Browse Definitions :

Browse Definitions by Alphabet

STA - STO

  • statfarad (statF) - The statfarad (abbreviated statF) is the unit of capacitance in the cgs (centimeter/gram/second) or small-unit metric system.
  • statH - The stathenry (abbreviated statH) is the unit of inductance in the cgs (centimeter/gram/second) or small-unit metric system.
  • stathenry - The stathenry (abbreviated statH) is the unit of inductance in the cgs (centimeter/gram/second) or small-unit metric system.
  • static - In general, dynamic means energetic, capable of action and/or change, or forceful, while static means stationary or fixed.
  • static analysis - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • static analysis (static code analysis) - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • static application security testing (SAST) - Static application security testing (SAST) is a program designed to analyze application (app) source code in order to find security vulnerabilities or weaknesses that may open an app up to a malicious attack.
  • static code analysis - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • static hashing - Static hashing is a method of hashing, or shortening a string of characters in computer programming, in which the set of shortened characters remains the same length to improve the ease with which data can be accessed.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • static jitter buffer - In voice over IP (VoIP), a jitter buffer is a shared data area where voice packets can be collected, stored, and sent to the voice processor in evenly spaced intervals.
  • static random access memory - SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is being supplied.
  • static scoping - Lexical scoping (sometimes known as static scoping) is a convention used with many programming languages that sets the scope (range of functionality) of a variable so that it may only be called (referenced) from within the block of code in which it is defined.
  • static testing - Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.
  • static URL - A static uniform resource locator (URL) is a name-based website address that is direct, unchanging, clear and contains no session or user identification information.
  • statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
  • statistical mean - The terms mean, median, mode, and range describe properties of statistical distributions.
  • statistical mean, median, mode and range - The terms mean, median, mode, and range describe properties of statistical distributions.
  • statistical noise - Statistical noise is unexplained variability within a data sample.
  • statistical process control (SPC) - Statistical process control (SPC) is a scientific, data-driven methodology for monitoring, controlling and improving procedures and products.
  • statistical time division multiplexing - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
  • statohm - The statohm (symbolized stat W) is the unit of resistance in the cgs (centimeter/gram/second) electrostatic system of units.
  • status code - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
  • statutory reporting - Statutory reporting is the mandatory submission of financial and non-financial information to a government agency.
  • statV - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
  • statvolt - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
  • statvolt (statV) - The statvolt (symbolized statV) is the unit of electromotive force (EMF) or potential difference in the cgs (centimeter/gram/second) electrostatic system.
  • statW - The statwatt (symbolized statW) is the unit of power in the cgs (centimeter/gram/second) electrostatic system.
  • statwatt - The statwatt (symbolized statW) is the unit of power in the cgs (centimeter/gram/second) electrostatic system.
  • stay interview - A stay interview is an organized meeting between a manager and an existing employee to review the reasons the employee stays with the company and seeking out concerns that might influence the employee to leave.
  • STDM - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
  • STDM (statistical time division multiplexing) - STDM, or statistical time division multiplexing, is one method for transmitting several types of data simultaneously across a single transmission cable or line (such as a T1 or T3 line).
  • steady state - Steady state is a condition in which a solid state flash drive has experienced enough program/erase (P/E) cycles that performance times for write operations becomes stable and can be evaluated in a consistent manner.
  • steadycam (steadicam) - A steadycam (also known as a steadicam) is a device that enables smooth video shooting by stabilizing a camera and isolating it from shock and vibration.
  • stealth virus - In computer security, a stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
  • STEAM (science, technology, engineering, arts and mathematics) - STEAM is an educational approach that incorporates the arts into the more-familiar STEM model (science, technology, engineering and mathematics).
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • steering committee - A steering committee is a group of high-level advisors who have been appointed to provide an organization or project with direction.
  • Stefan-Boltzmann constant - The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (), is a physical constant involving black body radiation.
  • Stegano - Stegano is a malware toolkit that allows users to hide malicious code in images.
  • steganographic - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
  • STEM (science, technology, engineering, and mathematics) - STEM is an educational program developed to prepare primary and secondary students for college and graduate study in the fields of science, technology, engineering, and mathematics (STEM).
  • stemming - Stemming is the process of reducing a word to its word stem that affixes to suffixes and prefixes or to the roots of words known as a lemma.
  • stepless frequency control - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
  • stepless frequency control (SFS) - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
  • stepper - A stepper is a machine used to project the image of a circuit in photolithographic semiconductor fabrication.
  • stepping - Stepping is a number used by Intel to identify what level of design change a microprocessor was built to.
  • steradian - The steradian (symbolized sr) is the Standard International (SI) unit of solid angular measure.
  • stereolithography - 3-D printing is a manufacturing process that builds layers to create a three-dimensional solid object from a digital model.
  • stereoscopic imaging - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
  • stereoscopy - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
  • stereoscopy (stereoscopic imaging) - Stereoscopy, sometimes called stereoscopic imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth to a flat image.
  • stickiness - Stickiness is anything about a Web site that encourages a visitor to stay longer.
  • stingray (IMSI catcher) - A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator.
  • STIX (Structured Threat Information eXpression) - STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared.
  • STM - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
  • STML - Spoken Text Markup Language (STML) is an early set of markup codes and symbols for text-to-speech (TTS) synthesis for voice-enabled Web browsers and voice enabled e-mail.
  • stochastic optimization - Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness.
  • stockkeeping unit - SKU (stockkeeping unit, sometimes spelled "Sku") is an identification, usually alphanumeric, of a particular product that allows it to be tracked for inventory purposes.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • stop list - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • stop loss order - A stop loss order is a market order that sets a minimum value, below which an investment broker sells a stock or other security at the next available time.
  • Stop Online Piracy Act (SOPA) and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
  • Stop Online Piracy Act and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
  • stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • stop words - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • storage (computer storage) - Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical or silicon-based storage media.
  • storage area management - Storage area management (SAM) is a still-evolving set of procedures, services, and standards for comprehensively managing the infrastructure of a storage area network (SAN), including all components within all servers, the disk arrays, the tape libraries, the switches, the routers, and the programs.
  • storage area network - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • Storage as a Service - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
  • storage as a service (STaaS) - Storage as a service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage capacity planning - Storage capacity planning is the practice of assessing current data storage needs and forecasting future storage requirements.
  • storage card - Flash storage memory cards use nonvolatile semiconductor memory to store pictures, audio and video data on portable and remote devices.
  • storage class memory (SCM) - Storage class memory (SCM) is a type of physical computer memory that combines dynamic random access memory (DRAM), NAND flash memory and a power source for data persistence.
  • storage consolidation - Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
  • storage container - A storage container is a defined, specific location in high-volume storage.
  • storage convergence - Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
  • storage convergence - Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
  • Storage Distributed Resource Scheduler - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
  • Storage Distributed Resource Scheduler (DRS) - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
  • storage encryption - Storage encryption is the use of encryption/decryption of backed-up and archived data, both in transit and on storage media.
  • storage filer - A storage filer is a file server designed and programmed for high-volume data storage, backup, and archiving.
  • storage hypervisor - Storage hypervisors make more efficient use of storage resources in a virtual environment.
  • storage management - ADSTAR Distributed Storage Management (ADSM) is a collective term for IBM's family of high-end software that helps a customer manage the storage devices (such as mainframe storage, PC disk drives, and Zip drives) that are scattered around the company.
  • Storage Management Initiative Specification - SMI-S (Storage Management Initiative Specification) is a standard developed by the Storage Network Industry Association (SNIA) that is intended to facilitate the management of storage devices from multiple vendors in storage area networks (SANs).
  • storage media - In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data.
  • storage medium (storage media) - In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and makes the data available for retrieval.
  • storage network - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • storage node - A storage node is typically a physical server with one or more hard-disk drives (HDDs) or solid-state drives (SDDs).
  • storage pools - Storage pools are capacity aggregated from disparate physical storage resources in a shared storage environment.
  • storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • storage resource management - An important goal of storage resource management is to make it easier for storage administrators to reclaim unused storage.
  • storage robot - A backup robot is an automated external USB storage device that supports multiple removable SATA hard drives.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities.
  • storage service provider - Also see two related terms, application service provider and management service provider.
  • storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • storage stack - A storage stack, also called an integrated stack, is a bundled storage product that include servers, networking components and server virtualization software.
  • storage tunneling - Fibre Channel over IP (FCIP or FC/IP, also known as Fibre Channel tunneling or storage tunneling) is an Internet Protocol (IP)-based storage networking technology developed by the Internet Engineering Task Force (IETF).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close