Browse Definitions :

Browse Definitions by Alphabet

SPA - SPL

  • spam cocktail - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
  • spam cocktail (or anti-spam cocktail) - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
  • spam confidence level - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam filter - A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
  • spam for life (S4L) - S4L is an online chat acronyms for "spam for life," the possible result of subscribing to an online service or becoming anyone's customer or client.
  • spam kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • spam over Internet telephony - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • spam ping - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • spam trap - A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.
  • Spam: Glossary - This is a glossary of terms associated with spam and the technologies that drive its transmission.
  • spamblock - A spamblock is a text segment interjected into an e-mail address to foil a spambot (a program that a spammer uses to troll the Internet seeking e-mail addresses).
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spamdexing - Spamdexing, coined from spam and index, is the practice of including information in a Web page that causes search engines to index it in some way that produces results that satisfy the spamdexer but usually dissatisify the search engine providers and users.
  • spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • Spamhaus Project - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • spanning tree protocol - Where two bridges are used to interconnect the same two computer network segments, spanning tree is a protocol that allows the bridges to exchange information so that only one of them will handle a given message that is being sent between two computers within the network.
  • spanning tree protocol (STP) - Spanning tree protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • SPARC (Scalable Processor Architecture)  - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
  • SPARC� - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
  • Sparkle - Expression Interactive Designer is Microsoft's new tool for adding 3D images and multimedia content to an application's user interface, or UI.
  • sparkline - A sparkline is a small embedded line graph that illustrates a single trend.
  • SPARQL - SPARQL is a declarative programming language and protocol used for analytics by graph databases.
  • sparsity and density - Sparsity and density are terms used to describe the percentage of cells in a database table that are not populated and populated, respectively.
  • spatial data - Spatial data, also known as geospatial data, is information about a physical object that can be represented by numerical values in a geographic coordinate system.
  • spatial division multiple access - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • spatial division multiple access (SDMA) - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • spatial intelligence - Spatial intelligence is the concept of being able to successfully perceive and derive insight from visual data.
  • spatial sensing - Spatial sensing is the detection, measuring and analysis of an environment's space and objects in real-time for the purposes of mapping them.
  • SPD - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • SPDIF - S/PDIF (Sony/Philips Digital Interface) is a standard audio transfer file format.
  • spear phishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spear-phishing - Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spearphishing - Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • SPEC - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
  • special effects - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • Special Interest Group - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • Special Interest Groups - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • special purpose acquisition company - A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO).
  • special purpose acquisition company (SPAC) - A special purpose acquisition company (SPAC) is a corporation formed by private individuals to facilitate investment through an initial public offering (IPO).
  • Special Report: Cloud Computing - April 2009 - A roundup of cloud computing news in 2009.
  • Specialized Mobile Radio - Also see Enhanced Specialized Mobile Radio (ESMR).
  • Specialized Mobile Radio (SMR) - Also see Enhanced Specialized Mobile Radio (ESMR).
  • Specific Biometric Techniques: Glossary - This glossary provides definitions for the most commonly encountered biometric techniques.
  • specific gravity - The term specific gravity, symbolized sp gr, refers to the ratio of the density of a solid or liquid to the density of water at 4 degrees Celsius.
  • specific volume - Specific volume is a property of materials, defined as the number of cubic meters occupied by one kilogram of a particular substance.
  • Specification and Description Language - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • specification by example (SBE) - Specification by example (SBE) is a user-driven contextual approach to defining software requirements.
  • specification of a sequence of flow objects - A sosofo (specification of a sequence of flow objects), a term used in the Document Style Semantics and Specification Language (DSSL), is a set of statements that describe how a sequence of document elements (such as a paragraph and headings) fit into a document and how they are to be formatted (for example, in what type font and with what spacing).
  • spectrum - The electromagnetic radiation spectrum is the complete range of the wavelengths of electromagnetic radiation, beginning with the longest radio waves (including those in the audio range) and extending through visible light (a very small part of the spectrum) all the way to the extremely short gamma rays that are a product of radioactive atoms.
  • spectrum analyzer - A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency.
  • spectrum efficiency - Spectrum efficiency is the optimized use of spectrum or bandwidth so that the maximum amount of data can be transmitted with the fewest transmission errors.
  • speculation - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
  • speculation (speculative loading) - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
  • speculative execution - Speculative execution is an optimization technique in which a processor (CPU) performs a series of tasks before it is prompted to in order to have the information ready if it is required at any point.
  • speculative loading - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
  • speculative risk - Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • Speech Application Program Interface - SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.
  • Speech Application Program Interface (SAPI) - SAPI (Speech Application Program Interface) is an application program interface (API) provided with the Microsoft Windows operating systemthat allows programmers to write programs that offer text-to-speech and speech recognitioncapabilities.
  • speech disfluency - A speech disfluency is any disruption in the flow of spoken language that is caused by the speaker.
  • speech recognition - Speech recognition, the ability for a machine to convert spoken language to text, is often used for voice dialing, call routing and voice search.
  • speech synthesis - Speech synthesis is the computer-generated simulation of human speech.
  • speech technology - Speech technology is a type of computing technology that enables an electronic device to recognize, analyze and understand spoken word or audio.
  • speed of gravity - The speed of gravity is the rate, in meters per second or other standard units, at which gravitational fields or effects propagate through space.
  • speed of light - The speed of light in free space (that is, in a vacuum) is a constant that has been measured to considerable accuracy.
  • speed of sound - The speed of sound, or of acoustic traveling waves, is a physical constant for any given medium at a specific pressure and temperature.
  • spend analysis - Spend analysis is the process of collecting, categorizing and evaluating expenditure data, either by human hand or through software.
  • spend management - In an enterprise, spend management is managing how to spend money to best effect in order to build products and services.
  • SPF - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • SPI - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
  • SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
  • SPICE - SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC.
  • SPID - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
  • SPID (Service Profile Identifier) - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • SPIF - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
  • SPIF (sales performance incentive fund) - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
  • spike - A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease.
  • spike testing - Spike testing is a type of performance testing where an application is tested with a sudden and extreme increase in load, such as user traffic or system transactions.
  • spim - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • spin (angular momentum) - Spin, in physics, is the velocity of rotation of something around a particular axis.
  • spin (PR, marketing) - Spin, in the context of public relations (PR) and journalism, is the selective assembly of fact and the shaping of nuance to support a particular view of a story.
  • spindle - A spindle is a shaft that holds rotating hard disk drive (HDD) platters in place.
  • sping - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • sping (spam ping) - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • spintronics - Spintronics is an emerging field of nanoscale electronics involving the detection and manipulation of electron spin.
  • spiral lifecycle model - The spiral model, also known as the spiral lifecycle model, is a systems development method (SDM) used in information technology (IT).
  • spiral model - The spiral model, also known as the spiral lifecycle model, is a systems development method (SDM) used in information technology (IT).
  • spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
  • SPIT - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • splash ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • splash page - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
  • splash page (splash screen) - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
  • splash screen - A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the site home page or to tell the user what kind of browser and other software they need to view the site.
  • Splashtop - Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.
  • splay tree - A splay tree is a self-adjusting search algorithm for placing and locating files (called records or keys) in a database.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close