Browse Definitions :

Browse Definitions by Alphabet

SCR - SER

  • scripting language - A scripting language is a form of programming language that is usually interpreted rather than compiled.
  • Scrum - Scrum is a framework for project management that emphasizes teamwork, accountability and iterative progress toward a well-defined goal.
  • Scrum Master - A Scrum Master is a facilitator for an Agile development team.
  • SCSI (Small Computer System Interface) - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
  • SCSI controller (Small Computer System Interface controller) - A SCSI controller, also called a host bus adapter (HBA), is a card or chip that allows a SCSI storage device to communicate with the operating system across a SCSI bus.
  • SD-branch - SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.
  • SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is technology that uses software-defined networking (SDN) concepts to distribute network traffic across a wide area network (WAN).
  • SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
  • SDL (Specification and Description Language) - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • search engine - A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria.
  • search engine marketing (SEM) - Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.
  • search engine optimization (SEO) - Search engine optimization is the science of improving a website to increase its visibility when people search for products or services.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - A search string is the combination of text, numbers and sometimes special characters that a user enters into an application's search form to find specific types of information.
  • second (s or sec) - The second (s or sec) is the International System of Units (SI) unit of time measurement.
  • Second Level Address Translation (SLAT) - Second Level Address Translation (SLAT) is a technology designed to reduce the overhead in a hypervisor CPU while easing the management of a hypervisor's memory and is often found with Hyper-V.
  • second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
  • secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
  • secondary storage - Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary storage or that doesn't have the same performance or availability requirements.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
  • Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet.
  • Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is the U.
  • security - Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
  • security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
  • Security Accounts Manager - The Security Accounts Manager (SAM) is a database file in the Microsoft Windows operating system that contains usernames and passwords.
  • security analytics - Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
  • Security Assertion Markup Language (SAML) - Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
  • security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
  • security awareness training - Security awareness training is a formal process for educating employees and third-party stakeholders, like contractors and business partners, how to protect an organization's computer systems, along with its data, people and other assets, from internet-based threats or criminals.
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
  • security identifier (SID) - In the context of Windows computing and Microsoft Active Directory (AD), a security identifier (SID) is a unique value that is used to identify any security entity that the operating system (OS) can authenticate.
  • security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed.
  • security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security who monitors, analyzes and protects an organization from cyber attacks.
  • security policy - A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets.
  • security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyber threats.
  • security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
  • security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
  • security token - A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login process.
  • Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • Seebeck effect - The Seebeck effect is a phenomenon in which a temperature difference between two dissimilar electrical conductors or semiconductors produces a voltage difference between the two substances.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
  • self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
  • self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
  • SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
  • semantic network (knowledge graph) - A semantic network is a knowledge structure that illustrates how concepts are related to one another and how they interconnect.
  • semantic technology - Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.
  • semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • semiconductor - A semiconductor is a substance that has specific electrical properties that enable it to serve as a foundation for computers and other electronic devices.
  • semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
  • semiotics - Semiotics is the study of the use of symbolic communication.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message.
  • sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
  • Serial ATA (Serial Advanced Technology Attachment or SATA) - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • serial digital interface (SDI) - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • serial peripheral interface (SPI) - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
  • serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • Serial-Attached SCSI (SAS) - Serial-Attached SCSI (SAS) is a method used to access computer peripheral devices that employs a serial -- one bit at a time -- means of digital data transfer over thin cables.
  • serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
  • server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
  • Server Message Block protocol (SMB protocol) - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • server refresh cycle - The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center.
  • server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.
  • server-based storage - Server-based storage is a re-emerging class of data storage that removes cost and complexity by housing storage media inside servers rather than in dedicated and custom-engineered storage arrays.
  • serverless computing - Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure.
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management guidance in communications networks, media services and end-user applications.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service desk - An IT service desk is a communications center that provides a single point of contact (SPOC) between a company, its customers, employees and business partners.
  • service discovery - Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.
  • Service Integration Maturity Model (SIMM) - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close