Browse Definitions :

Browse Definitions by Alphabet

SER - SMA

  • service supply chain - The service supply chain is the part of the supply chain dedicated to providing service on products.
  • service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
  • service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
  • service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • ServiceNow - ServiceNow is a software company that provides a cloud-based platform for automating IT management workflows.
  • servo (servomechanism) - A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • session control protocol (SCP) - Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection.
  • session ID - A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session).
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • session key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • shadow IT - Shadow IT is hardware or software within an enterprise that is not supported by the organization's central IT department.
  • shadow password file - A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.
  • sharding - Sharding is a type of database partitioning that separates large databases into smaller, faster, more easily managed parts.
  • share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • shared secret - A shared secret is data known to only the two entities involved in a communication so that either party's possession of that data can be provided as proof of identity for authentication.
  • shared services - Shared services is the consolidation of business operations that are used by multiple parts of the same organization.
  • shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
  • SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint Online - Microsoft SharePoint Online is a collection of cloud- and web-based technologies that make it easy for organizations to store, share and manage digital information.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shell - Shell is a UNIX term for the interactive user interface with an operating system.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • shielded twisted pair (STP) - Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a way for consumers to discover products and make a purchase through links within the video.
  • Short Message Service (SMS) - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • should-cost analysis (should-cost review) - A should-cost analysis, also called a should-cost review, is a procurement strategy for cost optimization in which the customer reverse engineers the cost of producing a finished product or service and uses that information to negotiate a contract.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of an application.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • Silicon Valley - Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
  • SimpliVity - SimpliVity Corp.
  • simulator sickness - Simulator sickness is a form of motion sickness related to interacting with a simulated environment.
  • Single namespace - A single namespace is one presentation of file system data.
  • single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
  • single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.
  • Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
  • single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
  • single source of truth (SSOT) - Single source of truth (SSOT) is a concept that an organization can apply as part of its information architecture to ensure that everyone in the organization uses the same data when making business decisions.
  • single-factor authentication (SFA) - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • single-level cell (SLC) flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
  • single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
  • single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
  • single-user MIMO - Single-user MIMO (SU-MIMO) is a multi-transmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.
  • Singularity (the) - In technology, the singularity describes a hypothetical future where technology growth is out of control and irreversible.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP connectivity between an on-premises phone system and the public switched telephone network.
  • SIPOC diagram (suppliers, inputs, process, outputs, customers) - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
  • Siri - Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
  • six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
  • Six Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • skeuomorphism - Skeuomorphism is the design concept of making items represented resemble their real-world counterparts.
  • skin effect - Skin effect is a tendency for alternating current (AC) to flow mostly near the outer surface of an electrical conductor, such as metal wire.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • SkunkWorks project (Skunk Works) - A skunk works is a small group of people who work on a project that needs to be completed quickly.
  • Slack software - Slack software is a cloud-based collaboration software suite.
  • slack space (file slack space) - Slack space is the difference between its logical and physical size.
  • slacktivism - Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.
  • sleep mode - Sleep mode, sometimes called standby or suspend mode, is a power-sparing state that a computer can enter when not in use.
  • slice and dice - To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.
  • sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
  • slot (or expansion slot) - In computers, a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinholes (typically, in the range of 16 to 64 closely-spaced holes) and a place to fit an expansion card containing the circuitry that provides some specialized capability, such as video acceleration, sound, or disk drive control.
  • slowness movement - The slowness movement is a grassroots reaction to the hectic pace, overwork, and lack of leisure typical of modern life.
  • SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
  • small cell - A small cell is an umbrella term used to describe a miniature radio access point or wireless network base station with a low radio frequency power output, footprint and range.
  • Small Disadvantaged Business (SDB) - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
  • small to medium enterprise (SME) - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
  • SMART (SMART goals) - SMART is a best practice framework for setting goals.
  • smart bulb (smart light bulb) - A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart city - A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
  • smart contract - A smart contract is a decentralized application that executes business logic in response to events.
  • smart data - Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics.
Networking
  • telematics

    Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to ...

  • packet filtering

    Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and ...

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local ...

Security
  • FIDO (Fast Identity Online)

    FIDO (Fast Identity Online) is a set of technology-agnostic security specifications for strong authentication.

  • Cloud Security Alliance (CSA)

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by ...

CIO
  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

  • lean management

    Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term ...

  • device ID (device identification)

    A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such ...

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • product-qualified lead (PQL)

    A product-qualified lead (PQL) is an individual or business that experienced value from using a product as a result of a free ...

  • marketing-qualified lead (MQL)

    A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate they are likely to become a customer.

  • customer success

    Customer success is a strategy to ensure a company's products are meeting the needs of the customer.

Close