Browse Definitions :

Browse Definitions by Alphabet

SUP - SYM

  • supercookie - A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a user's internet browsing history and habits.
  • SuperDLT - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • Superdome - Superdome is a high-end 64-bit, Hewlett-Packard (HP) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.
  • Supermicro - Supermicro is a company that specializes in x86-64 server technology.
  • supernet - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • supernetting - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • supernetting - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • superposition - Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured.
  • superscalar - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • SuperSpeed USB - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • SuperSpeed USB - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • superstring theory - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • supertasker - A supertasker is someone who performs better when doing multiple things simultaneously than they do when limiting their attention to a single task.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • superuser do - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • supervised learning - Supervised learning is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labeled for a particular output.
  • supervisor call - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • supervisor call (SVC) - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • supervisory control and data acquisition - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
  • supplier exchange - E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.
  • Supplier performance management (SPM) - Supplier performance management (SPM) is a blanket term for any business practice that is designed to manage, measure and analyze the performance of a supplier or suppliers in a network.
  • supplier relationship management - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • supplier risk management - Supplier risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings that are caused by the organization's supply chain.
  • supply and demand - The laws of supply and demand are the observed relationships between the amount of something that is available for purchase, the level of desire consumers have to buy it and the price.
  • supply chain - A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.
  • supply chain analytics - Supply chain analytics refers to the processes organizations use to gain insight and extract value from the large amounts of data associated with the procurement, processing and distribution of goods.
  • supply chain attack - A supply chain attack is a type of cyber attack that targets organizations by focusing on weaker links in an organization's supply chain.
  • supply chain execution - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • supply chain finance - Supply chain finance is a set of technology-enabled business and financial processes that provides flexible payment options for a buyer and one of their suppliers at lower financing costs.
  • supply chain management - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • supply chain management (SCM) - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • Supply Chain Operations Reference (SCOR) - Supply Chain Operations Reference (SCOR) is the process reference model used across industries as a supply chain management diagnostic tool.
  • supply chain planning - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • Supply Chain Planning (SCP) - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • supply chain risk management (SCRM) - Supply chain risks include cost volatility, material shortages, supplier financial issues and disasters.
  • supply chain security - Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation.
  • supply chain sustainability (SCS) - Supply chain sustainability (SCS) is a holistic view of supply chain processes, logistics and technologies that affect the environmental, social, economic and legal aspects of a supply chain's components.
  • supply chain transformation - Supply chain transformation is the addition and integration of technology to improve supply chain performance.
  • supply chain visibility - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
  • supply chain visibility (SCV) - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
  • supply-side platform (SSP) - A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.
  • support - In information technology, support refers to functionality that is provided between or among products, programs, devices, modes, or accessories.
  • support level - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • support vector machine (SVM) - A support vector machine (SVM) is a type of deep learning algorithm that performs supervised learning for classification or regression of data groups.
  • support-driven development - Support-driven development is a strategy used by developers to create products that fit the needs of customers by designing them based on direct customer feedback.
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • surface conduction electron emitter display television - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • surface printing - Flexography, sometimes referred to as "surface printing," is a method commonly used for printing on packaging and other uneven surfaces.
  • surface-conduction electron-emitter display - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • surface-conduction electron-emitter display television - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • surge protector - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • surge suppressor - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • surge suppressor (surge protector) - A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current (AC) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients.
  • surprise and delight - Surprise and delight is a marketing approach that seeks to attract and nurture customers by enhancing interactions with them and offering them unexpected rewards.
  • surveillance capitalism - Surveillance capitalism is the monetization of data captured through monitoring people's movements and behaviors online and in the physical world.
  • surveillance metadata - Surveillance metadata is details about data pertaining to the actions of an observed party.
  • survey research - Survey research is the collection of data attained by asking individuals questions either in person, on paper, by phone or online.
  • susceptance - Susceptance (symbolized B) is an expression of the ease with which alternating current (AC) passes through a capacitance or inductance.
  • SuSE - SuSE (pronounced soo'-sah) is a German Linux distribution provider and business unit of Novell, Inc.
  • SUSE Linux Enterprise Server (SLES) - SUSE Linux Enterprise Server (SLES) is a Linux-based server operating system created and maintained by the German-based organization, SUSE.
  • SUSE Manager - SUSE Manager is an open source infrastructure management tool for Linux systems.
  • Suspicious Activity Report - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
  • Suspicious Activity Report (SAR) - A Suspicious Activity Report (SAR) is a document that financial institutions must file with the Financial Crimes Enforcement Network (FinCEN) following a suspected incident of money laundering or fraud.
  • sustainability risk management - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • sustainable procurement - Sustainable procurement is the meeting of business needs for materials, goods, utilities and services in an environmentally-friendly, responsible and ethical way.
  • sustaining technology - A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.
  • SVC - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • SVC - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • SVG - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
  • SVGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • SVVP (server virtualization validation program) - SVVP (server virtualization validation program) is a policy that allows administrators running running Windows Server on certified virtualization technologies other than Hyper-V and Microsoft Virtual Server to receive technical support for Windows Server from Microsoft.
  • Swagger - Swagger is an open source set of rules, specifications and tools for developing and describing RESTful APIs.
  • swamp cooling - Evaporative cooling, also known as swamp cooling, is a strategy for cooling air that takes advantage of the drop in temperature that occurs when water that's exposed to moving air begins to change to gas.
  • SWAN - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • SWAN - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • swap file - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swap file (swap space or pagefile) - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swap space - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swarm intelligence - Swarm intelligence is the study of decentralized, self-organized systems that move quickly in a coordinated manner.
  • swarm robotics - Swarm robotics is the use of numerous, autonomous robotics to accomplish a task.
  • SWIFT - Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • Swing - Swing is a set of program components for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars, that are independent of the windowing system for specific operating system.
  • swirl - .
  • switch on a chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • switch-on-a-chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • switch-on-a-chip (SOC) - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • Switched Multimegabit Data Service - Switched Multimegabit Data Service (SMDS) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide area network on a nonconstant or bursty basis.
  • Switched Multimegabit Data Service (SMDS) - Switched Multimegabit Data Service (SMDS) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide area network on a nonconstant or bursty basis.
  • switched virtual circuit - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • switching fabric - Switching fabric is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
  • swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats -- which is what makes up the SWOT acronym.
  • SWR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
  • Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
  • Symantec PartnerNet - Symantec PartnerNet is web-based portal that was developed by security vendor Symantec to provide information, tools and benefits to its channel partner community.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close