Browse Definitions :

Browse Definitions by Alphabet

SET - SIG

  • SET - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • set theory - A set is a group or collection of objects or numbers, considered as an entity unto itself.
  • SETI - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • seven-segment display - A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.
  • severance agreement - A severance agreement is a contract between an employer and employee documenting the rights and responsibilities of both parties in the event of job termination.
  • severance package - A severance package is the contracted pay and benefits provided to an employee whose job is terminated.
  • SEWP IV - NASA Solutions for Enterprise-Wide Procurement (SEWP) IV is a contract issued by NASA's SEWP BOWL (Solutions for Enterprise-Wide Procurement Business Operations and Workstation Laboratory) to a commercial technology vendor.
  • SFA - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • SFA - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
  • SFF - Small form factor (SFF) refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
  • SFP - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
  • SFS - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
  • SFX - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SGI - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • SGI (Silicon Graphics) - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • SGML - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • SGRAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
  • shadow app - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • shadow password file - A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.
  • shadow RAM - Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a special area of random access memory (RAM) so that they can be accessed more quickly.
  • Shamoon - Shamoon, also called W32.
  • Shannon, Claude - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
  • sharding - Sharding is a type of database partitioning that is used to separate very large databases the into smaller, faster, more easily managed pieces called data shards.
  • share of wallet (SOW) or wallet share - Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.
  • Shareable Content Object Reference Model - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
  • Shared Assessments Program - Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.
  • Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
  • Shared Key Authentication - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared memory - In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.
  • shared nothing live migration - Shared nothing live migration is a term used to describe the process of moving a virtual machine (VM) from one physical host to another, without the need for clustering or a common shared storage location.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • shared secret - A shared secret is data known to only the two entities involved in a communication so that either party's possession of that data can be provided as proof of identity for authentication.
  • shared services - Shared services is the consolidation of business operations that are used by multiple parts of the same organization.
  • shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
  • Sharepoint - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • SharePoint 2013 Design Manager snippet - A SharePoint 2013 Design Manager snippet is HTML markup that can be copied and pasted into a SharePoint Master Page Design file.
  • SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shebang - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • sheep - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
  • sheep dipping - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip computer - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
  • shelfware - Shelfware is IT slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.
  • shelfware - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • shell - Shell is a UNIX term for the interactive user interface with an operating system.
  • shell command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • Shellshock - Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including Linux and Mac OS X, and allows attackers to remotely gain complete control of a system.
  • shielded twisted pair (STP) - Shielded twisted pair (STP) is a special kind of copper telephone and local area network (LAN) wiring used in some business installations.
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • Shimmer - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a multimedia recording that allows a user to initiate an order from within the video.
  • shopping cart software - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • Short Message Service - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • Short Message Service (SMS) - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • short message service center - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short messaging - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • short messaging service spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
  • shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
  • shotgun debugging - Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.
  • should-cost analysis (should-cost review) - A should-cost analysis, also called a should-cost review, is a procurement strategy for cost optimization in which the customer reverse engineers the cost of producing a finished product or service and uses that information to negotiate a contract.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • show-me marketing - Show-me marketing is the practice of telling a brand's story and engaging consumers through pictures, videos and other visual media.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • SHTML - A Web file with the suffix of ".
  • Si - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • SI - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • SI - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
  • SIBR - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SIBR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Siebel Systems - Siebel Systems is a prominent vendor of interoperable e-business software.
  • siemens - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIG - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIG (Special Interest Groups) - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close