Browse Definitions :

Browse Definitions by Alphabet

SCR - SEC

  • screen pop - A screen pop is a feature of a computer telephony integration (CTI) application that automatically displays all of the relevant caller and account information on a call center agent's screen during a call.
  • screen printing - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • screen printing (serigraphy) - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • screen saver - A screen saver is an animated image that is activated on a personal computer display when no user activity has been sensed for a certain time.
  • screen scraping - Screen scraping is programming that translates between legacy application programs (written to communicate with now generally obsolete input/output devices and user interfaces) and new user interfaces so that the logic and data associated with the legacy programs can continue to be used.
  • screen shot - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • screen shot (screen capture) - A screen shot (sometimes called a screen capture) is an image of a computer desktop that can be saved as a graphics file.
  • screencast - A screencast is a digital video recording that captures actions taking place on a computer desktop.
  • Screencast: How to use iTunes to have a successful interview - In this screencast series, learn how to find and use tools that will help you have successful interviews and even land that job - all thanks to iTunes.
  • screened subnet - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • screened subnet (triple-homed firewall) - A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single firewall with three network interfaces.
  • script - In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).
  • script - An interpreted program, sometimes called a script, is a program whose instructions are actually a logically sequenced series of operating system commands, handled one at a time by a command interpreter.
  • script kiddie - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • script kiddy - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • script kiddy (or script kiddie) - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • scripting language - A scripting language is a form of programming language that is usually interpreted rather than compiled.
  • scrub - Data scrubbing, also called data cleansing, is the process of cleaning up data in a database that is incorrect, incomplete, or duplicated.
  • scrubbing - Data scrubbing, also called data cleansing, is the process of cleaning up data in a database that is incorrect, incomplete, or duplicated.
  • Scrum - Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.
  • scrum master - A scrum master is the facilitator for a product development team that uses scrum, a rugby analogy for a development methodology that allows a team to self-organize and make changes quickly.
  • SCSA - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • SCSI - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
  • SCSI - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
  • SCSI (Small Computer System Interface) - Definition: The Small Computer System Interface (SCSI) is a set of parallel interface standards used to attach disk drives and other peripherals to a computer.
  • SCSI controller (Small Computer System Interface controller) - A SCSI controller, also called a host bus adapter (HBA), is a card or chip that allows a SCSI storage device to communicate with the operating system across a SCSI bus.
  • SCSI Express (SCSIe) - SCSI Express (SCSIe) is an emerging industry standard for a storage interface that runs Small Computer System Interface (SCSI) commands over a PCI Express (PCIe)link.
  • SCTP - SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network.
  • SCTP (Stream Control Transmission Protocol) - SCTP (Stream Control Transmission Protocol) is a protocol for transmitting multiple streams of data at the same time between two end points that have established a connection in a network.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • scuzzy - Definition: Learn what the SCSI (Small Computer System Interface) is, what part it played in the history of personal computing and how it is used today.
  • SCV - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination.
  • SD - SD cards use flash memory to provide nonvolatile storage.
  • SD card - SD cards use flash memory to provide nonvolatile storage.
  • SD-branch - SD-branch is a single, automated, centrally managed hardware platform and framework that supports SD-WAN, routing, integrated security and LAN/Wi-Fi functions.
  • SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is a technology to distribute network traffic across wide area networks (WAN) that uses software-defined networking (SDN) concepts to automatically determine the most effective way to route traffic to and from branch offices and data center sites.
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh-based recording/editing products.
  • SD2 - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SD2 (Sound Designer II or SDII) - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDARS - Satellite radio, more formally known as Satellite Digital Audio Radio Service (SDARS), is a broadcasting network in which digital high-fidelity (hi-fi) audio entertainment is transmitted from orbiting satellites to receivers on the surface.
  • SDB - A Small Disadvantaged Business describes any small business concern that is at least 51 percent owned by one or more individuals who are both socially and economically disadvantaged.
  • SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
  • SDDL - Security Descriptor Definition Language (SDDL) is a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system.
  • SDH - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
  • SDH (Synchronous Digital Hierarchy) - SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.
  • SDI - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
  • SDII - SDII (Sound Designer II, sometimes seen abbreviated as SD2) is a monophonic/stereophonic audio file format, originally developed by Digidesign for their Macintosh -based recording/editing products.
  • SDK - A software developer's kit (SDK) is a set of programs used by a computer programmer to write application programs.
  • SDL - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDL (Specification and Description Language) - SDL (Specification and Description Language) is a program design and implementation language that is used to build real-time event-driven systems that involve parallel processing.
  • SDLC - The software development life cycle (SDLC) is a conceptual model, used in project management, to describe the stages and tasks involved in each step of a project to write and deploy software.
  • SDLC - (SDLC is also an abbreviation for systems development life cycle.
  • SDLC (Synchronous Data Link Control) - (SDLC is also an abbreviation for systems development life cycle.
  • SDLC model - The software development life cycle (SDLC) is a conceptual model, used in project management, to describe the stages and tasks involved in each step of a project to write and deploy software.
  • SDMA - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • SDN application (software-defined networking application) - An SDN application is a software program designed to perform a task in a software-defined networking (SDN) environment.
  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • SDN overlay (software defined networking overlay) - An SDN overlay is a deployment method for network virtualization and software-defined networking (SDN) that involves running a logically separate network or network component on top of existing infrastructure.
  • SDP - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDP (Session Description Protocol) - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • SDR - Software-defined radio (SDR), sometimes shortened to software radio (SR), refers to wireless communication in which the transmitter modulation is generated or defined by a computer, and the receiver uses a computer to recover the signal intelligence.
  • SDRAM - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDRAM (synchronous DRAM) - SDRAM (synchronous DRAM) is a generic name for various kinds of dynamic random access memory (DRAM) that are synchronized with the clock speed that the microprocessor is optimized for.
  • SDTV - Standard definition television (SDTV) is a digital television (DTV) format that provides a picture quality similar to digital versatile disk (DVD).
  • SDWT - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • sea change - A sea change is a significant and/or systemic transformation.
  • sealed box computer - A disposable PC is a relatively inexpensive but full-featured personal computer that is designed to be discarded rather than fixed when serious problems arise.
  • seamless interface - A seamless interface is the joining of two computer programs so that they appear to be one program with a single user interface.
  • search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
  • Search Engine Cheat Sheets - We've gathered cheat sheets for fast reference to search engine-related information.
  • search engine hacking - Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet.
  • search engine marketing (SEM) - Search engine marketing (SEM) is an approach to advertising that helps companies' content rank higher in search engine queries.
  • search engine optimization - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • Search for Extraterrestrial Intelligence - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search for Extraterrestrial Intelligence (SETI) - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • Search Inside Yourself - Search Inside Yourself is a mindfulness program originally created by Google for its employees in 2012.
  • search neutrality - Search neutrality is the direct conducting of transparent search processes that do not discriminate between users or favor specific sites.
  • search operator - A search operator (sometimes referred to as a search parameter) is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - Search strings are sequences of characters and words used to find files and their content, database information and web pages.
  • search-and-replace - Search-and-replace is a capability that allows a computer user to find a given sequence of characters in one or more text files and, if desired, replace the sequence with another sequence of characters.
  • search-based applications (SBAs) - Search-based applications (SBAs) are applications that use a search engine platform as the backbone to access information residing in various file types.
  • searching - On the Internet, searching is just trying to find the information you need.
  • seat - In a networked computer system, a seat is a workstation that can be operated by one user at a time.
  • seat management - Seat management is a method of coordinating all the workstations in an enterprise network by overseeing the installation, operation, and maintenance of hardware and software at each workstation.
  • sec - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • SEC - The Securities and Exchange Commission (SEC) is a U.
  • SEC Form 10-K - SEC Form 10-K is the United States Securities and Exchange Commission’s form for the annual performance filings of public companies.
  • SEC Form 10-Q - SEC Form 10-Q is the Securities and Exchange Commission’s form for the quarterly performance filings of public companies.
  • SECAM - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • Seclore Technology (Seclore) - Seclore Technology is a Mumbai-based security software company incubated by the Indian Institute of Technology (IIT) in Bombay.
  • second - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second (s or sec) - The second (abbreviation,s or sec) is the Standard International (SI) unit of time.
  • second generation RISC - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • Second Level Address Translation (SLAT) - Second Level Address Translation (SLAT) is a technology designed to reduce the overhead in a hypervisor CPU while easing the management of a hypervisor's memory and is often found with Hyper-V.
  • second level domain - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • Second Life - Second Life is a massive multi-player universe (MMU) set in a 3D virtual worldcreated by San Francisco-based software maker Linden Labs.
  • second-hand - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • second-level address translation (SLAT) - Second-level address translation (SLAT) is a hardware virtualization technology that reduces hypervisor overhead.
  • second-level domain (SLD) - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close