Browse Definitions by Alphabet

  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to a hard disk drive (HDD) whereby the data tracks partially overlap to increase the areal density and overall storage capacity per disk.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a way for consumers to discover products and make a purchase through links within the video.
  • Short Message Service (SMS) - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of an application.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device's official application distribution method.
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
  • single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
  • single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.
  • Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
  • single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications.
  • single-factor authentication (SFA) - Single-factor authentication (SFA) is a process for securing access to a given system, such as a network or website, that identifies the party requesting access through only one category of credentials.
  • single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
  • single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
  • single-user multiple input, multiple output (SU-MIMO) - Single-user multiple input, multiple output (SU-MIMO) is a multitransmitter and receiver technology that lets a wireless access point send multiple, simultaneous data streams to one compatible endpoint at a time.
  • SIPOC (suppliers, inputs, process, outputs, customers) diagram - A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.
  • Siri - Siri is Apple's virtual assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
  • six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
  • Six Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • skeuomorphism - Skeuomorphism is when something is designed with extra ornamentation to make it resemble another object so it is more familiar.
  • skill-based learning - Skill-based learning develops students through hands-on practice and real-world application.
  • skills taxonomy - A skills taxonomy is a classification system for all the skills an employee at a business may have.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • skunkworks project (Skunk Works) - A skunkworks project, also known as Skunk Works, is an innovative undertaking, involving a small group of people, that is outside the normal research and development (R&D) channels within an organization.
  • Slack software - Slack software is a cloud-based messaging application that enables the personnel in an organization to connect and collaborate.
  • slack space (file slack space) - Slack space, or file slack space, is the leftover storage space on a computer's hard disk drive when a file does not need all the space it has been allocated by the operating system.
  • slice and dice - To slice and dice is to break a body of information down into smaller parts or to examine it from different viewpoints so that you can understand it better.
  • sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
  • slowness movement - The slowness movement is a grassroots reaction to the hectic pace, overwork, and lack of leisure typical of modern life.
  • SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
  • small cell - A small cell is an umbrella term used to describe a miniature radio access point or wireless network base station with a low radio frequency power output, footprint and range.
  • Small Disadvantaged Business (SDB) - A Small Disadvantaged Business (SDB) is a small business that is at least 51% owned and controlled by one or more socially and economically disadvantaged individuals.
  • SMART (SMART goals) - SMART is a best practice framework for setting goals.
  • smart bulb (smart light bulb) - A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart city - A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
  • smart farming - Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
  • smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
  • smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
  • smart machines - A smart machine is a device embedded with machine-to-machine and/or cognitive computing technologies such as artificial intelligence (AI), machine learning (ML) or deep learning, all of which it uses to reason, solve problems, make decisions and even take action.
  • smart manufacturing (SM) - Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process.
  • smart sensor - A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.
  • smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
  • smart TV - A smart TV is a television that includes an internal processor and onboard storage and enables internet connectivity, similar to a smartphone or personal computer.
  • smart warehouse - A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
  • smartphone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system (OS), web browsing and the ability to run software applications.
  • smartphone addiction (cellphone addiction) - Smartphone addiction (cellphone addiction) is a disorder involving compulsive overuse of mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.
  • smartwatch - A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
  • SMB (small and medium-sized business or small and midsize business) - SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business.
  • SMB 3.0 (Server Message Block 3.0) - SMB 3 (Server Message Block 3.
  • smishing (SMS phishing) - Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages.
  • smoke testing - Smoke testing, also called build verification testing or confidence testing, is a software testing method that is used to determine if a new software build is ready for the next testing phase.
  • SMP (symmetric multiprocessing) - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email.
  • snake case - Snake case is a naming convention where a developer replaces spaces between words with an underscore.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive "self-destructing" photos and videos.
  • Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of health information.
  • snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
  • Snort - Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch.
  • snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling in which dimensions are stored in multiple related dimension tables.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • soak testing - Soak testing is a type of performance testing that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • SOAP fault - A SOAP fault is an error in a Simple Object Access Protocol communication resulting from an incorrect message format, header-processing problems, incompatibility between applications or other issues.
  • soap opera effect (motion interpolation) - The soap opera effect is the colloquial name for a visual effect caused by motion interpolation on television sets that some people find undesirable.
  • SOAR (security orchestration, automation and response) - SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events with little or no human assistance.
  • SOC 1 (System and Organization Controls 1) - System and Organization Controls 1, or SOC 1 (pronounced "sock one"), aims to control objectives within a SOC 1 process area and documents internal controls relevant to an audit of a user entity's financial statements.
  • SOC 2 (System and Organization Controls 2) - SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in their care.
  • SOC 3 (System and Organization Controls 3) - A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls for security, availability, processing integrity, confidentiality and privacy.
  • social analysis - Social analysis is the practice of systematically examining a social problem, issue or trend, often with the aim of prompting changes in the situation being analyzed.
  • social commerce - Social commerce is a rapidly growing branch of e-commerce that uses social networks and digital media to facilitate transactions between businesses and customers.
  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social customer relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites such as Twitter and Facebook.
  • social currency - Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.
  • social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
  • social engineering penetration testing - Social engineering penetration testing is the practice of deliberately conducting typical social engineering scams on employees to ascertain the organization's level of vulnerability to this type of exploit.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social listening (social media listening) - Social listening, also referred to as social media listening, is the process of identifying and assessing what is being said about a company, individual, product or brand on the internet.
  • social media - Social media is a collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
  • social media analytics - Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization's strategic business decisions.
  • social media influence - Social media influence is a marketing term that describes an individual's ability to affect other people's thinking in a social online community.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
Networking
Security
CIO
HRSoftware
Customer Experience
Close