Browse Definitions :

Browse Definitions by Alphabet

SUP - WHA

  • support vector machine (SVM) - A support vector machine (SVM) is a type of deep learning algorithm that performs supervised learning for classification or regression of data groups.
  • support-driven development - Support-driven development is a strategy used by developers to create products that fit the needs of customers by designing them based on direct customer feedback.
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • surge suppressor (surge protector) - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • surprise and delight - Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.
  • surveillance capitalism - Surveillance capitalism is the monetization of data captured through monitoring people's movements and behaviors online and in the physical world.
  • surveillance metadata - Surveillance metadata is details about data pertaining to the actions of an observed party.
  • survey research - Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online.
  • susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • SUSE - SUSE (pronounced soo-sah) is a multinational company that offers enterprise-grade open source products based on Linux technologies.
  • SUSE Linux Enterprise Server (SLES) - SUSE Linux Enterprise Server (SLES) is a Linux-based server operating system created and maintained by the German-based organization, SUSE.
  • SUSE Manager - SUSE Manager is an open source infrastructure management tool for Linux systems.
  • Suspicious Activity Report (SAR) - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • sustainable procurement - Sustainable procurement is the meeting of business needs for materials, goods, utilities and services in an environmentally-friendly, responsible and ethical way.
  • Swagger - Swagger is an open source set of rules, specifications and tools for developing and describing RESTful APIs.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • swap file (swap space or page file) - A swap file is a system file that creates temporary storage space on a solid-state drive or hard disk when the system runs low on memory.
  • swarm intelligence - Swarm intelligence is the study of decentralized, self-organized systems that move quickly in a coordinated manner.
  • swarm robotics - Swarm robotics is the use of numerous, autonomous robotics to accomplish a task.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • Swing - Swing is a set of program components for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars, that are independent of the windowing system for specific operating system.
  • swirl - .
  • switch-on-a-chip (SOC) - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • Switched Multimegabit Data Service (SMDS) - Switched Multimegabit Data Service (SMDS) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide area network on a nonconstant or bursty basis.
  • switching fabric - Switching fabric is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
  • swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats.
  • Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
  • Symantec PartnerNet - Symantec PartnerNet is web-based portal that was developed by security vendor Symantec to provide information, tools and benefits to its channel partner community.
  • symmetric communications - Compare asymmetric communications.
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • SYN scanning - SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection.
  • synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to describe a perceived meaningful coincidence.
  • synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from Greek syn-, meaning "with," and chronos, meaning "time") is an adjective describing objects or events that are coordinated in time.
  • Synchronous Data Link Control (SDLC) - Synchronous Data Link Control (SDLC) is a transmission protocol used to synchronously transfer code-transparent, serial-by-bit data over a communications channel.
  • Synchronous Digital Hierarchy (SDH) - Synchronous Digital Hierarchy (SDH) is a group of fiber optic transmission rates that transport digital signals with different capacities.
  • Synchronous Graphics RAM (SGRAM) - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
  • synchronous mirroring - Synchronous mirroring is a type of data protection in which data is written to both a remote and local disk simultaneously.
  • Synchronous Optical Network (SONET) - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
  • synchronous replication - Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so there are multiple, current copies of the data.
  • synchronous/asynchronous API - Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.
  • synectics - Synectics is a method of problem-solving that focuses on cultivating creative thinking, often among small groups of individuals with diverse experience and skills.
  • syntax - Syntax is the grammar, structure, or order of the elements in a language statement.
  • synthetic backup - Synthetic backup is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
  • synthetic data - Synthetic data is information that's artificially manufactured rather than generated by real-world events.
  • synthetic intelligence (SI) - Synthetic intelligence (SI) recognizes that although the capacity for software to reason may be manufactured, it is nonetheless real intelligence and not just an imitation of how human beings acquire and apply knowledge and skill.
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interactions with a system.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • sysplex and Parallel Sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • SYSPRO - SYSPRO is a vendor that specializes in providing ERP and other integrated business software to midsize manufacturers and distributors.
  • system - A system is a collection of elements or components that are organized for a common purpose.
  • system administrator (sysadmin) - A system administrator (sysadmin) is an information technolog professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.
  • System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
  • system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
  • system of systems (SoS) - A system of systems (SoS) is the collection of multiple, independent systems in context as part of a larger, more complex system.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
  • system software - System software is a type of computer program that is designed to run a computer's hardware and application programs.
  • system testing - System testing, also referred to as system-level tests or system-integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.
  • system tray - The system tray (or "systray") is a section of the taskbars in the Microsoft Windows operating system user interface that provides easy access icons to the user's most commonly used apps and displays the clock.
  • system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • systemic risk - Systemic risk is a category of risk that describes threats to a system, market or economic segment.
  • systems development life cycle (SDLC) - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • systems of engagement - Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • SysTrack Desktop Assessment for VMware - SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is a Server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is SecOps? Everything you need to know - SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and assessing risk and protecting corporate assets, often operating from a security operations center, or SOC.
  • What is server sprawl and how to prevent it? - Server sprawl is when multiple underutilized servers take up more space and consume more resources than can be justified by their workload.
  • What is server virtualization? The ultimate guide - Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.
  • What is steganography? - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close