Browse Definitions :

Browse Definitions by Alphabet

  • shadow IT - Shadow IT is hardware or software within an enterprise that is not supported by the organization's central IT department.
  • shadow password file - A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.
  • sharding - Sharding is a type of database partitioning that separates large databases into smaller, faster, more easily managed parts.
  • share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • shared services - Shared services is a delivery model organizations use to consolidate similar business functions into a single unit that supports the entire organization.
  • SharePoint administrator - A SharePoint administrator is the person who oversees an organization's installation and operation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint Online - Microsoft SharePoint Online is a collection of cloud- and web-based technologies that make it easy for organizations to store, share and manage digital information.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shell program - A shell program is software that provides users with an interface for accessing services in the kernel.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • shielded twisted pair (STP) - Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-left testing - Shift-left testing is a software testing approach in which the code is tested in the earlier stages of the software development lifecycle (SDLC).
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to a hard disk drive (HDD) whereby the data tracks partially overlap to increase the areal density and overall storage capacity per disk.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a way for consumers to discover products and make a purchase through links within the video.
  • Short Message Service (SMS) - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of an application.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device's official application distribution method.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
  • single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
  • single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.
  • Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
  • single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
  • single-factor authentication (SFA) - Single-factor authentication (SFA) is a process for securing access to a given system, such as a network or website, that identifies the party requesting access through only one category of credentials.
  • single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
  • single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
  • single-user multiple input, multiple output (SU-MIMO) - Single-user multiple input, multiple output (SU-MIMO) is a multitransmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.
  • singularity - In technology, the singularity describes a hypothetical future where technology growth is out of control and irreversible.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP connectivity between an on-premises phone system and the public switched telephone network.
  • SIPOC (suppliers, inputs, process, outputs, customers) diagram - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
  • Siri - Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
  • six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
  • Six Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • skeuomorphism - Skeuomorphism is when something is designed with extra ornamentation to make it resemble another object so it is more familiar.
  • skill-based learning - Skill-based learning develops students through hands-on practice and real-world application.
  • skills taxonomy - A skills taxonomy is a classification system for all the skills an employee at a business may have.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • skunkworks project (Skunk Works) - A skunkworks project, also known as Skunk Works, is an innovative undertaking, involving a small group of people, that is outside the normal research and development (R&D) channels within an organization.
  • Slack software - Slack software is a cloud-based collaboration software suite.
  • slack space (file slack space) - Slack space, or file slack space, is the leftover storage space on a computer's hard disk drive when a file does not need all the space it has been allocated by the operating system.
  • slice and dice - To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.
  • sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
  • slot (or expansion slot) - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • slowness movement - The slowness movement is a grassroots reaction to the hectic pace, overwork, and lack of leisure typical of modern life.
  • SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
  • small cell - A small cell is an umbrella term used to describe a miniature radio access point or wireless network base station with a low radio frequency power output, footprint and range.
  • Small Disadvantaged Business (SDB) - A Small Disadvantaged Business (SDB) is a small business that is at least 51% owned and controlled by one or more socially and economically disadvantaged individuals.
  • small to medium enterprise (SME) - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
  • SMART (SMART goals) - SMART is a best practice framework for setting goals.
  • smart bulb (smart light bulb) - A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart city - A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
  • smart contract - A smart contract is a self-executing computer program that automatically executes the terms of a contract without the involvement of third parties.
  • smart factory - A smart factory is a highly digitized and connected production facility that relies on smart manufacturing.
  • smart farming - Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
  • smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
  • smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
  • smart machines - A smart machine is a device embedded with machine-to-machine and/or cognitive computing technologies such as artificial intelligence (AI), machine learning (ML) or deep learning, all of which it uses to reason, solve problems, make decisions and even take action.
  • smart manufacturing (SM) - Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process.
  • smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.
  • smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
  • smart TV - A smart TV is a television that includes an internal processor and onboard storage and enables internet connectivity, similar to a smartphone or personal computer.
  • smart warehouse - A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
  • smartphone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system (OS), web browsing and the ability to run software applications.
  • smartphone addiction (cell phone addiction) - Smartphone addiction is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.
  • smartwatch - A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
  • SMB (small and medium-sized business or small and midsize business) - SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business.
  • SMB 3.0 (Server Message Block 3.0) - SMB 3 (Server Message Block 3.
  • smishing (SMS phishing) - Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages.
  • smoke testing - Smoke testing, also called build verification testing or confidence testing, is a software testing method that is used to determine if a new software build is ready for the next testing phase.
  • SMP (symmetric multiprocessing) - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email.
  • snake case - Snake case is a naming convention where a developer replaces spaces between words with an underscore.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive "self-destructing" photos and videos.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of health information.
  • snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
  • Snort - Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

CIO
  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close