Browse Definitions :

Browse Definitions by Alphabet

SD- - SEC

  • SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is technology that uses software-defined networking (SDN) concepts to distribute network traffic across a wide area network (WAN).
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
  • SD2 (Sound Designer II or SDII) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDARS - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
  • SDB - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
  • SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
  • SDDL - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • SDH - Synchronous Digital Hierarchy (SDH) is a group of fiber optic transmission rates that transport digital signals with different capacities.
  • SDI - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • SDII - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDK - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
  • SDL - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDL (Specification and Description Language) - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDLC - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • SDLC - Synchronous Data Link Control (SDLC) is a transmission protocol used to synchronously transfer code-transparent, serial-by-bit data over a communications channel.
  • SDLC model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • SDMA - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • SDN application (software-defined networking application) - An SDN application is a software program designed to perform a task in a software-defined networking (SDN) environment.
  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • SDN overlay (software defined networking overlay) - An SDN overlay is a deployment method for network virtualization and software-defined networking (SDN) that involves running a logically separate network or network component on top of existing infrastructure.
  • SDO - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • SDP - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDR - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
  • SDRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDTV - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • SDWT - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • sea change - A sea change is a significant and/or systemic transformation.
  • search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
  • search engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • search engine marketing (SEM) - Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.
  • search engine optimization - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • Search for Extraterrestrial Intelligence - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search for Extraterrestrial Intelligence (SETI) - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search Inside Yourself - Search Inside Yourself is a mindfulness program originally created by Google for its employees in 2012.
  • search neutrality - Search neutrality is the direct conducting of transparent search processes that do not discriminate between users or favor specific sites.
  • search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - Search strings are sequences of characters and words used to find files and their content, database information and web pages.
  • search-based applications (SBAs) - Search-based applications (SBAs) are applications that use a search engine platform as the backbone to access information residing in various file types.
  • SEC - The Securities and Exchange Commission (SEC) is a U.
  • sec - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • SEC Form 10-K - SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies.
  • SEC Form 10-Q - SEC Form 10-Q is the Securities and Exchange Commission’s form for the quarterly performance filings of public companies.
  • SECAM - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • Seclore Technology (Seclore) - Seclore Technology is a Mumbai-based security software company incubated by the Indian Institute of Technology (IIT) in Bombay.
  • second - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second (s or sec) - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second generation RISC - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • Second Level Address Translation (SLAT) - Second Level Address Translation (SLAT) is a technology designed to reduce the overhead in a hypervisor CPU while easing the management of a hypervisor's memory and is often found with Hyper-V.
  • second level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • second-hand - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
  • second-level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
  • secondary storage - Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary storage or that doesn't have the same performance or availability requirements.
  • SecOps - SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.
  • secret key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.
  • secret key algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
  • sector - On a computer diskette or hard disk, a sector is one of the "pie slices" the diskette or disk is divided into.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
  • Secure Digital card - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
  • Secure Electronic Transaction - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the integrity and security of transactions conducted over the internet.
  • Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
  • Secure HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
  • Secure Multi Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • Secure Multi-Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • secure real time transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Real-Time Transport Protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • secure realtime transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure RTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Socket Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Sockets Layer - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
  • Secure Sockets Layer virtual private network - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
  • Securities and Exchange Commission - The Securities and Exchange Commission (SEC) is a U.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is a U.
  • security - Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
  • security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
  • Security Accounts Manager - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • Security Accounts Manager (SAM) - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • security analytics - Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.
  • Security as a Service - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Security Assertion Markup Language - The Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems.
  • security audit - A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.
  • security awareness training - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • security certification - Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².
  • security clearance - A security clearance is an authorization that allows access to information that would otherwise be forbidden.
  • security debt - Security debt is a variant of technical debt that occurs when organizations do not invest enough money or resources into security efforts upfront.
  • Security Descriptor Definition Language - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close