Browse Definitions by Alphabet
- SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
- Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
- Serial ATA (Serial Advanced Technology Attachment or SATA) - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
- serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial exchange of data -- that is, one bit at a time -- between a microprocessor and peripherals, such as printers, external drives, scanners and mice.
- serial digital interface (SDI) - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
- serial peripheral interface (SPI) - A serial peripheral interface (SPI) is an interface commonly used in computers and embedded systems to facilitate short-distance communication between a microcontroller and one or more peripheral integrated circuits (ICs).
- serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
- Serial-Attached SCSI (SAS) - Serial-Attached SCSI (SAS) is a method used to access computer peripheral devices that employs a serial -- one bit at a time -- means of digital data transfer over thin cables.
- servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
- server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
- serverless database - A serverless database is a type of cloud database that is fully managed for an organization by a cloud service provider and runs on demand as needed to support applications.
- service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management guidance in communications networks, media services and end-user applications.
- service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
- service desk - An IT service desk is a communications center that provides a single point of contact (SPOC) between a company, its customers, employees and business partners.
- service discovery - Service discovery is the automatic detection of devices and offered services over a network.
- service level indicator - A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.
- service lifecycle management (SLM) - Service lifecycle management (SLM) describes the strategy and software for managing the maintenance and repair of products and maximizing the profit opportunities from these activities.
- Service Profile Identifier (SPID) - In telecommunications, a Service Profile Identifier (SPID) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network (ISDN) B-channel.
- service supply chain - The service supply chain is the part of the supply chain dedicated to providing service on products.
- service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
- service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
- service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
- service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that makes services reusable and lets them communicate across different platforms and languages to form new applications.
- ServiceNow - ServiceNow is a software company that provides a cloud-based, AI-driven platform for automating multiple management workflows in enterprises.
- session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
- session ID - A session ID, also called a session token, is a unique identifier that a web server assigns to a user for the duration of the current session.
- Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
- session layer - The session layer is Layer 5 of the OSI communications model.
- seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
- shadow IT - Shadow IT is hardware or software within an enterprise that is not supported by the organization's central IT department.
- shadow password file - A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.
- sharding - Sharding is a type of database partitioning that separates large databases into smaller, faster, more easily managed parts.
- share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
- Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
- shared services - Shared services is a delivery model organizations use to consolidate similar business functions into a single unit that supports the entire organization.
- SharePoint administrator - A SharePoint administrator is the person who oversees an organization's installation and operation of the Microsoft SharePoint collaboration and content management platform.
- SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
- SharePoint Online - Microsoft SharePoint Online is a collection of cloud- and web-based technologies that make it easy for organizations to store, share and manage digital information.
- shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
- sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
- shell program - A shell program is software that provides users with an interface for accessing services in the kernel.
- shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
- shift-left testing - Shift-left testing is a software testing approach in which the code is tested in the earlier stages of the software development lifecycle (SDLC).
- shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to a hard disk drive (HDD) whereby the data tracks partially overlap to increase the areal density and overall storage capacity per disk.
- Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
- shoppable video - A shoppable video is a way for consumers to discover products and make a purchase through links within the video.
- short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
- shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
- sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of an application.
- sideloading - Sideloading is the installation of an application on a mobile device without using the device's official application distribution method.
- SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
- signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
- Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
- SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
- SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
- simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
- single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
- single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.
- Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
- single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications.
- single-factor authentication (SFA) - Single-factor authentication (SFA) is a process for securing access to a given system, such as a network or website, that identifies the party requesting access through only one category of credentials.
- single-user multiple input, multiple output (SU-MIMO) - Single-user multiple input, multiple output (SU-MIMO) is a multitransmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.
- SIPOC (suppliers, inputs, process, outputs, customers) diagram - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
- Siri - Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
- site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
- site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
- six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
- skeuomorphism - Skeuomorphism is when something is designed with extra ornamentation to make it resemble another object so it is more familiar.
- skill-based learning - Skill-based learning develops students through hands-on practice and real-world application.
- skills taxonomy - A skills taxonomy is a classification system for all the skills an employee at a business may have.
- skunkworks project (Skunk Works) - A skunkworks project, also known as Skunk Works, is an innovative undertaking, involving a small group of people, that is outside the normal research and development (R&D) channels within an organization.
- Slack software - Slack software is a cloud-based messaging application that enables the personnel in an organization to connect and collaborate.
- slack space (file slack space) - Slack space, or file slack space, is the leftover storage space on a computer's hard disk drive when a file does not need all the space it has been allocated by the operating system.
- sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
- SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
- small cell - A small cell is an umbrella term used to describe a miniature radio access point or wireless network base station with a low radio frequency power output, footprint and range.
- Small Disadvantaged Business (SDB) - A Small Disadvantaged Business (SDB) is a small business that is at least 51% owned and controlled by one or more socially and economically disadvantaged individuals.
- smart bulb (smart light bulb) - A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
- smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
- smart farming - Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
- smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
- smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
- smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
- smart machines - A smart machine is a device embedded with machine-to-machine and/or cognitive computing technologies such as artificial intelligence (AI), machine learning (ML) or deep learning, all of which it uses to reason, solve problems, make decisions and even take action.
- smart manufacturing (SM) - Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process.
- smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.
- smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
- smart TV - A smart TV is a television that includes an internal processor and onboard storage and enables internet connectivity, similar to a smartphone or personal computer.
- smart warehouse - A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
- smartphone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system (OS), web browsing and the ability to run software applications.
- smartphone addiction (cellphone addiction) - Smartphone addiction (cellphone addiction) is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.
- smartwatch - A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
- SMB (small and medium-sized business or small and midsize business) - SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business.
- SMB 3.0 (Server Message Block 3.0) - SMB 3 (Server Message Block 3.
- smishing (SMS phishing) - Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages.
- smoke testing - Smoke testing, also called build verification testing or confidence testing, is a software testing method that is used to determine if a new software build is ready for the next testing phase.
- SMP (symmetric multiprocessing) - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
- snake case - Snake case is a naming convention where a developer replaces spaces between words with an underscore.
- Snapchat - Snapchat is a mobile app that allows users to send and receive "self-destructing" photos and videos.
- SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of health information.