Browse Definitions :

Browse Definitions by Alphabet

SAT - SD-

  • satellite Internet connection - A satellite Internet connection is an arrangement in which the upstream (outgoing) and the downstream (incoming) data are sent from, and arrive at, a computer through a satellite.
  • satellite news gathering - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
  • satellite news gathering (SNG) - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
  • satellite radio - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
  • satellite radio or Satellite Digital Audio Radio Service (SDARS) - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
  • satisficer - A satisficer is a pragmatic individual who makes decisions based on meeting requirements in a timely manner, finding the “good enough” solution and moving on.
  • saturation - Saturation is the fully conducting state in a semiconductor junction.
  • saved state - Saved state, in a virtualization context, is a way to store the current state of a virtual machine so that is possible to return to that state quickly when desired.
  • SAX - SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) -- that is, a Web file that describes a collection of data.
  • SB 1386 - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
  • SB-1386 - In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if the security of their information is compromised.
  • SBC - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • SBIR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SBR - Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets.
  • SC sustainability - Supply chain sustainability is a holistic perspective of supply chain processes and technologies that goes beyond the focus of delivery, inventory and traditional views of cost.
  • SCA - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • SCADA - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
  • SCADA (supervisory control and data acquisition) - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
  • Scala (Scalable Language) - Scala is a software programming language that mixes object-oriented methods with functional programming capabilities.
  • scalability - Scalability is the ability of a computer application or product (hardware or software) to continue to perform well when it (or its context) is changed in size or volume in order to meet a users need.
  • scalable - It is the ability of a computer application or product (hardware or software) to continue to function well as it (or its context) is changed in size or volume in order to meet a user need.
  • Scalable Processor Architecture - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
  • Scalable Processor Architecture� - SPARC (Scalable Processor Architecture) is a 32- and 64-bit microprocessor architecture from Sun Microsystems that is based on reduced instruction set computing (RISC).
  • Scalable Vector Graphics - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
  • Scalable Vector Graphics (SVG) - Scalable Vector Graphics (SVG) is the description of an image as an application of the Extensible Markup Language (XML).
  • scalable video coding (SVC) - Scalable video coding (SVC) is an extension of the H.
  • scalar product - The dot product, also called the scalar product, of two vectors is a number (scalar quantity) obtained by performing a specific operation on the vector components.
  • Scale Computing - Scale Computing is a hyper-converged infrastructure vendor that ships the HC3, a scale-out storage system for virtual environments that uses Red Hat's KVM hypervisor.
  • scale-out storage - Scale-out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded as needed, even if some of the new drives reside in other storage arrays.
  • ScaleIO - ScaleIO is a software-defined storage software product from Dell EMC that uses existing hardware or EMC servers to turn direct-attached storage (DAS) into shared block storage.
  • Scalr - Scalr is an information technology (IT) vendor that offers a management platform for cloud computing.
  • scan code set - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
  • scan set - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
  • scan set (scan code set) - The scan set, also called the scan code set, is a function that converts keyboard key closures to digital signals the computer interprets as alphanumeric characters and special symbols.
  • ScanDisk - ScanDisk is a Windows utility used to check your hard disk for errors and to correct problems that are found.
  • scannable resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • scanner - A scanner is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
  • scanner-friendly resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • scanning tunneling microscope - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
  • scanning tunneling microscope (STM) - A scanning tunneling microscope (STM) is a device that obtains images of the atoms on the surfaces of materials.
  • SCART connector - A SCART connector is a physical and electrical interconnection between two pieces of audio-visual equipment, such as a television set and a video cassette recorder (VCR).
  • scatter plot - A scatter plot is a set of points plotted on a horizontal and vertical axes.
  • SCCP - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • SCCP - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • SCE - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • SCEM (supply chain event management) - Supply chain event management (SCEM) refers to software that is used to manage events that occur within and between organizations or supply chain partners.
  • scenario - Scenarios are potential events or combinations of events that could have an effect on a business -- typically a given scenario carries either risk or opportunity.
  • scenario planning - Scenario planning allows a business to prepare for various potential events and situations, known as scenarios.
  • schema - In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database, while in artificial intelligence (AI) a schema is a formal expression of an inference rule.
  • schemata - In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database, while in artificial intelligence (AI) a schema is a formal expression of an inference rule.
  • Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment designed to point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum theory.
  • SCI - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • scientific method - Scientific method is a logical approach to seeking knowledge that involves forming and testing a hypothesis.
  • scientific notation - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.
  • scientific notation (power-of-10 notation) - Scientific notation, also called power-of-10 notation, is a method of writing extremely large and small numbers.
  • SCL - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • SCM - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • scope creep - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
  • SCORM - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
  • SCP - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • scraper site - A scraper site is a website that features content stolen from other sites and presented as original.
  • Scratch - Scratch is a free object-oriented software development kit (SDK) that allows children age 8-16 to create animations, interactive stories, games and music without needing to know a specific programming language.
  • screen - In a computer display, the screen is the physical surface on which visual information is presented.
  • screen capture - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • screen door effect - The screen door effect is a mesh-like appearance that occurs where visible gaps between pixels are seen on an electronic screen, usually when viewed at close proximity.
  • screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
  • screen order - Backward mapping (also known as inverse mapping or screen order) is a technique used in texture mapping to create a 2D image from 3D data.
  • screen printing - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • screen printing (serigraphy) - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • screen saver - A screen saver is an animated image that is activated on a personal computer display when no user activity has been sensed for a certain time.
  • screen scraping - Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.
  • screen shot - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • screen shot (screen capture) - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • screencast - A screencast is a digital video recording that captures actions taking place on a computer desktop.
  • Screencast: How to use iTunes to have a successful interview - In this screencast series, learn how to find and use tools that will help you have successful interviews and even land that job - all thanks to iTunes.
  • screened subnet - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • screened subnet (triple-homed firewall) - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • script - In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).
  • script - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • script kiddie - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • script kiddy - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • script kiddy (or script kiddie) - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • scripting language - A scripting language is a form of programming language that is usually interpreted rather than compiled.
  • scrub - Data scrubbing, also referred to as data cleansing, is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted or duplicated.
  • scrubbing - Data scrubbing, also referred to as data cleansing, is the process of amending or removing data in a database that is incorrect, incomplete, improperly formatted or duplicated.
  • Scrum - Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.
  • Scrum Master - A Scrum Master is a facilitator for an Agile development team.
  • SCSA - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • SCSI - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
  • SCSI - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
  • SCSI (Small Computer System Interface) - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
  • SCSI controller (Small Computer System Interface controller) - A SCSI controller, also called a host bus adapter (HBA), is a card or chip that allows a SCSI storage device to communicate with the operating system across a SCSI bus.
  • SCSI Express (SCSIe) - SCSI Express (SCSIe) is an emerging industry standard for a storage interface that runs Small Computer System Interface (SCSI) commands over a PCI Express (PCIe)link.
  • SCTP - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • scuzzy - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
  • SCV - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
  • SD - SD cards use flash memory to provide nonvolatile storage.
  • SD card - SD cards use flash memory to provide nonvolatile storage.
  • SD-branch - SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close