Browse Definitions :

Browse Definitions by Alphabet

SUS - SYS

  • sustainability risk management - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • sustainability risk management (SRM) - Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company's environmental policies.
  • sustainable procurement - Sustainable procurement is the meeting of business needs for materials, goods, utilities and services in an environmentally-friendly, responsible and ethical way.
  • sustaining technology - A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.
  • SVC - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • SVC - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • SVG - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
  • SVGA - The term display mode refers to the characteristics of a computer display, in particular the maximum number of colors and the maximum image resolution (in pixels horizontally by pixels vertically).
  • SVVP (server virtualization validation program) - SVVP (server virtualization validation program) is a policy that allows administrators running running Windows Server on certified virtualization technologies other than Hyper-V and Microsoft Virtual Server to receive technical support for Windows Server from Microsoft.
  • SWAG - The Semantic Web Agreement Group (SWAG) is an organization of interested parties working together to further the development of the Semantic Web (SW), a concept that might lead to a Web that was self-described in a way that would make it easier for programs to work with it.
  • Swagger - Swagger is an open source set of rules, specifications and tools for developing and describing RESTful APIs.
  • swamp cooling - Evaporative cooling, also known as swamp cooling, is a strategy for cooling air that takes advantage of the drop in temperature that occurs when water that's exposed to moving air begins to change to gas.
  • SWAN - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • SWAN - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • SWAN (Structured Wireless-Aware Network) - SWAN (Structured Wireless-Aware Network) is a technology that incorporates a wireless local area network (wireless LAN or WLAN) into a wired wide-area network.
  • swap file - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swap file (swap space or pagefile) - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swap space - A swap file (or swap space or, in Windows NT, a pagefile) is a space on a hard disk used as the virtual memory extension of a computer's real memory (RAM).
  • swarm intelligence - Swarm intelligence is the study of decentralized, self-organized systems that move quickly in a coordinated manner.
  • swarm robotics - Swarm robotics is the use of numerous, autonomous robotics to accomplish a task.
  • SWIFT - Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions.
  • SWIFT (Society for the Worldwide Interbank Financial Telecommunication) - Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions.
  • SWIFT FIN message - SWIFT FIN is a message type (MT) that transmits financial information from one financial institution to another.
  • Swing - Swing is a set of program components for Java programmers that provide the ability to create graphical user interface (GUI) components, such as buttons and scroll bars, that are independent of the windowing system for specific operating system.
  • swirl - .
  • SWiSH - SWiSH is a program that is used to create Flash animations without using Macromedia's Flash product.
  • switch on a chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • switch-on-a-chip - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • switch-on-a-chip (SOC) - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • Switched Multimegabit Data Service - SMDS (Switched Multimegabit Data Service) is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis.
  • switched virtual circuit - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • switched virtual circuit (SVC) - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • switching fabric - Switching fabric is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
  • swivel chair interface - A swivel chair interface is a system for user input and interaction that requires them to move from one interface to another, sometimes duplicating work.
  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis) - SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person.
  • SWR - Standing-wave ratio (SWR) is a mathematical expression of the non-uniformity of an electromagnetic field (EM field) on a transmission line such as coaxial cable.
  • Sybase - Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products.
  • Symantec PartnerNet - Symantec PartnerNet is web-based portal that was developed by security vendor Symantec to provide information, tools and benefits to its channel partner community.
  • Symantec.cloud Service Provider Program - The Symantec.
  • symbology - A symbology is a protocol for arranging the bars and spaces that make up a particular kind of bar code.
  • symetric key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
  • symmetric algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
  • symmetric communications - Compare asymmetric communications.
  • Symmetric Multi Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • Symmetric Multi-Processing - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • symmetric multiprocessing - SMP (symmetric multiprocessing) is the processing of programs by multiple processors that share a common operating system and memory.
  • SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
  • SYN scanning - SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.
  • SynchBurst SRAM - Burst SRAM is used as the external L1 and L2 memory for the Pentium microprocessor chipset.
  • SynchML - SyncML is an Extensible Markup Language (XML) protocol under development as an open standard for the universal synchronization of data between devices, one of the most important building blocks in the development of third generation (3G) wireless.
  • synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to describe a perceived meaningful coincidence.
  • synchronize-and-stabilize (sync-and-stabilize) - Synchronize-and-stabilize (sometimes just called sync-and-stabilize) is a systems development life cycle model in which teams work in parallel on individual application modules, frequently synchronizing their code with that of other teams, and debugging (stabilizing) code regularly throughout the development process.
  • Synchronized Multimedia Integration Language - SMIL (Synchronized Multimedia Integration Language), is a language that allows Web site creators to be able to easily define and synchronize multimedia elements (video, sound, still images) for Web presentation and interaction.
  • synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from Greek syn-, meaning "with," and chronos, meaning "time") is an adjective describing objects or events that are coordinated in time.
  • Synchronous Data Link Control - (SDLC is also an abbreviation for systems development life cycle.
  • Synchronous Digital Hierarchy - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
  • synchronous DRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • Synchronous Graphics RAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
  • Synchronous Graphics RAM (SGRAM) - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
  • synchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
  • synchronous mirroring - Synchronous mirroring is a type of data protection in which data is written to both a remote and local disk simultaneously.
  • Synchronous Optical Network - SONET is the American National Standards Institute standard for synchronous data transmission on optical media.
  • Synchronous Optical Network (SONET) - Synchronous Optical Network (SONET) is a standard for synchronous data transmission on optical fibers.
  • synchronous replication - Synchronous replication copies data over a SAN, LAN or WAN so multiple copies are available.
  • synchronous/asynchronous API - Synchronous/asynchronous APIs are application programming interfaces that return data for requests either immediately or at a later time, respectively.
  • Synclink - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
  • Synclink Dynamic RAM - SyncLink SDRAM, along with Direct Rambus DRAM, is a protocol -based approach where all signals to random access memory (RAM) are on the same line.
  • syndication - In general, syndication is the supply of material for reuse and integration with other material, often through a paid service subscription.
  • synectics - Synectics is a method of problem-solving that focuses on cultivating creative thinking, often among small groups of individuals with diverse experience and skills.
  • synergy - In general, synergy (pronounced SIN-ur-jee, from Greek sunergia, meaning "cooperation," and also sunergos, meaning "working together") is the combined working together of two or more parts of a system so that the combined effect is greater than the sum of the efforts of the parts.
  • syntax - Syntax is the grammar, structure, or order of the elements in a language statement.
  • synthetic backup - Synthetic backup is the process of generating a file from a complete copy of a file created at some past time and one or more incremental copies created at later times.
  • synthetic data - Synthetic data is information that's artificially manufactured rather than generated by real-world events.
  • synthetic identity theft - Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity.
  • synthetic intelligence (SI) - Synthetic intelligence (SI) recognizes that although the capacity for software to reason may be manufactured, it is nonetheless real intelligence and not just an imitation of how human beings acquire and apply knowledge and skill.
  • synthetic monitoring - Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.
  • sysadmin - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • syslog - Syslog is an IETF RFC 5424 standard protocol for computer logging and collection that is popular in Unix-like systems including servers, networking equipment and IoT devices.
  • sysop - A sysop is the person who runs a computer server.
  • sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
  • sysplex and Parallel Sysplex - A sysplex is IBM's systems complex (the word sysplex comes from the first part of the word system and the last part of the word complex), introduced in 1990 as a platform for the MVS/ESA operating system for IBM mainframe servers.
  • Sysprep (System Preparation Tool) - Sysprep is Microsoft's System Preparation tool intended to duplicate, test and deliver new installations for the Windows operating system based on an established installation.
  • SYSPRO - SYSPRO is a vendor that specializes in providing ERP and other integrated business software to midsize manufacturers and distributors.
  • system - A system is a collection of elements or components that are organized for a common purpose.
  • System 5 - System V (System 5) was an early form of the Unix operating system, originally developed by AT&T (American Telephone and Telegraph).
  • system administrator - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • system administrator (sysadmin) - In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems.
  • system checkpoint - A restore point is a saved "snapshot" of a computer's data at a specific time.
  • System Insights - System Insights is a feature that debuted in Windows Server 2019 that processes data and uses predictive analytics to warn administrators of potential issues with Windows Server deployments.
  • system monitor - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • system of record (SOR) - A system of record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element.
  • system of systems (SoS) - System of systems (SoS)  is a way to view multiple, small independent systems in context as part of a larger, more complex system.
  • system on a chip - System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
  • system on a chip testing - SoC (system-on-a-chip) testing is the testing of system-on-a-chip (SoC) devices.
  • system operator - A sysop is the person who runs a computer server.
  • system operator (sysop) - A sysop is the person who runs a computer server.
  • System Performance Evaluation Cooperative - The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.
  • System Restore - System Restore is a utility to protect and revert the Windows client operating system to a previous state -- known as a restore point -- undoing system changes made since that time to avoid a reinstall of the operating system.
  • system software - System software is a type of computer program that is designed to run a computer’s hardware and application programs.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close