Browse Definitions :

Browse Definitions by Alphabet

SCU - SEC

  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • scuzzy - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
  • SCV - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
  • SD - SD cards use flash memory to provide nonvolatile storage.
  • SD card - SD cards use flash memory to provide nonvolatile storage.
  • SD-branch - SD-branch is a single, automated, centrally managed software-centric platform that replaces or supplements an existing branch network architecture.
  • SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is technology that uses software-defined networking (SDN) concepts to distribute network traffic across a wide area network (WAN).
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
  • SD2 (Sound Designer II or SDII) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDARS - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
  • SDB - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
  • SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
  • SDDL - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • SDH - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
  • SDH (Synchronous Digital Hierarchy) - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
  • SDI - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
  • SDII - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDK - A software development toolkit (SDK) is a set of software tools and programs provided by hardware and software vendors that developers can use to build applications for specific platforms.
  • SDL - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDL (Specification and Description Language) - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDLC - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • SDLC - (SDLC is also an abbreviation for systems development life cycle.
  • SDLC (Synchronous Data Link Control) - (SDLC is also an abbreviation for systems development life cycle.
  • SDLC model - The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
  • SDMA - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • SDN application (software-defined networking application) - An SDN application is a software program designed to perform a task in a software-defined networking (SDN) environment.
  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • SDN overlay (software defined networking overlay) - An SDN overlay is a deployment method for network virtualization and software-defined networking (SDN) that involves running a logically separate network or network component on top of existing infrastructure.
  • SDO - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • SDP - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDR - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
  • SDRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDTV - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • SDWT - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • sea change - A sea change is a significant and/or systemic transformation.
  • search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
  • Search Engine Cheat Sheets - We've gathered cheat sheets for fast reference to search engine-related information.
  • search engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • search engine marketing (SEM) - Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.
  • search engine optimization - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • Search for Extraterrestrial Intelligence - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search for Extraterrestrial Intelligence (SETI) - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search Inside Yourself - Search Inside Yourself is a mindfulness program originally created by Google for its employees in 2012.
  • search neutrality - Search neutrality is the direct conducting of transparent search processes that do not discriminate between users or favor specific sites.
  • search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - Search strings are sequences of characters and words used to find files and their content, database information and web pages.
  • search-based applications (SBAs) - Search-based applications (SBAs) are applications that use a search engine platform as the backbone to access information residing in various file types.
  • searching - On the Internet, searching is just trying to find the information you need.
  • sec - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • SEC - The Securities and Exchange Commission (SEC) is a U.
  • SEC Form 10-K - SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies.
  • SEC Form 10-Q - SEC Form 10-Q is the Securities and Exchange Commission’s form for the quarterly performance filings of public companies.
  • SECAM - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • Seclore Technology (Seclore) - Seclore Technology is a Mumbai-based security software company incubated by the Indian Institute of Technology (IIT) in Bombay.
  • second - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second (s or sec) - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second generation RISC - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • Second Level Address Translation (SLAT) - Second Level Address Translation (SLAT) is a technology designed to reduce the overhead in a hypervisor CPU while easing the management of a hypervisor's memory and is often found with Hyper-V.
  • second level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • Second Life - Second Life is a massive multi-player universe (MMU) set in a 3D virtual worldcreated by San Francisco-based software maker Linden Labs.
  • second-hand - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
  • second-level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • secondary data - Secondary data is research data that has previously been gathered and can be accessed by researchers.
  • secondary storage - Secondary storage is storage for noncritical data that will not be frequently accessed.
  • SecOps - SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.
  • secret key - A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code.
  • secret key algorithm - A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
  • sector - On a computer diskette or hard disk, a sector is one of the "pie slices" the diskette or disk is divided into.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
  • Secure Digital card - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital card (SD card) - SD cards use flash memory to provide nonvolatile storage.
  • Secure Digital Extended Capacity card (SDXC) - A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that has greater storage capacity than the original SD (Secure Digital) memory cards.
  • Secure Electronic Transaction - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure Electronic Transaction (SET) - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • Secure File Transfer Protocol (SSH File Transfer Protocol) - SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems.
  • Secure HTTP - S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
  • Secure Multi Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • Secure Multi-Purpose Internet Mail Extensions - S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system.
  • secure real time transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Real-Time Transport Protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • secure realtime transport protocol - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure RTP - SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features.
  • Secure Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Socket Shell - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Secure Sockets Layer - Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet.
  • Secure Sockets Layer virtual private network - An SSL VPN is a type of virtual private network (VPN) that uses the Secure Sockets Layer (SSL) protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability.
  • Securities and Exchange Act of 1934 (Exchange Act) - The Securities and Exchange Act of 1934 (Exchange Act) is a law that governs secondary trading and stock exchanges.
  • Securities and Exchange Commission - The Securities and Exchange Commission (SEC) is a U.
  • Securities and Exchange Commission (SEC) - The Securities and Exchange Commission (SEC) is a U.
  • security - Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
  • security (finance) - A security, in a financial context, is a certificate or other financial instrument that has monetary value and can be traded.
  • Security Accounts Manager - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
  • Security Accounts Manager (SAM) - The Security Accounts Manager (SAM) is a database in the Windows operating system (OS) that contains user names and passwords.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close