Browse Definitions :

Browse Definitions by Alphabet

SPI - SSD

  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • SPIF - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
  • SPIF (sales performance incentive fund) - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
  • spike - A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease.
  • spike testing - Spike testing is a type of performance testing where an application is tested with a sudden and extreme increase in load, such as user traffic or system transactions.
  • spim - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • spin (PR, marketing) - Spin, in the context of public relations (PR) and journalism, is the selective assembly of fact and the shaping of nuance to support a particular view of a story.
  • spindle - A spindle is a shaft that holds rotating hard disk drive (HDD) platters in place.
  • sping - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • sping (spam ping) - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • spiral lifecycle model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
  • spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
  • spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
  • SPIT - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • splash ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • splash page - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
  • splash screen - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
  • Splashtop - Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.
  • spline - In computer graphics, a spline is a curve that connects two or more specific points, or that is defined by two or more points.
  • split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
  • split horizon - Split horizon is a method used by distance vector protocols to prevent network routing loops.
  • split-mirror snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • SplitRX Mode - SplitRX Mode is a VMware vSphere feature that can improve network performance for some multicast workloads.
  • splitter - In telephony, a splitter, sometimes called a "plain old telephone service splitter," is a device that divides a telephone signal into two or more signals, each carrying a selected frequency range, and can also reassemble signals from multiple signal sources into a single signal.
  • splog - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
  • splog (spam blog) - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
  • splogger - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
  • Splunk - Splunk Inc. is a San Francisco-based multinational company whose software platform indexes machine data, and makes it searchable so it can be turned into actionable intelligence.
  • SPML - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
  • SPML (Services Provisioning Markup Language) - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
  • SPOF - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating.
  • Spoken Text Markup Language - Spoken Text Markup Language (STML) is an early set of markup codes and symbols for text-to-speech (TTS) synthesis for voice-enabled Web browsers and voice enabled e-mail.
  • spoliation - Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action.
  • spontaneous area network - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • spoofing - Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.
  • spool - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • spool (simultaneous peripheral operations online) - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • SPR - A reagent is a chemical substance that is used to create a reaction in combination with some other substance.
  • spray-on antenna - A spray-on antenna is a conductive material that can be sprayed onto nearly any surface to create a thin, lightweight and flexible antenna.
  • spread spectrum - Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.
  • spreadmart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • spreadsheet - A spreadsheet is a computer program that can capture, display and manipulate data arranged in rows and columns.
  • spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
  • spreadsheet data mart - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • Spring Framework - The Spring Framework (Spring) is an open-source application framework that provides infrastructure support for developing Java applications.
  • sprint (software development) - A sprint is a set period of time during which specific work has to be completed and made ready for review.
  • SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
  • SPX - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • spybot - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
  • spyware - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
  • SQL - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
  • SQL (Structured Query Language) - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
  • SQL Azure - SQL Azure is Microsoft’s cloud database service.
  • SQL injection - A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • SQL Server 2012 - Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment.
  • SQL Server buffer pool - An SQL Server buffer pool, also called an SQL Server buffer cache, is a place in system memory that is used for caching table and index data pages as they are modified or read from disk.
  • SQL Server Reporting Services (SSRS) - SQL Server Reporting Services (SSRS) is a SQL Server subsystem that enables the creation of graphical, mobile and printed reports using SQL Server and other data sources.
  • SQL-ledger - SQL-Ledger (SL) is a Web-based open source double-entry accounting system that is used primarily in the retail and manufacturing sectors.
  • SQL-on-Hadoop - SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements.
  • SQLJ - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
  • SQLJ Java - SQLJ is a set of programming extensions that allow a programmer using the Java programming language to embed statements that provide SQL (Structured Query Language) database requests.
  • SQPSK - Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transition is always 90 degrees or 1/4 cycle at a time.
  • Square (Square Register, Square Wallet) - Square is a mobile payment startup co-founded in 2009 by Twitter co-founder Jack Dorsey.
  • square foot - The foot squared, also called the square foot, is the standard unit of area in the English foot-pound-second (fps) system.
  • square meter - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
  • square meter (meter squared) - The square meter, also called the meter squared, is the Standard International (SI) unit of area.
  • SQUID - I2S (Inter-IC Sound) is a serial bus (path) design for digital audio devices and technologies such as compact disc (CD) players, digital sound processors, and digital TV (DTV) sound.
  • SQuID - Also see SQUID, a UNIX-based program for caching Web pages and other Internet content closer to the user.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • SRAM - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
  • SRAM (static random access memory) - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
  • SRE - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • SRI International (SRI) - SRI International (SRI), founded as Stanford Research Institute International, is an independent, non-profit research institute headquartered in Menlo Park, California.
  • SRM - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • SRM - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
  • SRM - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • SRS - A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development.
  • SRT bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
  • SRTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • SRTP (Secure Real-Time Transport Protocol or Secure RTP) - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • SS7 - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • SS7 attack - An SS7 attack is a security exploit that takes advantage of a weakness in the design of SS7 (Signaling System 7) to enable data theft, eavesdropping, text interception and location tracking.
  • SSA - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
  • SSADM - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
  • SSADM (Structured Systems Analysis & Design Method) - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
  • SSAE 16 - The Statement on Standards for Attestation Engagements No.
  • ssd - An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.
  • SSD - A RAM-based solid state drive is a storage device that is made from silicon microchips, has no moving parts and stores data electronically instead of magnetically.
  • SSD - A flash solid state drive (SSD)  is a non-volatile storage device that stores persistent data in flash memory.
  • SSD - Client solid state drive (SSD) is a marketing term used by original equipment manufacturers (OEMs) and value-added resellers (VARs) to differentiate between solid state drives built for consumers and solid state drives built for the enterprise.
  • SSD (solid-state drive) - An SSD, or solid-state drive, is a type of storage device used in computers.
  • SSD caching - SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.
  • SSD capacity - solid state drive (SSD) capacity.
  • SSD form factor - An SSD form factor is the size, configuration or physical arrangement of solid state storage (SSS) media.
  • SSD overprovisioning - Overprovisioning, in a storage context, is the inclusion of extra storage capacity in a flash solid state drive (SSD).
  • SSD purge - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
  • SSD purge (solid state drive purge) - SSD purge is the process of returning a flash memory device to its original state at the time of manufacturing and effectively erasing any data that has been written to the device.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close