Browse Definitions :

Browse Definitions by Alphabet

SMP - SOC

  • SMPTE - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
  • SMPTE (Society of Motion Picture and Television Engineers) - SMPTE (Society of Motion Picture and Television Engineers) is a professional association for enhancing the profession and contributing to the technology of motion picture and television engineering.
  • SMR - Also see Enhanced Specialized Mobile Radio (ESMR).
  • SMS - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • sms - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMS phishing - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMS spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • SMSC - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • SMTP - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • smurf - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
  • smurf attack - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
  • Smurf Suite - The Smurf Suite is a collection of smartphone hacking and spyware tools that can remotely activate iPhones and Android devices and collect user data through eavesdropping and data access.
  • smurfing - A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.
  • SNA - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
  • snackable content - Snackable content is website content that is designed to be easy for readers to consume and to share.
  • SNAFU - SNAFU is an acronym for "situation normal, all f***ed up.
  • SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal, all f***ed up.
  • snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
  • snake oil - In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a product.
  • snap-in - Snap-in, in general, refers to an object that can be attached to another object and that will then function as part of the whole.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • Snapchat World Lenses - Snapchat World Lenses are a collection of augmented reality (AR) 3D enhancements to live real-world environments as viewed through the Snapchat mobile app, which allows users to send and receive 'self-destructing' photos and videos.
  • SnapLogic - SnapLogic is a software company that offers cloud integration products to allow customers to connect cloud-based data and applications with on-premise business systems.
  • snarf attack - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • sneakernet - Sneakernet is a jargon term for the method of transmitting electronic information by personally carrying it from one place to another on floppy disk or other removable medium.
  • SNG - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
  • SNIA Solid State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • SNIA Solid-State Storage Initiative - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • SNIA Solid-State Storage Initiative (SSSI) - The Solid State Storage Initiative (SSSI) is an initiative formed by the Storage Network Industry Association (SNIA) to help foster and grow the adoption of solid-state storage in enterprise and client environments.
  • sniff subrating - Sniff subrating is a Bluetooth feature designed to increase battery life as much as 500 percent for devices whose typical usage involves a significant amount of inactive time.
  • sniffer - In common industry usage, a sniffer (with lower case "s") is a program that monitors and analyzes network traffic, detecting bottlenecks and problems.
  • sniffer keystroke logger - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that should be in the dictionary but isn't.
  • sniper-sniffing robot - A sniper-sniffing robot is a tactical mobile robot designed to seek out and identify weapons in congested areas.
  • SNMP - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
  • SNOMED CT - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • snoop server - A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.
  • snooping - Snooping, in a security context, is unauthorized access to another person's or company's data.
  • snoopware - In mobile computing, snoopware is malware that is capable of monitoring activity on a smartphone.
  • Snort - Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.
  • SnortSnarf - SnortSnarf is a program that was designed for use with Snort, a security program used mainly with Linux networks.
  • Snowden effect - The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.
  • snowflake schema - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • snowflaking - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • snowflaking (snowflake schema) - In data warehousing, snowflaking is a form of dimensional modeling where dimensions are stored in multiple related dimension tables.
  • SNR - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • SOA governance - SOA governance refers to the processes used to oversee and control the adoption and implementation of service-oriented architecture (SOA) in accordance with recognized practices, principles and government regulations.
  • SOA networking - SOA networking is the use of the service-oriented architecture (SOA) model to enhance the capabilities of networks that use Web services.
  • SOA record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • soak testing - Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
  • SOAP fault - A SOAP fault is an error in a SOAP (Simple Object Access Protocol) communication resulting from incorrect message format, header-processing problems, or incompatibility between applications.
  • soap opera effect - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
  • soap opera effect (motion interpolation) - Soap opera effect is consumer lingo for a visual effect caused by motion interpolation, a process that high definition televisions use to display content at a higher refresh rate than the original source.
  • SOAR (Security Orchestration, Automation and Response) - SOAR (Security Orchestration, Automation and Response) is a technology stack of compatible software programs that allow an organization to collect data about security threats and alerts from multiple sources and respond to low-level security events without human assistance.
  • sobriety cell phone - A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath.
  • SoC - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • SOC - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • Soc 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Soc 1 (Service Organization Control 1) - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Soc 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Soc 2 (Service Organization Control 2) - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Soc 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • Soc 3 (Service Organization Control 3) - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • SoC test - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SoC testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SoC testing (system-on-a-chip testing) - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • SOCA - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • social analysis - Social analysis is the practice of analyzing a situation or social problem through objective, systematic exploration.
  • social bookmarking - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • social BPM - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social BPM (business process management) - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social business (social enterprise) - Social business is an umbrella term used to describe an organization that includes social media as part of its business plan.
  • social business process management - Social business process management (BPM) is an approach to improving business processes that seeks to break down silos by encouraging a more collaborative, transparent approach to process improvement.
  • social coding - Social coding is an approach to software development that places an emphasis on formal and informal collaboration.
  • social collaboration - Social collaboration is work that is carried out by more than one person.
  • social comparison - Social comparison can lead to issues caused by the fear of missing out (FOMO), including anxiety, depression and a lack of self-esteem.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social contract - A social contract is an agreement to adhere to acceptable behaviors and meet obligations in a particular environment, such as a nation, a business or a social media site.
  • social CRM - Social CRM, or social relationship management, is customer relationship management and engagement fostered by communication with customers through social networking sites, such as Twitter and Facebook.
  • social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
  • social currency - Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels.
  • social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain.
  • social engineering attack surface - Social engineering attacks usually take advantage of human psychology: the desire for something free, the susceptibility to distraction, or the desire to be liked or to be helpful.
  • social engineering penetration testing - Social engineering pen testing is designed to test employees' adherence to the security policies and practices defined by management.
  • social entrepreneur - A social entrepreneur is an individual who conceptualizes and spearheads business enterprises, such as startups, that are focused on providing service to the community more than financial gain.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social learning theory - The social learning theory is the philosophy that people can learn from each other through observation, imitation and modeling.
  • social loafing - Social loafing is a reduction of individual effort that tends to occur when people work in groups.
  • social login - Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website.
  • social media - Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration.
  • social media addiction - Social media addiction is an unhealthy dependence on interactive platforms such as Facebook, Twitter and Instagram.
  • social media analytics - Social media analytics is the practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close