Browse Definitions :

Browse Definitions by Alphabet

SUR - WHA

  • surge suppressor (surge protector) - A surge suppressor, sometimes optimistically called a surge protector, is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage spikes, or transients.
  • surprise and delight - Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.
  • surveillance capitalism - Surveillance capitalism is an economic theory proposed by Harvard Business School Professor Emerita Shoshana Zuboff in 2014 that describes the modern, mass monetization of individuals' raw personal data in order to predict and modify their behavior.
  • susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • SUSE - SUSE (pronounced soo-sah) is a multinational company that offers enterprise-grade open source products based on Linux technologies.
  • SUSE Linux Enterprise Server (SLES) - SUSE Linux Enterprise Server (SLES) is a Linux-based server operating system created and maintained by the German-based organization, SUSE.
  • SUSE Manager - SUSE Manager is an open source infrastructure management tool for Linux systems.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • Swagger - Swagger is an open source set of rules, specifications and tools for developing and describing RESTful APIs.
  • swap file (swap space or page file) - A swap file is a system file that creates temporary storage space on a solid-state drive or hard disk when the system runs low on memory.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • Switched Multimegabit Data Service (SMDS) - Switched Multimegabit Data Service (SMDS) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide area network on a nonconstant or bursty basis.
  • swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats.
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • SYN scanning - SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection.
  • synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to describe a perceived meaningful coincidence.
  • Synchronous Data Link Control (SDLC) - Synchronous Data Link Control (SDLC) is a transmission protocol used to synchronously transfer code-transparent, serial-by-bit data over a communications channel.
  • Synchronous Digital Hierarchy (SDH) - Synchronous Digital Hierarchy (SDH) is a group of fiber optic transmission rates that transport digital signals with different capacities.
  • synchronous mirroring - Synchronous mirroring is a type of data protection in which data is written to both a remote and local disk simultaneously.
  • Synchronous Optical Network (SONET) - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
  • synchronous replication - Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so there are multiple, current copies of the data.
  • synchronous/asynchronous API - Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.
  • synectics - Synectics is a method of problem-solving that focuses on cultivating creative thinking, often among small groups of individuals with diverse experience and skills.
  • syntax - Syntax is the grammar, structure, or order of the elements in a language statement.
  • synthetic data - Synthetic data is information that's artificially manufactured rather than generated by real-world events.
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interactions with a system.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • system administrator (sysadmin) - A system administrator (sysadmin) is an information technolog professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.
  • System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
  • system of record (SOR) - A system of record (SOR) is an information storage and retrieval system that stores valuable data on an organizational system or process.
  • system of systems (SoS) - A system of systems (SoS) is the collection of multiple, independent systems in context as part of a larger, more complex system.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
  • system software - System software is a type of computer program that is designed to run a computer's hardware and application programs.
  • system testing - System testing, also referred to as system-level testing or system integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.
  • system tray - The system tray (or "systray") is a section of the taskbars in the Microsoft Windows operating system user interface that provides easy access icons to the user's most commonly used apps and displays the clock.
  • system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • systems development life cycle (SDLC) - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • systems of engagement - Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is a Server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is SD-WAN? Software-defined WAN explained - Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide area network, or WAN.
  • What is SecOps? Everything you need to know - SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and assessing risk and protecting corporate assets, often operating from a security operations center, or SOC.
  • What is server sprawl and how to prevent it? - Server sprawl is when multiple underutilized servers take up more space and consume more resources than can be justified by their workload.
  • What is server virtualization? The ultimate guide - Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.
  • What is steganography? - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
Networking
Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • knowledge-based systems (KBSes)

    Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to ...

  • Sarbanes-Oxley Act

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close