Browse Definitions :

Browse Definitions by Alphabet

SMB - SOC

  • SMB 3.0 (Server Message Block 3.0) - SMB 3.0 (Server Message Block 3.
  • SMB protocol - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • smbclient - Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet.
  • SMDS - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
  • SMDS (Switched Multimegabit Data Service) - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
  • SME - SME (small-to-medium enterprise) is a convenient term for segmenting businesses and other organizations that are somewhere between the "small office-home office" (SOHO) size and the larger enterprise.
  • SMF - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
  • SMF - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
  • SMF (Standard MIDI File) - The SMF (Standard MIDI File) was developed to allow musicians and audio file developers to transfer their sequenced MIDI data from one software application to another.
  • SMI S - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
  • SMI-S - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
  • SMI-S (Storage Management Initiative Specification) - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
  • SMIL - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
  • SMIL (Synchronized Multimedia Integration Language) - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
  • SMIME - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • SMiShing - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMiShing (SMS phishing) - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMM - Social media marketing (SMM) is a form of Internet marketing that utilizes social networking websites as a marketing tool.
  • smoke testing - Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details.
  • SMP - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
  • SMP (symmetric multiprocessing) - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
  • SMPTE - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
  • SMPTE (Society of Motion Picture and Television Engineers) - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
  • SMR - Also see Enhanced Specialized Mobile Radio (ESMR).
  • SMS - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • sms - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMS phishing - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMS spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMSC - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • SMTP - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • smurf - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
  • smurf attack - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
  • Smurf Suite - The Smurf Suite is a collection of smartphone hacking and spyware tools that can remotely activate iPhones and Android devices and collect user data through eavesdropping and data access.
  • SNA - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
  • snackable content - Snackable content is website content that is designed to be easy for readers to consume and to share.
  • SNAFU - SNAFU is an acronym for "situation normal, all f***ed up.
  • SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal, all f***ed up.
  • snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
  • Snake case - Snake case is a naming convention where a developer replaces spaces between words with an underscore.
  • snap-in - Snap-in, in general, refers to an object that can be attached to another object and that will then function as part of the whole.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • Snapchat World Lenses - Snapchat World Lenses are a collection of augmented reality (AR) 3D enhancements to live real-world environments as viewed through the Snapchat mobile app, which allows users to send and receive 'self-destructing' photos and videos.
  • SnapLogic - SnapLogic is a software company that offers cloud integration products to allow customers to connect cloud-based data and applications with on-premise business systems.
  • snarf attack - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • sneakernet - Sneakernet is a jargon term for the method of transmitting electronic information by personally carrying it from one place to another on floppy disk or other removable medium.
  • SNG - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
  • SNIA Solid State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • SNIA Solid-State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • SNIA Solid-State Storage Initiative (SSSI) - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • sniff subrating - Sniff subrating is a Bluetooth feature designed to increase battery life as much as 500 percent for devices whose typical usage involves a significant amount of inactive time.
  • sniffer - In common industry usage, a sniffer (with lower case "s") is a program that monitors and analyzes network traffic, detecting bottlenecks and problems.
  • sniffer keystroke logger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
  • SNMP - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
  • SNOMED CT - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
  • snoopware - In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone.
  • Snort - Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.
  • Snowden effect - The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.
  • snowflake schema - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • snowflaking - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • SNR - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • SOA - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • SOA governance - SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
  • SOA networking - SOA networking is the use of the service-oriented architecture (SOA) model to enhance the capabilities of networks that use Web services.
  • SOA record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • soak testing - Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
  • SOAP - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
  • SOAP fault - A SOAP fault is an error in a SOAP (Simple Object Access Protocol) communication resulting from incorrect message format, header-processing problems, or incompatibility between applications.
  • soap opera effect - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
  • soap opera effect (motion interpolation) - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
  • SOAR (security orchestration, automation and response) - SOAR (security orchestration, automation and response) is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events without human assistance.
  • sobriety cell phone - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
  • SOC - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • SoC - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • Soc 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Soc 1 (Service Organization Control 1) - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Soc 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Soc 2 (Service Organization Control 2) - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Soc 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • Soc 3 (Service Organization Control 3) - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • SoC test - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SoC testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SoC testing (system-on-a-chip testing) - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SOCA - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • social analysis - Social analysis is the practice of analyzing a situation or social problem through objective, systematic exploration.
  • social BPM - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social business (social enterprise) - Social business is an umbrella term used to describe an organization that includes social media as part of its business plan.
  • social business process management - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social coding - Social coding is an approach to software development that places an emphasis on formal and informal collaboration.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close