Browse Definitions :

Browse Definitions by Alphabet

SOF - SQL

  • software robotics - Software robotics is the use of bot programs to automate computer tasks normally performed by people.
  • software stack - A software stack is a collection of independent components that work together to support the execution of an application.
  • software substitution - Software substitution is the use of computer programs to conduct tasks that have traditionally been performed by a human.
  • software testing - Software testing is a method of assessing the functionality of a software program.
  • software toolchain - A software toolchain is a set of software development tools used in combination with one another to complete complex software development tasks or to deliver a software product.
  • software-defined everything (SDE) - Software-defined everything (SDE) is an umbrella term that describes how virtualization and abstracting workloads from the underlying hardware can be used to make information technology (IT) infrastructures more flexible and agile.
  • software-defined infrastructure control (SDIC) - Software-defined infrastructure control (SDIC) is an analytics-driven approach to balancing the resources that application programs demand in virtual and cloud environments.
  • software-defined networking (SDN) - Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • software-defined perimeter (SDP) - The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.
  • software-defined storage (SDS) - Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.
  • solar constant - A solar constant is a measurement of the solar electromagnetic radiation available in a meter squared at Earth's distance from the sun.
  • solar cooling - Solar cooling is a system that converts heat from the sun into cooling that can be used for refrigeration and air conditioning.
  • solar panel - A solar panel is a flat construction resembling a window, built with technology that allows it to passively harvest the heat of the sun or create electricity from its energy through photovoltaics.
  • solar power - Solar power is the use of the sun’s energy either thermally or through the use of photovoltaic cells in solar panels and transparent photovoltaic glass to generate electricity.
  • solar-powered laptop - A solar-powered laptop is a notebook computer that uses built-in photo voltaic solar panels to run and recharge its battery.
  • Solaris - Solaris is the computer operating system that Sun Microsystems provides for its family of Scalable Processor Architecture-based processors as well as for Intel-based processors.
  • solenoid - A solenoid is a coil of insulated or enameled wire wound on a rod-shaped form made of solid iron, solid steel, or powdered iron.
  • solid - A solid is a state of matter that retains its shape and density when not confined.
  • SOLID (software design principles) - SOLID is a mnemonic acronym for a set of design principles created for software development in object-oriented languages.
  • solid oxide fuel cell (SOFC) - A solid oxide fuel cell (SOFC) is a fuel cell that derives its energy directly from the oxidation of a solid or ceramic material called an electrolyte.
  • solid state module (SSM) - A solid state module is solid state storage that resides in a Dual In-line Memory Module (DIMM) or similar form factor.
  • solid-state - Solid-state is a common descriptor used to refer to electronic components, devices and systems based entirely on semiconductor materials such as silicon, germanium or gallium arsenide.
  • solid-state drive (SSD) capacity - Solid-state drive (SSD) capacity is the maximum amount of data that can be stored on a solid-state drive.
  • solid-state lighting (SSL) - Solid-state lighting (SSL) is a technology in which light-emitting diodes (LEDs) replace conventional incandescent and fluorescent lamps for general lighting purposes.
  • solid-state storage - Solid-state storage (SSS) is a type of computer storage media made from silicon microchips.
  • solid-state storage garbage collection - Solid-state storage garbage collection, or SSD garbage collection, is an automated process by which a solid-state drive (SSD) improves write performance.
  • solid-state storage UBER - Solid-state storage UBER (unrecoverable bit error rate) is the percentage of bits that have errors relative to the total number of bits that have been read.
  • Solidity - Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.
  • SoLoMo (social, local and mobile) - SoLoMo (social, local and mobile) is a term representing the convergence of collaborative, location-based and on-the-go technologies, primarily used for marketing and discovery purposes.
  • solution provider - A solution provider is a vendor, service provider or value-added reseller (VAR) that comprehensively handles the project needs of their client from concept to installation through support.
  • solution selling - Solution selling refers to the philosophy or practice of uncovering a customer's pain points and then providing products and services that address the underlying business problem.
  • SoMoClo (social, mobile and cloud) - SoMoClo (social, mobile and cloud) is the convergence of collaborative, on-the-go technologies that allow users to access data and applications from anywhere at any time.
  • sorting algorithm - A sorting algorithm is a method for reorganizing a large number of items into a specific order, such as alphabetical, highest-to-lowest value or shortest-to-longest distance.
  • sound card - A sound card (also referred to as an audio card) is a peripheral device that attaches to the ISA or PCI slot on a motherboard to enable the computer to input, process, and deliver sound.
  • sound wave - A sound wave is the pattern of disturbance caused by the movement of energy traveling through a medium (such as air, water or any other liquid or solid matter) as it propagates away from the source of the sound.
  • source code - Source code is the fundamental component of a computer program that is created by a programmer.
  • source code analysis - Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.
  • source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
  • Southbridge - Southbridge is an Intel chipset that manages the basic forms of input/output (I/O) such as Universal Serial Bus (USB), serial, audio, Integrated Drive Electronics (IDE), and Industry Standard Architecture (ISA) I/O in a computer.
  • space - Space is a term that can refer to various phenomena in science, mathematics and computing and generally encompasses the concept of an area or region.
  • Space Communications Protocol Specifications (SCPS) - Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.
  • Space Force (United States Space Force) - Space Force is a proposed branch of the United States Armed Forces.
  • Space Launch System (SLS) - The Space Launch System (SLS) is an aerospace launch vehicle designed to carry crews and cargo on deep-space missions onboard NASA's Orion spacecraft.
  • SpaceX - SpaceX (Space Exploration Technologies Corporation) is a space transportation and aerospace manufacturer founded in 2002 by Elon Musk.
  • spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • Spanning Tree Protocol (STP) - Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • sparkline - A sparkline is a small embedded line graph that illustrates a single trend.
  • SPARQL - SPARQL is a declarative programming language and protocol used for analytics by graph databases.
  • sparsity and density - Sparsity and density are terms used to describe the percentage of cells in a database table that are not populated and populated, respectively.
  • spatial data - Spatial data is any type of data that directly or indirectly references a specific geographical area or location.
  • spatial intelligence - Spatial intelligence is the concept of being able to successfully perceive and derive insight from visual data.
  • spatial sensing - Spatial sensing is the detection, measuring and analysis of an environment's space and objects in real-time for the purposes of mapping them.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • specific gravity - Specific gravity, more formally known as relative density, is a measure of the density of a substance in comparison to the density of water.
  • specific volume - Specific volume is a property of materials, defined as the number of cubic meters occupied by one kilogram of a particular substance.
  • specification by example (SBE) - Specification by example (SBE) is a user-driven contextual approach to defining software requirements.
  • spectrum analyzer - A spectrum analyzer is a device that measures and displays signal amplitude (strength) as it varies by frequency within its frequency range (spectrum).
  • spectrum efficiency - Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.
  • speculation (speculative loading) - Speculation (also known as speculative loading), is a process implemented in Explicitly Parallel Instruction Computing (EPIC) processors and their compilers to reduce processor-memory exchanging bottlenecks or latency by putting all the data into memory in advance of an actual load instruction.
  • speculative execution - Speculative execution is an optimization technique in which a processor (CPU) performs a series of tasks before it is prompted to in order to have the information ready if it is required at any point.
  • speculative risk - Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • speech disfluency - A speech disfluency is any disruption in the flow of spoken language that is caused by the speaker.
  • speech recognition - Speech recognition, or speech-to-text, is the ability of a machine or program to identify words spoken aloud and convert them into readable text.
  • speech synthesis - Speech synthesis is the computer-generated simulation of human speech.
  • speech technology - Speech technology is a type of computing technology that enables an electronic device to recognize, analyze and understand spoken word or audio.
  • speed of light - The speed of light in free space (that is, in a vacuum) is a constant that has been measured to considerable accuracy.
  • SPI model - SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.
  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • SPIF (sales performance incentive fund) - A SPIF(sales performance incentive fund) is a financial incentive that encourages a sales representative to sell a specific item or group of items.
  • spike - A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease.
  • spike testing - Spike testing is a type of performance testing where an application is tested with a sudden and extreme increase in load, such as user traffic or system transactions.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • spin (PR, marketing) - Spin, in the context of public relations (PR) and journalism, is the selective assembly of fact and the shaping of nuance to support a particular view of a story.
  • spindle - A spindle is a shaft that holds rotating hard disk drive (HDD) platters in place.
  • spiral model - The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • Splashtop - Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.
  • spline - In computer graphics, a spline is a curve that connects two or more specific points, or that is defined by two or more points.
  • split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
  • split horizon - Split horizon is a method used by distance vector protocols to prevent network routing loops.
  • Splunk - Splunk Inc. is a San Francisco-based multinational company whose software platform indexes machine data, and makes it searchable so it can be turned into actionable intelligence.
  • SPML (Services Provisioning Markup Language) - Services Provisioning Markup Language (SPML) is an open source XML-based standard that facilitates the exchange of account provisioning information among applications, services and organizations.
  • spoliation - Spoliation is the destruction, alteration, or mutilation of evidence that may pertain to legal action.
  • spool (simultaneous peripheral operations online) - To spool (which stands for "simultaneous peripheral operations online") a computer document or task list (or "job") is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document).
  • spray-on antenna - A spray-on antenna is a conductive material that can be sprayed onto nearly any surface to create a thin, lightweight and flexible antenna.
  • spread spectrum - Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.
  • spreadmart (spreadsheet data mart) - A spreadmart (spreadsheet data mart) is a situation in which a company's employees has inconsistent views of corporate data because each department relies on the data from their own spreadsheets.
  • spreadsheet - A spreadsheet is a computer program that can capture, display and manipulate data arranged in rows and columns.
  • spreadsheet controls - Spreadsheet controls are a set of steps that an organization's accounting personnel can take to ensure accuracy and integrity of financial records and bookkeeping procedures.
  • Spring Framework - The Spring Framework (Spring) is an open-source application framework that provides infrastructure support for developing Java applications.
  • sprint (software development) - A sprint is a set period of time during which specific work has to be completed and made ready for review.
  • SPSS (Statistical Package for the Social Sciences) - SPSS (Statistical Package for the Social Sciences), also known as SPSS Statistics, is a software package used for the analysis of statistical data.
  • spyware - Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
  • SQL injection - A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • SQL Server 2012 - Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close