Browse Definitions :

Browse Definitions by Alphabet

SER - SHA

  • serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
  • servers - A server is a computer program that provides a service to another computer programs (and its user).
  • service assurance (SA) - Service assurance (SA) is a procedure or set of procedures intended to optimize performance and provide management solutions in communications networks, media services and end-user applications.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • service contact port numbers - The well-known port numbers are the port numbers that are reserved for assignment by the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the application end points that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service discovery - Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.
  • Service Integration Maturity Model (SIMM) - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
  • service level - Service level describes, usually in measurable terms, the services a network service provider furnishes a customer within a given time period.
  • service level agreement - A service-level agreement (SLA) is a contract that specifies what the service provider is responsible for.
  • service level indicator - A service level indicator (SLI) is a carefully defined measure of performance within a provided service that is given to a customer by the vendor.
  • service lifecycle management (SLM) - Service lifecycle management (SLM) describes the strategy and software for managing the maintenance and repair of products and maximizing the profit opportunities from these activities.
  • Service Location Protocol - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
  • Service Location Protocol (SLP) - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • Service Organization Control 1 - A Service Organization Control 1 or Soc 1 (pronounced "sock one") report is written documentation of the internal controls that are likely to be relevant to an audit of a customer’s financial statements.
  • Service Organization Control 2 - A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy.
  • Service Organization Control 3 - A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal controls in security, availability, processing integrity, confidentiality or privacy.
  • service pack - A service pack is an orderable or downloadable update to a customer's software that fixes existing problems and, in some cases, delivers product enhancements.
  • Service Profile Identifier - A SPID (Service Profile Identifier) is a number assigned by a phone company to a terminal on an Integrated Services Digital Network B-channel.
  • Service Providers: Glossary - This is a glossary of terms related to different types of service providers.
  • service set identifier - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
  • service set identifier (SSID) - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
  • service supply chain - The service supply chain is the part of the supply chain dedicated to providing service on products.
  • service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service-level agreement - A service-level agreement (SLA) is a contract that specifies what the service provider is responsible for.
  • service-level agreement (SLA) - A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
  • service-level management - Service-level management is the monitoring and management of the quality of service(QoS) of an entity's key performance indicators(KPIs).
  • service-level objective - A service-level objective (SLO) is the part of a service-level agreement (SLA) that documents the key performance indicators (KPIs) the customer should expect from a provider.
  • service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • service-oriented integration (SOI) - SOI is also an abbreviation for Silicon-On-Insulator.
  • service-oriented management (SOM) - Service-oriented management (SOM) is the operational management of service delivery within a service-oriented architecture (SOA).
  • ServiceNow - ServiceNow is a cloud-based company that provides software as a service (SaaS) for technical management support.
  • servlet - A servlet is a small program that runs on a server.
  • servo (servomechanism) - A servo or servomechanism is an electromagnetic device that converts electricity into precise controlled motion by use of negative feedback mechanisms.
  • session - In telecommunication, a session is a series of interactions between two communication end points that occur during the span of a single connection.
  • Session Announcement Protocol (SAP) - Session Announcement Protocol (SAP) is a protocol used to define the format and describe the information that will be exchanged during a multicast conferencing session.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
  • session control protocol (SCP) - Session control protocol (SCP) is a method of creating multiple light-duty connections from a single TCP (Transmission Control Protocol) connection.
  • session cookie - On the Web, a transient cookie, sometimes called a session cookie, is a small file that contains information about a user that disappears when the user's browser is closed.
  • Session Description Protocol - SDP (Session Description Protocol) is a set of rules that defines how multimedia sessions can be set up to allow all end points to effectively participate in the session.
  • session hijacking - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • session hijacking (TCP session hijacking) - Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • session ID - A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session).
  • Session Initiation Protocol - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • Session Initiation Protocol trunking - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • session key - A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • session prediction - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • session prediction (credential/session prediction) - Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site.
  • session replay - Session replay is a scheme a cracker uses to masquerade as an authorized user on an interactive Web site.
  • session replay script - A session replay script is a program that enables the recording of website users’ keystrokes, clicks, mouse movements and scrolling behavior, along with the full contents of the pages they visit, and sends them to third-party servers.
  • session-based routing - Session-based routing is a type of routing architecture that is application-centric and designed to route entire sessions instead of individual packets.
  • set - A set is a group or collection of objects or numbers, considered as an entity unto itself.
  • SET - Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.
  • set theory - A set is a group or collection of objects or numbers, considered as an entity unto itself.
  • set-top box - A set-top box is a device that enables a television set to become a user interface to the Internet and also enables a television set to receive and decode digital television (DTV) broadcasts.
  • SETI - SETI (the Search for Extraterrestrial Intelligence) is a scientific effort to discover intelligent life elsewhere in the universe, primarily by attempting to discover radio signals that indicate intelligence.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • seven-segment display - A seven-segment display is a set of seven bar-shaped LED (light-emitting diode) or LCD (liquid crystal display) elements, arranged to form a squared-off figure 8.
  • severance agreement - A severance agreement is a contract between an employer and employee documenting the rights and responsibilities of both parties in the event of job termination.
  • severance package - A severance package is the contracted pay and benefits provided to an employee whose job is terminated.
  • SEWP IV - NASA Solutions for Enterprise-Wide Procurement (SEWP) IV is a contract issued by NASA's SEWP BOWL (Solutions for Enterprise-Wide Procurement Business Operations and Workstation Laboratory) to a commercial technology vendor.
  • sexting - Sexting is the act of sending or receiving sexually-explicit images and messages, typically between cell phones.
  • SFA - Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.
  • SFA - Sales force automation (SFA) software is a type of program that automates business tasks such as inventory control, sales processing, and tracking of customer interactions, as well as analyzing sales forecasts and performance.
  • SFF - Small form factor (SFF) refers to any of several physically compact connector designs that have been developed for use in fiber optic systems.
  • SFP - Small form-factor pluggable (SFP) is a specification for a new generation of optical modular transceivers.
  • SFS - Stepless frequency selection (SFS) is a technology that makes it possible to adjust the system bus frequency of a computer in increments of 1 MHz over a specified range.
  • SFT III - SFT III is a feature providing fault-tolerance in Intel-based PC network server running Novell's NetWare operating system.
  • SFX - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SGI - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • SGI (Silicon Graphics) - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • SGML - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • SGRAM - Synchronous Graphics RAM (SGRAM) is clock-synchronized random access memory that is used for video memory.
  • shadow app - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • shadow password file - In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.
  • shadow RAM - Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a special area of random access memory (RAM) so that they can be accessed more quickly.
  • Shamoon - Shamoon, also called W32.
  • Shannon's Law - Shannon's Law, formulated by Claude Shannon, a mathematician who helped build the foundations for the modern computer, is a statement in information theory that expresses the maximum possible data speed that can be obtained in a data channel.
  • Shannon, Claude - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
  • sharding - Sharding is a type of database partitioning that is used to separate very large databases the into smaller, faster, more easily managed pieces called data shards.
  • Shareable Content Object Reference Model (SCORM) - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
  • Shared Assessments Program - Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.
  • Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
  • shared hosting - Shared hosting is Web hosting in which the service provider serves pages for multiple Web sites, each having its own Internet domain name, from a single Web server.
  • Shared Key Authentication - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared memory - In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.
  • shared nothing live migration - Shared nothing live migration is a term used to describe the process of moving a virtual machine (VM) from one physical host to another, without the need for clustering or a common shared storage location.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • Shared SAS - Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close