Browse Definitions :

Browse Definitions by Alphabet

STR - SUP

  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • streaming sound - Streaming sound is sound that is played as it arrives.
  • streaming video - Streaming video is content sent in compressed form over the Internet and displayed by the viewer in real time.
  • Streamlined Sales Tax (SST) - The Streamlined Sales Tax (SST) program is a cooperative arrangement among states in the United States for the collection and payment of retail sales taxes when the seller and the purchaser are located in different taxing jurisdictions.
  • Streisand effect - The Streisand effect is the common and counterproductive result of attempting to suppress information about something, such that public awareness of it increases significantly.
  • stress testing - Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.
  • stretchable silicon - Stretchable silicon is a flexible form of silicon manufactured in thin, wavelike ribbons that can be expanded and compressed like accordion bellows.
  • stretched cluster - A stretched cluster is a deployment model in which two or more virtualization host servers are part of the same logical cluster but located in separate geographical locations.
  • string - In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).
  • string theory - Superstring theory - known less formally as "string theory" - is sometimes called the Theory of Everything (TOE), because it is a unifying physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • strobe - In computer or memory technology, a strobe is a signal that is sent that validates data or other signals on adjacent parallel lines.
  • strong authentication - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
  • strong cryptography - Strong cryptography is used by most governments around the world to protect communications.
  • strong password - A strong password is one that is designed to be hard for a person or program to discover.
  • strongly-typed programming language - A strongly-typed programming language is one in which each type of data (such as integer, character, hexadecimal, packed decimal, and so forth) is predefined as part of the programming language and all constants or variables defined for a given program must be described with one of the data types.
  • structural ambiguity - Structural or syntactic ambiguity is the potential of multiple interpretations for a piece of written or spoken language because of the way words or phrases are organized.
  • structured content - Structured content is a modular approach to managing digital content that uses metadata tags and automation to publish content from a single source to multiple distribution channels.
  • structured data - Structured data contrasts with unstructured and semi-structured data.
  • structured programming - Structured programming, sometimes known as modular programming, is a subset of procedural programming that enforces a logical structure on the program being written to make it more efficient and easier to understand and modify.
  • structured programming (modular programming) - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
  • Structured Query Language - SQL, short for Structured Query Language, is a programming language for relational databases.
  • Structured Systems Analysis & Design Method - SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.
  • Structured Wireless Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • Structured Wireless-Aware Network - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • Strunk's rules - Here is a list of the seven elementary rules of English usage and 11 elementary principles of composition from William Strunk, Jr.
  • stub - A stub is a small program routine that substitutes for a longer program, possibly to be loaded later or that is located remotely.
  • STUN - Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Address Translator (NAT) or firewall.
  • STUN (Simple Traversal of UDP through NAT) - Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Address Translator (NAT) or firewall.
  • Stuxnet - The Stuxnet worm is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • stylus - A stylus (pronounced STAI-luhs, from the Latin stilus or "stake") is an instrument for writing and, in computers, an input device used to write text or draw lines on a surface as input to a computer.
  • sub-release - A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version.
  • subcarrier - A subcarrier is one telecommunication signal carrier that is carried on top of another carrier so that effectively two signals are carried at the same time.
  • subcontract - A subcontract is a contract between a prime contractor and a subcontractor to furnish supplies or services for the performance of a prime contract or subcontract.
  • subnet - A subnet is a logical partition of an IP network into multiple, smaller network segments.
  • subnet (subnetwork) - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subnet mask (subnetting) - A subnet mask is a 32- or 128-bit number that segments an existing IP address in a TCP/IP network and divides that address into discrete network and host addresses.
  • subnetwork - A subnet is a logical partition of an IP network into multiple, smaller network segments.
  • subnetwork - A subnetwork is a separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.
  • subpoena - A subpoena is a command issued by a court in which a person or corporation is required to physically appear before, or produce specific evidence to, that court.
  • subrogation - Subrogation is a legal right that lets an insurance company seek to recover costs from any third party who is responsible for the damages.
  • subscriber identity module - A SIM card, also known as a subscriber identity module, is a smart card that stores data for GSM cellular telephone subscribers.
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • subscription-based pricing model - A subscription-based pricing model is a payment structure that allows a customer or organization to purchase or subscribe to a vendor's IT services for a specific period of time for a set price.
  • subset symbol - The subset symbol indicates a specific relationship between two sets.
  • subsidiary - A subsidiary is a business that is wholly or partially owned by another business, sometimes called the parent company or holding company.
  • substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • SuccessFactors Employee Central - SuccessFactors Employee Central is SuccessFactors' integrated suite of human capital management (HCM) cloud applications.
  • SuccessFactors MetaData Framework - The SuccessFactors Metadata Framework is Web-based software that gives SuccessFactors users the ability to create and maintain custom objects, screens and business rules to extend the platform’s functionality.
  • SuccessFactors Presentations - SuccessFactors Presentations is a feature within SuccessFactors software that HR managers can use to create more dynamic talent review presentations.
  • succession planning - Succession planning is the process of developing talent to replace executive, leadership or other key employees when they transition to another role, leave the company, are fired, retire or die.
  • sudo - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • sudo (superuser do) - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • suffix - A suffix is something added at the end of a word that conditions its usage or meaning.
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • SugarSync - SugarSync is an online file sync-and-share service.
  • sugging - Sugging, also spelled SUGGing, is an acronym that stands for "selling under the guise” of research.
  • suite - In computers, a suite is a set of usually related programs sold together in a single package.
  • sum - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • summation - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • summation (sum) - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • Sun - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • sun interference - Solar fade, also called sun interference, is a phenomenon that occurs in satellite communications on certain occasions when the downlink signal is aligned with the sun's position and it is overcome by signal noise from the sun.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • Sun ONE (Sun Open Net Environment) - Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products from Sun Microsystems aimed at enabling an enterprise to build Web services for its own internal use and for its customers.
  • sunk cost (SC) - A sunk cost is money that has already been spent and cannot be recovered.
  • sunk cost effect - The sunk cost effect is the tendency for humans to continue investing in something that clearly isn’t working.
  • SunOS - SunOS was the UNIX-based operating system for Scalable Processor Architecture-based workstations and servers from Sun Microsystems.
  • sunsetting - Sunsetting, in a business context, is intentionally and gradually phasing something out.
  • Super Audio CD - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
  • Super Audio CD (SACD) - Super Audio Compact Disk (SACD) is a high-resolution audio CD format.
  • Super DMCA - The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton.
  • Super Video - S-Video (Super-Video, sometimes referred to as Y/C Video, or component video) is a video signal transmission in which the luminance signal and the chrominance signal are transmitted separately to achieve superior picture clarity.
  • supercomputer - The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray.
  • supercomputer center - In general, a supercomputer center is a site with a supercomputer that is shared by a number of other sites, usually research sites.
  • superconducting quantum interference device - A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field.
  • superconductivity - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
  • superconductor - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
  • supercookie - A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a user's internet browsing history and habits.
  • SuperDLT - Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format.
  • Superdome - Superdome is a high-end 64-bit, Hewlett-Packard (HP) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.
  • superheterodyne - Superheterodyne refers to a method of designing and building wireless communications or broadcast equipment, particularly radio receivers.
  • Supermicro - Supermicro is a company that specializes in x86-64 server technology.
  • supernet - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • supernetting - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • supernetting - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • superposition - Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured.
  • superscalar - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • SuperSpeed USB - USB (Universal Serial Bus) is a plug-and-play interface between a computer and add-on devices, such as media players, keyboards, telephones, digital cameras, scanners, flash drives, joysticks and printers.
  • SuperSpeed USB - USB 3.0, also known as SuperSpeed USB, is the next major revision of the Universal Serial Bus (USB).
  • superstitial - A superstitial is a Web ad format developed by Unicast, which calls itself a rich media company.
  • superstring theory - Superstring theory - known less formally as "string theory" - is sometimes called the Theory of Everything (TOE), because it is a unifying physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • superstring theory (string theory, Theory of Everything) - String theory is a controversial physics theory that reconciles the differences between quantum theory and the theory of relativity to explain the nature of all known forces and matter.
  • supertasker - A supertasker is someone who performs better when doing multiple things simultaneously than they do when limiting their attention to a single task.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • superuser do - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • supervised learning - Supervised learning is an approach to creating artificial intelligence, where the program is given labeled input data and the expected output results.
  • supervisor call - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • supervisor call (SVC) - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close