Browse Definitions :

Browse Definitions by Alphabet

STO - SUP

  • storage tunneling - Fibre Channel over IP (FCIP or FC/IP, also known as Fibre Channel tunneling or storage tunneling) is an Internet Protocol (IP)-based storage networking technology developed by the Internet Engineering Task Force (IETF).
  • storage utilization - Storage utilization is a measure of how well the available data storage space in an enterprise is used.
  • storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity -- that is managed from a central console.
  • Storage vMotion - Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.
  • storage volume - A storage volume is an identifiable unit of data storage.
  • storage zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.
  • stored procedure - A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.
  • story - In agile software development, a story is a particular business need assigned to the software development team.
  • story point (story points) - Story points are used in agile project management and development to determine the difficulty of implementing a particular story (business need).
  • storyboard - A storyboard is a graphic organizer that provides the viewer with a high-level view of a project.
  • STP - Standard temperature and pressure, abbreviated STP, refers to nominal conditions in the atmosphere at sea level.
  • STP - Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.
  • STP - Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • strategic inflection point - A strategic inflection point is a time period when significant change in the business environment requires an organization to respond effectively or face deterioration.
  • strategic innovation - Strategic innovation is a company's process of reinventing its corporate strategy to encourage growth, create value for the company and its customers, and gain competitive differentiation.
  • strategic leadership - Strategic leadership is a practice in which executives, using different styles of management, develop a vision for their organization that enables it to adapt to or remain competitive in a changing economic and technological climate.
  • strategic management - Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to meet its goals and objectives.
  • strategic planning - Strategic planning is the process executives undertake in order to make thoughtful decisions about their organization’s mission, values and goals, and properly allocate resources to fulfill those directives.
  • strategic sourcing - Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.
  • Stratoscale - Stratoscale is a cloud infrastructure vendor offering software-defined data center (SDDC) technology.
  • straw man - In general, a straw man is an object, document, person, or argument that temporarily stands in for and is intended to be "knocked down" by something more substantial.
  • stream cipher - A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.
  • Stream Control Transmission Protocol - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • stream processing - Stream processing is a data management technique that involves ingesting a continuous data stream to quickly analyze, filter, transform or enhance the data in real time.
  • stream recorder - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
  • stream recorder (stream ripper) - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
  • stream ripper - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
  • streaming - Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.
  • streaming application - A streaming application is a program that has its necessary components downloaded as needed instead of being installed ahead of time on a computer.
  • streaming data architecture - A streaming data architecture is an information technology framework that puts the focus on processing data in motion and treats extract-transform-load (ETL) batch processing as just one more event in a continuous stream of events.
  • streaming media - Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.
  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • streaming video - Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.
  • Streamlined Sales Tax - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
  • Streisand effect - The Streisand effect is the common and counterproductive result of attempting to suppress information about something, such that public awareness of it increases significantly.
  • stress testing - Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.
  • stretched cluster - A stretched cluster is a deployment model in which two or more virtualization host servers are part of the same logical cluster but located in separate geographical locations.
  • string - In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).
  • string theory - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • strobe - In computer or memory technology, a strobe is a signal that is sent that validates data or other signals on adjacent parallel lines.
  • strong authentication - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
  • strong cryptography - Strong cryptography is used by most governments around the world to protect communications.
  • strong password - A strong password is one that is designed to be hard for a person or program to discover.
  • strongly-typed programming language - A strongly-typed programming language is one in which each type of data (such as integer, character, hexadecimal, packed decimal, and so forth) is predefined as part of the programming language and all constants or variables defined for a given program must be described with one of the data types.
  • structural ambiguity - Structural or syntactic ambiguity is the potential of multiple interpretations for a piece of written or spoken language because of the way words or phrases are organized.
  • structured content - Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.
  • structured data - Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis.
  • structured programming - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
  • structured programming (modular programming) - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
  • Structured Query Language - SQL (Structured Query Language) is a standardized programming language that's used to manage relational databases and perform various operations on the data in them.
  • Structured Systems Analysis & Design Method - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
  • Structured Wireless Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • Structured Wireless-Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • stub - A stub is a small program routine that substitutes for a longer program, possibly to be loaded later or that is located remotely.
  • STUN - Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Address Translator (NAT) or firewall.
  • Stuxnet - The Stuxnet worm is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • sub-release - A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version.
  • subcarrier - A subcarrier is a secondary modulated signal frequency modulated into the main frequency (the carrier) to provide an additional channel of transmission.
  • subcontract - A subcontract is a contract between a prime contractor and a subcontractor to furnish supplies or services for the performance of a prime contract or subcontract.
  • subnet - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subnet (subnetwork) - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subnetwork - A subnetwork is a separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.
  • subnetwork - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subrogation - Subrogation is a legal right that lets an insurance company seek to recover costs from any third party who is responsible for the damages.
  • subscriber identity module - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • subscription-based pricing model - A subscription-based pricing model is a payment structure that allows a customer or organization to purchase or subscribe to a vendor's IT services for a specific period of time for a set price.
  • subsidiary - A subsidiary is a business that is wholly or partially owned by another business, sometimes called the parent company or holding company.
  • substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • SuccessFactors Employee Central - SuccessFactors Employee Central is SuccessFactors' integrated suite of human capital management (HCM) cloud applications.
  • SuccessFactors MetaData Framework - The SuccessFactors Metadata Framework is Web-based software that gives SuccessFactors users the ability to create and maintain custom objects, screens and business rules to extend the platform’s functionality.
  • SuccessFactors Presentations - SuccessFactors Presentations is a feature within SuccessFactors software that HR managers can use to create more dynamic talent review presentations.
  • succession planning - Succession planning is the process of developing talent to replace executive, leadership or other key employees when they transition to another role, leave the company, are fired, retire or die.
  • sudo - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • sudo (superuser do) - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • suffix - A suffix is something added at the end of a word that conditions its usage or meaning.
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • SugarSync - SugarSync is an online file sync-and-share service.
  • sugging - Sugging, also spelled SUGGing, is an acronym that stands for "selling under the guise” of research.
  • sum - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • summation - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • summation (sum) - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • Sun - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • sun interference - Solar fade, also called sun interference, is a phenomenon that occurs in satellite communications on certain occasions when the downlink signal is aligned with the sun's position and it is overcome by signal noise from the sun.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • Sun ONE - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
  • Sun Open Net Environment - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
  • sunk cost (SC) - A sunk cost is money that has already been spent and cannot be recovered.
  • sunk cost effect - The sunk cost effect is the tendency for humans to continue investing in something that clearly isn’t working.
  • sunsetting - Sunsetting, in a business context, is intentionally and gradually phasing something out.
  • Super Audio CD - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
  • Super DMCA - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • Super Video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • supercomputer - The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray.
  • superconducting quantum interference device - A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field.
  • superconductivity - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
  • superconductor - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close