Environment - SAP Cloud Platform ABAP Environment is a software platform that allows SAP developers to use the ABAP language in cloud environments.
SAP Customer Experience Suite (CEC Suite) - The SAP Customer Engagement and Commerce (SAP CEC) suite is a collection of cloud-based applications that provide tools for CRM, marketing, sales and analytics, e-commerce and more.
SAP Data Hub - SAP Data Hub is software that enables organizations to manage and govern the flow of data from a variety of sources across the enterprise.
SAP Data Services - SAP Data Services is a data integration and transformation software application.
SAP Design Studio - SAP BusinessObjects Design Studio is an application that builds professionally authored dashboards across large enterprises.
SAP Digital Consumer Insight - SAP Digital Consumer Insight is a data-as-a-service product that allows brick-and-mortar businesses to gain digital insights into their customer's behavior and demographics, using location and time data from mobile networks and analytics from SAP HANA.
SAP Digital CRM - SAP Digital CRM is a simplified, mobile-first CRM application designed for individuals and small teams to manage sales, customer service and marketing campaign automation.
SAP Enterprise Support - SAP Enterprise Support is a premium support and maintenance plan for SAP customers.
SAP ERP - SAP ERP is an enterprise resource planning software developed by the company SAP SE.
SAP ERP Central Component (SAP ECC) - SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system that is commonly referred to as simply "SAP ERP.
SAP Exchange Infrastructure - SAP Exchange Infrastructure (SAP XI) is SAP's enterprise application integration (EAI) software, a component of the NetWeaver product group used to facilitate the exchange of information among a company's internal software and systems and those of externa.
SAP Exchange Infrastructure (SAP XI) - SAP Exchange Infrastructure (SAP XI) is SAP's enterprise application integration (EAI) software, a component of the NetWeaver product group used to facilitate the exchange of information among a company's internal software and systems and those of externa.
SAP FICO (SAP Finance and SAP Controlling) - SAP FICO is an important core functional component in SAP ERP Central Component that allows an organization to manage all of its financial data.
SAP Financial Supply Chain Management (SAP FIN-FSCM) - SAP Financial Supply Chain Management (SAP FIN-FSCM) is a set of applications meant to support a company's cash-related business processes for more efficient management of working capital, receivables and payments.
SAP Fiori - SAP Fiori is a design language and user experience approach developed by SAP for use by SAP, its customers and its partners in business applications.
SAP Gateway - SAP Gateway is an open standards-based framework that developers can use to more easily connect non-SAP applications to SAP applications.
SAP Global Trade Services (SAP GTS) - SAP Global Trade Services (SAP GTS) is an application that allows companies to support and define import and export trade processes in SAP ERP.
SAP HANA App Center - SAP HANA App Center is a cloud-based service that connects buyers and sellers to applications that were developed on SAP's HANA in-memory database platform.
SAP HANA Cloud Platform, mobile service for app and device management - SAP HANA Cloud Platform, mobile service for app and device management (formerly known as SAP Mobile Secure) is a mobile management tool for security.
SAP HANA One - SAP HANA One is an inexpensive, private cloud-based instance of the SAP HANA platform, hosted in the Amazon Web Services (AWS) cloud.
SAP HANA Vora - SAP HANA Vora is an in-memory computing engine designed to make big data from Hadoop more accessible and usable for enterprises.
SAP HEC (HANA Enterprise Cloud) - SAP HEC (HANA Enterprise Cloud) is a managed, private cloud hosting service for SAP HANA and its related applications.
SAP High Performance Analytic Appliance - SAP HANA is a data warehouse appliance for processing high volumes of operational and transactional data in real-time.
SAP High-Performance Analytic Appliance - SAP HANA is a data warehouse appliance for processing high volumes of operational and transactional data in real-time.
SAP indirect access - SAP indirect access is the license violation that occurs when SAP customers allow third-party applications to communicate with SAP system data.
SAP Integration Adapter - A SAP Integration Adapter is a product that facilitates the integration of a business application into an environment running SAP applications with SAP's NetWeaver and the SAP Exchange Infrastructure.
SAP Integration Repository - SAP Integration Repository is the design configuration piece of the SAP Exchange Infrastructure (XI), the process integration layer of the NetWeaver component from SAP, the company that sells a widely-used enterprise application platform.
SAP Integration Server - SAP Integration Server is the central component of SAP XI (Exchange Infrastructure), the company's enterprise application integration (EAI) product.
SAP Investment Management - SAP Investment Management is a module in SAP ERP Central Component (ECC) that helps organizations plan and manage investments and capital expenditures.
SAP JAM - SAP Jam is SAP's social media platform.
SAP Learning Guides - We've gathered a collection of our learning guides and tutorials on SAP-related topics.
SAP Leonardo - SAP Leonardo is an umbrella brand for SAP’s collection of software and services that organizations can use to develop digital transformation projects.
SAP Lumira - SAP Lumira (formerly called SAP Visual Intelligence) is a self-service, data visualization application for business users.
SAP MaxAttention - SAP MaxAttention is SAP's premium support plan for customers.
SAP MII (SAP Manufacturing Integration and Intelligence) - SAP MII (SAP Manufacturing Integration and Intelligence) is an SAP application for synchronizing manufacturing operations with back-office business processes and standardized data.
SAP MM (SAP Materials Management) - SAP MM (Materials Management) is a module in SAP ERP Central Component (ECC) that provides companies with materials, inventory and warehouse management capabilities.
SAP Mobile Documents - SAP Mobile Documents enables cross-platform mobile access to content that might otherwise be restricted to desktop environments.
SAP Mobile Platform (SMP) - SAP Mobile Platform (SMP) facilitates the development and deployment of business-to-enterprise (B2E) and business-to-customer (B2C) applications through reusable components, drag and drop HTML5 apps and other programming tools.
SAP ONE Support - SAP ONE Support is a program that allows customers to handle both on-premises and cloud support issues through a single, integrated portal.
SAP Planned Delivery Time - SAP Planned Delivery Time (PDT) is a tool within the SAP ERP software used to update manufacturing planning data, namely the scheduled delivery of procured goods and materials so that production plans reflect the most current data.
SAP Plant Maintenance (PM) - SAP Plant Maintenance (PM) is a component of the SAP ERP Central Component (ECC) that helps businesses support and maintain equipment and systems.
SAP Predictive Analytics - SAP Predictive Analytics is software that is designed to enable business users and data analysts to extract information from big data sources, including the Internet of Things, to determine patterns and trends and then predict future outcomes or behaviors.
SAP Production Planning - SAP Production Planning is a component of the SAP ERP system known as ERP Central Component (ECC) that helps businesses plan the manufacturing, sale, and distribution of goods.
SAP Project System (PS) - SAP Project System is a module in the SAP ERP system that enables tightly controlled project management from planning to completion.
SAP Quality Management (QM) - SAP Quality Management (QM) is a component of SAP ERP Central Component (ECC) that helps businesses implement and run quality control processes.
SAP Rapid Deployment Solutions (SAP RDS) - SAP Rapid Deployment Solutions (RDS) are pre-configured applications that allow companies to deploy software in weeks or months for a set price.
SAP S/4HANA - SAP S/4HANA is an ERP business suite based on the SAP HANA in-memory database that allows companies to perform transactions and analyze business data in real-time.
SAP S/4HANA Cloud - SAP S/4HANA Cloud is a SaaS version of SAP S/4HANA ERP, a suite of integrated business applications.
SAP S/4HANA Finance - SAP S/4HANA Finance is a financial application in the SAP S/4HANA ERP platform.
SAP S/4HANA HCM - SAP S/4HANA HCM is the unofficial name of a product SAP will release in 2023 as a bridge to give SAP ERP HCM users more time to migrate to SAP's cloud HCM platform, SuccessFactors.
SAP Sales and Distribution (SAP SD) - SAP Sales and Distribution (SAP SD) is a core functional module in SAP ERP Central Component (ECC) that allows organizations to store and manage customer- and product-related data.
SAP Single Sign On - SAP Single Sign On is a security product from SAP that allows users to have secure access to SAP and non-SAP applications with a single password.
SAP Smart Data Access (SDA) - Smart Data Access is a data virtualization feature in SAP HANA that allows customers to access data virtually from remote sources such as Hadoop, Oracle, Teradata, SQL Server and SAP databases and combine it with data that resides in an SAP HANA database.
SAP Solution Manager - SAP Solution Manager is an end-to-end Application Lifecycle Management (ALM) platform used to support and manage SAP and non-SAP applications in an SAP ERP environment, including such tasks as managing custom code and overall system performance.
SAP SQL Anywhere - SAP SQL Anywhere is an embedded RDBMS that makes it possible to develop applications that integrate IoT data with business data and can run outside of traditional data centers.
SAP SuccessFactors - SAP SuccessFactors is a major vendor of cloud-based human capital management (HCM) software and talent management software.
SAP TwoGo - SAP TwoGo is a cloud-based carpooling application.
SAP User Conference - SAP Sapphire Now is an annual conference for users and partners of SAP, the global business systems software company.
SAP XI - SAP Exchange Infrastructure (SAP XI) is SAP's enterprise application integration (EAI) software, a component of the NetWeaver product group used to facilitate the exchange of information among a company's internal software and systems and those of externa.
SAPI - SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.
SAPPHIRE - SAP Sapphire Now is an annual conference for users and partners of SAP, the global business systems software company.
Sapphire Now (SAP User Conference) - SAP Sapphire Now is an annual conference for users and partners of SAP, the global business systems software company.
SAPUI5 - SAPUI5 is SAP's toolkit for building web applications using HTML5.
SAR - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
SAR - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
Sarbanes Oxley - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
Sarbanes Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
Sarbanes Oxley Act Section 404 - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
Sarbanes-Oxley - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
Sarbanes-Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
Sarbanes-Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
Sarbanes-Oxley Act Section 404 - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
SAS - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
SAS 70 - SAS 70 (Statement on Auditing Standards No.
SAS Institute Inc. - SAS Institute Inc.
SAS SSD (Serial-Attached SCSI solid-state drive) - A SAS SSD (Serial-Attached SCSI solid-state drive) is a NAND flash-based storage or caching device designed to fit in the same slot as a hard disk drive (HDD) and use the SAS interface to connect to the host computer.
saser (sound amplification by stimulated emission of radiation) - The SASER is the sonic equivalent to the laser and is often referred to as a sound laser or acoustic laser.
SATA - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
SATA 2 - SATA 2 is a marketing term to describe products that use a revised version of the Serial Advanced Technology Attachment (SATA) standard.
SATA 2 (SATA II) - SATA 2 is a marketing term to describe products that use a revised version of the Serial Advanced Technology Attachment (SATA) standard.
SATA controller - A SATA controller handles how hard drives are connected to a computer's motherboard.
SATA Express (SATAe) - SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting SATA and PCI Express protocols simultaneously.
SATA II - SATA 2 is a marketing term to describe products that use a revised version of the Serial Advanced Technology Attachment (SATA) standard.
satellite - In general, a satellite is anything that orbits something else, as, for example, the moon orbits the earth.
satellite (transmission) - In general, a satellite is anything that orbits something else, as, for example, the moon orbits the earth.
satellite constellation (satellite swarm) - A satellite constellation, also called a satellite swarm, is a system of satellites that work together to achieve a single purpose.
Satellite Digital Audio Radio Service - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
satellite Internet connection - A satellite Internet connection is an arrangement in which the upstream (outgoing) and the downstream (incoming) data are sent from, and arrive at, a computer through a satellite.
satellite news gathering - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
satellite news gathering (SNG) - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
satellite radio - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
satellite radio or Satellite Digital Audio Radio Service (SDARS) - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
satisficer - A satisficer is a pragmatic individual who makes decisions based on meeting requirements in a timely manner, finding the “good enough” solution and moving on.
saturation - Saturation is the fully conducting state in a semiconductor junction.
saved state - Saved state, in a virtualization context, is a way to store the current state of a virtual machine so that is possible to return to that state quickly when desired.
SAX - SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) -- that is, a Web file that describes a collection of data.
SAX (Simple API for XML) - SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) -- that is, a Web file that describes a collection of data.
SB 1386 - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
SB-1386 - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
SBC - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
SBIR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
SBR - Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets.
SC sustainability - Supply chain sustainability is a holistic perspective of supply chain processes and technologies that goes beyond the focus of delivery, inventory and traditional views of cost.
SCA - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
SCADA - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
SCADA (supervisory control and data acquisition) - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
Scala (Scalable Language) - Scala is a software programming language that mixes object-oriented methods with functional programming capabilities.
scalability - It is the ability of a computer application or product (hardware or software) to continue to function well as it (or its context) is changed in size or volume in order to meet a user need.
scalable - It is the ability of a computer application or product (hardware or software) to continue to function well as it (or its context) is changed in size or volume in order to meet a user need.
scalable font - A scalable font is a type font that can be resized (enlarged or reduced)without introducing distortion.
Scalable Processor Architecture - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
Scalable Processor Architecture� - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
Scalable Vector Graphics - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
Scalable Vector Graphics (SVG) - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
scalable video coding (SVC) - Scalable video coding (SVC) is an extension of the H.
scalar - In mathematics, scalar (noun) and scalar (adjective) refer to a quantity consisting of a single real number used to measured magnitude (size).
scalar product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
Scale Computing - Scale Computing is a hyper-converged infrastructure vendor that ships the HC3, a scale-out storage system for virtual environments that uses Red Hat's KVM hypervisor.
scale-out storage - Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays.
ScaleIO - ScaleIO is a software-defined storage software product from Dell EMC that uses existing hardware or EMC servers to turn direct-attached storage (DAS) into shared block storage.
Scalr - Scalr is an information technology (IT) vendor that offers a management platform for cloud computing.
scam-baiting - Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.
scan code set - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
scan converter - A scan converter is a hardware device that converts a video signal into a format compatible with a specific type of display.
scan set - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
scan set (scan code set) - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
ScanDisk - ScanDisk is a Windows utility used to check your hard disk for errors and to correct problems that are found.
scannable resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
scanner - A scanner is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
scanner-friendly resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
scanning tunneling microscope - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
scanning tunneling microscope (STM) - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
scareware - Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software.
Scarlet Book - The Scarlet Book is Philips and Sony's 1999 specification document for Super Audio Compact Disc (SACD), a high-resolution audio format that features complex six-channel sound.
SCART connector - A SCART connector is a physical and electrical interconnection between two pieces of audio-visual equipment, such as a television set and a video cassette recorder (VCR).
scatter plot - A scatter plot is a set of points plotted on a horizontal and vertical axes.
SCCP - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
SCCP - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
SCE - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
SCEM (supply chain event management) - Supply chain event management (SCEM) refers to software that is used to manage events that occur within and between organizations or supply chain partners.
scenario - Scenarios are potential events or combinations of events that could have an effect on a business -- typically a given scenario carries either risk or opportunity.
scenario planning - Scenario planning allows a business to prepare for various potential events and situations, known as scenarios.
schema - In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database, while in artificial intelligence (AI) a schema is a formal expression of an inference rule.
schemata - In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database, while in artificial intelligence (AI) a schema is a formal expression of an inference rule.
Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory.
SCI - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
scientific method - Scientific method is a logical approach to seeking knowledge that involves forming and testing a hypothesis.
scientific notation - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.
scientific notation (power-of-10 notation) - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.
SCL - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
SCM - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
Scooter - Scooter is the Web "crawler" for the AltaVista public search engine.
scope creep - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
SCORM - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
SCP - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
scraper site - A scraper site is a website that features content stolen from other sites and presented as original.
Scratch - Scratch is a free object-oriented software development kit (SDK) that allows children age 8-16 to create animations, interactive stories, games and music without needing to know a specific programming language.
screaming cell phone - A screaming cell phone is a cellular telephone that is programmed to emit a noise like human screaming.
screen - In a computer display, the screen is the physical surface on which visual information is presented.
screen capture - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
screen door effect - The screen door effect is a mesh-like appearance that occurs where visible gaps between pixels are seen on an electronic screen, usually when viewed at close proximity.
screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
screen order - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
screen pop - A screen pop is a feature of a computer telephony integration (CTI) application that automatically displays all of the relevant caller and account information on a call center agent's screen during a call.
screen printing - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
screen printing (serigraphy) - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
screen saver - A screen saver is an animated image that is activated on a personal computer display when no user activity has been sensed for a certain time.
screen scraping - Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.
screen shot - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
screen shot (screen capture) - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
screencast - A screencast is a digital video recording that captures actions taking place on a computer desktop.
Screencast: How to use iTunes to have a successful interview - In this screencast series, learn how to find and use tools that will help you have successful interviews and even land that job - all thanks to iTunes.
screened subnet - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
screened subnet (triple-homed firewall) - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
script - In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).
script - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
script kiddie - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
script kiddy - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
script kiddy (or script kiddie) - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
scripting language - A scripting language is a form of programming language that is usually interpreted rather than compiled.
scrub - Data scrubbing, also referred to as data cleansing, is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted or duplicated.
scrubbing - Data scrubbing, also referred to as data cleansing, is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted or duplicated.
Scrum - Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.
Scrum Master - A Scrum Master is a facilitator for an Agile development team.
SCSA - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
SCSI - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
SCSI - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
SCSI (Small Computer System Interface) - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
SCSI controller (Small Computer System Interface controller) - A SCSI controller, also called a host bus adapter (HBA), is a card or chip that allows a SCSI storage device to communicate with the operating system across a SCSI bus.
SCSI Express (SCSIe) - SCSI Express (SCSIe) is an emerging industry standard for a storage interface that runs Small Computer System Interface (SCSI) commands over a PCI Express (PCIe)link.
SCTP - SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network.
SCTP (Stream Control Transmission Protocol) - SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network.
scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
scuzzy - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
SCV - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
SD - SD cards use flash memory to provide nonvolatile storage.
SD card - SD cards use flash memory to provide nonvolatile storage.
SD-branch - SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.
SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is technology that uses software-defined networking (SDN) concepts to distribute network traffic across a wide area network (WAN).
SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
SD2 (Sound Designer II or SDII) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
SDARS - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
SDB - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
SDDL - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
SDH - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
SDH (Synchronous Digital Hierarchy) - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
SDI - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
SDII - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
SDK - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
SDL - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
SDL (Specification and Description Language) - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
SDLC - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
SDLC - (SDLC is also an abbreviation for systems development life cycle.
SDLC (Synchronous Data Link Control) - (SDLC is also an abbreviation for systems development life cycle.
SDLC model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
SDMA - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
SDN application (software-defined networking application) - An SDN application is a software program designed to perform a task in a software-defined networking (SDN) environment.
SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
SDN overlay (software defined networking overlay) - An SDN overlay is a deployment method for network virtualization and software-defined networking (SDN) that involves running a logically separate network or network component on top of existing infrastructure.
SDO - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
SDP - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
SDR - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
SDRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
SDTV - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
SDWT - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
sea change - A sea change is a significant and/or systemic transformation.
seamless interface - A seamless interface is the joining of two computer programs so that they appear to be one program with a single user interface.
search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
Search Engine Cheat Sheets - We've gathered cheat sheets for fast reference to search engine-related information.
search engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
search engine marketing (SEM) - Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.
search engine optimization - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
Search for Extraterrestrial Intelligence - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
Search for Extraterrestrial Intelligence (SETI) - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
Search Inside Yourself - Search Inside Yourself is a mindfulness program originally created by Google for its employees in 2012.
search neutrality - Search neutrality is the direct conducting of transparent search processes that do not discriminate between users or favor specific sites.
search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
search string - Search strings are sequences of characters and words used to find files and their content, database information and web pages.
search-and-replace - Search-and-replace is a capability that allows a computer user to find a given sequence of characters in one or more text files and, if desired, replace the sequence with another sequence of characters.
search-based applications (SBAs) - Search-based applications (SBAs) are applications that use a search engine platform as the backbone to access information residing in various file types.
searching - On the Internet, searching is just trying to find the information you need.
seat - In a networked computer system, a seat is a workstation that can be operated by one user at a time.
seat management - Seat management is a method of coordinating all the workstations in an enterprise network by overseeing the installation, operation, and maintenance of hardware and software at each workstation.
sec - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
SEC - The Securities and Exchange Commission (SEC) is a U.
SEC Form 10-K - SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies.
SEC Form 10-Q - SEC Form 10-Q is the Securities and Exchange Commission’s form for the quarterly performance filings of public companies.
SECAM - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
Seclore Technology (Seclore) - Seclore Technology is a Mumbai-based security software company incubated by the Indian Institute of Technology (IIT) in Bombay.
second - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
second (s or sec) - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
second generation RISC - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
Second Level Address Translation (SLAT) - Second Level Address Translation (SLAT) is a technology designed to reduce the overhead in a hypervisor CPU while easing the management of a hypervisor's memory and is often found with Hyper-V.
second level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
Second Life - Second Life is a massive multi-player universe (MMU) set in a 3D virtual worldcreated by San Francisco-based software maker Linden Labs.
second-hand - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
second-level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
second-level domain (SLD) - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
secondary storage - Secondary storage is storage for noncritical data that will not be frequently accessed.
SecOps - SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.
secret key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.
secret key algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
secret key algorithm (symmetric algorithm) - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
sector - On a computer diskette or hard disk, a sector is one of the "pie slices" the diskette or disk is divided into.
Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
Secure Digital card - SD cards use flash memory to provide nonvolatile storage.
Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
Secure Electronic Transaction - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
Secure HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
Secure Multi Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
Secure Multi-Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
secure real time transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
Secure Real-Time Transport Protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
secure realtime transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
Secure RTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
Secure Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
Secure Socket Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
Secure Sockets Layer - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
Secure Sockets Layer virtual private network - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
Securities and Exchange Commission - The Securities and Exchange Commission (SEC) is a U.
Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is a U.
security - Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.
security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
Security Accounts Manager - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
Security Accounts Manager (SAM) - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
security analytics - Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
Security as a Service - Security-as-a-service (SaaS) is an outsourcing model for security management.
Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
Security Assertion Markup Language - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
security awareness training - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
security certification - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
security debt - Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront.
Security Descriptor Definition Language - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
Security Descriptor Definition Language (SDDL) - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
security ID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
security identifier - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed.
security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.
security information management - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
security intelligence (SI) - Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
security operations center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security who monitors, analyzes and protects an organization from cyber attacks.
security policy - In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.
security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
Security Quizzes - We've gathered a collection of our quizzes on security-related topics.
security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
security through minority - Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
security through obsolescence - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public.
security token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
security token (authentication token) - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
Security Trust and Assurance Registry - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
SED - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
SED TV - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
SED TV (surface-conduction electron-emitter display television) - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
Seebeck effect - The Seebeck effect describes the generation of electricity following the connection of two dissimilar electrical conductors or semiconductors that illustrates the thermoelectric effect.
SeeBeyond - SeeBeyond makes integration server software for enterprises and was a pioneer in marketing an enterprise application integration (EAI) product.
seed capital - Seed capital is the funding required to get a new business started.
segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
segmentation - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
segmentation and reassembly - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
segmented memory - Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode.
segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
SEI - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
selective outsourcing - Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.
selenium - What is selenium?Selenium is a non-metallic element that is often used as a semiconductor material, as a rectifier or in xerography.
self checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
Self Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
self scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
self-assembly - Self-assembly is a branch of nanotechnology in which objects, devices, and systems form structures without external prodding.
self-checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self-directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
self-healing - In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and, without human intervention, make the necessary adjustments to restore itself to normal operation.
Self-Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
Self-Monitoring Analysis & Reporting Technology (S.M.A.R.T.) - Self-Monitoring Analysis and Reporting Technology (S.
self-replication - In nanotechnology, self-replication is a process in which devices whose diameters are of atomic scale, on the order of nanometers, create copies of themselves.
self-scanning - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self-scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self-scanning checkout (self-checkout) - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
self-sending spam - Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.
self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
self-service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
self-service cloud computing - Self-service cloud computing is a form of private cloud service where the customer provisions storage and launches applications without going through an external cloud service provider.
self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
selfie pay authentication - Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.
SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
SEM - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
semantic network (knowledge graph) - A semantic network is a knowledge structure that illustrates how concepts are related to one another and how they interconnect.
semantic search - Semantic search is an approach to locating information on the internet in which programming predicts context for a query.
semantic technology - Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.
Semantic Web - The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a user's needs.
semantics - Semantics (pronounced seh-MANT-iks, from Greek semantikos or significant and sema or sign) is the branch of semiotics, the philosophy or study of signs, that deals with meaning.
semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
semiconductor - A semiconductor is a substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
Semios mesh network - Semios mesh network is the communications backbone of the Semios orchard farming automation platform.
semiotics - Semiotics is the study of the use of symbolic communication.
Senate Judiciary Committee (SJC) - The U.S.
Sender ID - Sender ID is Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits.
sender pays - E-mail postage (sometimes referred to as sender pays) is a proposed system that would involve charging senders a very small amount of money (sometimes called a micropayment) for the delivery of each e-mail message sent.
sender permitted from - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
Sender Policy Framework - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
sendmail - On the Internet, sendmail is the most popular UNIX-based implementation of the Simple Mail Transfer Protocol (SMTP) for transmitting e-mail.
Sensex (BSE Sensex) - The Bombay Stock Exchange's Sensitive Index, called 'Sensex' or 'BSE Sensex' for short, is one of the leading stock market benchmark indices in India.
sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
Sensitive Personal Data - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
sensor analytics - Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors.
sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
sensor fusion - Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.
sensor hub - A sensor hub is a connection point for multiple sensors that uses a multipoint control unit (MCU), coprocessor or digital signal processor (DSP) to compile and process data gathered from those sensors.
sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
SEO - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
SEO (search engine optimization) - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
Sequenced Packet Exchange - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
sequential consistency - In computers, sequential consistency is best defined by its inventor, Leslie Lamport, who declared that a multiprocessing system had sequential consistency if:".
Sequential Couleur avec Memoire - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
Sequential Couleur avec Memoire (SECAM) - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
sequential logic - Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.
SerDes - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
serendipity - In general, serendipity is the act of finding something valuable or delightful when you are not looking for it.
Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
serial - Serial means one event at a time.
Serial Advanced Technology Attachment - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
Serial ATA - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
Serial ATA (Serial Advanced Technology Attachment or SATA) - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
serial attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
serial communications interface - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
Serial Digital Interface - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
Serial Digital Interface (SDI) - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
Serial Line Internet Protocol - SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.
Serial Line Internet Protocol (SLIP) - SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.
serial peripheral interface - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
serial peripheral interface (SPI) - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
serial port server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
serial port server (serial server or port redirector) - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
serial presence detect - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
serial server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
Serial Storage Architecture - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
Serial Storage Architecture (SSA) - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
serial-attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
serial-attached SCSI (SAS) - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
serial-attached storage - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
serializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
serializer deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
serializer/deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
serigraphy - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
Serious Organized Crime Agency - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
Serious Organized Crime Agency (SOCA) - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
serious reportable event - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
SERMO - SERMO is an online social network of verified physicians where they can anonymously discuss patient cases and non-medical subjects.
servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
server - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
server accelerator card - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
server accelerator card (SSL card) - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
server blade - A server blade is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a blade server, which is a space-saving rack with many similar servers.
server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
server farm - A server farm is a group of computers acting as servers and housed together in a single location.
server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
Server Message Block Protocol - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
Server Message Block Protocol (SMB protocol) - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
server push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
server refresh cycle - The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center.
server side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
server space provider - A server space provider is an individual, company, or organization that provides storage space on a server for Web pages, usually for a charge.
server sprawl - Server sprawl is a situation in which multiple, under-utilized servers take up more space and consume more resources than can be justified by their workload.
server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.
server-based computing - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
server-based SSD - A server-based SSD is a solid state drive that may be manufactured in a PCI Express form factor.
server-based storage - Server-based storage is a re-emerging class of data storage that removes cost and complexity by housing storage media inside servers rather than in dedicated and custom-engineered storage arrays.
server-push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
server-side flash - Server-side flash is the use of a solid state drive with flash memory in a server.
server-side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
server-side include (SSI) - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
serverless backup - Serverless data backup removes backup procedures from production servers so that the time usually spent on backup functions can be used for other server tasks.
serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
servers - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
service assurance - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
service component architecture - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
service contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
Service Data Objects - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
service discovery - Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.
Service Integration Maturity Model - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
Service Integration Maturity Model (SIMM) - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
service level - Service level describes, usually in measurable terms, the services a network service provider furnishes a customer within a given time period.
service level agreement - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
service level indicator - A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.
service lifecycle management (SLM) - Service lifecycle management (SLM) describes the strategy and software for managing the maintenance and repair of products and maximizing the profit opportunities from these activities.
Service Location Protocol - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
Service Organization Control 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
Service Organization Control 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
Service Organization Control 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
service oriented architecture - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
service oriented integration - SOI is also an abbreviation for Silicon-On-Insulator.
service oriented management - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
service pack - A service pack is an orderable or downloadable update to a customer's software that fixes existing problems and, in some cases, delivers product enhancements.
Service Profile Identifier - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
Service Providers: Glossary - This is a glossary of terms related to different types of service providers.
service set identifier - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
service set identifier (SSID) - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
service supply chain - The service supply chain is the part of the supply chain dedicated to providing service on products.
service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
service-component architecture - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
service-level agreement - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
service-level management - Service-level management is the monitoring and management of the quality of service(QoS) of an entity's key performance indicators(KPIs).
service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
service-oriented architecture - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
service-oriented integration - SOI is also an abbreviation for Silicon-On-Insulator.
service-oriented integration (SOI) - SOI is also an abbreviation for Silicon-On-Insulator.
service-oriented management - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
service-oriented management (SOM) - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
ServiceNow - ServiceNow is a cloud-based company that provides software as a service (SaaS) for technical management support.
Services Provisioning Markup Language - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
servlet - A servlet is a small program that runs on a server.
servo (servomechanism) - A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.
session - In telecommunication, a session is a series of interactions between two communication end points that occur during the span of a single connection.
Session Announcement Protocol (SAP) - Session Announcement Protocol (SAP) is a protocol used to define the format and describe the information that will be exchanged during a multicast conferencing session.
session border controller - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
session control protocol (SCP) - Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection.
session cookie - On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.
Session Description Protocol - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
session hijacking - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
session hijacking (TCP session hijacking) - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
session ID - A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session).
Session Initiation Protocol - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
Session Initiation Protocol trunking - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
session key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
session prediction (credential/session prediction) - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
session replay - Session replay is a scheme a cracker uses to masquerade as an authorized user on an interactive Web site.
session replay script - A session replay script is a program that enables the recording of website users’ keystrokes, clicks, mouse movements and scrolling behavior, along with the full contents of the pages they visit, and sends them to third-party servers.
session-based routing - Session-based routing is a type of routing architecture that is application-centric and designed to route entire sessions instead of individual packets.
set - A set is a group or collection of objects or numbers, considered as an entity unto itself.
SET - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
set theory - A set is a group or collection of objects or numbers, considered as an entity unto itself.
set-top box - A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.
SETI - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
seven-segment display - A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.
severance agreement - A severance agreement is a contract between an employer and employee documenting the rights and responsibilities of both parties in the event of job termination.
severance package - A severance package is the contracted pay and benefits provided to an employee whose job is terminated.
SEWP IV - NASA Solutions for Enterprise-Wide Procurement (SEWP) IV is a contract issued by NASA's SEWP BOWL (Solutions for Enterprise-Wide Procurement Business Operations and Workstation Laboratory) to a commercial technology vendor.
sexting - Sexting is the act of sending or receiving sexually-explicit images and messages, typically between cell phones.
SFA - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
SFA - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
SFF - Small form factor (SFF) refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
SFP - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
SFS - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
SFT III - SFT III is a feature providing fault-tolerance in Intel-based PC network server running Novell's NetWare operating system.
SFX - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
SGI - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
SGI (Silicon Graphics) - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
SGML - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
SGRAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
shadow app - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
shadow password file - In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.
shadow RAM - Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a special area of random access memory (RAM) so that they can be accessed more quickly.
Shamoon - Shamoon, also called W32.
Shannon, Claude - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
sharding - Sharding is a type of database partitioning that is used to separate very large databases the into smaller, faster, more easily managed pieces called data shards.
share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
Shareable Content Object Reference Model - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
Shareable Content Object Reference Model (SCORM) - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
Shared Assessments Program - Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.
Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
shared hosting - Shared hosting is Web hosting in which the service provider serves pages for multiple Web sites, each having its own Internet domain name, from a single Web server.
Shared Key Authentication - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
shared memory - In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.
shared nothing live migration - Shared nothing live migration is a term used to describe the process of moving a virtual machine (VM) from one physical host to another, without the need for clustering or a common shared storage location.
shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
Shared SAS - Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.
shared secret - A shared secret is data known to only the two entities involved in a communication so that either party's possession of that data can be provided as proof of identity for authentication.
shared services - Shared services is the consolidation of business operations that are used by multiple parts of the same organization.
shared source - Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model.
shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
Sharepoint - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
SharePoint 2013 Design Manager snippet - A SharePoint 2013 Design Manager snippet is HTML markup that can be copied and pasted into a SharePoint Master Page Design file.
SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
shebang - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
sheep - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
sheep dipping - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
sheepdip - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
sheepdip (sheep dipping or a footbath) - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
sheepdip computer - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
shelfware - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
shelfware - Shelfware is IT slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.
shell - Shell is a UNIX term for the interactive user interface with an operating system.
shell command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
Shellshock - Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including Linux and Mac OS X, and allows attackers to remotely gain complete control of a system.
shielded twisted pair - This definition closely duplicates the definition for twisted pair.
shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
Shimmer - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
Shockwave - Shockwave, developed by Macromedia, is a family of multimedia players.
Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
shoppable video - A shoppable video is a multimedia recording that allows a user to initiate an order from within the video.
shopping cart software - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
short message - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
Short Message Service - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
Short Message Service (SMS) - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
short message service center - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
short messaging - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
short messaging service spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
shortest path bridging - Shortest path bridging, or 802.
Shoshkele - A Shoshkele (pronounced Shosh-KEY-lee) is a proprietary type of floating ad developed by United Virtualities.
shotgun debugging - Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.
should-cost analysis (should-cost review) - A should-cost analysis, also called a should-cost review, is a procurement strategy for cost optimization in which the customer reverse engineers the cost of producing a finished product or service and uses that information to negotiate a contract.
shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
shovelware - Shovelware is content taken from any source and put on the Web as fast as possible with little regard for appearance and usability.
show control - Show control is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system.
show-me marketing - Show-me marketing is the practice of telling a brand's story and engaging consumers through pictures, videos and other visual media.
showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
SHTML - A Web file with the suffix of ".
shuffle mode - In iPod and other audio or multimedia playback applications, shuffle mode is the playing of items in a list in some random fashion.
SI - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
Si - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
SI - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
SIBR - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
SIBR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
SID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
Siebel - Siebel Systems is a prominent vendor of interoperable e-business software.
Siebel Systems - Siebel Systems is a prominent vendor of interoperable e-business software.
siemens - (Siemens AG is a German company engaged in electrical engineering and electronics.
siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
SIG - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
SIG (Special Interest Groups) - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
signal - In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another.
Signal Computing System Architecture - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
Signal Computing System Architecture (SCSA) - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
signal-to-noise ratio - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
signal-to-noise ratio (S/N or SNR) - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
signaling - In telephony, signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.
Signaling System 7 - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
Signaling Transport - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
Signalling Connection Control Part - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
signature analysis - Signature analysis has two meanings.
signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
significant figures - The term significant figures refers to the number of important single digits (0 through 9 inclusive) in the coefficient of an expression in scientific notation.
SIGTRAN - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
silence machine - The Electronic Controlled Acoustic Shadow System (ECASS), called the silence machine by its creator Selwyn Wright, an engineer at the University of Huddersfield in Yorkshire, UK, is the first device capable of blocking out a specified noise while leaving everything else audible.
silence machine or Electronic Controlled Acoustic Shadow System (ECASS) - The Electronic Controlled Acoustic Shadow System (ECASS), called the silence machine by its creator Selwyn Wright, an engineer at the University of Huddersfield in Yorkshire, UK, is the first device capable of blocking out a specified noise while leaving everything else audible.
silence suppression - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
silent attrition - Silent attrition is a situation in which customers stop patronizing a business without any communication.
silent monitoring - Silent monitoring refers to the practice of call center managers or senior agents listening to the interaction between an incoming caller and an agent.
silicon - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
silicon (Si) - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
Silicon Graphics - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
Silicon on Insulator - Silicon-On-Insulator (SOI) is a semiconductor fabrication technique developed by IBM that uses pure crystal silicon and silicon oxide for integrated circuits (IC) and microchips.
silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
Silicon Valley - Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.
Silicon-on-Insulator - Silicon-On-Insulator (SOI) is a semiconductor fabrication technique developed by IBM that uses pure crystal silicon and silicon oxide for integrated circuits (IC) and microchips.
Silverlight - Silverlight is: (1) A programming model for developing and distributing rich Internet applications (RIA) that use graphics, animations or video within the .
SIM - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
SIMD - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
SIMM - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
SIMM - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
SIMM (single in-line memory module) - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
SIMO - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
SIMO (single input, multiple output) - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
SIMPLE - SIMPLE is an add-on to the Session Initiation Protocol (SIP) that some industry insiders predict will be the basis for a new Instant Messaging and Presence Protocol (IMPP).
SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions) - SIMPLE is an add-on to the Session Initiation Protocol (SIP) that some industry insiders predict will be the basis for a new Instant Messaging and Presence Protocol (IMPP).
Simple API for XML - SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) -- that is, a Web file that describes a collection of data.
simple inexpensive mobile computer - The Simputer (short for simple inexpensive mobile computer) is an inexpensive, Web-enabled handheld computer designed for use by people in developing countries.
Simple Mail Transfer Protocol - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
Simple Network Management Protocol - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
Simple Object Access Protocol - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
Simple Traversal of UDP through NAT - Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Address Translator (NAT) or firewall.
simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
simplex - In telecommunication, duplex communication means that both ends of the communication can send and receive signals at the same time.
simplicity - In information technology, simplicity is a quality that is frequently sought by both users and technologists, although, as users frequently attest, it is not always found.
SimpliVity - SimpliVity Corp.
Simputer - The Simputer (short for simple inexpensive mobile computer) is an inexpensive, Web-enabled handheld computer designed for use by people in developing countries.
Simputer (simple inexpensive mobile computer) - The Simputer (short for simple inexpensive mobile computer) is an inexpensive, Web-enabled handheld computer designed for use by people in developing countries.
Simula - Simula, short for "simulation language," was the first object-oriented programming language.
Simula (simulation language) - Simula, short for "simulation language," was the first object-oriented programming language.
simulation language - Simula, short for "simulation language," was the first object-oriented programming language.
simulator sickness - Simulator sickness is a form of motion sickness related to interacting with a simulated environment.
simultaneous localization and mapping - Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.
simultaneous peripheral operations online - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
Sina Weibo - Sina Weibo is a social networking and microblogging service based in China with more than 368 million registered users.
sine wave - A waveform is a representation of how alternating current (AC) varies with time.
Single Carrier Radio Transmission Technology - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
single electron memory - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
single factor authentication - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
single image random dot stereogram - A single-image random-dot stereogram (SIRDS) is a set of printed or displayed dots that appear to form a three-dimensional (3D) scene when viewed close-up with the eyes focused at infinity.
single in line memory module - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
single in-line memory module - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
single input multiple output - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
single input single output - SISO (single input, single output) refers to a wireless communications system in which one antenna is used at the source (transmitter) and one antenna is used at the destination (receiver).
single instance storage - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
Single Instruction Multiple Data - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
Single Instruction Multiple Data (SIMD) - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
single level cell flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
single mode fiber - In optical fiber technology, single mode fiber is optical fiber that is designed for the transmission of a single ray or mode of light as a carrier and is used for long-distance signal transmission.
Single namespace - A single namespace is one presentation of file system data.
single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
single point of failure - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating.
single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating.
Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
Single Root I/O Virtualization (SR-IOV) - Single Root I/O Virtualization (SR-IOV) is a peripheral component interconnect (PCI) Special Interest Group specification for sharing PCIe devices within a single computer.
single sign on - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
single sign-on - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
single source of truth (SSOT) - Single source of truth (SSOT) is a concept that an organization can apply as part of its information architecture to ensure that everyone in the organization uses the same data when making business decisions.
single stream 802.11n - Single-stream 802.
single system image - Single-system image (SSI) is the idea that the resources provided by cluster computing or in any system which aggregates resources should present a single interface to the user.
single unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
Single UNIX Specification - The Single UNIX Specification is an industry standard description of the C language program and user command interfaces for a standard Unix operating system.
Single-Carrier Radio Transmission Technology - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
single-electron memory - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
single-electron memory (SEM) - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
single-factor authentication - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
single-factor authentication (SFA) - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
single-factor token - A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in conjunction with other types of credentials for multifactor authentication.
single-image random-dot stereogram - A single-image random-dot stereogram (SIRDS) is a set of printed or displayed dots that appear to form a three-dimensional (3D) scene when viewed close-up with the eyes focused at infinity.
single-level cell (SLC) flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
single-serving site - A single-serving site is a one-page, one-purpose website with a dedicated domain name.
single-source publishing (multi-channel publishing) - Single-source publishing, often used synonymously with multi-channel publishing, is a content management method in which material from one document can be used for various file formats, such as a text file, a website or an image file.
single-sourcing - Single-sourcing is the development of information content in a form that can conveniently be the basis for other forms of content.
single-system image - Single-system image (SSI) is the idea that the resources provided by cluster computing or in any system which aggregates resources should present a single interface to the user.
single-system image (SSI) - Single-system image (SSI) is the idea that the resources provided by cluster computing or in any system which aggregates resources should present a single interface to the user.
single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
single-user MIMO - Single-user MIMO (SU-MIMO) is a multi-transmitter and receiver technology for wireless communication that allocates the bandwidth of a wireless access point to a single device.
Singlet - Words that should be in the dictionary - A sniglet is a word that should be in the dictionary but isn't.
Singlet Words that should be in the dictionary - A sniglet is a word that should be in the dictionary but isn't.
singleton - In object-oriented programming, a singleton class is a class that can have only one object (an instance of the class) at a time.
Singularity - The Singularity is the hypothetical future creation of superintelligent machines.
Singularity (the) - The Singularity is the hypothetical future creation of superintelligent machines.
SIP - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
SIP authentication - Internet caller ID is an application that allows users to screen incoming telephone calls.
SIP for Instant Messaging and Presence Leveraging Extensions - SIMPLE is an add-on to the Session Initiation Protocol (SIP) that some industry insiders predict will be the basis for a new Instant Messaging and Presence Protocol (IMPP).
SIP trunking - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
SIPOC diagram (suppliers, inputs, process, outputs, customers) - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
SIRDS - A single-image random-dot stereogram (SIRDS) is a set of printed or displayed dots that appear to form a three-dimensional (3D) scene when viewed close-up with the eyes focused at infinity.
Siri - Siri is Apple's personal assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
SISO - SISO (single input, single output) refers to a wireless communications system in which one antenna is used at the source (transmitter) and one antenna is used at the destination (receiver).
SISO (single input, single output) - SISO (single input, single output) refers to a wireless communications system in which one antenna is used at the source (transmitter) and one antenna is used at the destination (receiver).
site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
site scraper - A site scraper is a type of software used to copy content from a website.
sitelet - A sitelet is a small section of a Web site that has a special purpose and identity.
situation normal all fucked up - SNAFU is an acronym for "situation normal, all f***ed up.
situational leadership - Situational leadership is based on the belief that there is no single way to direct people; successful leaders will adapt the way they lead to the needs and abilities of their employees.
six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
Six Sigma - Six Sigma is an approach to data-driven management that seeks to improve quality by measuring how many defects there are in a process and systematically eliminating them until there are as close to zero defects as possible.
Six Sigma: Glossary - This is a glossary of the Six Sigma concept.
six thinking hats retrospective - Six thinking hats is a tool for structuring a discussion.
SKA - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
skeuomorphism - Skeuomorphism is the design concept of making items represented resemble their real-world counterparts.
skewness - Skewness is asymmetry in a statistical distribution, in which the curve appears distorted or skewed either to the left or to the right.
skill based routing - Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets.
skill-based routing - Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets.
skill-based routing (SBR) - Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets.
skin - On the Internet, a skin is a graphic or audio file used to change the appearance of the user interface to a program or for a game character.
skin effect - Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.
Skinny Client Control Protocol - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
SKU - SKU (stockkeeping unit, sometimes spelled "Sku") is an identification, usually alphanumeric, of a particular product that allows it to be tracked for inventory purposes.
SKU (stockkeeping unit) - SKU (stockkeeping unit, sometimes spelled "Sku") is an identification, usually alphanumeric, of a particular product that allows it to be tracked for inventory purposes.
skunk works - A skunk works is a small group of people who work on a project that needs to be completed quickly.
skunked term - A skunked term is a word or phrase whose meaning is changing in such a way that it becomes difficult for people to be sure they are using it correctly.
skunkworks - A skunk works is a small group of people who work on a project that needs to be completed quickly.
SkunkWorks project (Skunk Works) - A skunk works is a small group of people who work on a project that needs to be completed quickly.
skuzzy - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
Skyera - Skyera was an all-flash array vendor that Western Digital's HGST subsidiary purchased in an all-cash transaction in December 2014.
Skype - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
Skype for Business - Skype for Business, formerly known as Microsoft Lync Server, is a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), video conferencing, file transfer, web conferencing, voicemail and email.
Skype protocol - Skype protocol is a peer-to-peer Internet telephony protocol used to move encrypted voice over IP (VoIP) traffic between Skype members' computers (peers).
SkypeOut - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
skyscraper - A skyscraper ad is a tall and narrow banner advertisement usually placed to the right of content on a Web page.
Skytap - Skytap is a software company that makes applications for cloud automation and virtual machine (VM) management, development and testing.
SLA - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
Slack software - Slack software is a cloud-based collaboration software suite.
slack space (file slack space) - Slack space is the difference between its logical and physical size.
slacktivism - Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.
Slackware - Slackware is the earliest distribution of the Linux operating system that is still being developed.
slag code - A logic bomb, sometimes referred to as slag code, is a string of malicious code used to cause harm to a network when the programmed conditions are met.
slamming - Slamming is the practice by some U.
SlapOS - SlapOS (Simple Language for Accounting and Provisioning Operating System) is an open source operating system for distributed cloud computing.
SLAPP - A SLAPP suit is a legal action undertaken or threatened to make the target stop any public activities in opposition to the interests of the person or organization bringing the suit.
Slashdot - Slashdot is a socially curated website dedicated to technology-related news items.
Slashdot Effect - The Slashdot Effect is the sudden, relatively temporary surge in traffic to a Web site that occurs when a high-traffic Web site or other source posts a story that refers visitors to another Web site.
slave - In computer networking, master/slave is a model for a communication protocol in which one device or process (known as the master) controls one or more other devices or processes (known as slaves).
SLC flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
SLD - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
sleep mode - Sleep mode, sometimes called standby or suspend mode, is a power-sparing state that a computer can enter when not in use.
slice and dice - To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.
slideware - Slideware is an overarching term for a presentation program or software that facilitates the creation and implementation of content into the form of a slideshow.
sliding windows - Sliding windows, a technique also known as windowing, is used by the Internet's Transmission Control Protocol (TCP) as a method of controlling the flow of packets between two computers or network hosts.
sliding windows (windowing) - Sliding windows, a technique also known as windowing, is used by the Internet's Transmission Control Protocol (TCP) as a method of controlling the flow of packets between two computers or network hosts.
Slingshot - Slingshot is Facebook's photograph sharing smartphone application, developed to compete with services like Snapchat and Instagram.
SLIP - SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.
slivercasting - Slivercasing, or narrowcasting, is the transmission of video programming to a niche audience, often through relatively inexpensive means like streaming video over high-speed connections.
slivercasting (narrowcasting) - Slivercasing, or narrowcasting, is the transmission of video programming to a niche audience, often through relatively inexpensive means like streaming video over high-speed connections.
slot - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
slot (or expansion slot) - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
Slot 1 - Slot 1 and Slot 2 are names for the way Intel P6-based microprocessors connect to a computer motherboard so that it makes contact with the built-in paths called the data bus.
slow scan television - Slow-scan television (SSTV) is a mode of video communications in which a sequence of fixed images is sent and received at intervals of several seconds.
slow-scan television - Slow-scan television (SSTV) is a mode of video communications in which a sequence of fixed images is sent and received at intervals of several seconds.
slow-scan television (SSTV) - Slow-scan television (SSTV) is a mode of video communications in which a sequence of fixed images is sent and received at intervals of several seconds.
SLP - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
slurping - Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player.
SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
small and medium sized business - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
small and medium-size business - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
small and midsized business - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
Small Business Innovative Research contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
Small Business Innovative Research contract (SBIR contract) - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
small cell - A small cell is an umbrella term used to describe a miniature radio access point or wireless network base station with a low radio frequency power output, footprint and range.
Small Computer System Interface - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
Small Computer System Interface - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
small data - Small data is data presented in a volume and format that makes it accessible and actionable.
Small Disadvantaged Business - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
Small Disadvantaged Business (SDB) - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
small form factor - Small form factor (SFF) refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
small form factor (SFF) - Small form factor (SFF) refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
small form factor pluggable - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
small form-factor pluggable - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
small form-factor pluggable (SFP) - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
small medium business - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
small midsized business - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
small multiples - Small multiples (also called trellis charts or lattice charts) provide data visualization of many small, interrelated graphs clustered together in a single display.
Small Office Home Office - In information technology, SOHO is a term for the small office or home office environment and business culture.
Small Office Home Office (SOHO) - In information technology, SOHO is a term for the small office or home office environment and business culture.
Small Particle Reagent - A reagent is a chemical substance that is used to create a reaction in combination with some other substance.
small system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
small to medium enterprise - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
small to medium enterprise (SME) - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
small unit metric system - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
small world - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
small world problem - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
small-unit metric system or centimeter-gram-second (cgs) system of units - The small-unit metric system (or more formally, the centimeter-gram-second (cgs) system of units) is based on three fundamental units: the centimeter (cm), which quantifies displacement, the gram (g), which quantifies mass, and the second (s or sec), which quantifies time.
Smalltalk - Smalltalk is a programming language that was designed expressly to support the concepts of object-oriented programming.
smarketing (sales and marketing alignment) - Smarketing is an alignment of a company's sales and marketing departments for better communication, more collaborative efforts, greater efficiency and, as a result, enhanced profitability.
SMART (SMART goals) - SMART is a best practice framework for setting goals.
smart antenna - A smart antenna is a digital wireless communications antenna system that takes advantage of diversity effect at the source (transmitter), the destination (receiver), or both.
smart appliance - An Internet appliance (sometimes called a Net appliance, a smart appliance or an information appliance) is a machine designed for a specific function that also has a built-in Web-enabled computer.
smart bandage - A smart bandage is a wound dressing with added technology to sense wound healing progress, dispense medication and upload progress-related data.
smart building - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
smart bulb (smart light bulb) - A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
smart city - A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
smart contract - A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.
smart data - Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics.
Smart Display - Smart Display is a wireless touch screen display device in development at Microsoft.
smart dust - In nanotechnology, smart dust is an ad hoc network of tiny devices equipped with wireless micro-electromechanical sensors (MEMS).
smart factory - A smart factory is a highly digitized and connected production facility that relies on smart manufacturing.
smart farming - Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
smart frame - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
smart grid - Smart grid is a generic label for the application of computer intelligence and networking abilities to a dumb electricity distribution system.
Smart Grid Glossary - Definitions and acronyms related to smart grid technology about smart grids and smart networks.
smart grid sensor - A smart grid sensor is a small, lightweight node that serves as a detection station in a sensor network.
Smart Grid Technology Overview - Smart Grid vocabulary is about electricity and power management, but it's also about wireless networking, data management, storage, security, customer communication and privacy.
smart hard hat - A smart hard hat is personal protective equipment (PPE) designed to enhance worker performance and safety in construction and related industries through embedded technology.
smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
smart home kit (home automation kit) - A smart home kit, sometimes called a home automation kit or an Internet of Things (IoT) platform, is a product that includes all the hardware and software required to connect, control and manage compatible smart devices for home automation.
smart home or building (home automation or domotics) - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
smart label - A smart label is a slip of paper, plastic or other material on a product that contains an RFID tag in addition to bar code data.
smart lock - A smart lock is an electronic and mechanical locking device that opens wirelessly with an authorized users’ authentication.
smart machines - A smart machine is a device embedded with machine-to-machine (M2M) and/or cognitive computing technologies such as artificial intelligence (AI), machine learning or deep learning, all of which it uses to reason, problem-solve, make decisions and even, ultimately, take action.
smart manufacturing (SM) - Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process.
smart matter - This definition generally duplicates our definition for MEMS.
smart meter - A smart meter is an Internet-capable device that measures energy, water or natural gas consumption of a building or home.
smart meter hack - A smart meter hack is the unauthorized access of such a device or its data transmissions for the purpose of obtaining or altering communications between it and the responsible utility.
smart paging - Smart paging is an advanced version of memory paging in Windows Server 2012 Hyper-V, where a virtual machine is capable of temporarily using hard disk space to supplement shortages of solid-state memory.
smart phone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system, web browsing and the ability to run software applications.
smart process applications (smart process apps) - A smart process application is software that is designed to support an organization's business process management (BPM) efforts in a collaborative manner.
smart projector - A smart projector is a video projector with extra inputs, connectivity and a built-in computer that is used primarily for entertainment and presentations.
smart radio - .
smart robot - A smart robot is an artificial intelligence (AI) system that can learn from its environment and its experience and build on its capabilities based on that knowledge.
smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on.
smart speaker - A smart speaker is a wireless and smart audio playback device that uses several types of connectivity for additional functions.
smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
smart tag - Microsoft's Smart Tags were a proposed feature of Windows XP that would allow Microsoft and its partners to insert their own links into any Web page viewed through its Internet Explorer browser.
Smart Tags - Microsoft's Smart Tags were a proposed feature of Windows XP that would allow Microsoft and its partners to insert their own links into any Web page viewed through its Internet Explorer browser.
smart TV - A smart TV is a digital television that is, essentially, an Internet-connected, storage-aware computer specialized for entertainment.
smart warehouse - A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
smart watch - A smart wristwatch is a wristwatch that not only tells time but, using a wireless connection to an information source, can show you the news, stock, sports scores, or weather; remind you of meetings on your Outlook calendar; provide instant messaging input from others; and update the time when you move to another time zone.
smartboard - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
SmartMedia - A SmartMedia card (originally called a solid-state floppy disk card, or SSFDC) is a memory card developed by Toshiba that uses flash memory to store data and to make it portable among devices, such as digital cameras, personal digital assistants (PDAs), and other handheld devices.
SmartMedia card - A SmartMedia card (originally called a solid-state floppy disk card, or SSFDC) is a memory card developed by Toshiba that uses flash memory to store data and to make it portable among devices, such as digital cameras, personal digital assistants (PDAs), and other handheld devices.
smartphone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system, web browsing and the ability to run software applications.
smartphone addiction (cell phone addiction) - Smartphone addiction is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.
smartphone sensor - A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.
SmartScreen - SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files.
smartwatch - A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
SMB - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
SMB (small and medium-sized business or small and midsized business) - SMB is an abbreviation for small and medium-sized business, sometimes seen as small and midsized business.
SMB 3.0 (Server Message Block 3.0) - SMB 3.0 (Server Message Block 3.
SMB protocol - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
smbclient - Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet.
SMDS - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
SMDS (Switched Multimegabit Data Service) - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
SME - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
SMF - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
SMF - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
SMF (Standard MIDI File) - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
SMI S - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
SMI-S - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
SMI-S (Storage Management Initiative Specification) - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
SMIL - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
SMIL (Synchronized Multimedia Integration Language) - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
SMIME - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
SMiShing - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
SMiShing (SMS phishing) - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
SMM - Social media marketing (SMM) is a form of Internet marketing that utilizes social networking websites as a marketing tool.
smoke testing - Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details.
SMP - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
SMP (symmetric multiprocessing) - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
SMPTE - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
SMPTE (Society of Motion Picture and Television Engineers) - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
SMR - Also see Enhanced Specialized Mobile Radio (ESMR).
sms - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
SMS - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
SMS phishing - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
SMS spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
SMSC - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
SMTP - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
smurf - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
smurf attack - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
Smurf Suite - The Smurf Suite is a collection of smartphone hacking and spyware tools that can remotely activate iPhones and Android devices and collect user data through eavesdropping and data access.
smurfing - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
SNA - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
snackable content - Snackable content is website content that is designed to be easy for readers to consume and to share.
SNAFU - SNAFU is an acronym for "situation normal, all f***ed up.
SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal, all f***ed up.
snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
Snake case - Snake case is a naming convention where a developer replaces spaces between words with an underscore.
snake oil - In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a product.
snap-in - Snap-in, in general, refers to an object that can be attached to another object and that will then function as part of the whole.
Snapchat - Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.
Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
Snapchat World Lenses - Snapchat World Lenses are a collection of augmented reality (AR) 3D enhancements to live real-world environments as viewed through the Snapchat mobile app, which allows users to send and receive 'self-destructing' photos and videos.
SnapLogic - SnapLogic is a software company that offers cloud integration products to allow customers to connect cloud-based data and applications with on-premise business systems.
snarf attack - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
sneakernet - Sneakernet is a jargon term for the method of transmitting electronic information by personally carrying it from one place to another on floppy disk or other removable medium.
SNG - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
SNIA Solid State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
SNIA Solid-State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
SNIA Solid-State Storage Initiative (SSSI) - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
sniff subrating - Sniff subrating is a Bluetooth feature designed to increase battery life as much as 500 percent for devices whose typical usage involves a significant amount of inactive time.
sniffer - In common industry usage, a sniffer (with lower case "s") is a program that monitors and analyzes network traffic, detecting bottlenecks and problems.
sniffer keystroke logger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
SNMP - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
SNOMED CT - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
snoop server - A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.
snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
snoopware - In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone.
Snort - Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.
SnortSnarf - SnortSnarf is a program that was designed for use with Snort, a security program used mainly with Linux networks.
Snowden effect - The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.
snowflake schema - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
snowflaking - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
SNR - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
SOA - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
SOA governance - SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
SOA networking - SOA networking is the use of the service-oriented architecture (SOA) model to enhance the capabilities of networks that use Web services.
SOA record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
soak testing - Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
SOAP - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
SOAP fault - A SOAP fault is an error in a SOAP (Simple Object Access Protocol) communication resulting from incorrect message format, header-processing problems, or incompatibility between applications.
soap opera effect - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
soap opera effect (motion interpolation) - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
SOAR (security orchestration, automation and response) - SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events without human assistance.
sobriety cell phone - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
SOC - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
SoC - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
Soc 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
Soc 1 (Service Organization Control 1) - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
Soc 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
Soc 2 (Service Organization Control 2) - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
Soc 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
Soc 3 (Service Organization Control 3) - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
SoC test - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
SoC testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
SoC testing (system-on-a-chip testing) - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
SOCA - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
social analysis - Social analysis is the practice of analyzing a situation or social problem through objective, systematic exploration.
social bookmarking - Social bookmarking is a user-defined taxonomy system for bookmark s.
social BPM - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
social business (social enterprise) - Social business is an umbrella term used to describe an organization that includes social media as part of its business plan.
social business process management - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
social coding - Social coding is an approach to software development that places an emphasis on formal and informal collaboration.
social collaboration - Social collaboration is work that is carried out by more than one person.
social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
social computing - Social computing is the collaborative and interactive nature of online behavior.
social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
social CRM - Social CRM, or social relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites, such as Twitter and Facebook.
social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
social currency - Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.
social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain.
social engineering attack surface - Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful.
social engineering penetration testing - Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management.
social entrepreneur - A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.
social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
social learning theory - The social learning theory is the philosophy that people can learn from each other through observation, imitation and modeling.
social loafing - Social loafing is a reduction of individual effort that tends to occur when people work in groups.
social login - Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website.
social media - Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and collaboration.
social media addiction - Social media addiction is an unhealthy dependence on interactive platforms such as Facebook, Twitter and Instagram.
social media analytics - Social media analytics is the practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.
social media dashboard - A social media dashboard is a social media management tool that individuals or companies can use to coordinate a social media presence across multiple channels or accounts, through a single interface.
social media influence - Social media influence is a marketing term that describes an individual’s ability to affect other people's thinking in a social online community.
social media listening - Social media listening, also known as social media monitoring, is the process of identifying and assessing what is being said about a company, individual, product or brand.
Social media management software (SMMS) - Social media management software (SMMS) is a tool that allows organizations to monitor and analyze online conversations from different communication channels.
social media manager - A social media manager is the individual in an organization trusted with monitoring, contributing to, filtering, measuring and otherwise guiding the social media presence of a brand, product, individual or corporation.
social media marketing - Social media marketing (SMM) is a form of Internet marketing that utilizes social networking websites as a marketing tool.
social media marketing (SMM) - Social media marketing (SMM) is a form of Internet marketing that utilizes social networking websites as a marketing tool.
social media metrics - Social media metrics refer to the measurements that companies use to gauge the impact of their efforts on social media platforms, and the impact of social media activity on a company’s revenue.
social media policy - A social media policy (also called a social networking policy) is a corporate code of conduct that provides guidelines for employees who post content on the Internet either as part of their job or as a private person.
social media ROI - Social media ROI refers to the return on investment a company can expect to make from its investment in social media technologies.
social network - A social network, in technology parlance, is a website or other application where people, often of similar interests, come together to communicate with each other and share information including photos, videos, audio and written messages.
social networking - Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals.
social proof - Social proof is a psychological phenomenon in which the actions and attitudes of the people around us (either in real life or online) are considered support to guide our own behavior.
social recruiting (social media recruitment) - Social media recruiting is the enterprise use of social media platforms to identify, engage and vet individuals the organization may want to hire.
social robot - A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots.
social search - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
social search engine - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
social selling - Social selling is a B2B and B2C social media marketing (SMM) strategy that utilizes social networking sites and applications to generate leads, sales or one-on-one relationships with consumers.
social shopping - Social shopping is a type of e-commerce that seeks to involve people with similar tastes in an online shopping experience.
social simulation - Social simulation is the application of computer-based methods and technologies to replicate human social dynamics in various environments and scenarios.
social sourcing - Social sourcing, also called social recruiting, is a type of e-recruitment in which recruiters and HR managers search for job candidates by using social media sites.
social task management - Social task management (STM) is a real-time, collaborative software-based approach to business activities that have traditionally been conducted through sequential processes such as document sharing and status updates.
socialbot - A socialbot is a software program that simulates human behavior in automated interactions on social network sites such as Facebook and Twitter.
Socialcast - Socialcast is an enterprise social networking and collaboration platform by VMware.
Society for the Worldwide Interbank Financial Telecommunication - Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions.
Society of Heating, Refrigerating, and Air Conditioning Engineers - ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) is an organization devoted to the advancement of indoor-environment-control technology in the heating, ventilation and air conditioning (HVAC) industry.
Society of Motion Picture and Television Engineers - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
sociogram - A sociogram is a tool for charting the relationships in a group by providing a visual representation of the social connections and preferences of each individual.
sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
Socket 7 - Socket 7 is the descriptive term for the way certain Intel Pentium microprocessors plug into a computer motherboard so that it makes contact with the motherboard's built-in wires or data bus.
socks - Socks (or "SOCKS") is a protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet.
SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
soft bounce - A soft bounce is an e-mail message that gets as far as the recipient's mail server but is bounced back undelivered before it gets to the intended recipient.
soft computing - Soft computing is the use of approximate calculations to provide approximate solutions to complex computational problems.
soft copy - A soft copy (sometimes spelled "softcopy") is an electronic copy of some type of data, such as a file viewed on a computer's display or transmitted as an e-mail attachment.
soft error - A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way.
soft handoff - In cellular telephone communication, soft handoff refers to the overlapping of repeater coverage zones, so that every cell phone set is always well within range of at least one repeater (also called a base station).
soft keyboard - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
soft keyboard (onscreen keyboard or software keyboard) - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
soft phone - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
soft skills - A soft skill is a personal attribute that supports situational awareness and enhances an individual's ability to get a job done.
soft token - A soft token is a software-based security token that generates a single-use login PIN.
soft zoning - Soft zoning is used to allocate resources and control access in a storage-area network (SAN).
softcooling - Softcooling is a software-based method of computer component cooling, conducted either by adjusting component settings or by using softcooling products.
softcooling (software cooling) - Softcooling is a software-based method of computer component cooling, conducted either by adjusting component settings or by using softcooling products.
softcopy - A soft copy (sometimes spelled "softcopy") is an electronic copy of some type of data, such as a file viewed on a computer's display or transmitted as an e-mail attachment.
softlifting - Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
softphone - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
softswitch - Softswitch (software switch) is a generic term for any open application program interface (API) software used to bridge a public switched telephone network (PSTN) and Voice over Internet Protocol (VOiP) by separating the call control functions of a phone call from the media gateway (transport layer).
software - Software is a set of instructions, data or programs used to operate computers and execute specific tasks.
software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
Software as a Medical Device (SaMD) - Software as a Medical Device (SaMD) is software that performs a medical task without being part of a hardware device.
Software as a Service - Vertical SaaS describes a type of Software as a Service cloud computing solution created for a specific industry.
Software as a Service - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
Software as a Service BI - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
software as a service ERP hosting - SaaS ERP is a type of cloud-based enterprise resource planning (ERP) software that runs on the vendor's or cloud provider's servers, is sold through subscription and delivered as a service over the internet.
software asset management (SAM) - Software asset management (SAM) is the part of IT asset management that seeks to ensure compliance with license agreements and prevent overspending on software.
software attack surface - The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user.
software audit - A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.
software bug - In computer technology, a bug is a coding error in a computer program.
software clustering - Application clustering (sometimes called software clustering) is a method of turning multiple computer servers into a cluster (a group of servers that acts like a single system).
software cooling - Softcooling is a software-based method of computer component cooling, conducted either by adjusting component settings or by using softcooling products.
software defined radio - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
software developer's kit - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
software development - Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).
software development kit (SDK) - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
software development life cycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
software development life cycle (SDLC) - The software development life cycle (SDLC) is a framework used in project management to describe the stages and tasks involved in each step of writing and deploying the instructions and data computers use to execute specific tasks.
Software development: Glossary - This is a glossary of terms related to software development.
software engineering - Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.
Software Engineering Institute - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
Software Engineering Institute (SEI) - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
software keyboard - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
software license - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
software license - A software license is a document that provides legally binding guidelines on the use and distribution of software.
software package - A software package is an assemblage of files and information about those files.
software piracy - Software piracy is the illegal copying, distribution, or use of software.
Software Piracy Quiz - How much do you know about the finer points of software piracy? Take our quiz to find out.
Software Process Improvement and Capability dEtermination - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
Software Process Improvement and Capability dEtermination (SPICE) - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
software RAID (software redundant array of independent disk) - Software RAID is a form of RAID (redundant array of independent disks) performed on the internal server.
software requirements specification - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
software requirements specification (SRS) - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
software robot - A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.
software robotics - Software robotics is the use of bot programs to automate computer tasks normally performed by people.
Software Security - Application security is the use of software, hardware, and procedural methods to protect applications from external threats.
software stack - A software stack is a collection of independent components that work together to support the execution of an application.
software substitution - Software substitution is the use of computer programs to conduct tasks that have traditionally been performed by a human.
software telephone - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
software testing - Software testing is a method of assessing the functionality of a software program.
software toolchain - A software toolchain is a set of software development tools used in combination with one another to complete complex software development tasks or to deliver a software product.
Software Update Services - Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems.
software-as-a-service ERP hosting - SaaS ERP is a type of cloud-based enterprise resource planning (ERP) software that runs on the vendor's or cloud provider's servers, is sold through subscription and delivered as a service over the internet.
software-defined everything (SDE) - Software-defined everything (SDE) is an umbrella term that describes how virtualization and abstracting workloads from the underlying hardware can be used to make information technology (IT) infrastructures more flexible and agile.
software-defined infrastructure control (SDIC) - Software-defined infrastructure control (SDIC) is an analytics-driven approach to balancing the resources that application programs demand in virtual and cloud environments.
software-defined networking (SDN) - Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network in order to make networks agile and flexible.
software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
software-defined perimeter (SDP) - The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.
software-defined radio - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
software-defined storage (SDS) - Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.
SOHO - In information technology, SOHO is a term for the small office or home office environment and business culture.
SOI - Silicon-On-Insulator (SOI) is a semiconductor fabrication technique developed by IBM that uses pure crystal silicon and silicon oxide for integrated circuits (IC) and microchips.
SOI - SOI is also an abbreviation for Silicon-On-Insulator.
solar constant - A solar constant is a measurement of the solar electromagnetic radiation available in a meter squared at Earth's distance from the sun.
solar cooling - Solar cooling is a system that converts heat from the sun into cooling that can be used for refrigeration and air conditioning.
solar fade - Solar fade, also called sun interference, is a phenomenon that occurs in satellite communications on certain occasions when the downlink signal is aligned with the sun's position and it is overcome by signal noise from the sun.
solar fade (sun interference) - Solar fade, also called sun interference, is a phenomenon that occurs in satellite communications on certain occasions when the downlink signal is aligned with the sun's position and it is overcome by signal noise from the sun.
solar panel - A solar panel is a flat construction resembling a window, built with technology that allows it to passively harvest the heat of the sun or create electricity from its energy through photovoltaics.
solar power - Solar power is the use of the sun’s energy either thermally or through the use of photovoltaic cells in solar panels and transparent photovoltaic glass to generate electricity.
solar-powered laptop - A solar-powered laptop is a notebook computer that uses built-in photo voltaic solar panels to run and recharge its battery.
Solaris - Solaris is the computer operating system that Sun Microsystems provides for its family of Scalable Processor Architecture-based processors as well as for Intel-based processors.
sole proprietorship - A sole proprietorship is an unincorporated business owned by a single individual or a couple who files a single tax return.
SOLED - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
SOLED (stacked organic light-emitting device) - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
solenoid - A solenoid is a coil of insulated or enameled wire wound on a rod-shaped form made of solid iron, solid steel, or powdered iron.
solid - A solid is a sample of matter that retains its shape and density when not confined.
SOLID (software design principles) - SOLID is a mnemonic acronym for a set of design principles created for software development in object-oriented languages.
solid oxide fuel cell (SOFC) - A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte.
solid state drive - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
solid state drive - A flash solid state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
solid state drive (SSD) capacity - solid state drive (SSD) capacity.
solid state drive capacity - solid state drive (SSD) capacity.
solid state drive purge - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
solid state drive RAID - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
solid state lighting - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
solid state module - A solid state module is solid state storage that resides in a Dual In-line Memory Module (DIMM) or similar form factor.
solid state module (SSM) - A solid state module is solid state storage that resides in a Dual In-line Memory Module (DIMM) or similar form factor.
solid state storage (SSS) garbage collection - Garbage collection, like TRIM, pro-actively eliminates the need for whole block erasures prior to every write operation.
solid state storage auto-tiering - Solid state storage auto tiering is automatically moving data that needs to accessed frequently to more expensive single-level cell (SLC) solid state storage and moving data that does not require frequent access to less expensive multi-level cell (MLC) solid state media or other lower cost, higher capacity drives.
solid state storage garbage collection - Garbage collection, like TRIM, pro-actively eliminates the need for whole block erasures prior to every write operation.
Solid State Storage Performance Test Specification - Solid State Storage Performance Test Specification (SSS PTS) is a set of procedures for evaluating the performance of NAND-based solid state storage (SSS).
Solid State Storage Performance Test Specification (SSS PTS) - Solid State Storage Performance Test Specification (SSS PTS) is a set of procedures for evaluating the performance of NAND-based solid state storage (SSS).
solid state storage technologies comparison - Solid-state storage (SSS) is an increasingly popular backup alternative to traditional storage technologies such as the hard disk drive (HDD), compact disc, rewriteable (CD-RW), and digital versatile disc RAM (DVD-RAM).
solid-state - Solid-state refers to electronic components, devices, and systems based entirely on the semiconductor.
solid-state drive - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
solid-state lighting - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
solid-state lighting (SSL) - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
solid-state storage - Solid-state storage (SSS) is a type of computer storage media made from silicon microchips.
solid-state storage UBER - Solid-state storage UBER (unrecoverable bit error rate) is the percentage of bits that have errors relative to the total number of bits that have been read.
solide state disk - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
Solidity - Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.
soliton - A soliton is a special form of light pulse that can be transmitted over a fiber optic channel.
SoLoMo (social, local and mobile) - SoLoMo (social, local and mobile) is a term representing the convergence of collaborative, location-based and on-the-go technologies, primarily used for marketing and discovery purposes.
solution provider - A solution provider is a vendor, a service provider or a value-added reseller (VAR) that comprehensively handles the project needs of their client from concept to installation through support.
solution selling - Solution selling refers to the philosophy or practice of uncovering a customer's pain points and then providing products and services that address the underlying business problem.
solution stack - A solution stack is an ordered collection of software that makes it possible to complete a particular task.
SOM - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
SoMoClo (social, mobile and cloud) - SoMoClo (social, mobile and cloud) is the convergence of collaborative, on-the-go technologies that allow users to access data and applications from anywhere at any time.
sonar - Sonar is an acronym (like radar, now spelled with all lower-case letters) for sound navigation and ranging.
sonar (sound navigation and ranging) - Sonar is an acronym (like radar, now spelled with all lower-case letters) for sound navigation and ranging.
SONET - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
Sony Philips Digital Interface - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
Sony/Philips Digital Interface - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
Sony/Philips Digital Interface (S/PDIF) - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
SOP - The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.
SOPA and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
sorting algorithm - A sorting algorithm is a method for reorganizing a large number of items into a specific order, such as alphabetical, highest-to-lowest value or shortest-to-longest distance.
SoS - System of systems (SoS) is a way to view multiple, small independent systems in context as part of a larger, more complex system.
sound beam - Directional sound is a technology that concentrates acoustic energy into a narrow beam so that it can be projected to a discrete area, much as a laser focuses light.
sound card - A sound card (also referred to as an audio card) is a peripheral device that attaches to the ISA or PCI slot on a motherboard to enable the computer to input, process, and deliver sound.
sound designer 2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
Sound Designer II - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
Sound designer II - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
Sound Designer II (SD2) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
sound navigation and ranging - Sonar is an acronym (like radar, now spelled with all lower-case letters) for sound navigation and ranging.
sound wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water, or any other liquid or solid matter) as it propagates away from the source of the sound.
source code - Source code is the fundamental component of a computer program that is created by a programmer.
source code analysis - Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.
source data - Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.
source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
Source Quench Introduced Delay - Also see SQUID, a UNIX-based program for caching Web pages and other Internet content closer to the user.
Source route transparent bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
Source-route transparent bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
Southbridge - Southbridge is an Intel chipset that manages the basic forms of input/output (I/O) such as Universal Serial Bus (USB), serial, audio, Integrated Drive Electronics (IDE), and Industry Standard Architecture (ISA) I/O in a computer.
SOW - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
SOX - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
SOX Section 404 - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
SOX Section 404 (Sarbanes-Oxley Act Section 404) - SOX Section 404 (Sarbanes-Oxley Act Section 404) mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting.
SP - A service pack is an orderable or downloadable update to a customer's software that fixes existing problems and, in some cases, delivers product enhancements.
SPAC - A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO).
space - In mathematics, space is an unbounded continuum (unbroken set of points) in which exactly three numerical coordinates are necessary to uniquely define the location of any particular point.
Space Communications Protocol Specifications (SCPS) - Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.
Space Force (United States Space Force) - Space Force is a proposed branch of the United States Armed Forces.
Space Launch System (SLS) - The Space Launch System (SLS) is an aerospace launch vehicle designed to carry crews and cargo on deep-space missions onboard NASA's Orion spacecraft.
spacer GIF - A transparent GIF (Graphics Interchange Format) is an image file that has one color assigned to be "transparent" so that the assigned color will be replaced by the browser's background color, whatever it may be.
SpaceX - Space Exploration Technologies Corp.
spaghetti code - Spaghetti code is a derogatory term for computer programming that is unnecessarily convoluted and difficult to change.
spaghetti diagram - A spaghetti diagram is a graphic representation of the flow of some entity, such as a person, a product or a piece of information, as it goes through some process.
spam blog - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
spam cocktail - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
spam cocktail (or anti-spam cocktail) - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
spam confidence level - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
spam filter - A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
spam for life - S4L is an online chat acronyms for "spam for life," the possible result of subscribing to an online service or becoming anyone's customer or client.
spam for life (S4L) - S4L is an online chat acronyms for "spam for life," the possible result of subscribing to an online service or becoming anyone's customer or client.
spam kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
spam over Internet telephony - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
spam ping - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
spam trap - A spam trap is an email address that is used to identify and monitor spam email.
spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
spamdexing - Spamdexing, coined from spam and index, is the practice of including information in a Web page that causes search engines to index it in some way that produces results that satisfy the spamdexer but usually dissatisify the search engine providers and users.
spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
Spamhaus Project - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
spanning tree protocol - Spanning tree protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
spanning tree protocol (STP) - Spanning tree protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
SPARC (Scalable Processor Architecture) - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
SPARC� - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
Sparkle - Expression Interactive Designer is Microsoft's new tool for adding 3D images and multimedia content to an application's user interface, or UI.
sparkline - A sparkline is a small embedded line graph that illustrates a single trend.
SPARQL - SPARQL is a declarative programming language and protocol used for analytics by graph databases.
sparsity and density - Sparsity and density are terms used to describe the percentage of cells in a database table that are not populated and populated, respectively.
spatial data - Spatial data is any type of data that directly or indirectly references a specific geographical area or location.
spatial division multiple access - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
spatial division multiple access (SDMA) - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
spatial intelligence - Spatial intelligence is the concept of being able to successfully perceive and derive insight from visual data.
spatial sensing - Spatial sensing is the detection, measuring and analysis of an environment's space and objects in real-time for the purposes of mapping them.
SPD - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
SPDIF - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
spear phishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
spear-phishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
spearphishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
SPEC - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
special effects - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
Special Interest Group - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
Special Interest Groups - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
special purpose acquisition company - A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO).
special purpose acquisition company (SPAC) - A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO).
Specialized Mobile Radio - Also see Enhanced Specialized Mobile Radio (ESMR).
Specialized Mobile Radio (SMR) - Also see Enhanced Specialized Mobile Radio (ESMR).
Specific Biometric Techniques: Glossary - This glossary provides definitions for the most commonly encountered biometric techniques.
specific gravity - The term specific gravity, symbolized sp gr, refers to the ratio of the density of a solid or liquid to the density of water at 4 degrees Celsius.
specific volume - Specific volume is a property of materials, defined as the number of cubic meters occupied by one kilogram of a particular substance.
Specification and Description Language - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
specification by example (SBE) - Specification by example (SBE) is a user-driven contextual approach to defining software requirements.
spectrum - The electromagnetic radiation spectrum is the complete range of the wavelengths of electromagnetic radiation, beginning with the longest radio waves (including those in the audio range) and extending through visible light (a very small part of the spectrum) all the way to the extremely short gamma rays that are a product of radioactive atoms.
spectrum analyzer - A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency.
spectrum efficiency - Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.
speculation - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
speculation (speculative loading) - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
speculative execution - Speculative execution is an optimization technique in which a processor (CPU) performs a series of tasks before it is prompted to in order to have the information ready if it is required at any point.
speculative loading - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
speculative risk - Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss.
speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
Speech Application Program Interface - SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.
Speech Application Program Interface (SAPI) - SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.
speech disfluency - A speech disfluency is any disruption in the flow of spoken language that is caused by the speaker.
speech recognition - Speech recognition, or speech-to-text, is the ability for a machine or program to identify words spoken aloud and convert them into readable text.
speech recognition - Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.
speech synthesis - Speech synthesis is the computer-generated simulation of human speech.
speech technology - Speech technology is a type of computing technology that enables an electronic device to recognize, analyze and understand spoken word or audio.
speed of gravity - The speed of gravity is the rate, in meters per second or other standard units, at which gravitational fields or effects propagate through space.
speed of light - The speed of light in free space (that is, in a vacuum) is a constant that has been measured to considerable accuracy.
speed of sound - The speed of sound, or of acoustic traveling waves, is a physical constant for any given medium at a specific pressure and temperature.
spend analysis - Spend analysis is the process of collecting, categorizing and evaluating expenditure data, either by human hand or through software.
SPF - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
SPI - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
SPICE - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
SPID - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
SPID (Service Profile Identifier) - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
SPIF - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
SPIF (sales performance incentive fund) - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
spike - A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease.
spike testing - Spike testing is a type of performance testing where an application is tested with a sudden and extreme increase in load, such as user traffic or system transactions.
spim - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
spin (angular momentum) - Spin, in physics, is the velocity of rotation of something around a particular axis.
spin (PR, marketing) - Spin, in the context of public relations (PR) and journalism, is the selective assembly of fact and the shaping of nuance to support a particular view of a story.
spindle - A spindle is a shaft that holds rotating hard disk drive (HDD) platters in place.
sping - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
sping (spam ping) - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
spintronics - Spintronics is an emerging field of nanoscale electronics involving the detection and manipulation of electron spin.
spiral lifecycle model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
SPIT - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
splash ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
splash page - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
splash page (splash screen) - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
splash screen - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
Splashtop - Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.
splay tree - A splay tree is a self-adjusting search algorithm for placing and locating files (called records or keys) in a database.
spline - In computer graphics, a spline is a curve that connects two or more specific points, or that is defined by two or more points.
split - Among Internet Relay Chat (IRC) users, a split is a condition where two or more IRC servers are temporarily unable to communicate.
split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
split horizon - Split horizon is a method of preventing a routing loop in a network.
split-mirror snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
SplitRX Mode - SplitRX Mode is a VMware vSphere feature that can improve network performance for some multicast workloads.
splitter - In telephony, a splitter, sometimes called a "plain old telephone service splitter," is a device that divides a telephone signal into two or more signals, each carrying a selected frequency range, and can also reassemble signals from multiple signal sources into a single signal.
splog - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
splog (spam blog) - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
splogger - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
Splunk - Splunk Inc. is a San Francisco-based multinational company whose software platform indexes machine data, and makes it searchable so it can be turned into actionable intelligence.
SPML - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
SPML (Services Provisioning Markup Language) - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
spod - On the Internet in the United Kingdom, a spod is a person who frequents chat rooms or discussion groups a little too frequently.
SPOF - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating.
Spoken Text Markup Language - Spoken Text Markup Language (STML) is an early set of markup codes and symbols for text-to-speech (TTS) synthesis for voice-enabled Web browsers and voice enabled e-mail.
Spoken Text Markup Language (STML) - Spoken Text Markup Language (STML) is an early set of markup codes and symbols for text-to-speech (TTS) synthesis for voice-enabled Web browsers and voice enabled e-mail.
spoliation - Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action.
spontaneous area network - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
spoof - Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.
spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
spool - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
spool (simultaneous peripheral operations online) - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
SPR - A reagent is a chemical substance that is used to create a reaction in combination with some other substance.
spray-on antenna - A spray-on antenna is a conductive material that can be sprayed onto nearly any surface to create a thin, lightweight and flexible antenna.
spread spectrum - Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.
spreadmart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
spreadsheet - A spreadsheet is a sheet of paper that shows accounting or other data in rows and columns; a spreadsheet is also a computer application program that simulates a physical spreadsheet by capturing, displaying, and manipulating data arranged in rows and columns.
spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
spreadsheet data mart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
Spring Framework - The Spring Framework (Spring) is an open-source application framework that provides infrastructure support for developing Java applications.
sprint (software development) - A sprint is a set period of time during which specific work has to be completed and made ready for review.
sprite - A sprite is a fairy or an elf.
SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
SPX - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
spybot - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
spyware - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
Spyware glossary - Print out for a handy reference guide or browse online to connect to full definitions and more information.
SQL - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
SQL (Structured Query Language) - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
SQL Azure - SQL Azure is Microsoft’s cloud database service.
SQL injection - A SQL injection (SQLi) is a security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data.
SQL Server 2012 - Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment.
SQL Server buffer pool - An SQL Server buffer pool, also called an SQL Server buffer cache, is a place in system memory that is used for caching table and index data pages as they are modified or read from disk.
SQL Server Reporting Services (SSRS) - SQL Server Reporting Services (SSRS) is a SQL Server subsystem that enables the creation of graphical, mobile and printed reports using SQL Server and other data sources.
SQL-ledger - SQL-Ledger (SL) is a Web-based open source double-entry accounting system that is used primarily in the retail and manufacturing sectors.
SQL-on-Hadoop - SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements.
SQLJ - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
SQLJ Java - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
SQPSK - Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transition is always 90 degrees or 1/4 cycle at a time.
Square (Square Register, Square Wallet) - Square is a mobile payment startup co-founded in 2009 by Twitter co-founder Jack Dorsey.
square foot - The foot squared, also called the square foot, is the standard unit of area in the English foot-pound-second (fps) system.
square meter - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
square meter (meter squared) - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
square root symbol - The square root symbol () is used to indicate the quantity or quantities which, when multiplied by itself or themselves, results in the quantity encompassed by the symbol.
SQUID - SQUID is also an abbreviation for Source Quench Introduced Delay, a networking term, and superconducting quantum interference device.
SQuID - Also see SQUID, a UNIX-based program for caching Web pages and other Internet content closer to the user.
SQUID - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
SRAM - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
SRAM (static random access memory) - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
SRE - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
SRI International (SRI) - SRI International (SRI), founded as Stanford Research Institute International, is an independent, non-profit research institute headquartered in Menlo Park, California.
SRM - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
SRM - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
SRM - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
SRS - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
SRT bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
SRTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
SS7 - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
SS7 attack - While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust.
SSA - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
SSADM - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
SSADM (Structured Systems Analysis & Design Method) - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
SSAE 16 - The Statement on Standards for Attestation Engagements No.
SSD - A RAM-based solid state drive is a storage device that is made from silicon microchips, has no moving parts and stores data electronically instead of magnetically.
SSD - A flash solid state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
SSD - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
ssd - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
SSD (solid-state drive) - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
SSD caching - SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.
SSD capacity - solid state drive (SSD) capacity.
SSD form factor - An SSD form factor is the size, configuration or physical arrangement of solid state storage (SSS) media.
SSD overprovisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
SSD purge - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
SSD purge (solid state drive purge) - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
SSD RAID - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
SSD RAID (solid-state drive RAID) - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
SSD TRIM - SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state drive (SSD) which data blocks it can erase because they are no longer in use.
SSD write cycle - An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.
SSH - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
SSI - Single-system image (SSI) is the idea that the resources provided by cluster computing or in any system which aggregates resources should present a single interface to the user.
SSI - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
SSI injection - SSI injection is a form of attack that can be used to compromise Web sites that contain SSI (server-side include) statements.
SSID - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
SSL - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
SSL - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
SSL (Secure Sockets Layer) - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
SSL card - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
SSL certificate (Secure Sockets Layer certificate) - A Secure Sockets Layer certificate, known commonly as an SSL certificate, is a small data file installed on a Web server that allows for a secure connection between a Web server and a Web browser.
SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
SSL VPN - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
SSL VPN (Secure Sockets Layer virtual private network) - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
SSM - A solid state module is solid state storage that resides in a Dual In-line Memory Module (DIMM) or similar form factor.
SSO - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
SSP - Also see two related terms, application service provider and management service provider.
SSS - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
SSS garbage collection - Garbage collection, like TRIM, pro-actively eliminates the need for whole block erasures prior to every write operation.
SSS PTS - Solid State Storage Performance Test Specification (SSS PTS) is a set of procedures for evaluating the performance of NAND-based solid state storage (SSS).
SSSI - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
SST - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
SST virus - The Anna Kournikova VBS.
SSTV - Slow-scan television (SSTV) is a mode of video communications in which a sequence of fixed images is sent and received at intervals of several seconds.
stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
stack - TCP/IP is frequently referred to as a "stack.
stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
stack pointer - A stack pointer is a small register that stores the address of the last program request in a stack.
stack smashing - Stack smashing is causing a stack in a computer application or operating system to overflow.
stacked organic light emitting device - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
stacked organic light-emitting device - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
stacked ranking - Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several levels of performance.
stackloader - A stackloader (also known as an autoloader) is a tape storage device that automatically loads tape cartridges using a robotic mechanism.
staggered quadrature phase-shift keying - Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transition is always 90 degrees or 1/4 cycle at a time.
staging environment - A staging environment, or staging, provides a nearly exact replica of a production environment for software testing.spreadmart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
spreadsheet - A spreadsheet is a sheet of paper that shows accounting or other data in rows and columns; a spreadsheet is also a computer application program that simulates a physical spreadsheet by capturing, displaying, and manipulating data arranged in rows and columns.
spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
spreadsheet data mart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
Spring Framework - The Spring Framework (Spring) is an open-source application framework that provides infrastructure support for developing Java applications.
sprint (software development) - A sprint is a set period of time during which specific work has to be completed and made ready for review.
sprite - A sprite is a fairy or an elf.
SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
SPX - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
spybot - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
spyware - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
Spyware glossary - Print out for a handy reference guide or browse online to connect to full definitions and more information.
SQL - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
SQL (Structured Query Language) - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
SQL Azure - SQL Azure is Microsoft’s cloud database service.
SQL injection - A SQL injection (SQLi) is a security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data.
SQL Server 2012 - Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment.
SQL Server buffer pool - An SQL Server buffer pool, also called an SQL Server buffer cache, is a place in system memory that is used for caching table and index data pages as they are modified or read from disk.
SQL Server Reporting Services (SSRS) - SQL Server Reporting Services (SSRS) is a SQL Server subsystem that enables the creation of graphical, mobile and printed reports using SQL Server and other data sources.
SQL-ledger - SQL-Ledger (SL) is a Web-based open source double-entry accounting system that is used primarily in the retail and manufacturing sectors.
SQL-on-Hadoop - SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements.
SQLJ - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
SQLJ Java - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
SQPSK - Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transition is always 90 degrees or 1/4 cycle at a time.
Square (Square Register, Square Wallet) - Square is a mobile payment startup co-founded in 2009 by Twitter co-founder Jack Dorsey.
square foot - The foot squared, also called the square foot, is the standard unit of area in the English foot-pound-second (fps) system.
square meter - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
square meter (meter squared) - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
square root symbol - The square root symbol () is used to indicate the quantity or quantities which, when multiplied by itself or themselves, results in the quantity encompassed by the symbol.
SQUID - SQUID is also an abbreviation for Source Quench Introduced Delay, a networking term, and superconducting quantum interference device.
SQuID - Also see SQUID, a UNIX-based program for caching Web pages and other Internet content closer to the user.
SQUID - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
SRAM - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
SRAM (static random access memory) - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
SRE - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
SRI International (SRI) - SRI International (SRI), founded as Stanford Research Institute International, is an independent, non-profit research institute headquartered in Menlo Park, California.
SRM - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
SRM - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
SRM - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
SRS - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
SRT bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
SRTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
SS7 - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
SS7 attack - While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust.
SSA - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
SSADM - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
SSADM (Structured Systems Analysis & Design Method) - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
SSAE 16 - The Statement on Standards for Attestation Engagements No.
SSD - A RAM-based solid state drive is a storage device that is made from silicon microchips, has no moving parts and stores data electronically instead of magnetically.
SSD - A flash solid state drive (SSD) is a non-volatile storage device that stores persistent data in flash memory.
SSD - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
ssd - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
SSD (solid-state drive) - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
SSD caching - SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.
SSD capacity - solid state drive (SSD) capacity.
SSD form factor - An SSD form factor is the size, configuration or physical arrangement of solid state storage (SSS) media.
SSD overprovisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
SSD purge - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
SSD purge (solid state drive purge) - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
SSD RAID - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
SSD RAID (solid-state drive RAID) - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
SSD TRIM - SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state drive (SSD) which data blocks it can erase because they are no longer in use.
SSD write cycle - An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.
SSH - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
SSI - Single-system image (SSI) is the idea that the resources provided by cluster computing or in any system which aggregates resources should present a single interface to the user.
SSI - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
SSI injection - SSI injection is a form of attack that can be used to compromise Web sites that contain SSI (server-side include) statements.
SSID - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
SSL - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
SSL - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
SSL (Secure Sockets Layer) - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
SSL card - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
SSL certificate (Secure Sockets Layer certificate) - A Secure Sockets Layer certificate, known commonly as an SSL certificate, is a small data file installed on a Web server that allows for a secure connection between a Web server and a Web browser.
SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
SSL VPN - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
SSL VPN (Secure Sockets Layer virtual private network) - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
SSM - A solid state module is solid state storage that resides in a Dual In-line Memory Module (DIMM) or similar form factor.
SSO - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
SSP - Also see two related terms, application service provider and management service provider.
SSS - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
SSS garbage collection - Garbage collection, like TRIM, pro-actively eliminates the need for whole block erasures prior to every write operation.
SSS PTS - Solid State Storage Performance Test Specification (SSS PTS) is a set of procedures for evaluating the performance of NAND-based solid state storage (SSS).
SSSI - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
SST - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
SST virus - The Anna Kournikova VBS.
SSTV - Slow-scan television (SSTV) is a mode of video communications in which a sequence of fixed images is sent and received at intervals of several seconds.
stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
stack - TCP/IP is frequently referred to as a "stack.
stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
stack pointer - A stack pointer is a small register that stores the address of the last program request in a stack.
stack smashing - Stack smashing is causing a stack in a computer application or operating system to overflow.
stacked organic light emitting device - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
stacked organic light-emitting device - SOLED (stacked organic light-emitting device) is a display technology from the Universal Display Corporation (UDC) that uses a stack of transparent organic light-emitting devices (TOLED s) to improve resolution and enhance full-color quality.
stacked ranking - Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several levels of performance.
stackloader - A stackloader (also known as an autoloader) is a tape storage device that automatically loads tape cartridges using a robotic mechanism.
staggered quadrature phase-shift keying - Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transition is always 90 degrees or 1/4 cycle at a time.
staging environment - A staging environment, or staging, provides a nearly exact replica of a production environment for software testing.
stakeholder - A stakeholder is a person or group who has an interest -- vested or otherwise -- in an enterprise and whose support is required in order for an enterprise to be successful.
stale data - In computer processing, if a processor changes the value of an operand and then, at a subsequent time, fetches the operand and obtains the old rather than the new value of the operand, then it is said to have seen stale data.
stamped e-mail - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
stamped email - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
stamped multisession CD standard - The Blue Book is the informal name for the standard specification document for stamped multisession (also known as the enhanced CD or E-CD) disk format, developed in 1995 from a supplement to Philips and Sony's 1988 Orange Book.
stand alone solid state storage - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
stand up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
stand-alone solid state storage - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
stand-alone solid state storage (SSS) - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
stand-up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
standalone dump - A standalone dump is the copying of the contents of computer main storage (random access memory) to another storage device, usually for the purpose of debugging a programming problem.
standard - A standard is a generally agreed-upon technology, method or format for a given application.
standard definition television - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
Standard Generalized Markup Language - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
Standard MIDI File - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
Standard MIDI File - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
Standard MIDI File (SMF) - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
standard operating procedure (SOP) - A standard operating procedure (SOP) is a set of written instructions that describes the step-by-step process that must be taken to properly perform a routine activity.
Standard Performance Evaluation Corporation - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
Standard Performance Evaluation Corporation (SPEC) - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
standard temperature and pressure - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
standard temperature and pressure (STP) - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
standardization - In data management, record standardization is a process in which files are first parsed (assigned to appropriate fields in a database record) and then translated to a common format.
standardization - Standardization is the process of developing, promoting and possibly mandating standards-based and compatible technologies within a given industry.
standards organization - A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.
standby - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
standing-wave ratio - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
standing-wave ratio (SWR, VWSR, IWSR) - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
Stanford Bunny - The Stanford Bunny is a computer graphics test model (GTM) for 3-D graphics.
STAR - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
star network - A star network is a local area network (LAN) in which all nodes (workstations or other devices) are directly connected to a common central computer.
star schema - A star schema is a database organizational structure optimized for use in a data warehouse or business intelligence that uses a single large fact table to store transactional or measured data, and one or more smaller dimensional tables that store attributes about the data.
StarBand - StarBand is a broadband Internet service provider (ISP) that uses geostationary satellites to provide always-on connection independent of other media.
Starlink - Starlink is a SpaceX initiative to create a global broadband network from a low-earth orbit (LEO) satellite constellation.
StarOffice - StarOffice is a free productivity application suite from Sun Microsystems that includes a word processor (Writer), spreadsheet (Calc), database (Base), presentation maker (Impress), illustrator (Draw), schedule managment (Schedule), e-mail (Mail) and newsgroup (Discussion) component.
start of authority record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
startup accelerator - A startup accelerator, sometimes referred to as a seed accelerator, is a business program that supports early-stage, growth-driven companies through education, mentorship and financing.
startup company - A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or service.
startup culture - Startup culture refers to how people within a new business, or startup, work together.
stash hunt - Geocaching, also referred to as GPS stash hunting, is a recreational activity in which someone "buries" something for others to try to find using a Global Positioning System (GPS) receiver.
stat W - The statohm (symbolized stat W) is the unit of resistance in the cgs (centimeter/gram/second) electrostatic system of units.
statA - The statampere (abbreviated statA or A-esu) is the unit of electric current in the cgs (centimeter/gram/second) system of electrostatic units (esu).
statampere - The statampere (abbreviated statA or A-esu) is the unit of electric current in the cgs (centimeter/gram/second) system of electrostatic units (esu).
statampere (statA or A-esu) - The statampere (abbreviated statA or A-esu) is the unit of electric current in the cgs (centimeter/gram/second) system of electrostatic units (esu).
statC - The statcoulomb (abbreviated statC) is the unit of electric charge quantity in the cgs (centimeter/gram/second) system.
statcoulomb - The statcoulomb (abbreviated statC) is the unit of electric charge quantity in the cgs (centimeter/gram/second) system.
statcoulomb (statC) - The statcoulomb (abbreviated statC) is the unit of electric charge quantity in the cgs (centimeter/gram/second) system.
State Bank of India (SBI) - State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.
state diagram - A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).
state diagram (state machine diagram or statechart diagram) - A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).
state machine - In general, a state machine is any device that stores the status of something at a given time and can operate on input to change the status and/or cause an action or output to take place for any given change.
state machine diagram - A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).
state management - Application state management is the process of maintaining knowledge of an application's inputs across multiple related data flows that form a complete business transaction -- or a session -- to understand the condition of the app at any given moment.
state of charge (SOC) - The state of charge (SOC) is a measurement of the amount of energy available in a battery at a specific point in time.
state wide area network - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
statechart diagram - A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).
stateful app - A stateful app is a program that saves client data from the activities of one session for use in the next session.
stateful inspection - Stateful inspection is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
stateless - Stateful and stateless are adjectives that describe whether a computer or computer program is designed to note and remember one or more preceding events in a given sequence of interactions with a user, another computer or program, a device, or other outside element.
stateless app - A stateless app is an application program that does not save client data generated in one session for use in the next session with that client.
statement of work - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
statement of work (SOW) - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
Statement on Auditing Standards 70 - SAS 70 (Statement on Auditing Standards No.
Statement on Auditing Standards No 70 - SAS 70 (Statement on Auditing Standards No.
Statement on Auditing Standards No. 70 - SAS 70 (Statement on Auditing Standards No.
states of digital data - A state of digital data is a way to describe the current functionality of a data file.
statF - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
statfarad - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
statfarad (statF) - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
statH - The stathenry (abbreviated statH) is the unit of inductance in the cgs (centimeter/gram/second) or small-unit metric system.
stathenry - The stathenry (abbreviated statH) is the unit of inductance in the cgs (centimeter/gram/second) or small-unit metric system.
stathenry (statH) - The stathenry (abbreviated statH) is the unit of inductance in the cgs (centimeter/gram/second) or small-unit metric system.
static - In general, dynamic means energetic, capable of action and/or change, or forceful, while static means stationary or fixed.
static analysis - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
static analysis (static code analysis) - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
static application security testing (SAST) - Static application security testing (SAST) is a program designed to analyze application (app) source code in order to find security vulnerabilities or weaknesses that may open an app up to a malicious attack.
static code analysis - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
static hashing - Static hashing is a method of hashing, or shortening a string of characters in computer programming, in which the set of shortened characters remains the same length to improve the ease with which data can be accessed.
static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
static jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
static random access memory - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
static scoping - Lexical scoping (sometimes known as static scoping) is a convention used with many programming languages that sets the scope (range of functionality) of a variable so that it may only be called (referenced) from within the block of code in which it is defined.
static testing - Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.
static URL - A static uniform resource locator (URL) is a name-based website address that is direct, unchanging, clear and contains no session or user identification information.
statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
statistical mean - The terms mean, median, mode, and range describe properties of statistical distributions.
statistical mean, median, mode and range - The terms mean, median, mode, and range describe properties of statistical distributions.
statistical noise - Statistical noise is unexplained variability within a data sample.
statistical process control (SPC) - Statistical process control (SPC) is a scientific, data-driven methodology for monitoring, controlling and improving procedures and products.
statistical time division multiplexing - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
statohm - The statohm (symbolized stat W) is the unit of resistance in the cgs (centimeter/gram/second) electrostatic system of units.
statohm (stat W) - The statohm (symbolized stat W) is the unit of resistance in the cgs (centimeter/gram/second) electrostatic system of units.
status code - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
statutory reporting - Statutory reporting is the mandatory submission of financial and non-financial information to a government agency.
statV - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
statvolt - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
statvolt (statV) - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
statW - The statwatt (symbolized statW) is the unit of power in the cgs (centimeter/gram/second) electrostatic system.
statwatt - The statwatt (symbolized statW) is the unit of power in the cgs (centimeter/gram/second) electrostatic system.
stay interview - A stay interview is an organized meeting between a manager and an existing employee to review the reasons the employee stays with the company and seeking out concerns that might influence the employee to leave.
STDM - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
STDM (statistical time division multiplexing) - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
steady state - Steady state is a condition in which a solid state flash drive has experienced enough program/erase (P/E) cycles that performance times for write operations becomes stable and can be evaluated in a consistent manner.
steadycam (steadicam) - A steadycam (also known as a steadicam) is a device that enables smooth video shooting by stabilizing a camera and isolating it from shock and vibration.
stealth - In computing, stealth refers to an event, object, or file that evades methodical attempts to find it.
stealth virus - In computer security, a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
STEAM (science, technology, engineering, arts and mathematics) - STEAM is an educational approach that incorporates the arts into the more-familiar STEM model (science, technology, engineering and mathematics).
steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
steering committee - A steering committee is a group of high-level advisors who have been appointed to provide an organization or project with direction.
Stefan-Boltzmann constant - The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.
Stegano - Stegano is a malware toolkit that allows users to hide malicious code in images.
steganographic - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
steganography - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
STEM (science, technology, engineering, and mathematics) - STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM).
stemming - Stemming is the process of reducing a word to its word stem that affixes to suffixes and prefixes or to the roots of words known as a lemma.
stepless frequency control - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
stepless frequency control (SFS) - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
stepper - A stepper is a machine used to project the image of a circuit in photolithographic semiconductor fabrication.
stepper motor - A stepper motor is a special type of electric motor that moves in increments, or steps, rather than turning smoothly as a conventional motor does.
stepping - Stepping is a number used by Intel to identify what level of design change a microprocessor was built to.
steradian - The steradian (symbolized sr) is the Standard International (SI) unit of solid angular measure.
stereolithography - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
stereoscopic imaging - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
stereoscopy - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
stereoscopy (stereoscopic imaging) - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
stickiness - Stickiness is anything about a Web site that encourages a visitor to stay longer.
stingray (IMSI catcher) - A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator.
STIX (Structured Threat Information eXpression) - STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared.
STM - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
STML - Spoken Text Markup Language (STML) is an early set of markup codes and symbols for text-to-speech (TTS) synthesis for voice-enabled Web browsers and voice enabled e-mail.
stochastic - Generally, stochastic (pronounced stow-KAS-tik, from the Greek stochastikos, or "skilled at aiming," since stochos is a target) describes an approach to anything that is based on probability.
stochastic optimization - Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness.
stockkeeping unit - SKU (stockkeeping unit, sometimes spelled "Sku") is an identification, usually alphanumeric, of a particular product that allows it to be tracked for inventory purposes.
STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
stop list - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
stop loss order - A stop loss order is a market order that sets a minimum value, below which an investment broker sells a stock or other security at the next available time.
Stop Online Piracy Act (SOPA) and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
Stop Online Piracy Act and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
stop words - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
storage area management - Storage area management (SAM) is a still-evolving set of procedures, services, and standards for comprehensively managing the infrastructure of a storage area network (SAN), including all components within all servers, the disk arrays, the tape libraries, the switches, the routers, and the programs.
storage area management (SAM) - Storage area management (SAM) is a still-evolving set of procedures, services, and standards for comprehensively managing the infrastructure of a storage area network (SAN), including all components within all servers, the disk arrays, the tape libraries, the switches, the routers, and the programs.
storage area network - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
Storage as a Service - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
storage as a service (STaaS) - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
storage capacity planning - The goal of storage capacity planning is to predict how much storage an organization will require so that just enough disk space can be purchased to meet the needs of users and applications.
storage card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
storage class memory (SCM) - Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system crash or power failure.
storage consolidation - Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
storage container - A storage container is a defined, specific location in high-volume storage.
storage convergence - Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
storage convergence - Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
storage distance extension - Storage distance extension refers to any of several different technologies that allow data communication in Fibre Channel storage area networks (SANs) over long spans of fiber optic cable.
Storage Distributed Resource Scheduler - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
Storage Distributed Resource Scheduler (DRS) - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
storage encryption - Storage encryption is the use of encryption/decryption of backed-up and archived data, both in transit and on storage media.
storage filer - A storage filer is a file server designed and programmed for high-volume data storage, backup, and archiving.
storage hypervisor - Storage hypervisors make more efficient use of storage resources in a virtual environment.
Storage Learning Guides - We've gathered a collection of our learning guides and tutorials on storage-related topics.
storage management - ADSTAR Distributed Storage Management (ADSM) is a collective term for IBM's family of high-end software that helps a customer manage the storage devices (such as mainframe storage, PC disk drives, and Zip drives) that are scattered around the company.
Storage Management Initiative Specification - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
storage media - In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data.
storage medium (storage media) - In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data.
storage network - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
Storage Networking Industry Association - The Storage Networking Industry Association, also known as SNIA, is a nonprofit trade group that promotes standards and technologies for the storage industry and offers education services, technical work groups and certifications for IT professionals.
storage node - A storage node is typically a physical server with one or more hard-disk drives (HDDs) or solid-state drives (SDDs).
storage pools - Storage pools are capacity aggregated from disparate physical storage resources in a shared storage environment.
storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
Storage Quizzes - We've gathered a collection of our quizzes on storage-related topics.
storage replication service - A storage replication service is a managed service in which stored or archived data is duplicated in real time over a storage area network (SAN).
storage resource management - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
storage resource management (SRM) - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
storage robot - A backup robot is an automated external USB storage device that supports multiple removable SATA hard drives.
storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities.
storage service provider - Also see two related terms, application service provider and management service provider.
storage service provider (SSP) - Also see two related terms, application service provider and management service provider.
storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
storage stack - A storage stack, also called an integrated stack, is a bundled storage product that include servers, networking components and server virtualization software.
storage tunneling - Fibre Channel over IP (FCIP or FC/IP, also known as Fibre Channel tunneling or storage tunneling) is an Internet Protocol (IP)-based storage networking technology developed by the Internet Engineering Task Force (IETF).
storage utilization - Storage utilization is a measure of how well the available data storage space in an enterprise is used.
storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity -- that is managed from a central console.
Storage vMotion - Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.
storage volume - A definition of volume must include a comparison of the unit of data storage to a partition, as well as insight into logical volume management, a form of storage virtualization.
storage zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.
stored procedure - A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.
story - In agile software development, a story is a particular business need assigned to the software development team.
story point (story points) - Story points are used in agile project management and development to determine the difficulty of implementing a particular story (business need).
storyboard - A storyboard is a graphic organizer that provides the viewer with a high-level view of a project.
stove-piped development - In engineering and information technology, stove-piped development is an approach in which improvements are considered only within the existing and technologically familiar context.
STP - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
STP - Spanning tree protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
STP - This definition closely duplicates the definition for twisted pair.
strange matter - Strange matter is matter consisting of atoms whose nuclei contain pairs of particles called strange quark s.
strategic inflection point - A strategic inflection point is a time period when significant change in the business environment requires an organization to respond effectively or face deterioration.
strategic innovation - Strategic innovation is a company's process of reinventing its corporate strategy to encourage growth, create value for the company and its customers, and gain competitive differentiation.
strategic leadership - Strategic leadership is a practice in which executives, using different styles of management, develop a vision for their organization that enables it to adapt to or remain competitive in a changing economic and technological climate.
strategic management - Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to meet its goals and objectives.
strategic planning - Strategic planning is the process executives undertake in order to make thoughtful decisions about their organization’s mission, values and goals, and properly allocate resources to fulfill those directives.
strategic sourcing - Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.
Stratellite - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
Stratoscale - Stratoscale is a cloud infrastructure vendor offering software-defined data center (SDDC) technology.
straw man - In general, a straw man is an object, document, person, or argument that temporarily stands in for and is intended to be "knocked down" by something more substantial.
straw man - In general, a straw man is an object, document, person, or argument that temporarily stands in for and is intended to be "knocked down" by something more substantial.
stream cipher - A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.
Stream Control Transmission Protocol - SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network.
stream recorder - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
stream recorder (stream ripper) - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
stream ripper - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
streaming - Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.
streaming application - A streaming application is a program that has its necessary components downloaded as needed instead of being installed ahead of time on a computer.
streaming data architecture - A streaming data architecture is an information technology framework that puts the focus on processing data in motion and treats extract-transform-load (ETL) batch processing as just one more event in a continuous stream of events.
streaming media - Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.
Streaming media quiz - A quiz about technologies and terms related to streaming media.
streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
streaming sound - Streaming sound is sound that is played as it arrives.
streaming video - Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.
Streamlined Sales Tax - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
Streamlined Sales Tax (SST) - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
Streisand effect - The Streisand effect is the common and counterproductive result of attempting to suppress information about something, such that public awareness of it increases significantly.
stress testing - Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.
stretchable silicon - Stretchable silicon is a flexible form of silicon manufactured in thin, wavelike ribbons that can be expanded and compressed like accordion bellows.
stretched cluster - A stretched cluster is a deployment model in which two or more virtualization host servers are part of the same logical cluster but located in separate geographical locations.
string - In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).
string theory - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
strobe - In computer or memory technology, a strobe is a signal that is sent that validates data or other signals on adjacent parallel lines.
strong authentication - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
strong cryptography - Strong cryptography is used by most governments around the world to protect communications.
strong password - A strong password is one that is designed to be hard for a person or program to discover.
strongly-typed programming language - A strongly-typed programming language is one in which each type of data (such as integer, character, hexadecimal, packed decimal, and so forth) is predefined as part of the programming language and all constants or variables defined for a given program must be described with one of the data types.
structural ambiguity - Structural or syntactic ambiguity is the potential of multiple interpretations for a piece of written or spoken language because of the way words or phrases are organized.
structured content - Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.
structured data - Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis.
structured programming - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
structured programming (modular programming) - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
Structured Query Language - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
Structured Systems Analysis & Design Method - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
Structured Wireless Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
Structured Wireless-Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
Strunk's rules - Here is a list of the seven elementary rules of English usage and 11 elementary principles of composition from William Strunk, Jr.
stub - A stub is a small program routine that substitutes for a longer program, possibly to be loaded later or that is located remotely.
STUN - Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Address Translator (NAT) or firewall.
Stuxnet - The Stuxnet worm is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems.
style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
stylus - A stylus (pronounced STAI-luhs, from the Latin stilus or "stake") is an instrument for writing and, in computers, an input device used to write text or draw lines on a surface as input to a computer.
sub-release - A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version.
subcarrier - A subcarrier is one telecommunication signal carrier that is carried on top of another carrier so that effectively two signals are carried at the same time.
subcontract - A subcontract is a contract between a prime contractor and a subcontractor to furnish supplies or services for the performance of a prime contract or subcontract.
subnet - A subnet, or subnetwork, is a segmented piece of a larger network.
subnet (subnetwork) - A subnet, or subnetwork, is a segmented piece of a larger network.
subnetwork - A subnetwork is a separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.
subnetwork - A subnet, or subnetwork, is a segmented piece of a larger network.
subpoena - A subpoena is a command issued by a court in which a person or corporation is required to physically appear before, or produce specific evidence to, that court.
subrogation - Subrogation is a legal right that lets an insurance company seek to recover costs from any third party who is responsible for the damages.
subscriber identity module - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
subscription-based pricing model - A subscription-based pricing model is a payment structure that allows a customer or organization to purchase or subscribe to a vendor's IT services for a specific period of time for a set price.
subset symbol - The subset symbol indicates a specific relationship between two sets.
subsidiary - A subsidiary is a business that is wholly or partially owned by another business, sometimes called the parent company or holding company.
substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
SuccessFactors Employee Central - SuccessFactors Employee Central is SuccessFactors' integrated suite of human capital management (HCM) cloud applications.
SuccessFactors MetaData Framework - The SuccessFactors Metadata Framework is Web-based software that gives SuccessFactors users the ability to create and maintain custom objects, screens and business rules to extend the platform’s functionality.
SuccessFactors Presentations - SuccessFactors Presentations is a feature within SuccessFactors software that HR managers can use to create more dynamic talent review presentations.
succession planning - Succession planning is the process of developing talent to replace executive, leadership or other key employees when they transition to another role, leave the company, are fired, retire or die.
sudo - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
sudo (superuser do) - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
suffix - A suffix is something added at the end of a word that conditions its usage or meaning.
Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
SugarSync - SugarSync is an online file sync-and-share service.
sugging - Sugging, also spelled SUGGing, is an acronym that stands for "selling under the guise” of research.
suite - In computers, a suite is a set of usually related programs sold together in a single package.
sum - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
summation - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
summation (sum) - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
Sun - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
sun interference - Solar fade, also called sun interference, is a phenomenon that occurs in satellite communications on certain occasions when the downlink signal is aligned with the sun's position and it is overcome by signal noise from the sun.
Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
Sun ONE - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
Sun ONE (Sun Open Net Environment) - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
Sun Open Net Environment - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
sunk cost (SC) - A sunk cost is money that has already been spent and cannot be recovered.
sunk cost effect - The sunk cost effect is the tendency for humans to continue investing in something that clearly isn’t working.
SunOS - SunOS was the UNIX-based operating system for Scalable Processor Architecture-based workstations and servers from Sun Microsystems.
sunsetting - Sunsetting, in a business context, is intentionally and gradually phasing something out.
Super Audio CD - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
Super Audio CD (SACD) - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
Super DMCA - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
Super Video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
supercomputer - The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray.
supercomputer center - In general, a supercomputer center is a site with a supercomputer that is shared by a number of other sites, usually research sites.
superconducting quantum interference device - A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field.
superconductivity - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
superconductor - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
supercookie - A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a user's internet browsing history and habits.
SuperDLT - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
Superdome - Superdome is a high-end 64-bit, Hewlett-Packard (HP) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.
superheterodyne - Superheterodyne refers to a method of designing and building wireless communications or broadcast equipment, particularly radio receivers.
Supermicro - Supermicro is a company that specializes in x86-64 server technology.
supernet - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
supernetting - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
supernetting - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
superposition - Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured.
superscalar - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
SuperSpeed USB - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
SuperSpeed USB - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
superstitial - A superstitial is a Web ad format developed by Unicast, which calls itself a rich media company.
superstring theory - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
superstring theory (string theory, Theory of Everything) - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
supertasker - A supertasker is someone who performs better when doing multiple things simultaneously than they do when limiting their attention to a single task.
superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
superuser do - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
supervised learning - Supervised learning is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labeled for a particular output.
supervisor call - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
supervisor call (SVC) - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
supervisory control and data acquisition - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
SuperZap - SuperZap is an IBM utility program used to install zaps or fixes to MVS operating systems or application program code that is causing a problem.
supplier exchange - E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.
Supplier performance management (SPM) - Supplier performance management (SPM) is a blanket term for any business practice that is designed to manage, measure and analyze the performance of a supplier or suppliers in a network.
supplier relationship management - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
supplier risk management - Supplier risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings that are caused by the organization's supply chain.
supply and demand - The laws of supply and demand are the observed relationships between the amount of something that is available for purchase, the level of desire consumers have to buy it and the price.
supply chain - A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.
supply chain analytics - Supply chain analytics refers to the processes organizations use to gain insight and extract value from the large amounts of data associated with the procurement, processing and distribution of goods.
supply chain attack - A supply chain attack is a type of cyber attack that targets organizations by focusing on weaker links in an organization's supply chain.
supply chain execution - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
supply chain finance - Supply chain finance is a set of technology-enabled business and financial processes that provides flexible payment options for a buyer (such as a manufacturer) and one of their suppliers (for example, a raw materials supplier), typically through the services of a financial institution at lower financing costs.
supply chain management - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
supply chain management (SCM) - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
Supply Chain Operations Reference (SCOR) - Supply Chain Operations Reference (SCOR) is the process reference model used across industries as a supply chain management diagnostic tool.
supply chain planning - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
Supply Chain Planning (SCP) - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
supply chain risk management (SCRM) - Supply chain risks include cost volatility, material shortages, supplier financial issues and disasters.
supply chain security - Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation.
supply chain sustainability (SCS) - Supply chain sustainability (SCS) is a holistic view of supply chain processes, logistics and technologies that affect the environmental, social, economic and legal aspects of a supply chain's components.
supply chain transformation - Supply chain transformation is the addition and integration of technology to improve supply chain performance.
supply chain visibility - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
supply chain visibility (SCV) - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
supply-side platform (SSP) - A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.
support - In information technology, support refers to functionality that is provided between or among products, programs, devices, modes, or accessories.
support level - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
support vector machine (SVM) - A support vector machine (SVM) is a type of deep learning algorithm that performs supervised learning for classification or regression of data groups.
support-driven development - Support-driven development is a strategy used by developers to create products that fit the needs of customers by designing them based on direct customer feedback.
surd - A surd is a number or quantity that cannot be expressed as the ratio of two integer s.
surf - In using the World Wide Web, to surf is to either: Explore a sequence of Web sites in a random, unplanned way, or2) Simply use the Web to look for something in a questing way.
Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
surface conduction electron emitter display television - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
surface printing - Flexography, sometimes referred to as "surface printing," is a method commonly used for printing on packaging and other uneven surfaces.
surface-conduction electron-emitter display - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
surface-conduction electron-emitter display television - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
surge protector - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
surge suppressor - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
surge suppressor (surge protector) - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
surprise and delight - Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.
surveillance capitalism - Surveillance capitalism is the monetization of data captured through monitoring people's movements and behaviors online and in the physical world.
surveillance metadata - Surveillance metadata is details about data pertaining to the actions of an observed party.
survey research - Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online.
susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
SuSE - SuSE (pronounced soo'-sah) is a German Linux distribution provider and business unit of Novell, Inc.
SUSE Linux Enterprise Server (SLES) - SUSE Linux Enterprise Server (SLES) is a Linux-based server operating system created and maintained by the German-based organization, SUSE.
SUSE Manager - SUSE Manager is an open source infrastructure management tool for Linux systems.
Suspicious Activity Report - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
Suspicious Activity Report (SAR) - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
sustainability risk management - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
sustainable procurement - Sustainable procurement is the meeting of business needs for materials, goods, utilities and services in an environmentally-friendly, responsible and ethical way.
sustaining technology - A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.
SVC - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
SVC - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
SVG - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
SVGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
SVVP (server virtualization validation program) - SVVP (server virtualization validation program) is a policy that allows administrators running running Windows Server on certified virtualization technologies other than Hyper-V and Microsoft Virtual Server to receive technical support for Windows Server from Microsoft.
Swagger - Swagger is an open source set of rules, specifications and tools for developing and describing RESTful APIs.
swamp cooling - Evaporative cooling, also known as swamp cooling, is a strategy for cooling air that takes advantage of the drop in temperature that occurs when water that's exposed to moving air begins to change to gas.
SWAN - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
SWAN - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
SWAN (Structured Wireless-Aware Network) - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
swap file - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
swap file (swap space or pagefile) - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
swap space - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
swarm intelligence - Swarm intelligence is the study of decentralized, self-organized systems that move quickly in a coordinated manner.
swarm robotics - Swarm robotics is the use of numerous, autonomous robotics to accomplish a task.
SWIFT - Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions.
SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
Swing - Swing is a set of program components for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars, that are independent of the windowing system for specific operating system.
swirl - .
SWiSH - SWiSH is a program that is used to create Flash animations without using Macromedia's Flash product.
switch on a chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
switch-on-a-chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
switch-on-a-chip (SOC) - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
Switched Multimegabit Data Service - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
switched virtual circuit - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
switching fabric - Switching fabric is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats -- which is what makes up the SWOT acronym.
SWR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
Symantec PartnerNet - Symantec PartnerNet is web-based portal that was developed by security vendor Symantec to provide information, tools and benefits to its channel partner community.
Symantec.cloud Service Provider Program - The Symantec.
symbology - A symbology is a protocol for arranging the bars and spaces that make up a particular kind of bar code.
symetric key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
symmetric algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
Symmetric Multi Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
Symmetric Multi-Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
symmetric multiprocessing - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
SYN scanning - SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.
sync and stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
sync-and-stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
SynchBurst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
SynchML - SyncML is an Extensible Markup Language (XML) protocol under development as an open standard for the universal synchronization of data between devices, one of the most important building blocks in the development of third generation (3G) wireless.
synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to describe a perceived meaningful coincidence.
synchronize and stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
synchronize-and-stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
synchronize-and-stabilize (sync-and-stabilize) - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
Synchronized Multimedia Integration Language - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from Greek syn-, meaning "with," and chronos, meaning "time") is an adjective describing objects or events that are coordinated in time.
Synchronous Data Link Control - (SDLC is also an abbreviation for systems development life cycle.
Synchronous Digital Hierarchy - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
synchronous DRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
Synchronous Graphics RAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
Synchronous Graphics RAM (SGRAM) - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
synchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
synchronous mirroring - Synchronous mirroring is a type of data protection in which data is written to both a remote and local disk simultaneously.
Synchronous Optical Network - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
Synchronous Optical Network (SONET) - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
synchronous replication - Synchronous replication copies data over a SAN, LAN or WAN so multiple copies are available.
synchronous/asynchronous API - Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.
Synclink - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
Synclink Dynamic RAM - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
syndication - In general, syndication is the supply of material for reuse and integration with other material, often through a paid service subscription.
synectics - Synectics is a method of problem-solving that focuses on cultivating creative thinking, often among small groups of individuals with diverse experience and skills.
synergy - In general, synergy (pronounced SIN-ur-jee, from Greek sunergia, meaning "cooperation," and also sunergos, meaning "working together") is the combined working together of two or more parts of a system so that the combined effect is greater than the sum of the efforts of the parts.
syntax - Syntax is the grammar, structure, or order of the elements in a language statement.
synthetic backup - Synthetic backup is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
synthetic data - Synthetic data is information that's artificially manufactured rather than generated by real-world events.
synthetic identity theft - Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity.
synthetic intelligence (SI) - Synthetic intelligence (SI) recognizes that although the capacity for software to reason may be manufactured, it is nonetheless real intelligence and not just an imitation of how human beings acquire and apply knowledge and skill.
synthetic monitoring - Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.
sysadmin - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
sysop - A sysop is the person who runs a computer server.
sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
sysplex and Parallel Sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
SYSPRO - SYSPRO is a vendor that specializes in providing ERP and other integrated business software to midsize manufacturers and distributors.
system - A system is a collection of elements or components that are organized for a common purpose.
System 5 - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
system administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
system administrator (sysadmin) - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
system checkpoint - A restore point is a saved "snapshot" of a computer's data at a specific time.
System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
system monitor - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
system of systems - System of systems (SoS) is a way to view multiple, small independent systems in context as part of a larger, more complex system.
system of systems (SoS) - System of systems (SoS) is a way to view multiple, small independent systems in context as part of a larger, more complex system.
system on a chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system on a chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
system operator - A sysop is the person who runs a computer server.
system operator (sysop) - A sysop is the person who runs a computer server.
System Performance Evaluation Cooperative - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
system software - System software is a type of computer program that is designed to run a computer's hardware and application programs.
system testing - System testing, also referred to as system-level tests or system-integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.
system tray - The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user interface that is used to display the clock and the icons of certain programs so that a user is continually reminded that they are there and can easily click one of them.
System V - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
System V (System 5) - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
system-on-a-chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system-on-a-chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
Systematized Nomenclature of Medicine -- Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
Systematized Nomenclature of Medicine Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
systemic risk - Systemic risk is a category of risk that describes threats to a system, market or economic segment.
systems administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
Systems Application Architecture - Systems Application Architecture (SAA) was IBM's strategy for enterprise computing in the late 1980s and early 1990s.
systems development life cycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development life cycle (SDLC) - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development life cycle model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development lifecycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
Systems Management: Glossary - This is a glossary of terms related to systems management.
Systems Network Architecture - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
Systems Network Architecture (SNA) - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
systems of engagement - Systems of engagement are decentralized IT components that incorporate communication technologies such as social media to encourage and enable peer interaction.
systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
Systems, Application and Products in Data Processing - SAP ERP is an enterprise resource planning software developed by the company SAP SE.
SysTrack Desktop Assessment for VMware - SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.
The speed of end-user and backbone transmission technologies - This table shows the stated data rates for the most important end-user and backbone transmission technologies.
What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
What is SecOps? Everything you need to know - SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and assessing risk and protecting corporate assets, often operating from a security operations center, or SOC.
What is srver virtualization? The ultimate guide - Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.
swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats -- which is what makes up the SWOT acronym.
SWR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
Symantec PartnerNet - Symantec PartnerNet is web-based portal that was developed by security vendor Symantec to provide information, tools and benefits to its channel partner community.
Symantec.cloud Service Provider Program - The Symantec.
symbology - A symbology is a protocol for arranging the bars and spaces that make up a particular kind of bar code.
symetric key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
symmetric algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
Symmetric Multi Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
Symmetric Multi-Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
symmetric multiprocessing - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
SYN scanning - SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.
sync and stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
sync-and-stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
SynchBurst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
SynchML - SyncML is an Extensible Markup Language (XML) protocol under development as an open standard for the universal synchronization of data between devices, one of the most important building blocks in the development of third generation (3G) wireless.
synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to describe a perceived meaningful coincidence.
synchronize and stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
synchronize-and-stabilize - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
synchronize-and-stabilize (sync-and-stabilize) - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
Synchronized Multimedia Integration Language - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from Greek syn-, meaning "with," and chronos, meaning "time") is an adjective describing objects or events that are coordinated in time.
Synchronous Data Link Control - (SDLC is also an abbreviation for systems development life cycle.
Synchronous Digital Hierarchy - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
synchronous DRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
Synchronous Graphics RAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
Synchronous Graphics RAM (SGRAM) - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
synchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
synchronous mirroring - Synchronous mirroring is a type of data protection in which data is written to both a remote and local disk simultaneously.
Synchronous Optical Network - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
Synchronous Optical Network (SONET) - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
synchronous replication - Synchronous replication copies data over a SAN, LAN or WAN so multiple copies are available.
synchronous/asynchronous API - Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.
Synclink - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
Synclink Dynamic RAM - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
syndication - In general, syndication is the supply of material for reuse and integration with other material, often through a paid service subscription.
synectics - Synectics is a method of problem-solving that focuses on cultivating creative thinking, often among small groups of individuals with diverse experience and skills.
synergy - In general, synergy (pronounced SIN-ur-jee, from Greek sunergia, meaning "cooperation," and also sunergos, meaning "working together") is the combined working together of two or more parts of a system so that the combined effect is greater than the sum of the efforts of the parts.
syntax - Syntax is the grammar, structure, or order of the elements in a language statement.
synthetic backup - Synthetic backup is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
synthetic data - Synthetic data is information that's artificially manufactured rather than generated by real-world events.
synthetic identity theft - Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity.
synthetic intelligence (SI) - Synthetic intelligence (SI) recognizes that although the capacity for software to reason may be manufactured, it is nonetheless real intelligence and not just an imitation of how human beings acquire and apply knowledge and skill.
synthetic monitoring - Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.
sysadmin - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
sysop - A sysop is the person who runs a computer server.
sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
sysplex and Parallel Sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
SYSPRO - SYSPRO is a vendor that specializes in providing ERP and other integrated business software to midsize manufacturers and distributors.
system - A system is a collection of elements or components that are organized for a common purpose.
System 5 - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
system administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
system administrator (sysadmin) - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
system checkpoint - A restore point is a saved "snapshot" of a computer's data at a specific time.
System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
system monitor - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
system of systems - System of systems (SoS) is a way to view multiple, small independent systems in context as part of a larger, more complex system.
system of systems (SoS) - System of systems (SoS) is a way to view multiple, small independent systems in context as part of a larger, more complex system.
system on a chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system on a chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
system operator - A sysop is the person who runs a computer server.
system operator (sysop) - A sysop is the person who runs a computer server.
System Performance Evaluation Cooperative - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
system software - System software is a type of computer program that is designed to run a computer's hardware and application programs.
system testing - System testing, also referred to as system-level tests or system-integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.
system tray - The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user interface that is used to display the clock and the icons of certain programs so that a user is continually reminded that they are there and can easily click one of them.
System V - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
System V (System 5) - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
system-on-a-chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
system-on-a-chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
Systematized Nomenclature of Medicine -- Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
Systematized Nomenclature of Medicine Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
systemic risk - Systemic risk is a category of risk that describes threats to a system, market or economic segment.
systems administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
Systems Application Architecture - Systems Application Architecture (SAA) was IBM's strategy for enterprise computing in the late 1980s and early 1990s.
systems development life cycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development life cycle (SDLC) - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development life cycle model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems development lifecycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
Systems Management: Glossary - This is a glossary of terms related to systems management.
Systems Network Architecture - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
Systems Network Architecture (SNA) - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
systems of engagement - Systems of engagement are decentralized IT components that incorporate communication technologies such as social media to encourage and enable peer interaction.
systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
Systems, Application and Products in Data Processing - SAP ERP is an enterprise resource planning software developed by the company SAP SE.
SysTrack Desktop Assessment for VMware - SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.