Browse Definitions :

Browse Definitions by Alphabet

SEL - SER

  • self-scanning checkout - Self-scanning checkout, also called "self-checkout" is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance.
  • self-service analytics - Self-service analytics is an approach to advanced analytics that gives the ability to conduct analyses to business users, rather than data scientists.
  • self-service business intelligence - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions like data mining and statistical analysis.
  • self-service cloud computing - Self-service cloud computing is a form of private cloud service where the customer provisions storage and launches applications without going through an external cloud service provider.
  • self-service rate (self-service bounce rate) - Self-service rate, also known as self-service completion rate, is a key performance indicator (KPI) used to analyze the effectiveness of a help desk or support team by measuring the percentage of issues that users are able to troubleshoot on their own.
  • self-sovereign identity - Self-sovereign identity (SSI) is a model for managing digital identities in which an individual or business has sole ownership over the ability to control their accounts and personal data.
  • selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
  • selfie pay authentication - Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.
  • SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
  • SEM - Single-electron memory (SEM) refers to experimental hardware technologies in which the position or presence of a single charge carrier, usually an electron, makes the difference between the logical low (0) and high (1) states in a digital system.
  • semantic network (knowledge graph) - A semantic network is a knowledge structure that illustrates how concepts are related to one another and how they interconnect.
  • semantic search - Semantic search is an approach to locating information on the internet in which programming predicts context for a query.
  • semantic technology - Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.
  • semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • semiconductor - A semiconductor is a substance that has specific electrical properties that enable it to serve as a foundation for computers and other electronic devices.
  • semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
  • Semios mesh network - Semios mesh network is the communications backbone of the Semios orchard farming automation platform.
  • semiotics - Semiotics is the study of the use of symbolic communication.
  • Senate Judiciary Committee (SJC) - The U.S.
  • sender permitted from - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sensex (BSE Sensex) - The Bombay Stock Exchange's Sensitive Index, called 'Sensex' or 'BSE Sensex' for short, is one of the leading stock market benchmark indices in India.
  • sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • Sensitive Personal Data - Consumer privacy, also known as customer privacy, involves the handling and protection of the sensitive personal information provided by customers in the course of everyday transactions.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • sensor analytics - Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors.
  • sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
  • sensor fusion - Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.
  • sensor hub - A sensor hub is a connection point for multiple sensors that uses a multipoint control unit (MCU), coprocessor or digital signal processor (DSP) to compile and process data gathered from those sensors.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
  • Sequenced Packet Exchange - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
  • sequential logic - Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.
  • SerDes - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
  • serial - Serial means one event at a time.
  • Serial Advanced Technology Attachment - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • Serial ATA - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • Serial ATA (Serial Advanced Technology Attachment or SATA) - Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is transferred between a computer's motherboard and mass storage devices, such as hard disk drives (HDDs), optical drives and solid-state drives (SSDs).
  • serial attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial communications interface - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • Serial Digital Interface - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • serial digital interface (SDI) - Serial digital interface (SDI) is a standard for digital video and audio transmission over coaxial or fiber optic cabling.
  • serial peripheral interface - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial peripheral interface (SPI) - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
  • serial presence detect - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial-attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached SCSI (SAS) - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached storage - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer/deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serigraphy - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • serious reportable event - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • SERMO - SERMO is an online social network of verified physicians where they can anonymously discuss patient cases and non-medical subjects.
  • servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
  • server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
  • server farm - A server farm is a group of computers acting as servers and housed together in a single location.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
  • Server Message Block Protocol - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • Server Message Block protocol (SMB protocol) - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • server push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server refresh cycle - The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center.
  • server space provider - A server space provider is an individual, company, or organization that provides storage space on a server for Web pages, usually for a charge.
  • server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.
  • server-based computing - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
  • server-based SSD - A server-based SSD is a solid state drive that may be manufactured in a PCI Express form factor.
  • server-based storage - Server-based storage is a re-emerging class of data storage that removes cost and complexity by housing storage media inside servers rather than in dedicated and custom-engineered storage arrays.
  • server-push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server-side flash - Server-side flash is the use of a solid state drive with flash memory in a server.
  • serverless backup - Serverless data backup removes backup procedures from production servers so that the time usually spent on backup functions can be used for other server tasks.
  • serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
  • servers - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • service assurance - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • service component architecture - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • Service Data Objects - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service discovery - Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.
  • service level - Service level describes, usually in measurable terms, the services a network service provider furnishes a customer within a given time period.
  • service level agreement - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service level indicator - A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.
  • service lifecycle management (SLM) - Service lifecycle management (SLM) describes the strategy and software for managing the maintenance and repair of products and maximizing the profit opportunities from these activities.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • Service Organization Control 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Service Organization Control 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

  • click fraud (pay-per-click fraud)

    Click fraud -- sometimes called 'pay-per-click fraud' -- is a type of fraud that artificially inflates traffic statistics for ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close