Browse Definitions :

Browse Definitions by Alphabet

SQL - STO

  • SQL Server buffer pool - An SQL Server buffer pool, also called an SQL Server buffer cache, is a place in system memory that is used for caching table and index data pages as they are modified or read from disk.
  • SQL Server Reporting Services (SSRS) - SQL Server Reporting Services (SSRS) is a SQL Server subsystem that enables the creation of graphical, mobile and printed reports using SQL Server and other data sources.
  • SQL-ledger - SQL-Ledger (SL) is a Web-based open source double-entry accounting system that is used primarily in the retail and manufacturing sectors.
  • SQL-on-Hadoop - SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements.
  • SQLJ - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
  • square meter (meter squared) - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • SRAM (static random access memory) - SRAM (static RAM) is a type of random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
  • SRI International (SRI) - SRI International (SRI), founded as Stanford Research Institute International, is an independent, non-profit research institute headquartered in Menlo Park, California.
  • SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • SS7 attack - An SS7 attack is a security exploit that takes advantage of a weakness in the design of SS7 (Signaling System 7) to enable data theft, eavesdropping, text interception and location tracking.
  • SSADM (Structured Systems Analysis and Design Method) - SSADM (Structured Systems Analysis and Design Method) is a widely used computer application development method in the United Kingdom, where its use is often specified as a requirement for government computing projects.
  • SSAE 16 - The Statement on Standards for Attestation Engagements No.
  • SSD (solid-state drive) - An SSD, or solid-state drive, is a type of storage device used in computers.
  • SSD caching - SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.
  • SSD form factor - An SSD form factor is the size, configuration or physical arrangement of solid state storage media.
  • SSD purge (solid state drive purge) - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
  • SSD RAID (solid-state drive RAID) - SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.
  • SSD TRIM - SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state drive (SSD) which data blocks it can erase because they are no longer in use.
  • SSD write cycle - An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.
  • SSL (secure sockets layer) - Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
  • SSL certificate (Secure Sockets Layer certificate) - A Secure Sockets Layer certificate, known commonly as an SSL certificate, is a small data file installed on a Web server that allows for a secure connection between a Web server and a Web browser.
  • SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
  • SSL VPN (Secure Sockets Layer virtual private network) - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote access VPN capability.
  • stablecoin - Stablecoin is a fixed-price cryptocurrency whose market value is attached to another stable asset.
  • stack - TCP/IP is frequently referred to as a "stack.
  • stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
  • stack pointer - A stack pointer is a small register that stores the address of the last program request in a stack.
  • stacked ranking - Stacked ranking is an employee evaluation method that slots a certain percentage of employees into each of several  levels of performance.
  • staging environment - A staging environment, or staging, provides a nearly exact replica of a production environment for software testing.
  • stakeholder - A stakeholder is a person or group who has an interest -- vested or otherwise -- in an enterprise and whose support is required in order for an enterprise to be successful.
  • stale data - In computer processing, if a processor changes the value of an operand and then, at a subsequent time, fetches the operand and obtains the old rather than the new value of the operand, then it is said to have seen stale data.
  • stand-alone solid state storage (SSS) - Stand-alone SSS is solid state storage that is not integrated with spinning hard drive disks as in a hybrid flash array.
  • stand-up - In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area.
  • standard - A standard is a generally agreed-upon technology, method or format for a given application.
  • standard definition television (SDTV) - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • Standard MIDI File (SMF) - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • standard operating procedure (SOP) - A standard operating procedure (SOP) is a set of written instructions that describes the step-by-step process that must be taken to properly perform a routine activity.
  • Standard Performance Evaluation Corporation (SPEC) - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
  • standard temperature and pressure (STP) - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
  • standardization - Standardization is the process of developing, promoting and possibly mandating standards-based and compatible technologies within a given industry.
  • standards organization - A standards organization, sometimes referred to as a standards body, is an organization with authority to endorse official standards for given applications.
  • standby power - Standby power is electrical power that a device consumes when not in present use, but plugged in to a source of power and ready to be used.
  • standing-wave ratio (SWR, VWSR, IWSR) - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
  • star network - A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.
  • star schema - A star schema is a database organizational structure optimized for use in a data warehouse or business intelligence that uses a single large fact table to store transactional or measured data, and one or more smaller dimensional tables that store attributes about the data.
  • Starlink - Starlink is a SpaceX initiative to create a global broadband network from a low-earth orbit (LEO) satellite constellation.
  • start of authority record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • startup accelerator - A startup accelerator, sometimes referred to as a seed accelerator, is a business program that supports early-stage, growth-driven companies through education, mentorship and financing.
  • startup company - A startup company is a newly formed business with particular momentum behind it based on perceived demand for its product or service.
  • startup culture - Startup culture refers to how people within a new business, or startup, work together.
  • statcoulomb (statC) - The statcoulomb (abbreviated statC) is the unit of electric charge quantity in the cgs (centimeter/gram/second) system.
  • State Bank of India (SBI) - State Bank of India (SBI) is the country's largest commercial bank, in terms of assets, deposits, and employees.
  • state diagram (state machine diagram or statechart diagram) - A state diagram, also known as a state machine diagram or statechart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).
  • state machine - In general, a state machine is any device that stores the status of something at a given time and can operate on input to change the status and/or cause an action or output to take place for any given change.
  • state management - Application state management is the process of maintaining knowledge of an application's inputs across multiple related data flows that form a complete business transaction -- or a session -- to understand the condition of the app at any given moment.
  • state of charge (SOC) - The state of charge (SOC) is a measurement of the amount of energy available in a battery at a specific point in time.
  • stateful app - A stateful app is a program that saves client data from the activities of one session for use in the next session.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • stateless - Stateful and stateless are adjectives that describe whether a computer or computer program is designed to note and remember one or more preceding events in a given sequence of interactions with a user, another computer or program, a device, or other outside element.
  • stateless app - A stateless app is an application program that does not save client data generated in one session for use in the next session with that client.
  • statement of work (SOW) - A statement of work (SOW), in project management, is a document in which a contracting officer or chief procurement officer (CPO) specifies the objectives and deliverables for a particular project or service contract.
  • states of digital data - A state of digital data is a way to describe the current functionality of a data file.
  • statfarad (statF) - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
  • static analysis (static code analysis) - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • static application security testing (SAST) - Static application security testing (SAST) is a program designed to analyze application (app) source code in order to find security vulnerabilities or weaknesses that may open an app up to a malicious attack.
  • static hashing - Static hashing is a method of hashing, or shortening a string of characters in computer programming, in which the set of shortened characters remains the same length to improve the ease with which data can be accessed.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • static testing - Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.
  • statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
  • statistical mean, median, mode and range - The terms mean, median, mode, and range describe properties of statistical distributions.
  • statistical noise - Statistical noise is unexplained variability within a data sample.
  • statistical process control (SPC) - Statistical process control (SPC) is a scientific, data-driven methodology for monitoring, controlling and improving procedures and products.
  • statutory reporting - Statutory reporting is the mandatory submission of financial and non-financial information to a government agency.
  • statvolt (statV) - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
  • stay interview - A stay interview is an organized meeting between a manager and an existing employee to review the reasons the employee stays with the company and seeking out concerns that might influence the employee to leave.
  • steady state - Steady state is a condition in which a solid state flash drive has experienced enough program/erase (P/E) cycles that performance times for write operations becomes stable and can be evaluated in a consistent manner.
  • stealth virus - A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
  • STEAM (science, technology, engineering, arts and mathematics) - STEAM is an educational approach that incorporates the arts into the more-familiar STEM model (science, technology, engineering and mathematics).
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • steering committee - A steering committee is a group of high-level advisors who have been appointed to provide an organization or project with direction.
  • Stefan-Boltzmann constant - The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.
  • STEM (science, technology, engineering, and mathematics) - STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM).
  • stemming - Stemming is the process of reducing a word to its word stem that affixes to suffixes and prefixes or to the roots of words known as a lemma.
  • stepper - A stepper is a machine used to project the image of a circuit in photolithographic semiconductor fabrication.
  • stepping - Stepping is a number used by Intel to identify what level of design change a microprocessor was built to.
  • steradian - The steradian (symbolized sr) is the Standard International (SI) unit of solid angular measure.
  • stereoscopy (stereoscopic imaging) - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
  • stickiness - Stickiness is anything about a Web site that encourages a visitor to stay longer.
  • stingray (IMSI catcher) - A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator.
  • STIX (Structured Threat Information eXpression) - STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared.
  • stochastic optimization - Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • storage (computer storage) - Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media.
  • storage as a service (STaaS) - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage capacity planning - Storage capacity planning is the practice of assessing current data storage needs and forecasting future storage requirements.
  • storage class memory (SCM) - Storage class memory (SCM) is a type of physical computer memory that combines dynamic random access memory (DRAM), NAND flash memory and a power source for data persistence.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close