-
-
- smart building
- A smart home or building is a home or building, u...
- smart card
- A smart card is a plastic card about the size of a credit...
- smart home
- A smart home or building is a home or building, usually a...
- smart home or building
- A smart home or building is a hom...
- smart tag
- Microsoft's Smart Tags were a proposed feature of Windows X...
- Smart Tags
- Microsoft's Smart Tags were a proposed feature of Windows...
- smart watch
- A smart wristwatch is a wristwatch that not only tells ...
- smart wristwatch
- A smart wristwatch is a wristwatch that not o...
- smartboard
- A whiteboard is a non-electronic variation of the traditi...
- SmartDownload
- Netscape's SmartDownload is a free software program...
- smbclient
- Samba is a popular freeware program that allows end users t...
- smiley
- In Internet e-mail messages and Web discussions, a smiley is a se...
- SMTP
- SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sen...
- SMTP (Simple Mail Transfer Protocol)
- SMTP ...
- snail mail
- Snail mail is a slang term for the regular postal service...
- snarf attack
- Bluesnarfing is the theft of information from a wirel...
- social bookmarking
- Social bookmarking is a user-defined taxo...
- social computing
- Social computing is the collaborative and int...
- social graph
- A social graph is a diagram that illustrates intercon...
- social networking
- Social networking is the practice of expand...
- social spreadsheet
- A social spreadsheet is social software t...
- soft bounce
- A soft bounce is an e-mail message that gets as far as ...
- Software as a Service BI
- Software as a Service busines...
- Software as a Service BI (SaaS BI)
- Software ...
- SOP
- The Same Origin Policy (SOP), also called Single Origin Policy, is a se...
- spam
- Spam is unsolicited e-mail on the Internet.
- spam blog
- A splog (spam blog) is a fake blog created solely to promot...
- spam cocktail
- A spam cocktail (or anti-spam cocktail) is the use ...
- spam cocktail (or anti-spam cocktail)
- A s...
- spam filter
- A spam filter is a program that is used to detect unsol...
- spam kit
- A phishing kit is a collection of tools assembled to make it ...
- spam over Internet telephony
- SPIT (spam over Inter...
- spam trap
- A spam trap is the inclusion of an option in an online form...
- spamblock
- A spamblock is a text segment interjected into an e-mail ad...
- spambot
- A spambot is a program designed to collect, or harvest, e-mail ...
- spamhaus
- A spamhaus (haus is the German word for house) is an Internet...
- Spamhaus Project
- A spamhaus (haus is the German word for house...
- spear phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spear-phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spearphishing
- Spear phishing is an e-mail spoofing fraud attempt ...
- Special Report: Cloud Computing - April 2009
- spend management
- In an enterprise, spend management is managin...
- SPF
- Sender Policy Framework (SPF) is an anti-spam approach in which the Int...
- spim
- Spim is spam delivered through instant messaging (IM) instead of thro...
- spim (instant messaging spam)
- Spim is spam delive...
- SPIT
- SPIT (spam over Internet telephony), sometimes known as vam (voice or...
- SPIT (spam over Internet telephony)
- SPIT (s...
- split
- Among Internet Relay Chat (IRC) users, a split is a condition where...
- splog
- A splog (spam blog) is a fake blog created solely to promote affili...
- splog (spam blog)
- A splog (spam blog) is a fake blog created ...
- splogger
- A splog (spam blog) is a fake blog created solely to promote ...
- spoofing
- E-mail spoofing is the forgery of an e-mail header so that th...
- SQL injection
- SQL injection is a type of security exploit in whic...
- SQUID
- SQUID is also an abbreviation for Source Quench Introduced Delay, a...
- Squid proxy server
- Squid is a Unix-based proxy server that c...
- SRM
- Supplier relationship management is a comprehensive approach to managin...
- SSP
- Also see two related terms, application service provider and management...
- Standard Generalized Markup Language
- SGML ...
- storage at the edge
- Storage at the edge is an expression th...
- storage security
- Storage security is the group of parameters a...
- storage service provider
- Also see two related terms, a...
- storage service provider (SSP)
- Also see two rela...
- storage tunneling
- Fibre Channel over IP (FCIP or FC/IP, also ...
- Streaming media quiz
- A quiz about technologies and terms r...
- Stuff I've Seen
- Stuff I've Seen is the name of a capability und...
- supplier exchange
- E-procurement is the business-to-business p...
- supplier relationship management
- Supplier rela...
- supplier relationship management (SRM)
- synchronous groupware
- Synchronous groupware is programmin...
- syndication
- In general, syndication is the supply of material for r...
- T Model
- A tModel is a data structure representing a service type (a gen...
- tabbed browsing
- Tabbed browsing, also called a tabbed document ...
- tabbed document interface
- Tabbed browsing, also calle...
- tagging
- Social bookmarking is a user-defined taxonomy system for bookma...
- tags
- Social bookmarking is a user-defined taxonomy system for bookmark s.
- TCP Wrapper
- TCP Wrapper is a public domain computer program that pr...
- TDI
- Tabbed browsing, also called a tabbed document interface (TDI), is a fe...
- teergrube
- A teergrube (German for tar pit) is a computer server set u...
- telematics
- Telematics is the blending of computers and wireless tele...
- Telnet
- What is Telnet? Telnet is a user command and an underlying TCP/IP...
- text online
- Fortunately, there is a way to find out whether a given...
- The Big Murkowski
- A Murkogram is spam (unsolicited commercial...
- Thing
- A Thing is an interactive object for a Web page that is developed w...
- third party relay
- An open relay (sometimes called an insecure...
- third-party relay
- An open relay (sometimes called an insecure...
- tModel
- A tModel is a data structure representing a service type (a gener...
- Top 10 Spyware Threats
- Visit our spyware feature page to...
- topsite
- A topsite is a stringently protected underground FTP server at ...
- Total Quality Management
- Total Quality Management (TQM...
- Total Quality Management (TQM)
- Total Quality Man...
- TQM
- Total Quality Management (TQM) is a comprehensive and structured approa...
- transactional e-mail
- Transactional e-mail is a type of Web...
- Transactions for UNIX Enhanced for Distributed ...
- triplewhack
- Googlewhacking is the challenging pursuit of searching ...
- tumblelog
- A tumblelog is a blog that supports short-form mixed media ...
- Tuxedo
- Tuxedo (which stands for Transactions for UNIX, Enhanced for Dist...
- Tuxedo (Transactions for UNIX, Enhanced for Dis...
- tweet
- A tweet is a post on Twitter.
- Twitter
- Twitter is a free social networking microblogging service that ...
- two dimensional barcode
- A 2D (two-dimensional) barcode ...
- two-dimensional barcode
- A 2D (two-dimensional) barcode ...