Browse Definitions :

Browse Definitions by Alphabet

SEM - SER

  • Semantic Web - The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a user's needs.
  • semantics - Semantics (pronounced seh-MANT-iks, from Greek semantikos or significant and sema or sign) is the branch of semiotics, the philosophy or study of signs, that deals with meaning.
  • semaphore - In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • semiconductor - A semiconductor is a substance, usually a solid chemical element or compound, that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
  • semiconductor fab - A semiconductor fab is a manufacturing plant in which raw silicon wafers are turned into integrated circuits.
  • Semios mesh network - Semios mesh network is the communications backbone of the Semios orchard farming automation platform.
  • semiotics - Semiotics is the study of the use of symbolic communication.
  • Senate Judiciary Committee (SJC) - The U.S.
  • Sender ID - Sender ID is Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits.
  • sender permitted from - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • sendmail - On the Internet, sendmail is the most popular UNIX-based implementation of the Simple Mail Transfer Protocol (SMTP) for transmitting e-mail.
  • Sensex (BSE Sensex) - The Bombay Stock Exchange's Sensitive Index, called 'Sensex' or 'BSE Sensex' for short, is one of the leading stock market benchmark indices in India.
  • sensitive information - Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
  • Sensitive Personal Data - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • sensor - A sensor is a device that detects and responds to some type of input from the physical environment.
  • sensor analytics - Sensor analytics is the statistical analysis of data that’s created by wired or wireless sensors.
  • sensor data - Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
  • sensor fusion - Sensor fusion is the combined use of multiple types of sensor data for a more complete picture of the sensor’s subject or environment.
  • sensor hub - A sensor hub is a connection point for multiple sensors that uses a multipoint control unit (MCU), coprocessor or digital signal processor (DSP) to compile and process data gathered from those sensors.
  • sentiment analysis (opinion mining) - Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.
  • SEO - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • SEO (search engine optimization) - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • SEO poisoning (search poisoning) - Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results.
  • Sequenced Packet Exchange - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • Sequenced Packet Exchange (SPX) - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • SequenceFile - A SequenceFile is a flat, binary file type that serves as a container for data to be used in Hadoop distributed compute projects.
  • sequencer - In digital audio recording, a sequencer is a program in a computer or stand-alone keyboard unit that puts together a sound sequence from a series (or sequence) of Musical Instrument Digital Interface (MIDI) events (operations).
  • sequential consistency - In computers, sequential consistency is best defined by its inventor, Leslie Lamport, who declared that a multiprocessing system had sequential consistency if:".
  • Sequential Couleur avec Memoire - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • Sequential Couleur avec Memoire (SECAM) - SECAM (Sequential Couleur avec Memoire) is the television display technology that is standard in France, the countries of the former Soviet Union, and certain other countries.
  • sequential logic - Sequential logic is a form of binary circuit design that employs one or more inputs and one or more outputs, whose states are related by defined rules that depend, in part, on previous states.
  • SerDes - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • SerDes (serializer/deserializer) - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serendipity - In general, serendipity is the act of finding something valuable or delightful when you are not looking for it.
  • Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
  • serial - Serial means one event at a time.
  • Serial Advanced Technology Attachment - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
  • Serial ATA - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
  • Serial ATA (Serial Advanced Technology Attachment or SATA) - The SATA storage protocol transmits data in serial fashion between hard drives and computer systems.
  • serial attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial communications interface - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • serial communications interface (SCI) - A serial communications interface (SCI) is a device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, or mice.
  • Serial Digital Interface - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
  • Serial Digital Interface (SDI) - Serial Digital Interface (SDI) is a standard for digital video transmission over coaxial cable.
  • Serial Line Internet Protocol (SLIP) - SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other.
  • serial peripheral interface - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial peripheral interface (SPI) - In a computer, a serial peripheral interface (SPI) is an interface that enables the serial (one bit at a time) exchange of data between two devices, one called a master and the other called a slave.
  • serial port server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • serial port server (serial server or port redirector) - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
  • serial presence detect - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • Serial Storage Architecture - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
  • Serial Storage Architecture (SSA) - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
  • serial-attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached SCSI (SAS) - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached storage - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer/deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serigraphy - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • Serious Organized Crime Agency - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • Serious Organized Crime Agency (SOCA) - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • serious reportable event - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • SERMO - SERMO is an online social network of verified physicians where they can anonymously discuss patient cases and non-medical subjects.
  • servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
  • server - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • server accelerator card - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
  • server accelerator card (SSL card) - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
  • server blade - A server blade is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a blade server, which is a space-saving rack with many similar servers.
  • server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
  • server farm - A server farm is a group of computers acting as servers and housed together in a single location.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
  • Server Message Block Protocol - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • Server Message Block Protocol (SMB protocol) - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • server push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server refresh cycle - The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center.
  • server side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
  • server space provider - A server space provider is an individual, company, or organization that provides storage space on a server for Web pages, usually for a charge.
  • server sprawl - Server sprawl is a situation in which multiple, under-utilized servers take up more space and consume more resources than can be justified by their workload.
  • server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.
  • server-based computing - A thin client, sometimes called a lean client, is a low-cost, centrally-managed computer that relies heavily on a server for its computational role.
  • server-based SSD - A server-based SSD is a solid state drive that may be manufactured in a PCI Express form factor.
  • server-based storage - Server-based storage is a re-emerging class of data storage that removes cost and complexity by housing storage media inside servers rather than in dedicated and custom-engineered storage arrays.
  • server-push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server-side flash - Server-side flash is the use of a solid state drive with flash memory in a server.
  • server-side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
  • server-side include (SSI) - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
  • serverless backup - Serverless data backup removes backup procedures from production servers so that the time usually spent on backup functions can be used for other server tasks.
  • serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
  • servers - A server is a computer program that provides a service to another computer programs (and its user).
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • service contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close