Browse Definitions :

Browse Definitions by Alphabet

SHA - SIL

  • shared source - Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model.
  • shared storage - Shared storage is a medium accessible by all of the subscribers in a network, intended for file storage and allowing simultaneous access by multiple subscribers without the need to duplicate files to their computers.
  • Sharepoint - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • SharePoint 2013 Design Manager snippet - A SharePoint 2013 Design Manager snippet is HTML markup that can be copied and pasted into a SharePoint Master Page Design file.
  • SharePoint administrator - A SharePoint administrator manages an organization's installation of the Microsoft SharePoint collaboration and content management platform.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint sprawl - SharePoint sprawl occurs when end users create a new site to categorize content that could have been stored in an existing site, or categorize content poorly so it's difficult to find later on.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • shebang - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term for the "#!" characters that must begin the first line of a script.
  • sheep - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
  • sheep dipping - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip (sheep dipping or a footbath) - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheepdip computer - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • sheet-fed offset printing - Sheet-fed offset printing is a method in which individual pages of paper are fed into the machine.
  • shelfware - Shelfware is IT slang for software that a company buys because of a perceived need or demand but never uses; hence, it sits on the shelf.
  • shelfware - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • shell - Shell is a UNIX term for the interactive user interface with an operating system.
  • shell command injection - Command injection is the insertion of HTML code into dynamically generated output by a malevolent hacker (also known as a cracker) seeking unauthorized access to data or network resources.
  • shell script - A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.
  • Shellshock - Shellshock is the common name for a coding vulnerability found in the Bash shell user interface that affects Unix-based operating systems, including Linux and Mac OS X, and allows attackers to remotely gain complete control of a system.
  • shielded twisted pair - This definition closely duplicates the definition for twisted pair.
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift register - A shift register is a digital memory circuit found in calculators, computers, and data-processing systems.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • Shimmer - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • shingled magnetic recording (SMR) - Shingled magnetic recording (SMR) is a technique for writing data to disk drives in partially overlapping tracks to boost areal density and overall capacity.
  • Shockwave - Shockwave, developed by Macromedia, is a family of multimedia players.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • shoppable video - A shoppable video is a multimedia recording that allows a user to initiate an order from within the video.
  • shopping cart - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • shopping cart software - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • short message - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • Short Message Service - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • Short Message Service (SMS) - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • short message service center - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • short messaging - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • short messaging service spam - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • short stroking - Short stroking is the practice of formatting a disk drive such that data is written only to the outer sectors of the disk's platters.
  • shortcut - In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the regular operation.
  • shortest path bridging - Shortest path bridging, or 802.
  • Shoshkele - A Shoshkele (pronounced Shosh-KEY-lee) is a proprietary type of floating ad developed by United Virtualities.
  • shotgun debugging - Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.
  • should costing (should-cost analysis) - The purpose of should-cost analysis is assessing an appropriate figure to guide negotiations or to compare with a figure provided by a supplier.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • shovelware - Shovelware is content taken from any source and put on the Web as fast as possible with little regard for appearance and usability.
  • show control - Show control is a computer system, especially in the entertainment industry, that combines disparate hardware and software-controlled lighting, sound, and visual effects into a single, synchronized system.
  • show-me marketing - Show-me marketing is the practice of telling a brand's story and engaging consumers through pictures, videos and other visual media.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • showrooming (reverse showrooming) - Showrooming is the practice of examining a product in a brick-and-mortar store, then purchasing it online for a lower price.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • SHTML - A Web file with the suffix of ".
  • shuffle mode - In iPod and other audio or multimedia playback applications, shuffle mode is the playing of items in a list in some random fashion.
  • SI - The International System of Units (abbreviated SI from systeme internationale, the French version of the name) is a scientific method of expressing the magnitudes or quantities of important natural phenomena.
  • SI - A systems integrator (SI) is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • Si - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • SIBR - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SIBR contract - A type of contract designed to foster technological innovation by small businesses with 500 or fewer employees.
  • SID - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • side-channel attack - A side-channel attack (SCA) is a security exploit that involves collecting information about what a computing device does when it is performing cryptographic operations and using that information to reverse engineer the device's cryptography system.
  • sideband - In electronic signal transmission, a sideband is the portion of a modulated carrier wave that is either above or below the basic (baseband) signal.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Siebel - Siebel Systems is a prominent vendor of interoperable e-business software.
  • siemens - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • siemens (mho) - (Siemens AG is a German company engaged in electrical engineering and electronics.
  • SIG - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIG (Special Interest Groups) - The Association of Computing Machinery (ACM), an international scientific and industrial computer society, carries on most of its activities through its members' SIGs (Special Interest Groups).
  • SIGINT (signals intelligence) - SIGINT (signals intelligence) is information gained by the collection and analysis of the electronic signals and communications of a given target.
  • signal - In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another.
  • Signal Computing System Architecture - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • Signal Computing System Architecture (SCSA) - Signal Computing System Architecture (SCSA) is an industry standard architectural framework for the hardware and software components in a computer-telephony integration system.
  • signal-to-noise ratio - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • signal-to-noise ratio (S/N or SNR) - In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise.
  • signaling - In telephony, signaling is the exchange of information between involved points in the network that sets up, controls, and terminates each telephone call.
  • Signaling System 7 - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
  • Signaling System 7 (SS7) - Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.
  • Signaling Transport - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
  • Signalling Connection Control Part - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • signature analysis - Signature analysis has two meanings.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • significant figures - The term significant figures refers to the number of important single digits (0 through 9 inclusive) in the coefficient of an expression in scientific notation.
  • SIGTRAN - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
  • SIGTRAN (Signaling Transport) - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
  • silence machine - The Electronic Controlled Acoustic Shadow System (ECASS), called the silence machine by its creator Selwyn Wright, an engineer at the University of Huddersfield in Yorkshire, UK, is the first device capable of blocking out a specified noise while leaving everything else audible.
  • silence machine or Electronic Controlled Acoustic Shadow System (ECASS) - The Electronic Controlled Acoustic Shadow System (ECASS), called the silence machine by its creator Selwyn Wright, an engineer at the University of Huddersfield in Yorkshire, UK, is the first device capable of blocking out a specified noise while leaving everything else audible.
  • silence suppression - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • silent attrition - Silent attrition is a situation in which customers stop patronizing a business without any communication.
  • silent monitoring - Silent monitoring refers to the practice of call center managers or senior agents listening to the interaction between an incoming caller and an agent.
  • silicon - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • silicon (Si) - Silicon is a chemical element (its symbol in chemical formula expressions is "Si") that is present in sand and glass and which is the best known semiconductor material in electronic components.
  • Silicon Graphics - SGI (Silicon Graphics) is a leading manufacturer of high-performance computing, data management, and visualization products.
  • Silicon on Insulator - Silicon-On-Insulator (SOI) is a semiconductor fabrication technique developed by IBM that uses pure crystal silicon and silicon oxide for integrated circuits (IC) and microchips.
  • silicon photonics - Silicon photonics is an evolving technology in which data is transferred among computer chips by optical rays.
  • Silicon Valley - Silicon Valley is home to some of the world's largest technology corporations and thousands of technology-related startup companies.
  • Silicon-on-Insulator - Silicon-On-Insulator (SOI) is a semiconductor fabrication technique developed by IBM that uses pure crystal silicon and silicon oxide for integrated circuits (IC) and microchips.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close