Browse Definitions :

Browse Definitions by Alphabet

SHA - SIG

  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • shadow password file - In the Linux operating system, a shadow password file is a system file in which encryption user password are stored so that they aren't available to people who try to break into the system.
  • shadow RAM - Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a special area of random access memory (RAM) so that they can be accessed more quickly.
  • Shamoon - Shamoon, also called W32.
  • Shannon's Law - Shannon's Law, formulated by Claude Shannon, a mathematician who helped build the foundations for the modern computer, is a statement in information theory that expresses the maximum possible data speed that can be obtained in a data channel.
  • Shannon, Claude - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan (U.
  • shape-shifting chembot - A shape-shifting chembot, also called a liquid robot or a chemical robot, is a mobile robot that can alter its shape and other physical characteristics to do things that it could not do in its normal form.
  • shape-shifting chembot (liquid robot or a chemical robot) - A shape-shifting chembot, also called a liquid robot or a chemical robot, is a mobile robot that can alter its shape and other physical characteristics to do things that it could not do in its normal form.
  • sharding - Sharding is a type of database partitioning that is used to separate very large databases the into smaller, faster, more easily managed pieces called data shards.
  • Shareable Content Object Reference Model (SCORM) - Shareable Content Object Reference Model (SCORM) is an XML-based framework used to define and access information about learning objects so they can be easily shared among different learning management systems (LMSs).
  • Shared Assessments Program - Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.
  • Shared Call Appearance (SCA) - Shared Call Appearance (SCA) is the sharing of a VoIP phone number across multiple devices in different locations.
  • shared hosting - Shared hosting is Web hosting in which the service provider serves pages for multiple Web sites, each having its own Internet domain name, from a single Web server.
  • Shared Key Authentication - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • shared memory - In computer programming, shared memory is a method by which program processes can exchange data more quickly than by reading and writing using the regular operating system services.
  • shared nothing live migration - Shared nothing live migration is a term used to describe the process of moving a virtual machine (VM) from one physical host to another, without the need for clustering or a common shared storage location.
  • shared responsibility model - A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability.
  • Shared SAS - Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.
  • shared secret - A shared secret is data known to only the two entities involved in a communication so that either party's possession of that data can be provided as proof of identity for authentication.
  • shared services - Shared services is the consolidation of business operations that are used by multiple parts of the same organization.
  • shared source - Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model.
  • shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
  • Sharepoint - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • SharePoint 2013 Design Manager snippet - A SharePoint 2013 Design Manager snippet is HTML markup that can be copied and pasted into a SharePoint Master Page Design file.
  • SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shebang - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • sheep - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
  • sheep dipping - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip (sheep dipping or a footbath) - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip computer - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
  • shelfware - Shelfware is IT slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.
  • shelfware - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • shell - Shell is a UNIX term for the interactive user interface with an operating system.
  • shell command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • Shellshock - Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including Linux and Mac OS X, and allows attackers to remotely gain complete control of a system.
  • shielded twisted pair - This definition closely duplicates the definition for twisted pair.
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • Shimmer - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
  • Shockwave - Shockwave, developed by Macromedia, is a family of multimedia players.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a multimedia recording that allows a user to initiate an order from within the video.
  • shopping cart - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • shopping cart software - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • short message - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • Short Message Service - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • Short Message Service (SMS) - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • short message service center - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short messaging - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • short messaging service spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
  • shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
  • shortest path bridging - Shortest path bridging, or 802.
  • Shoshkele - A Shoshkele (pronounced Shosh-KEY-lee) is a proprietary type of floating ad developed by United Virtualities.
  • shotgun debugging - Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.
  • should costing (should-cost analysis) - The purpose of should-cost analysis is assessing an appropriate figure to guide negotiations or to compare with a figure provided by a supplier.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • shovelware - Shovelware is content taken from any source and put on the Web as fast as possible with little regard for appearance and usability.
  • show control - Show control is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system.
  • show-me marketing - Show-me marketing is the practice of telling a brand's story and engaging consumers through pictures, videos and other visual media.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • SHTML - A Web file with the suffix of ".
  • shuffle mode - In iPod and other audio or multimedia playback applications, shuffle mode is the playing of items in a list in some random fashion.
  • Si - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • SI - A systems integrator (SI) is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • SI - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
  • SIBR - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SIBR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • side-channel attack - A side-channel attack (SCA) is a security exploit that involves collecting information about what a computing device does when it is performing cryptographic operations and using that information to reverse engineer the device's cryptography system.
  • sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Siebel - Siebel Systems is a prominent vendor of interoperable e-business software.
  • siemens - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIG - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIG (Special Interest Groups) - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal - In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another.
  • Signal Computing System Architecture - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • Signal Computing System Architecture (SCSA) - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • signal-to-noise ratio - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • signaling - In telephony, signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.
  • Signaling System 7 - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close