Browse Definitions :

Browse Definitions by Alphabet

SYS - WHA

  • sysplex and Parallel Sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • SYSPRO - SYSPRO is a vendor that specializes in providing ERP and other integrated business software to midsize manufacturers and distributors.
  • system - A system is a collection of elements or components that are organized for a common purpose.
  • System 5 - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
  • system administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • system administrator (sysadmin) - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • system checkpoint - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
  • system monitor - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
  • system of systems - System of systems (SoS)  is a way to view multiple, small independent systems in context as part of a larger, more complex system.
  • system of systems (SoS) - System of systems (SoS)  is a way to view multiple, small independent systems in context as part of a larger, more complex system.
  • system on a chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • system on a chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • system operator - A sysop is the person who runs a computer server.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • System Performance Evaluation Cooperative - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
  • System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
  • system software - System software is a type of computer program that is designed to run a computer's hardware and application programs.
  • system testing - System testing, also referred to as system-level tests or system-integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.
  • system tray - The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user interface that is used to display the clock and the icons of certain programs so that a user is continually reminded that they are there and can easily click one of them.
  • System V - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
  • system-on-a-chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • system-on-a-chip (SoC) - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • system-on-a-chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • Systematized Nomenclature of Medicine -- Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • Systematized Nomenclature of Medicine Clinical Terms - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • systemic risk - Systemic risk is a category of risk that describes threats to a system, market or economic segment.
  • systems administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • Systems Application Architecture - Systems Application Architecture (SAA) was IBM's strategy for enterprise computing in the late 1980s and early 1990s.
  • systems development life cycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems development life cycle (SDLC) - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems development life cycle model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems development lifecycle - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • Systems Network Architecture - SNA is a proprietary IBM architecture and set of implementing products for network computing within an enterprise.
  • systems of engagement - Systems of engagement are decentralized IT components that incorporate communication technologies such as social media to encourage and enable peer interaction.
  • systems thinking - Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.
  • Systems, Application and Products in Data Processing - SAP ERP is an enterprise resource planning software developed by the company SAP SE.
  • SysTrack Desktop Assessment for VMware - SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.
  • The speed of end-user and backbone transmission technologies - This table shows the stated data rates for the most important end-user and backbone transmission technologies.
  • What is a SAN? Ultimate storage area network guide - A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
  • What is a Server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is SecOps? Everything you need to know - SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and assessing risk and protecting corporate assets, often operating from a security operations center, or SOC.
  • What is server virtualization? The ultimate guide - Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.
  • What is steganography? - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close