Browse Definitions :

Browse Definitions by Alphabet

SEC - SER

  • security event - A security event is a change in the everyday operations of a network or IT service, indicating that an security policy may have been violated or a security safeguard may have failed.
  • security ID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security incident - A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed.
  • security information and event management (SIEM) - Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.
  • security information management - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • security intelligence (SI) - Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
  • security operations center (SOC) - A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information security who monitors, analyzes and protects an organization from cyber attacks.
  • security policy - A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT) assets.
  • security posture - Security posture refers to an organization's overall cybersecurity strength and how well it can predict, prevent and respond to ever-changing cyberthreats.
  • security theater - Security theater includes any measures taken by a company or security team to create an atmosphere of safety that may only achieve the appearance of heightened security.
  • security through minority - Security through minority is an approach that relies upon infrequently-used code for its effectiveness.
  • security through obscurity - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted.
  • security through obsolescence - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public.
  • security token - A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
  • security token - A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login process.
  • Security Trust and Assurance Registry - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • Security, Trust and Assurance Registry (STAR) - The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls.
  • SED - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • SED TV (surface-conduction electron-emitter display television) - SED (surface-conduction electron-emitter display) is a flat-panel, high-resolution display developed by Canon and Toshiba that will compete with LCD and plasma displays.
  • Seebeck effect - The Seebeck effect describes the generation of electricity following the connection of two dissimilar electrical conductors or semiconductors that illustrates the thermoelectric effect.
  • seed capital - Seed capital is the funding required to get a new business started.
  • segment - A segment is a defined portion or section of something larger such as a database, geometric object, or network.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • segmentation - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmentation and reassembly - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • segmented memory - Segmented memory is a system of addressing computer memory, which may be physical or virtual and may be operating in real or protected mode.
  • segregation of duties (SoD) - Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task.
  • SEI - The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security.
  • selective outsourcing - Selective outsourcing is a targeted sourcing strategy that relies upon sending very specific functions and work off-premises while keeping other functions on-premises.
  • self checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • Self Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • self scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-directed work team - A self-directed work team (SDWT) is a group of people, usually employees in a company, who combine different skills and talents to work without the usual managerial supervision toward a common purpose or goal.
  • self-driving car (autonomous car or driverless car) - A self-driving car (sometimes called an autonomous car or driverless car) is a vehicle that uses a combination of sensors, cameras, radar and artificial intelligence (AI) to travel between destinations without a human operator.
  • Self-Monitoring Analysis & Reporting Technology - Self-Monitoring Analysis and Reporting Technology (S.
  • self-scanning - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service cloud computing - Self-service cloud computing is a form of private cloud service where the customer provisions storage and launches applications without going through an external cloud service provider.
  • self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
  • self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
  • selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
  • selfie pay authentication - Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.
  • SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
  • SEM - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
  • semantic network (knowledge graph) - A semantic network is a knowledge structure that illustrates how concepts are related to one another and how they interconnect.
  • semantic search - Semantic search is an approach to locating information on the internet in which programming predicts context for a query.
  • semantic technology - Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.
  • semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • semiconductor - A semiconductor is a substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
  • semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
  • Semios mesh network - Semios mesh network is the communications backbone of the Semios orchard farming automation platform.
  • semiotics - Semiotics is the study of the use of symbolic communication.
  • Senate Judiciary Committee (SJC) - The U.S.
  • sender pays - E-mail postage (sometimes referred to as sender pays) is a proposed system that would involve charging senders a very small amount of money (sometimes called a micropayment) for the delivery of each e-mail message sent.
  • sender permitted from - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sensex (BSE Sensex) - The Bombay Stock Exchange's Sensitive Index, called 'Sensex' or 'BSE Sensex' for short, is one of the leading stock market benchmark indices in India.
  • sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • Sensitive Personal Data - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • sensor analytics - Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors.
  • sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
  • sensor fusion - Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.
  • sensor hub - A sensor hub is a connection point for multiple sensors that uses a multipoint control unit (MCU), coprocessor or digital signal processor (DSP) to compile and process data gathered from those sensors.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SEO - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
  • Sequenced Packet Exchange - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
  • Sequential Couleur avec Memoire - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • sequential logic - Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.
  • SerDes - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
  • serial - Serial means one event at a time.
  • Serial Advanced Technology Attachment - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
  • Serial ATA - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
  • Serial ATA (Serial Advanced Technology Attachment or SATA) - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • serial attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial communications interface - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • Serial Digital Interface - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • serial digital interface (SDI) - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • Serial Line Internet Protocol - SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.
  • serial peripheral interface - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial peripheral interface (SPI) - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial port server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close