Browse Definitions by Alphabet
- PowerFlex (formerly ScaleIO) - PowerFlex is a software-defined storage product from Dell EMC.
- S-Video (Super-Video, Y/C Video, component video) - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
- SaaS ERP - SaaS ERP is a type of cloud-based enterprise resource planning (ERP) software that runs on the vendor's or cloud provider's servers, is sold through subscription and delivered as a service over the internet.
- SAE International - SAE International is a professional association and standards development organization for the engineering industry, with a special focus on transport sectors such as automotive, aerospace and commercial vehicles.
- SAFe (Scaled Agile Framework) - The Scaled Agile Framework (SAFe) is a framework for scaling Agile across the enterprise.
- sales and operations planning (S&OP) - Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.
- sales development representative (SDR) - A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the sales pipeline and then delivers those leads to individuals who are responsible for closing sales.
- sales force automation (SFA) - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
- sales lead - A sales lead is a potential sales contact, individual or organization that expresses an interest in your goods or services.
- sales-qualified lead (SQL) - A sales-qualified lead (SQL) is a prospective customer that has been researched and vetted -- first by an organization's marketing department and then by its sales team -- and is deemed ready for the next stage in the sales process.
- Salesforce - Salesforce, Inc.
- Salesforce Community Cloud (Community Cloud) - Community Cloud is a social platform from Salesforce.
- Salesforce Customer 360 - Salesforce Customer 360 is a collection of tools that connect Salesforce apps and create a unified customer ID to build a single view of the customer.
- Salesforce Health Cloud - Salesforce Health Cloud is a health IT CRM system that incorporates doctor-patient relationship and record management services.
- Salesforce Trailhead - Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to code for the Salesforce platform.
- SalesforceIQ - SalesforceIQ is customer relationship management (CRM) software from Salesforce.
- SaltStack - SaltStack, often referred to as simply "Salt," is an open source configuration management and orchestration tool for automating repeated system administrative and code deployment tasks.
- Samsung Galaxy - Samsung Galaxy is a product line of Android smartphones, tablets and internet of things devices manufactured by Samsung Electronics.
- SAN switch (storage area network switch) - A SAN switch (storage area network switch) is a device that connects servers and shared pools of storage devices and is dedicated to moving storage traffic.
- sandbox - A sandbox is an isolated testing environment that enables users to run programs or open files without affecting the application, system or platform on which they run.
- SAP Analytics Cloud - SAP Analytics Cloud (or SAP Cloud for Analytics) is a software as a service (SaaS) business intelligence (BI) platform designed by SAP.
- SAP Business One - SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).
- SAP Business Suite - SAP Business Suite is a bundle of end-to-end enterprise software applications that integrate data, processes and functions for important areas such as finance, sales and HR, as well as industry-focused features.
- SAP BusinessObjects BI - SAP BusinessObjects BI (SAP BO) is a centralized suite of reporting and analytics tools for business intelligence (BI) platforms.
- SAP Cloud for Customer (SAP C4C) - SAP Cloud for Customer (SAP C4C) is a software as a service (SaaS) platform for sales and service.
- SAP Cloud Platform - SAP Cloud Platform (SCP) is a platform-as-a-service (PaaS) product that provides a development and runtime environment for cloud applications.
- SAP ERP - SAP ERP is enterprise resource planning software developed by the company SAP SE.
- SAP ERP Central Component (SAP ECC) - SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system.
- SAP FICO (SAP Finance and SAP Controlling) - SAP FICO is an important core functional component in SAP ERP Central Component that allows an organization to manage all of its financial data.
- SAP Fiori - SAP Fiori is a design language and user experience approach developed by SAP for use by SAP, its customers and its partners in business applications.
- SAP Global Trade Services (SAP GTS) - SAP Global Trade Services (GTS) is software that allows companies to support and define import and export trade processes in SAP ERP.
- SAP HEC (HANA Enterprise Cloud) - SAP HEC (HANA Enterprise Cloud) is a managed, private cloud hosting service for SAP HANA and its related applications.
- SAP Integration Server - SAP Integration Server is the central component of SAP XI (Exchange Infrastructure), the company's enterprise application integration (EAI) product.
- SAP MII (SAP Manufacturing Integration and Intelligence) - SAP MII (SAP Manufacturing Integration and Intelligence) is an SAP application for synchronizing manufacturing operations with back-office business processes and standardized data.
- SAP MM (SAP Materials Management) - SAP MM (Materials Management) is a module in SAP ERP Central Component (ECC) that provides companies with materials, inventory and warehouse management capabilities.
- SAP Planned Delivery Time - SAP Planned Delivery Time (PDT) is a tool within the SAP ERP software used to update manufacturing planning data, namely the scheduled delivery of procured goods and materials so that production plans reflect the most current data.
- SAP Predictive Analytics - SAP Predictive Analytics is business intelligence software from SAP that is designed to enable organizations to analyze large data sets and predict future outcomes and behaviors.
- SAP S/4HANA - SAP S/4HANA is an ERP business suite based on the SAP HANA in-memory database that allows companies to perform transactions and analyze business data in real time.
- SAP S/4HANA Cloud - SAP S/4HANA Cloud is a SaaS version of SAP S/4HANA ERP, a suite of integrated business applications.
- SAP S/4HANA Finance - SAP S/4HANA Finance is a financial application in the SAP S/4HANA ERP platform.
- SAP SuccessFactors - SAP SuccessFactors is a leading suite of cloud-based talent management and human capital management (HCM) software.
- Sarbanes-Oxley Act - The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.
- Sarbanes-Oxley Act (SOX) Section 404 - Sarbanes-Oxley Act (SOX) Section 404 mandates that all publicly traded companies must establish internal controls and procedures for financial reporting and must document, test, and maintain those controls and procedures to ensure their effectiveness.
- SAS SSD (Serial-Attached SCSI solid-state drive) - A SAS SSD (Serial-Attached SCSI solid-state drive) is a NAND flash memory-based storage or caching device designed to fit in the same slot as a hard disk drive (HDD) and use the SAS interface to connect to the host computer.
- SATA Express (SATAe) - SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting SATA and PCI Express protocols simultaneously.
- satellite - A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.
- SCADA (supervisory control and data acquisition) - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
- scalability - In information technology, scalability (frequently spelled 'scaleability') has two uses: for a computer application to function with change in size and volume, and to take advantage of a rescale.
- Scalable Processor Architecture (SPARC) - Scalable Processor Architecture (SPARC) is a 32- and 64-bit microprocessor architecture developed by Sun Microsystems in 1987.
- scale-out storage - Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded through the addition of devices in connected arrays with their own resources.
- scanner - A scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display.
- scareware - Scareware is a type of malware tactic used to manipulate victims into downloading or buying potentially malware-infested software.
- schema - In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database, while in artificial intelligence (AI), a schema is a formal expression of an inference rule.
- Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory.
- scientific method - The scientific method is the process of objectively establishing facts through testing and experimentation.
- scope creep - Scope creep in project management is the gradual expansion of functions or adding features, functions or other deliverables beyond a project's original parameters.
- screen door effect - The screen door effect is the occurrence of thin, dark lines or a mesh appearance caused by the gaps between pixels on a screen or projected image.
- screen scraping - Screen scraping is a data collection method used to gather information shown on a display to use for another purpose.
- screened subnet - A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces.
- script - In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).
- script kiddie - Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses.
- scripting language - A scripting language is a type of programming language in which the instructions are interpreted individually at runtime.
- Scrum - Scrum is a framework for project management that emphasizes teamwork, accountability and iterative progress toward a well-defined goal.
- Scrum master - A Scrum master is a facilitator for an Agile development team.
- SCSI (Small Computer System Interface) - SCSI (Small Computer System Interface) is an electronic interface that enables PCs and servers to communicate with peripheral hardware, such as storage devices, printers and scanners, faster and more flexibly than previous parallel data transfer interfaces.
- SD-branch - SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.
- SD-WAN security - SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure.
- SDN controller (software-defined networking controller) - A software-defined networking controller is an application in SDN architecture that manages flow control for improved network management and application performance.
- SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
- search engine - A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria.
- search engine marketing (SEM) - Search engine marketing (SEM) is a method of promotion and advertising to help companies' content rank higher among search engine traffic.
- search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or keyword phrase query.
- search operator - A search operator -- sometimes referred to as a search parameter -- is a character or string of characters used in a search engine query to narrow the focus of the search.
- search string - A search string is the combination of text, numbers and sometimes special characters that a user enters into an application's search form to find specific types of information.
- second (s or sec) - The second (s or sec) is the International System of Units (SI) unit of time measurement.
- second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
- secondary storage - Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary storage or that doesn't have the same performance or availability requirements.
- secure access service edge (SASE) - Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service.
- Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet.
- Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
- Secure Sockets Layer certificate (SSL certificate) - A Secure Sockets Layer certificate (SSL certificate) is a small data file installed on a web server that allows for a secure, encrypted connection between the server and a web browser.
- Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is the U.
- security - Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
- security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
- Security Accounts Manager - The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.
- security analytics - Security analytics is a cybersecurity approach that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
- Security Assertion Markup Language (SAML) - Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
- security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
- security awareness training - Security awareness training is a strategic approach IT and security professionals take to educate employees and stakeholders on the importance of cybersecurity and data privacy.
- security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
- security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
- security identifier (SID) - In the context of Windows computing and Microsoft Active Directory (AD), a security identifier (SID) is a unique value that is used to identify any security entity that the operating system (OS) can authenticate.
- security incident - A security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed.
- security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources.
- security operations center (SOC) - A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.
- security policy - A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets.
- security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
- security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
- security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
- security token - A security token is a physical or wireless device that provides two-factor authentication (2FA) for users to prove their identity in a login process.