Browse Definitions :

Browse Definitions by Alphabet

SER - SIM

  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service-level management - Service-level management is the monitoring and management of the quality of service(QoS) of an entity's key performance indicators(KPIs).
  • service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
  • service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • service-oriented integration (SOI) - SOI is also an abbreviation for Silicon-On-Insulator.
  • service-oriented management (SOM) - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
  • ServiceNow - ServiceNow is a cloud-based company that provides software as a service (SaaS) for technical management support.
  • servlet - A servlet is a small program that runs on a server.
  • servo (servomechanism) - A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.
  • Session Announcement Protocol (SAP) - Session Announcement Protocol (SAP) is a protocol used to define the format and describe the information that will be exchanged during a multicast conferencing session.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • session control protocol (SCP) - Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection.
  • session hijacking (TCP session hijacking) - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • session ID - A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session).
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • session key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • session prediction (credential/session prediction) - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • session-based routing - Session-based routing is a type of routing architecture that is application-centric and designed to route entire sessions instead of individual packets.
  • set - A set is a group or collection of objects or numbers, considered as an entity unto itself.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • seven-segment display - A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.
  • severance agreement - A severance agreement is a contract between an employer and employee documenting the rights and responsibilities of both parties in the event of job termination.
  • SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SGI (Silicon Graphics) - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • shadow app - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • shadow password file - A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.
  • shadow RAM - Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a special area of random access memory (RAM) so that they can be accessed more quickly.
  • Shannon's Law - Shannon's Law, formulated by Claude Shannon, a mathematician who helped build the foundations for the modern computer, is a statement in information theory that expresses the maximum possible data speed that can be obtained in a data channel.
  • sharding - Sharding is a type of database partitioning that separates large databases into smaller, faster, more easily managed parts.
  • share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
  • Shared Assessments Program - Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.
  • Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared memory - In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.
  • shared nothing live migration - Shared nothing live migration is a term used to describe the process of moving a virtual machine (VM) from one physical host to another, without the need for clustering or a common shared storage location.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • shared secret - A shared secret is data known to only the two entities involved in a communication so that either party's possession of that data can be provided as proof of identity for authentication.
  • shared services - Shared services is the consolidation of business operations that are used by multiple parts of the same organization.
  • shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
  • SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint Online - Microsoft SharePoint Online is a collection of cloud- and web-based technologies that make it easy for organizations to store, share and manage digital information.
  • SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
  • shelfware - Shelfware is IT slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.
  • shell - Shell is a UNIX term for the interactive user interface with an operating system.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • Shellshock - Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including Linux and Mac OS X, and allows attackers to remotely gain complete control of a system.
  • shielded twisted pair (STP) - Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • Short Message Service (SMS) - SMS (Short Message Service), commonly referred to as 'text messaging,' is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones, smartphones and tablets.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
  • shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
  • should-cost analysis (should-cost review) - A should-cost analysis, also called a should-cost review, is a procurement strategy for cost optimization in which the customer reverse engineers the cost of producing a finished product or service and uses that information to negotiate a contract.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Siebel - Siebel Systems is a prominent vendor of interoperable e-business software.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal - In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • signaling - In telephony, signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • signature analysis - Signature analysis has two meanings.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • significant figures - The term significant figures refers to the number of important single digits (0 through 9 inclusive) in the coefficient of an expression in scientific notation.
  • silent monitoring - Silent monitoring refers to the practice of call center managers or senior agents listening to the interaction between an incoming caller and an agent.
  • silicon (Si) - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • Silicon Alley - Silicon Alley is the growing community of Internet and computer-oriented businesses, mainly startup companies, in the New York metropolitan area, particularly Manhattan's downtown.
  • silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
  • Silicon Valley - Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.
  • Silverlight - Silverlight is: (1) A programming model for developing and distributing rich Internet applications (RIA) that use graphics, animations or video within the .
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • SIMM (single in-line memory module) - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • SIMO (single input, multiple output) - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
  • SimpliVity - SimpliVity Corp.
  • Simula (simulation language) - Simula, short for "simulation language," was the first object-oriented programming language.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close