Browse Definitions :

Browse Definitions by Alphabet

SHO - SIN

  • short messaging service spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
  • shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
  • shotgun debugging - Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.
  • should-cost analysis (should-cost review) - A should-cost analysis, also called a should-cost review, is a procurement strategy for cost optimization in which the customer reverse engineers the cost of producing a finished product or service and uses that information to negotiate a contract.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • show-me marketing - Show-me marketing is the practice of telling a brand's story and engaging consumers through pictures, videos and other visual media.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • SI - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
  • Si - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • SI - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • SIBR - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SIBR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • side-channel attack - A side-channel attack is a security exploit that aims to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly.
  • sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • siemens - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIG - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIG (Special Interest Groups) - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal - In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another.
  • signal-to-noise ratio - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired signal relative to background noise (undesired signal).
  • signaling - In telephony, signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.
  • Signaling System 7 - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunication protocol standard that defines how the network elements in a public switched telephone network (PSTN) exchange information and control signals.
  • Signalling Connection Control Part - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • signature analysis - Signature analysis has two meanings.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • significant figures - The term significant figures refers to the number of important single digits (0 through 9 inclusive) in the coefficient of an expression in scientific notation.
  • silence suppression - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • silent attrition - Silent attrition is a situation in which customers stop patronizing a business without any communication.
  • silent monitoring - Silent monitoring refers to the practice of call center managers or senior agents listening to the interaction between an incoming caller and an agent.
  • silicon - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • silicon (Si) - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • Silicon Graphics - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
  • Silicon Valley - Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.
  • Silverlight - Silverlight is: (1) A programming model for developing and distributing rich Internet applications (RIA) that use graphics, animations or video within the .
  • SIM - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • SIMD - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • SIMM - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • SIMM (single in-line memory module) - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • SIMO - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
  • SIMO (single input, multiple output) - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
  • simple inexpensive mobile computer - The Simputer (short for simple inexpensive mobile computer) is an inexpensive, Web-enabled handheld computer designed for use by people in developing countries.
  • Simple Mail Transfer Protocol - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • Simple Network Management Protocol - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network (LAN) or wide area network (WAN).
  • Simple Object Access Protocol - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
  • simplex - Simplex is a communications mode in which only one signal is transmitted, and it always goes in the same direction.
  • simplex - In telecommunication, duplex communication means that both ends of the communication can send and receive signals at the same time.
  • SimpliVity - SimpliVity Corp.
  • Simputer - The Simputer (short for simple inexpensive mobile computer) is an inexpensive, Web-enabled handheld computer designed for use by people in developing countries.
  • Simula - Simula, short for "simulation language," was the first object-oriented programming language.
  • Simula (simulation language) - Simula, short for "simulation language," was the first object-oriented programming language.
  • simulation language - Simula, short for "simulation language," was the first object-oriented programming language.
  • simulator sickness - Simulator sickness is a form of motion sickness related to interacting with a simulated environment.
  • simultaneous localization and mapping - Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.
  • simultaneous peripheral operations online - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • sine wave - A waveform is a representation of how alternating current (AC) varies with time.
  • Single Carrier Radio Transmission Technology - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • single factor authentication - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • single in line memory module - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • single in-line memory module - A SIMM (single in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit board with pins that connect to the computer motherboard.
  • single input multiple output - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
  • single input single output - SISO (single input, single output) refers to a wireless communications system in which one antenna is used at the source (transmitter) and one antenna is used at the destination (receiver).
  • single instance storage - Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant copies of data and reduces storage overhead.
  • Single Instruction Multiple Data - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
  • Single Instruction Multiple Data (SIMD) - As one of the three performance enhancements of MMX, SIMD lets one microinstruction operate at the same time on multiple data items.
  • single level cell flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
  • Single namespace - A single namespace is one presentation of file system data.
  • single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
  • single point of failure - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system in which one fault or malfunction causes an entire system to stop operating.
  • single point of failure (SPOF) - A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system.
  • Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
  • Single Root I/O Virtualization (SR-IOV) - Single Root I/O Virtualization (SR-IOV) is a peripheral component interconnect (PCI) Special Interest Group specification for sharing PCIe devices within a single computer.
  • single sign on - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
  • single sign-on - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
  • single sign-on (SSO) - Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a name and password -- to access multiple applications.
  • single source of truth (SSOT) - Single source of truth (SSOT) is a concept that an organization can apply as part of its information architecture to ensure that everyone in the organization uses the same data when making business decisions.
  • single stream 802.11n - Single-stream 802.
  • single unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
  • Single-Carrier Radio Transmission Technology - 1xRTT (Single-Carrier Radio Transmission Technology) is an operational mode for CDMA2000 wireless communications that specifies a single (1x) 1.
  • single-factor authentication - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • single-factor authentication (SFA) - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • single-level cell (SLC) flash - Single-level cell (SLC) flash is a type of solid-state storage that stores one bit of data per cell of flash media.
  • single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
  • single-serving site - A single-serving site is a one-page, one-purpose website with a dedicated domain name.
  • single-source publishing (multi-channel publishing) - Single-source publishing, often used synonymously with multi-channel publishing, is a content management method in which material from one document can be used for various file formats, such as a text file, a website or an image file.
  • single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • cyberterrorism

    Cyberterrorism is often defined as any premeditated, politically motivated attack against information systems, programs and data ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close