Browse Definitions :

Browse Definitions by Alphabet

SNA - SOF

  • snap-in - Snap-in, in general, refers to an object that can be attached to another object and that will then function as part of the whole.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • SnapLogic - SnapLogic is a software company that offers cloud integration products to allow customers to connect cloud-based data and applications with on-premise business systems.
  • sneakernet - Sneakernet is a jargon term for the method of transmitting electronic information by personally carrying it from one place to another on floppy disk or other removable medium.
  • sniff subrating - Sniff subrating is a Bluetooth feature designed to increase battery life as much as 500 percent for devices whose typical usage involves a significant amount of inactive time.
  • Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
  • Snort - Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch.
  • Snowden effect - The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.
  • snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • SOA governance - SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
  • SOA networking - SOA networking is the use of the service-oriented architecture (SOA) model to enhance the capabilities of networks that use Web services.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • soak testing - Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • SOAP fault - A SOAP fault is an error in a SOAP (Simple Object Access Protocol) communication resulting from incorrect message format, header-processing problems, or incompatibility between applications.
  • soap opera effect (motion interpolation) - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
  • SOAR (security orchestration, automation and response) - SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events without human assistance.
  • SOC 1 (System and Organization Controls 1) - System and Organization Controls 1, or SOC 1 (pronounced "sock one"), aims to control objectives within a SOC 1 process area and documents internal controls relevant to an audit of a user entity's financial statements.
  • Soc 2 (Service Organization Control 2) - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Soc 3 (Service Organization Control 3) - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • social analysis - Social analysis is the practice of analyzing a situation or social problem through objective, systematic exploration.
  • social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social business (social enterprise) - Social business is an umbrella term used to describe an organization that includes social media as part of its business plan.
  • social coding - Social coding is an approach to software development that places an emphasis on formal and informal collaboration.
  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites, such as Twitter and Facebook.
  • social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
  • social currency - Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.
  • social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
  • social engineering penetration testing - Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social learning theory - The social learning theory is the philosophy that people can learn from each other through observation, imitation and modeling.
  • social listening (social media listening) - Social listening, also referred to as social media listening, is the process of identifying and assessing what is being said about a company, individual, product or brand on the internet.
  • social loafing - Social loafing is a reduction of individual effort that tends to occur when people work in groups.
  • social login - Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website.
  • social media - Social media is a collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
  • social media addiction - Social media addiction is an unhealthy dependence on interactive platforms such as Facebook, Twitter and Instagram.
  • social media analytics - Social media analytics is the process of collecting and analyzing audience data shared on social networks to improve an organization's strategic business decisions.
  • social media dashboard - A social media dashboard is a social media management tool that individuals or companies can use to coordinate a social media presence across multiple channels or accounts, through a single interface.
  • social media influence - Social media influence is a marketing term that describes an individual’s ability to affect other people's thinking in a social online community.
  • Social media management software (SMMS) - Social media management software (SMMS) is a tool that allows organizations to monitor and analyze online conversations from different communication channels.
  • social media manager - A social media manager is the individual in an organization trusted with monitoring, contributing to, filtering, measuring and otherwise guiding the social media presence of a brand, product, individual or corporation.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • social media metrics - Social media metrics refer to the measurements that companies use to gauge the impact of their efforts on social media platforms, and the impact of social media activity on a company’s revenue.
  • social media policy - A social media policy (also called a social networking policy)  is a corporate code of conduct that provides guidelines for employees who post content on the Internet either as part of their job or as a private person.
  • social media ROI - Social media ROI refers to the return on investment a company can expect to make from its investment in social media technologies.
  • social network - A social network, in technology parlance, is a website or other application where people, often of similar interests, come together to communicate with each other and share information including photos, videos, audio and written messages.
  • social networking - Social networking is the practice of using a dedicated online platform to maintain contacts, interact and collaborate with like-minded individuals, peers, friends and family.
  • social proof - Social proof is a psychological phenomenon in which the actions and attitudes of the people around us (either in real life or online) are considered support to guide our own behavior.
  • social recruiting (social media recruitment) - Social media recruiting is the enterprise use of social media platforms to identify, engage and vet individuals the organization may want to hire.
  • social robot - A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots.
  • social search engine - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • social selling - Social selling is a B2B and B2C social media marketing (SMM) strategy that utilizes social networking sites and applications to generate leads, sales or one-on-one relationships with consumers.
  • social shopping - Social shopping is a type of e-commerce that seeks to involve people with similar tastes in an online shopping experience.
  • social simulation - Social simulation is the application of computer-based methods and technologies to replicate human social dynamics in various environments and scenarios.
  • social sourcing - Social sourcing, also called social recruiting, is a type of e-recruitment in which recruiters and HR managers search for job candidates by using social media sites.
  • socialbot - A socialbot is a software program that simulates human behavior in automated interactions on social network sites such as Facebook and Twitter.
  • Socialcast - Socialcast is an enterprise social networking and collaboration platform by VMware.
  • sociogram - A sociogram is a tool for charting the relationships in a group by providing a visual representation of the social connections and preferences of each individual.
  • sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
  • sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
  • socks - Socks (or "SOCKS") is a protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft computing - Soft computing is the use of approximate calculations to provide approximate solutions to complex computational problems.
  • soft copy - A soft copy (sometimes spelled "softcopy") is an electronic copy of some type of data, such as a file viewed on a computer's display or transmitted as an e-mail attachment.
  • soft error - A soft error is an issue that causes a temporary condition in RAM that alters stored data in an unintended way.
  • soft keyboard (onscreen keyboard or software keyboard) - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • soft skills - A soft skill is a personal attribute that supports situational awareness and enhances an individual's ability to get a job done.
  • soft token - A soft token is a software-based security token that generates a single-use login PIN.
  • soft zoning - Soft zoning is used to allocate resources and control access in a storage-area network (SAN).
  • softlifting - Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • software - Software is a set of instructions, data or programs used to operate computers and execute specific tasks.
  • software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
  • Software as a Medical Device (SaMD) - Software as a Medical Device (SaMD) is software that performs a medical task without being part of a hardware device.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • software asset management (SAM) - Software asset management (SAM) is the part of IT asset management that seeks to ensure compliance with license agreements and prevent overspending on software.
  • software attack surface - The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user.
  • software audit - A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.
  • software development - Software development is the body of processes involved in creating software programs, embodying all the stages throughout the systems development life cycle (SDLC).
  • software development kit (SDK) - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
  • software development life cycle (SDLC) - The software development life cycle (SDLC) is a framework used in project management to describe the stages and tasks involved in each step of writing and deploying the instructions and data computers use to execute specific tasks.
  • Software development: Glossary - This is a glossary of terms related to software development.
  • software engineering - Software engineering is the application of principles used in the field of engineering, which usually deals with physical systems, to the design, development, testing, deployment and management of software systems.
  • Software Engineering Institute (SEI) - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
  • software license - A software license is a document that provides legally binding guidelines for the use and distribution of software.
  • software package - A software package is an assemblage of files and information about those files.
  • Software Process Improvement and Capability Determination (SPICE) - Software Process Improvement and Capability Determination (SPICE) is an international framework to assess software development processes.
  • software RAID (software redundant array of independent disk) - Software RAID is a form of RAID (redundant array of independent disks) performed on the internal server.
  • software requirements specification (SRS) - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
  • software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
  • software robot - A software robot is an AI (artificial intelligence) system that runs on a host device rather than existing as a standalone machine.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close