Browse Definitions :

Browse Definitions by Alphabet

SER - SES

  • serial position effect - The serial position effect is the psychological tendency to remember the first and last items in a list better than those in the middle.
  • serial presence detect - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial presence detect (SPD) - When a computer is booted (started), serial presence detect (SPD) is information stored in anelectrically erasable programmable read-only memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM) memory module that tells thebasic input/output system (BIOS) the module's size, data width, speed, and voltage.
  • serial server - A serial port server, also called a serial server or port redirector, is a device that transfers data between a computer serial port (COM port) and an Ethernet local area network (LAN).
  • Serial Storage Architecture - Serial Storage Architecture (SSA) is an open standard for high-speed access to high-capacity disk storage.
  • serial-attached SCSI - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached SCSI (SAS) - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serial-attached storage - Serial-attached SCSI (SAS) is a point-to-point protocol used to transfer digital data between servers and SAS storage devices.
  • serializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serializer/deserializer - A SerDes or serializer/deserializer is an integrated circuit (IC or chip) transceiver that converts parallel data to serial data and vice-versa.
  • serigraphy - Screen printing, also known as serigraphy, is a method of creating an image on paper, fabric or some other object by pressing ink through a screen with areas blocked off by a stencil.
  • Serious Organized Crime Agency - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • Serious Organized Crime Agency (SOCA) - The Serious Organized Crime Agency (SOCA) is a policing agency dedicated to the identification of criminal activity related to drug trafficking, money laundering, identity theft and immigration.
  • serious reportable event - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • SERMO - SERMO is an online social network of verified physicians where they can anonymously discuss patient cases and non-medical subjects.
  • servant leadership - Servant leadership is a leadership philosophy built on the belief that the most effective leaders strive to serve others, rather than accrue power or take control.
  • server accelerator card - A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.
  • server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
  • server farm - A server farm is a group of computers acting as servers and housed together in a single location.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • server hardware degradation - Server hardware degradation is the gradual breakdown of the physical parts of a server.
  • Server Message Block Protocol - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • Server Message Block protocol (SMB protocol) - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • server push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server refresh cycle - The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center.
  • server side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
  • server space provider - A server space provider is an individual, company, or organization that provides storage space on a server for Web pages, usually for a charge.
  • server stack - A server stack is the collection of software that forms the operational infrastructure on a given machine.
  • server-based computing - A thin client (or lean client) is a virtual desktop computing model that runs on the resources stored on a central server instead of a computer's resources.
  • server-based SSD - A server-based SSD is a solid state drive that may be manufactured in a PCI Express form factor.
  • server-based storage - Server-based storage is a re-emerging class of data storage that removes cost and complexity by housing storage media inside servers rather than in dedicated and custom-engineered storage arrays.
  • server-push - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • server-side flash - Server-side flash is the use of a solid state drive with flash memory in a server.
  • server-side include - A server-side include is a variable value (for example, a file "Last modified" date) that a server can include in an HTML file before it sends it to the requestor.
  • serverless backup - Serverless data backup removes backup procedures from production servers so that the time usually spent on backup functions can be used for other server tasks.
  • serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
  • servers - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • service assurance - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • service component architecture - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • Service Data Objects - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service discovery - Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.
  • Service Integration Maturity Model - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
  • Service Integration Maturity Model (SIMM) - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
  • service level - Service level describes, usually in measurable terms, the services a network service provider furnishes a customer within a given time period.
  • service level agreement - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service level indicator - A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.
  • service lifecycle management (SLM) - Service lifecycle management (SLM) describes the strategy and software for managing the maintenance and repair of products and maximizing the profit opportunities from these activities.
  • Service Location Protocol - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • Service Organization Control 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Service Organization Control 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Service Organization Control 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • service oriented architecture - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • service oriented integration - SOI is also an abbreviation for Silicon-On-Insulator.
  • service oriented management - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
  • Service Profile Identifier - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
  • Service Profile Identifier (SPID) - In telecommunications, a Service Profile Identifier (SPID) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network (ISDN) B-channel.
  • service set identifier - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
  • service set identifier (SSID) - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
  • service supply chain - The service supply chain is the part of the supply chain dedicated to providing service on products.
  • service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
  • service-component architecture - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service-level agreement - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
  • service-oriented architecture - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • service-oriented integration - SOI is also an abbreviation for Silicon-On-Insulator.
  • service-oriented management - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
  • ServiceNow - ServiceNow is a cloud-based company that provides software as a service (SaaS) for technical management support.
  • Services Provisioning Markup Language - SPML (Services Provisioning Markup Language) is an Extensible Markup Language (XML)-based language that facilitates the exchange of provisioning information among applications and organizations, corporations, or agencies.
  • servlet - A servlet is a small program that runs on a server.
  • servo (servomechanism) - A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.
  • Session Announcement Protocol (SAP) - Session Announcement Protocol (SAP) is a protocol used to define the format and describe the information that will be exchanged during a multicast conferencing session.
  • session border controller - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • session control protocol (SCP) - Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection.
  • session cookie - On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.
  • Session Description Protocol - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • session hijacking - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • session hijacking (TCP session hijacking) - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • session ID - A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session).
  • Session Initiation Protocol - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • Session Initiation Protocol trunking - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • session key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • session prediction (credential/session prediction) - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • session replay script - A session replay script is a program that enables the recording of website users’ keystrokes, clicks, mouse movements and scrolling behavior, along with the full contents of the pages they visit, and sends them to third-party servers.
  • session-based routing - Session-based routing is a type of routing architecture that is application-centric and designed to route entire sessions instead of individual packets.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close