Browse Definitions :

Browse Definitions by Alphabet

  • snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling in which dimensions are stored in multiple related dimension tables.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • soak testing - Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • SOAP fault - A SOAP fault is an error in a Simple Object Access Protocol communication resulting from an incorrect message format, header-processing problems, incompatibility between applications or other issues.
  • soap opera effect (motion interpolation) - The soap opera effect is the colloquial name for a visual effect caused by motion interpolation on television sets that some people find undesirable.
  • SOAR (security orchestration, automation and response) - SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events with little or no human assistance.
  • SOC 1 (System and Organization Controls 1) - System and Organization Controls 1, or SOC 1 (pronounced "sock one"), aims to control objectives within a SOC 1 process area and documents internal controls relevant to an audit of a user entity's financial statements.
  • SOC 2 (System and Organization Controls 2) - SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in their care.
  • SOC 3 (System and Organization Controls 3) - A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls for security, availability, processing integrity, confidentiality and privacy.
  • social analysis - Social analysis is the practice of systematically examining a social problem, issue or trend, often with the aim of prompting changes in the situation being analyzed.
  • social commerce - Social commerce is a rapidly growing branch of e-commerce that uses social networks and digital media to facilitate transactions between businesses and customers.
  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social customer relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites such as Twitter and Facebook.
  • social currency - Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.
  • social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
  • social engineering penetration testing - Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social learning theory - The social learning theory is the philosophy that people can learn from each other through observation, imitation and modeling.
  • social listening (social media listening) - Social listening, also referred to as social media listening, is the process of identifying and assessing what is being said about a company, individual, product or brand on the internet.
  • social media - Social media is a collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
  • social media addiction - Social media addiction is an unhealthy dependence on interactive platforms such as Facebook, Twitter and Instagram.
  • social media analytics - Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization's strategic business decisions.
  • social media influence - Social media influence is a marketing term that describes an individual's ability to affect other people's thinking in a social online community.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • social media metrics - Social media metrics are the various data points that enable a company to gauge the impact of social media activity on its revenues.
  • social media policy - A social media policy is a corporate code of conduct that provides guidelines for employees who post content on the internet either as part of their job or as a private person.
  • social media recruitment (social media recruiting) - Social media recruitment (social media recruiting) is the use of social media platforms to identify, engage and vet people the organization may want to hire.
  • social media ROI - Social media ROI refers to the return on investment a company can expect to make from its investment in social media technologies.
  • social network - A social network is a website or app that lets people connect with each other on a common platform.
  • social networking - Social networks are websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
  • social robot - A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots.
  • sociogram - A sociogram is a tool for charting the relationships in a group by providing a visual representation of the social connections and preferences of each individual.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft computing - Soft computing is the use of approximate calculations to provide approximate solutions to complex computational problems.
  • soft copy - A soft copy (sometimes spelled 'softcopy') is an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer's display or transmitted as an email attachment.
  • soft keyboard (onscreen keyboard or software keyboard) - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • soft skills - A soft skill is a personal attribute that supports situational awareness and enhances an individual's ability to get a job done.
  • soft token - A soft token is a software-based security token that generates a single-use login personal identification number (PIN).
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • software - Software is a set of instructions, data or programs used to operate computers and execute specific tasks.
  • software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
  • Software as a Medical Device (SaMD) - Software as a Medical Device (SaMD) is software that performs a medical task without being part of a hardware device.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software asset management (SAM) - Software asset management (SAM) is the administration of processes, policies and procedures that support the procurement, deployment, use, maintenance and disposal of software applications within an organization.
  • software audit - A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.
  • software bill of materials (SBOM) - A software bill of materials (SBOM) is an inventory of all constituent components and software dependencies involved in the development and delivery of an application.
  • software development kit (SDK) - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
  • software development life cycle (SDLC) - The software development life cycle (SDLC) is a framework used in project management to describe the stages and tasks involved in each step of writing and deploying the instructions and data computers use to execute specific tasks.
  • software engineering - Software engineering is the process of developing, testing and deploying computer applications to solve real-world problems by adhering to a set of engineering principles and best practices.
  • software license - A software license is a document that provides legally binding guidelines for the use and distribution of software.
  • software package - A software package is a group of programs bundled together into a product suite.
  • Software Process Improvement and Capability Determination (SPICE) - Software Process Improvement and Capability Determination (SPICE) is an international framework to assess software development processes.
  • software RAID (software redundant array of independent disk) - Software RAID is a form of RAID (redundant array of independent disks) performed on the internal server.
  • software requirements specification (SRS) - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
  • software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
  • software stack - A software stack is a collection of independent components that work together to support the execution of an application.
  • software testing - Software testing is the process of assessing the functionality of a software program.
  • software toolchain - A software toolchain is a set of software development tools used simultaneously to complete complex software development tasks or to deliver a software product.
  • software-defined networking (SDN) - Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • software-defined perimeter (SDP) - A software-defined perimeter, or SDP, is a security technique that controls access to resources based on identity and forms a virtual boundary around networked resources.
  • software-defined storage (SDS) - Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.
  • solar constant - A solar constant is a measurement of the solar electromagnetic radiation available in a meter squared at Earth's distance from the sun.
  • solar cooling - Solar cooling is a system that converts heat from the sun into cooling that can be used for refrigeration and air conditioning.
  • solar power - Solar power is a renewable form of energy harvested from the sun for the purpose of producing electricity or thermal energy (heat).
  • solid - A solid is a state of matter that retains its shape and density when not confined.
  • solid-state - Solid-state is a common descriptor used to refer to electronic components, devices and systems based entirely on semiconductor materials such as silicon, germanium or gallium arsenide.
  • solid-state drive (SSD) capacity - Solid-state drive (SSD) capacity is the maximum amount of data that can be stored on a solid-state drive.
  • solid-state storage - Solid-state storage (SSS) is a type of computer storage media made from silicon microchips.
  • solid-state storage garbage collection - Solid-state storage garbage collection, or SSD garbage collection, is an automated process by which a solid-state drive (SSD) improves write performance.
  • solution provider - A solution provider is a vendor, service provider or value-added reseller (VAR) that comprehensively handles the project needs of their client from concept to installation through support.
  • solution selling - Solution selling refers to the philosophy or practice of uncovering a customer's pain points and then providing products and services that address the underlying business problem.
  • sound card - A sound card is a computer component responsible for generating and recording audio.
  • sound wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water or any other liquid or solid matter) as it propagates away from the source of the sound.
  • source code - Source code is the fundamental component of a computer program that is created by a programmer, often written in the form of functions, descriptions, definitions, calls, methods and other operational statements.
  • source code analysis - Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.
  • space - Space is a term that can refer to various phenomena in science, mathematics and computing and generally encompasses the concept of an area or region.
  • SpaceX - SpaceX (Space Exploration Technologies Corporation) is a space transportation and aerospace manufacturer founded in 2002 by Elon Musk.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is an automated system that sends unwanted, unsolicited messages to users, known as spam.
  • Spanning Tree Protocol (STP) - Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • spatial computing - Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D) data.
  • spatial data - Spatial data is any type of data that directly or indirectly references a specific geographical area or location.
  • spatial intelligence - Spatial intelligence is the concept of being able to successfully perceive and derive insight from visual data.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • specific gravity - Specific gravity, more formally known as relative density, is a measure of the density of a substance in comparison to the density of water.
  • spectrum analyzer - A spectrum analyzer is a device that measures and displays signal amplitude (strength) as it varies by frequency within its frequency range (spectrum).
  • spectrum efficiency - Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.
  • speculative execution - Speculative execution is an optimization technique in which a processor (CPU) performs a series of tasks before it is prompted to in order to have the information ready if it is required at any point.
  • speculative risk - Speculative risk is a type of risk the risk-taker takes on voluntarily and will result in some degree of profit or loss.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • speech disfluency - A speech disfluency is any disruption in the flow of spoken language that is caused by the speaker.
  • speech recognition - Speech recognition, or speech-to-text, is the ability of a machine or program to identify words spoken aloud and convert them into readable text.
  • speech technology - Speech technology is a type of computing technology that enables an electronic device to recognize, analyze and understand spoken word or audio.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

CIO
  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close