Copyright © 2014 Connet, Inc. All Rights Reserved. Create at AgencyofRecord.com.
S for Script
|abbreviation / acronyms||term||definition|
|S+||Security+||A CompTIA certification in vendor-neutral computer security training. One of the required basic certifications mandated by DoD Instruction 8570.01-M for ALL people having access, either as a military member or as a civilian support person.|
|S-Video||Super-Video / Sony Video||a technology for transmitting video signals over a cable by dividing the video information into two separate signals. One signal for color (chrominance), and the other for brightness (luminance).|
|S3||Simple Storage System||an online storage web service offered by Amazon Web Services that first became available in the US in March 2006 and in Europe in November 2007.|
The system administrator account installed with Microsoft SQL Server. This system administrator account has the username "sa".
The person who controls and manages a computer system.
SA(Source-Active) is Cisco term.
In OSI, a person who controls how the open system resources of a system or enterprise are used.
|SAA||Systems Application Architecture||IBM's family of standard interfaces which enable software to be written independently of hardware and operating systems.|
software as a service
|SaaS is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network,|
|SAD||Security Association Database||In each IPsec implementation there is a nominal Security Association Database, in which each entry defines the parameters associated with one Security Association|
|SAIC||Science Applications International Corporation||Founded by J. Robert Beyster, Ph.D., and a small group of scientists in 1969, a FORTUNE 500® company http://www.saic.com|
|SALT||Speech Application Language Tags||Lightweight set of extensions to existing markup languages, in particular HTML and XHTML that enable multimodal and telephony access to information, applications and Web services from PCs, telephones, tablet PCs and wireless personal digital assistants|
security account manager
Serial Access Memory
software asset management
An integral subsystem that maintains a database of information about user accounts, including passwords, any account groups a given user belongs to, the access rights each user is allowed, and any special privileges a given user has.
a serial register built into a VRAM to enable it to transfer large quantities of data from the DRAM portion of the device to a graphics controller or frame buffer.
A process for making software acquisition and disposal decisions. It includes strategies that identify and eliminate unused or infrequently used software, consolidating software licenses or moving toward new licensing models
|SAML||Security Assertion Markup Language||An XML-based mechanism that enables disparate entities to exchange identity-related security information. This information is presented as assertions about authentication, authorization or various attributes of the identity in question.|
|SAN / SANs||Storage Area Network(s)||
A storage network that consists of two tiers:
The first tier — the storage plumbing tier — provides connectivity between nodes in a network and transports device-oriented commands and status.
The second tier — the software tier — uses software to provide value-added services that operate over the first tier.
SysAdmin, Audit, Network, Security
System Administration, Networking and Security institute
the most trusted and by far the largest source for information security training and certification in the world
Organization that develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.
|SAP||Service Access Point||
A logical address that allows a system to route data between a remote device and the appropriate communications support.
In OSI architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.
The protocol and credentials associated with a data center device for authentication of remote operations.
Service Advertising Protocol
Secondary Audio Program
Systeme, Anwendungen, Produkte
Novell's Protocol provides information about what servers are available on the network.
An NTSC audio channel used for auxiliary transmission, such as foreign language broadcasting or teletext.
A german company that produces the leading suite of client-server business software ("Systems, Applications and Products in data processing"). www.sap.com
|SAR||segmentation and reassembly||the process used to fragment and rebuild packets that allows them to be transported across asynchronous transfer mode (ATM)|
Secure Attention Sequence
Serial Attached SCSI
single attachment station
Statistical Analysis System
A key sequence that begins the process of logging on or off. The default sequence is CTRL+ALT+DEL
A replacement for the Parallel SCSI physical storage interface. Serial Attached SCSI offers much faster communication and easier configuration.
Device attached only to the primary ring of a FDDI ring. Also known as a Class B station.
SAS Institute, a business intelligence software vendor, founded in 1976 and headquartered in Cary, North Carolina. www.sas.com
|SAS 70||Statement on Auditing Standards No. 70||defines the standards an auditor must employ in order to assess the contracted internal controls www.sas70.com|
|SASL||Simple Authentication and Security Layer||An extensible authentication scheme that allows the Open Directory Password Server to support a variety of network user authentication methods required.|
|SAST||Static application security testing||a set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.|
|Sat Nav||Satellite navigation||software which finds your physical geographical location then gives you directions on which way to travel. This is most commonly used in specialist hand-held devices as well as mobile phones.|
|SATA||Serial ATA||a disk-interface technology developed by a group of the industry's leading vendors to replace parallel ATA. It is the natural successor to IDE. Serial ATA only requires seven wires per device (4 data and 3 ground) and the cables can be up to 1m long.|
|SAV||Symantec AntiVirus||Previously called Norton AntiVirus (NAV)|
|SAX||Simple API for XML||A public-domain alternative to DOM for enabling programming languages to work with XML documents. SAX is API that uses "start events" and "stop events" to parse an XML document so that an application can interact with it.|
|SB||Sound Blaster||Sound Blaster brand by Creative Labs|
|SBAS||Satellite-Based Augmentation System||systems broadcast free correction signals from geo-stationary satellites to improve the accuracy, integrity and availability of the GPS network|
|SBB||Storage Bridge Bay||specification created in March 2006 by a nonprofit working group, including collaborative vendors such as Intel, Dell, EMC and LSI, which defines SBB as the mechanical/electrical interface between a passive backplane drive array and the electronics packages that give the array its personality.|
Session Border Controller
An appliance that simplifies handling of VoIP at the border of a network
a complete computer that resides on a single printed circuit board, usually a small one.
single-byte character set
Smart Business Communications
A coded character set in which each character is represented by a 1-byte code.
Cisco unified communications appliance that provides voice and data communications, voicemail, automated attendant, video, security, and wireless capabilities while integrating with existing desktop applications
|SBL||Spamhaus Block List||Realtime database of IP addresses of verified spam sources and spam operations, maintained by the Spamhaus Project team and supplied as a free service to help email administrators better manage incoming email streams.|
|SBLOG||spam blog||a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.|
|SBM||Subnet Bandwidth Manager||An IETF proposed standard for handling resource reservations on shared and switched IEEE 802-style local-area media|
|SBS||Small Business Server||Taken to refer to Small Business Server 2003 (or earlier versions) from Microsoft.
www.microsoft.com/windowsserver2003/sbs/default.mspx - Windows Small Business Server 2003 Home
|SBSD||Slow But Sure Death||term used by hardware repair people that refers to the fact that computers are not in question as to IF they will crash and die; it is only a matter of when. The three lethal factors are heat, power that is not clean and cigarette smoke residue.|
|SCA||Service component architecture||a collection of specifications (proposed and published) by a consortium of vendors.|
|SCADA||Supervisory Control And Data Acquisition||Used extensively by power, water, gas and other utility companies to monitor and manage distribution facilities. They are also used to monitor and control end user usage levels for purposes such as remote meter reading and load shedding.|
|SCAI||Switch-to-Computer Applications Interface||Protocol that allows subscriber’s computer to interact with digital switch, making it possible to coordinate information in database with incoming and outgoing phone calls to allow company representative to receive customer call and simultaneously receive customer's file for viewing on desktop workstation.|
|SCAM||SCSI Configured Auto-Magically||This SCAM is actually a good thing. It allows SCSI devices to automatically be configured with an ID number, even if they aren’t assigned one.|
|SCCM||Software change and configuration management||
SCCM tools are products and suites that support the structured approval, assignment, monitoring, execution and reporting of changes to software products for teams and teams of teams.
|SCCP||Signaling Connection and Control Part||SS7 protocol that provides additional functions to Message Transfer Part (MTP). Typically supports Transaction Capabilities Application Part (TCAP).|
|SCCS||Source Code Control System||A suite of utilities to administrate source code such that only one person can change any given file at any given instant.|
Service Control Manager
Specifc Coverage Metric
Source Code Management
Source configuration management
supply chain management
The Windows component that maintains a database of installed services and manages each service's state.
A code database used to enable the collaborative development of large projects by multiple engineers. SCM repositories are managed by specific tools, which manage the repository and handle check-ins and check-outs of code resources by engineers.
How much of an application’s functionality is tested for security
a set of activities to control change by identifying the software work products that are likely to change, establishing relationships among them, defining mechanisms for managing different versions, and auditing and reporting.
The process of optimizing the delivery of goods, services and information from supplier to customer. SCM is a set of business processes that engages a trading-partner community in the common goal of satisfying the end customer.
|SCO||Santa Cruz Operation||software company based in Santa Cruz, California which was best known for selling three UNIX variants for Intel x86 processors: Xenix, SCO UNIX, and UnixWare. http://www.sco.com/|
|SCOM||System Center Operation Manager||End-to-end service-management product that is the best choice for Windows because it works seamlessly with Microsoft software and applications, helping organizations increase efficiency while enabling greater control of the IT environment|
|SCORM||Sharable Courseware Object Reference Model||a set of technical standards that enable Web-based learning systems to find, import, share, reuse, and export learning content in a standardized way.|
Service/Signal Control Point
A secure protocol for transferring files over a network.
A part of SS7. A SCP is usually a host computer with databases.
|SCPC||single channel per carrier||A transmission system in which a physical channel is allocated solely to one carrier for the duration of the transmission.|
|SCR||Sustainable Cell Rate||an upper bound on the conforming average rate of an ATM connection over time scales which are long relative to those for which the PCR is defined.|
|SCSI||Small Computer System Interface||
An ANSI-standard electronic interface that allows personal computers to communicate with peripheral hardware
A peripheral interface for up to seven devices. SCSI provides a high-speed, parallel data transfer of up to 40 megabits per second (Mbps).
|SCSL||Sun Community Source Licensing||The Sun Microsystems license model for Java. The agreement leverages a community-based development model similar to "open-source software" initiatives that have existed over the years.|
|ScTP||screened twisted pair||A cable where the twisted pair is screened from electromagnetic interference by a thin aluminum screen.|
|SCTP||Stream Control Transmission Protocol||set of rules for transmitting multiple streams of data at the same time between two end points that have an established network connection.|
|SCWCD||Sun Certified Web Component Developer||A specialty performance-based certification program offered by Sun Microsystems (part of Oracle Corporation) that targets information regarding Java components related to Web applications, specifically Servlets and JSP.|
|SD|| Sales and Distribution
| SD is SAP term.
SD is a type of memory card used for storing data in devices such as digital cameras, PDAs, mobile phones, portable music players, and digital voice recorders.
SD is Cisco term
|SDDL||Security Descriptor Definition Language||a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system. The security descriptor may also provide an access control list for an object or group of objects.|
|SDDS||Sony Dynamic Digital Sound||Multi-channel (5.1 or 7.1) digital audio format, compressed from PCM at 48 kHz. The data rate can go up to 1280 kbps|
|SDDM||source distributed data manager||In a distributed data management network, programming support that translates local data management requests for remote files or SQL requests for a remote database into a DDM request|
|SDEP||sequential dependent segment||A segment of a data entry database that is chained off the root segment and inserted (last-in first-out) into the last part of a DEDB area.|
|SDFI||Secure Digital Forensic Imaging||Asynchronous method of telemedicine. It denotes a specific process that ensures the fast, safe and secure capture, storage and instant delivery of digital forensic evidence|
Synchronous Data Hierarchy
Synchronous Digital Hierarchy
The European standard for using optical media as the physical transport for high-speed, long-haul networks.
ITU-TSS International standard, similar to SONET. A technique for assembling and transmitting component digital signals, for example for individual phone calls, into a single high bit rate digital data stream.
|SDK||software development kit||A set of development utilities for writing software applications, usually associated with specific software environments (for example, the Java Development Kit).|
|SDMA||spatial division multiple access||a satellite communications mode for using data from antenna arrays in wireless communications systems.|
Secondary Directory Number
Software Defined Network
A telephone number that is picked up on a telephone set, but which is a PDN on another instrument.
Software Defined Network
|SDO||Service Data Objects||An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way, based on the concept of a disconnected data graph.|
|SDP||Service Delivery Platform||Oracle's platfrom contains the telephony functionality,
is geared toward service providers and not toward enterprises.
|SDRAM||Synchronous Dynamic Random Access Memory||A type of high-speed DRAM that can transfer bursts of non-contiguous data at 100 MB/second or greater and works with up to 100 MHz processor speeds.|
Software development life cycle
Synchronous Data Link Control
methodologies are based on the principle that security implementation shouldn't be an isolated process, but rather part of a comprehensive software engineering process.
A link-level communications protocol used in an IBM SNA network that manages synchronous, code-transparent, serial information transfer over a link connection
|SDLT||Super Digital Linear Tape||A Quantum storage product architecture that extends the capacity and transfer rate of DLT drives.|
|SDO||Service Data Objects||Framework that simplifies and unifies data application development in a SOA. It supports and integrates XML and incorporates J2EE patterns and best practices|
|SDP||Session Description Protocol||A text file used with QuickTime Streaming Server that provides information about the format, timing, and authorship of a live streaming broadcast and gives the user’s computer instructions for tuning in.|
|SDR||software-defined radio||software-defined radio|
|SDS||Sudden Death Syndrome||Used in digital photography when your camera dies a sudden death|
|SDSL||Symmetric Digital Subscriber Line||
SDSL is a type of of DSL, which is used for transferring data over copper telephone lines. The "symmetric" part of the term means that an SDSL connection has the same maximum upload and download speeds.
|SDTV||Standard Definition television||the digital television format that provides a video quality near the equivalent of DVD. SDTV and HDTV are the two designations of display formats for digital television (DTV) transmissions, which are standards as of 2004.|
|SDVO||Serial Digital Video Output||Makes it possible to use a 16-lane PCI express slot to add additional video signaling interfaces such as VGA and DVI monitor outputs, SDTV and HDTV television outputs, or TV tuner inputs to a system board containing an integrated Intel 9xx-series graphics processor.|
|SDX||Storage Data Acceleration||This technology was introduced by Western Digital. The idea behind it is that slower drives such as CD and DVD drives would attach directly to larger, faster hard drives.|
a generic term that describes the place where a mobile contactless application is stored securely.
|SEA-ME-WE||Southeast Asia-Middle East-Western Europe 2||A submarine cable network that went into operation in 1994, linking over one dozen countries from France to Singapore.|
|SEA-ME-WE 3||Southeast Asia-Middle East-Western Europe 3||A fiber-optic submarine cable network that went into service in 1999, linking over 30 countries between Western Europe and Southeast Asia.|
|SEAL||simple and efficient AAL||method of relaying ATM cells between ATM Layer and a higher layer|
|SEAS||SaaS-enabled application server||platform middleware that is specially designed with multitenant capabilities in transaction isolation, data access isolation, and security and performance isolation to support the design and deployment of SaaS-style business applications.|
|SEC||Siemens Enterprise Communications||a joint venture of the Siemens parent company and The Gores Group, emerging as a significant competitor in the enterprise UC market.|
|SECAM||Sequential Couleur a Memoire||A color television broadcasting system using 625 picture lines and a 50-hertz field frequency, in which the two color-difference signals are transmitted sequentially instead of simultaneously. It was developed in France and is also used in the former Soviet Union.|
|SEG||secure e-mail gateway||solutions that provide enterprise message transfer agent (MTA) capabilities, offer protection against inbound and outbound e-mail threats|
|SEM||Strategic Enterprise Management||A suite of SAP analytical applications that support integrated planning, decision making and performance monitoring. SEM uses multidimensional OLAP functionality to process data held in SAP's Business Information Warehouse.|
|SEN||Siemens Enterprise Communications||provides professional business solutions, managed services & unified communications to all business types. www.siemens-enterprise.com|
|SEO||Search Engine Optimization||
Just about every Webmaster wants his or her site to appear in the top listings of all the major search engines. Say, for example, that Bob runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes."
|SERK||Server Extensions Resource Kit||Microsoft Frontpage server extensions additional documentation and software|
|SERP||Search Engine Results Page||the page that you see after you perform a search using a search engine. It includes a list of search results that are relevant to the search phrase or keywords you entered.|
Severely Errored Seconds
A simple push-button configuration method that automates wireless network connection setup between Linksys routers and wireless devices
A unit used to specify the error performance of T carrier systems. This indicates a second containing ten or more errors, usually expressed as SES per hour, day, or week.
|SET||Secure Electronic Transaction||A standard in conceived 1995 by Visa and MasterCard to ensure that all Internet-based payment transaction details are encrypted, the parties authenticated, acknowledgments fully recorded and the customer payment details made available only to the bank.|
|SETI||Search of Extraterrestrial Intelligence||the collective name for a number of activities to detect intelligent extraterrestrial life. SETI projects survey the sky to detect the existence of transmissions from a civilization on a distant planet.|
|SEX||Sun Users' Group & elsewhere||A technique invented by the blue-green algae hundreds of millions of years ago to speed up their evolution, which had been terribly slow up until then.|
|SFA||Sales Force Automation||The process of using software to automate the business tasks of sales, including order processing, contact management, information sharing, inventory monitoring and control, order tracking, customer management, sales forecast analysis and employee performance evaluation.|
|SFD||Start-of-Frame Delimiter||A data packet on the wire is called a frame. A frame begins with Preamble and SFD, following which each Ethernet frame features an Ethernet header featuring source and destination MAC addresses.|
|SFF||Small Form Factor||A device that is smaller than others in its field.|
|SFP||Small Form-factor Pluggable||A standard hot swappable small multi-pin conector used mostly for fibre channel optical modules on disk array controllers.|
SSH File Transfer Protocol
A network protocol providing file transfer and manipulation over a secure data stream.
SFTP client is a command-line program that implements the client part of SFTP , such as that supplied with OpenSSH.
|SFU||Services For Unix||A set of tools to better integrate existing Unix and Windows environments|
|SGC||Server Gated Cryptology||SGC is a technology for another level of transaction and operation security on the Internet. It is associated with online banking.|
|SGF||Structured Graphics Format||An application of the XML, that is used to describe a Web site so that its pages and content can be displayed and accessed in a structured, usually tabular form.|
|SGI||Silicon Graphics Incorporated||SGI was founded by Dr. James Clark in 1982 and had its initial public offering in 1986. It is best known for products used to develop computer graphics such as those used to create special effects and animation in motion pictures. HTTP://WWW.SGI.COM|
|SGML||Standard Generalized Markup Language||Developed in 1986 SGML provides a rich set of rules for defining new data formats. A well-known example of using SGML is XML, which is a subset of SGML: The definition of XML is all of SGML minus a couple of dozen items. SGML is an International Standards Organization (ISO) standard: ISO 8879:1986.|
|SGRAM||Synchronous Graphics Random Access memory||a type of memory that is optimized for graphics use. SGRAM is capable of running at much higher speeds than fast page or EDO DRAM.|
|SGSN||Service GPRS Support Node||mediates access to network resources on behalf of mobile subscribers (MS) and implements the packet scheduling policy between different QoS classes.|
|SHA||Secure Hash Algorithm||A hashing algorithm that generates a 160-bit hash value (SHA-1). Used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places|
|S-HTTP||Secure Hypertext Transport Protocol||Also known as HTTPS, this is an extension of Hypertext Transport Protocol (HTTP) that provides security services for transaction confidentiality, authenticity and integrity between HTTP servers and clients.|
The process of creating a complex information system. This process may include designing or building a customized architecture or application, and integrating it with new or legacy hardware, packaged and custom software, and communications.
An organization or an individual that performs system integration. Major system integration projects often require the assistance of a specialty firm that has the resources and expertise to manage a project plan that could last over several months or even years.
|SID||Security Identifier||A unique value assigned to an object by which it is identified. Security zones - A technique used in IE to allow you to assign different levels of security to different sets of Web sites depending on where they're located or how much you trust them.|
|SIEM (SEM & SIM)||Security Information and Event Management||Originally tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. This is spreading into software and appliances that are beginning to play a big role in proactive security.|
|Sig Block||signature block||The signature block that automatically appears at the end of every outgoing e-mail message.|
|SIIA||Software & Information Industry Association||An association for software companies. See also http://www.siia.net/|
|SIIT||Stateless Ip/Icmp Translation algorithm||Translates between IPv4 and IPv6 packet headers (including ICMP headers) in separate translator "boxes" in the network without requiring any per-connection state in those "boxes"|
|SIL||Safety Integrity Level||a relative level of risk-reduction provided by a safety function, or to specify a target level of risk reduction|
Security Information Management
subscriber identity module
Software designed to automate the collection of event log data from security devices and helping users make sense of it through a common management console
A small, programmable smart card containing a cellular service subscriber's identity key. The SIM contains codes to identify a subscriber to a digital mobile service and the details of the special services the subscriber has elected to use.
|SIMD||Single Instruction Multiple Data||A processor instruction that can perform operations across multiple data instructions.|
|SIMM||single in-line memory module||a small circuit board that can hold a group of memory chips. Typically, SIMMs hold up 8 (on Macintoshes) or 9 (on PCs) RAM chips. On PCs, the ninth chip is often used for parity error checking. Unlike memory chips, SIMMs are measured in bytes rather than bits.|
|Simulcast||simultaneous broadcast||A simulcast is a broadcast that can be shared live with multiple sites.|
Session Initiation Protocol
The IP equivalent of ITU Standard Number 7 Signaling (SS7). A control protocol developed within IETF for creating, modifying and terminating multiparty sessions, particularly Internet conferencing and Internet telephony sessions.
|SIPP||Stable Image Platform Program||A program launched by Intel in June 2003. SIPP aims to give PC manufacturers and enterprises greater platform stability and advanced notice of future PC desktop and notebook changes.|
|SiS||Silicon Integrated Systems||a worldwide leader in the development, manufacturing and marketing of leading-edge logic products, including core logic, multimedia, connectivity and information appliances|
Single Instance Store
student information system
Architecture designed to maintain duplicate files with a minimum of disk, cache, and backup media overhead
A system used in academic environments to enroll and register students, and to track student information such as prior transcripts, courses taken, grades received and progress toward a degree.
|SISMAPI||Siebel Internet Session Network API||a proprietary (originally Siebel Systems, now Oracle) message format protocol used for communications between various Siebel application components.|
|SITA||Societe Internationale de Telecommunications Aeronautiques||A European provider of telecommunications and IT services to the airline industry, headquartered in Geneva.|
|SIU||smallest installable unit||The file or set of files that comprise the atomic (non-aggregated) installable unit (IU) that is intended to be deployed into a single hosting environment.|
|SIX||Shared with Intent eXclusive||Database management system's locking attribute|
|SKMS||Service Knowledge Management System||Service Knowledge Management System|
|SKU||Stock Keeping Unit||
The number of each specific product available for sale. For example, if a hardware device or software package comes in different versions, there is an SKU for each one.
|SL||Scientific Linux||Scientific Linux (SL) is a Linux distribution produced by Fermi National Accelerator Laboratory and the European Organization for Nuclear Research (CERN).|
|SLA||Service Level Agreement||Defines how a service should perform and the sanctions if it fails to perform. http://www.slf4j.org/|
|SLI||Scalable Link Interface||Method for linking two (or more) video cards together to produce a single output. It is an application of parallel processing for computer graphics, meant to increase the processing power available for graphics|
|SLIC||Subscriber Line Interface Card||Interface between home phone lines and CO|
|SLIP||Serial Line Internet Protocol||A standard that was popular in the early 1990's for using a regular telephone line (a serial line) and a modem to connect a computer as a realInternet site. SLIP has largely been replaced by PPP.|
|SLM||service level management||The disciplined, proactive methodology used to ensure that adequate levels of service are delivered to all IT users in accordance with business priorities and at acceptable cost.|
|SLP DA||Service Location Protocol Directory Agent||A protocol that registers services available on a network and gives users easy access to them. When a service is added to the network, the service uses SLP to register itself on the network.|
|SLR||Scalable Linear Recording||A quarter-inch tape format developed by storage vendor Tanberg Data.|
|SLS||Softlanding Linux System||One of the first Linux distributions, originally shipped on a number of floppies, that eventually became the Slackware distribution.|
|SLSI||Super Large Scale of Integration||The process of placing from 50,000 to 100,000 circuit components. Also, the quality of their connections|
|SM/SI||Social Mining and Social Intelligence||processes for developing and applying analytics to social content. These technologies will enable organizations to discover and make sense of the knowledge, behaviors, affiliations and tendencies of Web communities, societies and environments.|
|SMART||Self-Monitoring Analysis And Reporting Technology||
It is used to protect and prevent errors in hard drives. The SMART technology basically monitors and analyzes hard drives (hence the name), then checks the health of your hard drive and lets you know if there are any problems.
|SMASH||Simple, Many And Self-Healing||Supercomputing architecture by IBM|
|SMATV||satellite master antenna television||Transmission of television programming to a Satellite Master Antenna installed on top of an apartment building, a hotel, or at another central location from where it serves a private group of viewers. The transmission usually is done in C-band to 1.5 or 2 meter dishes.|
|SMB||Server Message Block||A common format for sharing files, directories and devices in Microsoft's operating systems|
|SMBP||Server Message Block Protocol||This architecture provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network, local or distant.|
|SMD||Storage Module Device||An industry-standard interface used for large-capacity, high-performance disks|
|SMDR||station message detail recording||A computer generated report showing internal usage on a telephone system; usually includes extension number, trunk number used, phone number dialed, time of call, duration and operator involvement.|
|SMDS||Switched Multimegabit Data Service||public, packet-switched service aimed at enterprises that need to exchange large amounts of data over the wide-area network on a nonconstant or "bursty" basis.|
|SMF||Semantic Modelling Format||XML-based language that can be used to persist English Query model information|
|SMI||Structure of Management Information||In the SNMP, the rules used to define the objects that can be accessed by means of a network management protocol.|
|SMiShing||SMS phishing||a type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink, which, if clicked would download a Trojan horse to the mobile phone.|
|SMLT||Split Multi-Link Trunking||an improvement over Multi-Link Trunking (MLT), a method of link aggregation that allows multiple Ethernet links to be aggregated together, and handled as a single logical trunk.|
Simple Management Protocol
another name for SNMP2. SNMP2 is an enhanced version of the SNMP with features required to support larger networks operating at high data transmission rates.
A multiprocessing architecture developed by Intel and a group of leading PC manufacturers. The architecture describes how multiple processors in the same server can share the same system memory and provide increased performance/scalability.
Security Management System
Short Message Service
Systems Management Server
TippingPoint Appliance manages multiple IPS systems
A bidirectional paging function that is built into GSM systems. Each message can be up to 160 characters long. The network stores messages for several days and attempts to deliver the messages whenever the portable phone is switched on.
Microsoft's premier remote, large-batch computer management application. Used to inventory large numbers, determine capabilities of each, and deploy selected software to systems that are capable of receiving the software.
Short Messaging Service Center
Smart Mixed-Signal Connectivity
On a wireless network, SMSC allows short text messages to be exchanged between mobile cell telephones and other networks.
global supplier of semiconductor solutions that distribute video, sound, photos and data in the home, automobile, office and factory. www.smsc.com
|SMSI||Simplified Message Service Interface||A Lucent Technologies service that transmits out-of-band information between DirectTalk and certain switches.|
|SMTP||Simple Mail Transfer Protocol||
A TCP/IP protocol governing electronic mail transmission and reception.
|SN||Sequence Number||A cell sent periodically on each link of an AIMUX to indicate how many cells have been transmitted since the previous SN cell.|
|S/N||Signal-to-Noise||The ratio of the signal power to the noise power at a point in a system (usually expressed in decibels).|
Social Network Analysis
Systems Network Architecture
a technique for analyzing patterns of relationships among people in groups, and the roles that individuals play in an informal network. It involves collecting data from multiple sources, analyzing the data to identify relationships and mining it for new information.
An IBM-developed network architecture, with layers similar to those of the OSI network reference model
|SNAP||Sub-Network Access Protocol||a standard for the transmission of IP datagrams over IEEE 802 networks.|
|SNC||Supply Network Collaboration||SAP's SCM tool|
|SNI||Switch Node Interface||The link(s) between a PPN and an EPN over which control information is passed.|
|SNIPS||System & Network Integrated Polling Software||a system and network monitoring software that runs on Unix systems and can monitor network and system devices. It is capable of monitoring DNS, NTP, TCP or web ports, host performance, syslogs, radius servers, BGP peers, etc. New monitors can be added easily|
Simple Network Management Protocol
A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches. A device is said to be SNMP compatible if it can be monitored and /or controlled using SNMP messages.
|SNS||social networking site||any Web site that enables users to create public profiles within that Web site and form relationships with other users of the same Web site who access their profile. Social networking sites can be used to describe community-based Web sites, online discussions forums, chatrooms and other social spaces online.|
|SOA||Service Oriented Architecture
Start of Authority
|When businesses grow, they often add new products and services. While these additions may help make the business larger, it is often difficult to implement them in an efficient manner. The goal of SOA is to make it easy for businesses to grow and add new services. more...
SOA is for domain name system record
|SOAP||Simple Object Access Protocol||
SOAP is a method of transferring messages, or small amounts of information, over the Internet. SOAP messages are formatted in XML and are typically sent using HTTP (hypertext transfer protocol). Both are widely supported data transmission standards.
Security Operation Centre
Separation Of Concerns
Security Operation Centre
Software development technique used in aspect-oriented programming (AOP)
|SOCKS||SOCKetS||protocol for handling TCP though a proxy server; library of software added to an individual application for secure communication through the firewal|
|SODIMM||Small Outline Dual Inline Memory Module||These memory modules are typically used in laptop and notebook computers where space and low power consumption is a major consideration. SODIMM's are about half the size of its DIMM counterpart.|
|SOH||Start Of Header||A control character that is used to indicate the start of a header that precedes the messages text.|
|SoIP||Storage over IP||the merging of Fibre Channel technologies with IP-based technology to allow for accessing storage devices over TCP/IP networks|
|SOM||Self-Organizing Map||Algorithm used to visualize and interpret large high-dimensional data sets. Typical applications are visualization of process states or financial results by representing the central dependencies within the data on the map|
|SONET||Synchronous Optical Network||A ITU standard for high-speed communications over fiber-optic networks. It offers synchronous transmission at speeds up to multigigabit rates and includes features to enable multivendor interoperability, improved troubleshooting and network survivability.|
|SONIC||Science Of Networks In Communities
SAC On-Line Interactive Controller
|SONIC stands for Science Of Networks In Communities
SONIC stands for SAC On-Line Interactive Controller
|SORBS||Spam and Open Relay Blocking System||DNSBL includes more than 3 million listed hosts that are considered to be compromised|
|SOS||Sophisticated Operating System
Symbian Operating System
Secure Object Store
|SOS is Apple /// OS
Symbian Operating System
Lotus Notes database system
|SOW||statement of work||A document that provides comprehensive descriptions of required services — along with realistic information concerning the current environment — to ensure that vendors deliver what the enterprise needs at the price that has been negotiated.|
|SOX||Sarbanes-Oxley Act||Most significant piece of corporate securities legislation since the Securities Act of 1933 and The Securities and Exchange Act of 1934. The Act's requirements are significant and have brought about substantial change in the work and role of auditors and the operations and financial disclosures of publicly traded corporations.|
A minor software product revision that contains feature updates or bug fixes, but not enough new code to warrant a new version number. e.g. SP1 or SP2
an intelligent RAID controller that is enclosed within a storage device.
|SPAN||Switched Port Analyzer||Feature of the Catalyst 5000 switch that extends the monitoring capabilities of existing network analyzers into a switched Ethernet environment. SPAN mirrors the traffic at one switched segment onto a predefined SPAN port.|
|SPARC||Scalable Processor ARChitecture||Architecture based on a RISC concept. Sun and its suppliers designed the architecture to significantly improve price and performance|
|Sphairon||Sphere, luminary, global and Elektron, Technology (vision)||One of the leading producer of ISDN- NTs worldwide and a specialist for DSL broadband network solutions. website: www.sphairon.com|
|SPB||Stored Procedure Builder||Development environment for creating, installing and testing stored procedures|
|SPC||stored program control||A method whereby instructions are placed in the memory of a common controlled switching unit for use as a reference when processing calls. Instructions may include: class marks, code conversions, routing and trouble analysis.|
Serial Presence Detect
System Products Division
An 8-pin serial EEPROM chip available on some SDRAM memory that keeps specific information about a DIMM’s size, speed, voltage, drive strength, number of row and column addresses, DIMM manufacturer, and RAM manufacturer.
Proprietary AS/400 I/O bus
|S/PDIF||Sony/Philips Digital Interface||An audio transfer file format that allows the transfer of audio from one file to another without converting it to and from an analog format, which could degrade the quality of the file.|
Synergistic Processor Element
System Policy Editor
In the Cell Broadband Engine architecture, a grouping of multiple Synergistic Processor Units (SPUs).
It provides an administrator with the means to centrally manage Windows desktop environments, and is a flexible alternative to mandatory user profiles
Sender Policy Framework
Shortest Path First
allows the e-mail address owner to specify which mail servers they use to send mail from their domain to prevent sender address forgery.
A routing algorithm in which each router uses the length of the path to determine the shortest-path spanning tree.
Serial Peripheral Interface
Stateful Packet Inspection
An inexpensive bus for chip interconnection that is popular on circuit boards.
A firewall mechanism which examines each incoming network packet and only allows through those packets which are for a known open connection.
|SPICE||Simple Protocol for Independent Computing Environment||a hosted virtual desktop protocol and a key part of Red Hat Enterprise Virtualization for Desktops.|
|SPIM||Spam over Instant Messaging||a type of spam that uses IM platforms as the transport medium. Users of different public IM systems, who use public profiles are quite likely to receive unsolicited advertising messages from spammers.|
|SPIT||Spam over Internet Telephony||SPIT offers spammers a low-cost alternative to unsolicited marketing. Mass marketing using automated voice messages is accomplished literally with the push of a button.|
Sender Policy Framework
Sound Pressure Level
an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
A measure in decibels of the sound power produced by an object. It is measured with a sound level meter.
Statistical Packet Multiplexing
supplier performance management
Technology to dynamically allocate bandwidth to active circuits
products use dashboard and reporting mechanisms to aggregate information on suppliers, their financial condition, their certifications and social responsibility performance, and their track record of meeting requirements
|SPML||Service Provisioning Markup Language||SaaS industry standards|
|SPOF||Single point of failure||a generic phrase for any component of a system that upon failure will cause a malfunction in the entire system. A SPOF can be a hardware or electrical component or a software component.|
|SPOI||Signaling Point Of Interface||The demarcation point on the SS7 signaling link between a LEC network and a Wireless Services Provider (WSP) network.|
|SPOT||Smart Personal Objects Technology||SPOT is the result of a Microsoft research project to embed more intelligence in a variety of everyday devices such as clocks. Microsoft is by no means the first vendor to promote such a vision, but the specificity and practicality of Microsoft's approach sets it apart from many earlier efforts.|
|SPREAD||Systems Programming, Research, Engineering And Development||Systems Programming, Research, Engineering And Development by IBM|
|SPSS||Statistical Package for the Social Sciences||A statistical analysis software package invented in 1968, which became the founding product of Chicago-based analytical-software firm SPSS, Inc., acquired by IBM|
|SPU||Synergistic Processor Unit||A 128-bit processor with single-instruction multiple-data (SIMD) capabilities specialized for computationally-intensive tasks.|
|SPX||Sequenced Packet Exchange||A Novell NetWare session-based communications protocol used to govern the transport of messages across a network. It is designed to provide reliable end-to-end data transport, including error detection between two end-user devices.|
Speech recognition is the process by which a computer identifies spoken words. Basically, it means talking to your computer, AND having it correctly recognize what you are saying.
Structured Query Language
|SQL is a standardized query language for requesting information from a database.|
|SQL PL||SQL procedural language||A language extension of SQL that consists of statements and language elements that can be used to implement procedural logic in SQL statements.|
|SQR||Security to Quality Defect Ratio||The ratio of the number of security defects to the number of all identifed defects|
|SR-IOV||Single-root I/O virtualization standards||developed by the PCI Special Interest Group (PCI-
SIG) and enables VM migration. The Intel Ethernet
Server Adapter’s implementation assists direct connectivity from the adapter to the virtual machines to provide near-native performance.
|SRAM||static random access memory||a type of memory that is faster and more reliable than the more common DRAM. The term static is derived from the fact that it doesn't need to be refreshed like dynamic RAM.|
|SRAT||Static Resource Affinity Table||Can be used to describe the physical location of processors and memory in large-scale systems, allowing threads and memory to be grouped in an optimal manner|
|SRGS||Speech Recognition Grammar Specification||Grammar intended for use by speech recognizers and other grammar processors so that developers can specify the words and patterns of words to be listened for by a speech recognizer|
|SRL||Singing Return Loss||
The frequency-weighted measure of return loss at the edges of the voiceband (SRL Low, 260 to 500 Hz and SRL High, 2200 to 3400 Hz), where singing (instability) problems are most likely to occur.
|SRM||storage resource management||SRM refers to software that manages storage from a capacity, utilization, policy and event-management perspective.|
|SRS||Shared Registry Server||The central system for all accredited registrars to access and register/control domain names.|
Source Routing Transparent
(formerly) Souris River Telecommunications
An IETF Bridging Standard combining Transparent Bridging and Source Route Bridging.
the largest telecommunications cooperative in North Dakota, with telephone, wireless phone, broadband Internet, security systems, and cable tv services. http://www.srt.com/
|SRV||Service records||SRV Records represent a data category in the Domain Name System that localizes specific domain related services such as FTP and SIP.|
Signaling System 7
Defined by ITU-T, SS7 is an international out-of-band signaling protocol that provides two major capabilities: high-speed circuit-switched connections for faster call setup and remote database access for transaction processing. SS7 has been deployed throughout the PSTN.
Social Security Administration
Survivable Systems Analysis
an independent agency of the United States federal government that administers Social Security www.ssa.gov
Practical engineering process that enables you to systematically assess the survivability properties of proposed systems, existing systems, and modifications to existing systems
|SSAP||Source Service Access Point||part of the LLC LSAP for data type.|
|SSB||sequential store buffer||A sequential store buffer is a technique for dividing the cost of a write-barrier by remembering which objects are modified and updating remembered sets (and so on) at a later stage.|
|SSSCE||Short Self-Contained Correct (or Compilable) Example||Preferred form of code snippets posted in newsgroups and bug reports. http://sscce.org/|
|SSD||Solid-State Drive||a data storage device that uses solid-state memory to store persistent data|
Simple Sharing Extension
Streaming Simd Extensions
Extensions to RSS
Xeon CPU extension to the instruction set
|SSH||Secure Shell||A set of applications and protocols to provide secure encrypted message transmission between two computers on an insecure (e.g. public) network.|
Small Scale Integration
Instructs the server to include some dynamic information in a Web page before it is sent to a client. This dynamic information could be current date, an opinion poll, etc.
Chips containing tens of transistors, but not hundreds.
|SSID||Service Set identifier||Identifies a network consisting of one or more access points. Such a network is also known as an Extended Service Set (ESS).|
|SSIM||Symantec Security Information Manager||enables a documented, repeatable process for security threat response and IT policy compliance via integrated log management and incident response solutions.|
Secure Sockets Layer
A protocol designed by Netscape Communications to enable encrypted, authenticated communications across the internet. SSL used mostly in communications between web browsers and web servers.
|SSLE||sequential systems of linear equations||an infeasible QP-free method based on the update of the inverse of the symmetric matrix|
|SSMP||Simple Screen Management Protocol||A communications protocol for text-based terminals.|
System Security Officer
A term used to describe technology that enables a user to access multiple computer platforms or application systems after being authenticated just one time.
A person responsible for enforcement or administration of the security policy that applies to the system.
|STA||Single Threaded Apartment||A threading context for components that require a message queue or thread affinity. Access to components in an STA is by definition synchronized|
|STEP||Standard for the exchange of product||a draft ISO standard for the exchange of CAD data.|
|STK||Satellite ToolKit||Graphical, object-oriented software for satellite and space station orbital and sensor coverage analysis [|
|STM||scanning tunneling microscopes||scanning tunneling microscopes|
|STM||Synchronous Transport Module||
A system of fiber-optic transmission rates defined in the Synchronous Digital Hierarchy (SDH) scheme (see SDH). STM levels are the European equivalent of Synchronous Optical Network (SONET) Optical Carrier Level N (OC-N) hierarchy in North America (see SONET and OC-N). Each level quadruples as follows:
STM-4: 622 Mbps
STM-16: 2.5 gigabits per second (Gbps)
STM-64: 10 Gbps
STM-256: 40 Gbps
|STOCK||Strategic and Operational
|MDM project that provides a single customer database shared by all applications managing customer data|
shielded twisted pair
Soa Tools Platform
Spanning Tree Protocol
Straight Through Processing
Switching Transfer Points or Single Transfer Points
A cable where the twisted pair is shielded from electromagnetic interference.
Open source collaborative software development project dedicated to providing a generic, extensible, standards-based tool platform for producing Service Oriented Architecture (SOA) applications
provides a loop free topology for any LAN or bridged network.
Ability to take a financial transaction though complete confirmation automatically
part of SS7. STPs are packet switches.
|STS||Security Token Service||Service used to issue tokens|
|STT||Secure Transaction Technology||Technology developed by software companies and credit companies to protect financial dealings over the Internet and prevent fraud.|
|STUN||Session Traversal Utilities for NAT||an Internet standards-track suite of methods, including a network protocol, used in NAT traversal for applications of real-time voice, video, messaging.|
|STX||Start Of Text||A control character that is used to indicate the beginning of a message and is placed immediately behind the header in a transmit ted block.|
|SUA||Single User Account||Allows multiple users to share a single IP address (either dynamic or static) assigned by your Internet Service Provider (ISP)|
|SUS||Software Update Services||Software update management solution by Microsoft|
|SUT||System Under Test||The real open system in which the Implementation Under Test (IUT) resides.|
|SVBR||Semantics of Business Vocabulary and Business Rules|| vocabularies exist for specific vertical
industries — for example, Health Level Seven (HL7), the Agency for Co-operation and Research
in Development (ACORD), and the Society for Worldwide Interbank Financial elecommunication
|SVC||Scalable Video Coding||traffic handling techniques, an extension of H.264|
A request that serves as the interface into operating system functions, such as allocating storage.
An instruction that interrupts the program being run and passes control to the supervisor so that it can perform the specific service indicated by the instruction.
|SVC||Switched Virtual Circuit||
Virtual connection set up only for the duration of a single communications session.
In OSI, a temporary association between two DTEs that is initiated when one DTE makes a call request to the network.
|SVD||Secondary Virtual Disk||a VD configured using hybrid RAID levels like RAID10 or RAID50. Its elements
|SVG||Scalable Vector Graphics||an XML file that is used to hold graphical data that can be resized without loss of quality. SVG data can be kept in its own file, or even embedded within a web page|
|SVGA||Super Video Graphics Array||A display standard defined by the Video Electronics Standards Association. It provides higher resolution than the 640 x 480 VGA standard, and supports as many as 16 million colors, depending on the computer system and amount of available memory.|
|SVPCo||Small Value Payments Co.||A banking consortium, formed in July 1998, that is governed by 12 large U.S. banks SVPCo is concentrating on Electronic Check Presentment (ECP), which requires cooperation from many banks in order to succeed.|
|SW or S/W||Software||a computer program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware).|
|SWAP||Shared Wireless Access Protocol||A protocol used for wireless voice and data networking in the home, developed by the HomeRF Working Group.|
|SWAT||Samba Web Administration Tool
Solutions with Advanced Technologies
|Samba Web Administration Tool
SWAT is Cisco term
|SWIFT||Society for Worldwide Interbank Financial Telecommunication||A self-describing messaging format used in the banking and finance industry to support electronic funds transfer.|
|SWIM||System Wide Information Management||System Wide Information Management|
|SWL||short wavelength||A type of fiber optic cabling that is based on 850-mm lasers and supports 1.0625-Gbps link speeds.|
|SWOP||Specifications for Web Offset Publications||These specifications standardize the submission of materials supplied to web offset publications, and areas of responsibility for each of the involved industry segments. See http://www.swop.org/|
|SWT||Standard Widget Toolkit||An Eclipse toolkit for Java developers that defines a common, portable, user interface API that uses the native widgets of the underlying operating system.|
|Sync||Synchronisation||pulse ensures that the monitor displaying the information is synchronized at regular intervals with the device supplying the data, thus displaying the data at the right location.|
|syslog||system logging||Syslog is the system logging facility for Unix systems.|
|Sysop||System Operator||Anyone responsible for the physical operations of a computer system or network resource. For example, a System Administrator decides how often backups and maintenance should be performed and the System Operator performs those tasks.|
|SYSVOL||System Volume||a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain in Microsoft Windows.|
|salt||In password protection, salt is a random string of data used to modify a password hash. Salt can be added to the hash to prevent a collision by uniquely identifying a user's password, even if another user in the system has selected the same password.|
A trial environment online where you can test something out without breaking anything.
|SANergy||A product of IBM Tivoli that delivers shared data access at the speed of a SAN, using fibre channel, the SCSI, or the iSCSI.|
|satellite phone||They operate both on either GSM/AMPs networks, and via satellite, in areas where there is no coverage.|
|scam||A fraudulent scheme that is used to attempt to obtain money from a person via the Internet.|
|script||A series of statements, written in a scripting language such as AppleScript or Perl, that instruct an application or the operating system to perform various operations. Interpreter programs translate scripts.|
|seamless||In software, it means that what takes place between the user and the application or applications accessed by the user is perfectly smooth to the user and the software being used by the user will work easily with other software the user is using.|
|Server||A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running|
|shadow password||A password that’s stored in a secure file on the server and can be authenticated using a variety of conventional authentication methods|
|Silicon Valley||A nickname for the region south of San Francisco that contains an unusually high concentration of computer companies. Silicon is the most common semiconductor material used to produce chips.|
|site license||A license that gives a customer permission to use a software package on more than one system. Site licenses provide a bulk rate to companies and schools that want to use software on many computers.|
|Six Sigma||Six Sigma is a disciplined, data-driven approach and methodology for eliminating defects in any process and is broadly applied, from manufacturing to transactional processes within product to service sectors.|
|slamming||Changing an end user's primary local exchange carrier or Interexchange Carrier without the end user's authorization.|
|slave||This usually refers to an IDE setting on a hard drive or other IDE device. When two devices are used on a single IDE channel, one is set to master and the other to slave.|
|slot||a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinhole type contact points|
|Smart card||A tamper-resistant hardware device the size of a credit card, that can be used for the storage of secure information such as personal information, electronic cash and private encryption keys.|
A copy of the data in a database at any given point in time.
A copy of changed data in the active files and directories of a file system with the exception of the inode number
|sniff / sniffer||
The process of listening to network traffic that you are not authorized to receive.
Sniffer: network management tool that monitors data packets on a network to help administrators ensure message integrity and service quality.
|Social Analytics||describes the process of measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas.|
a receptacle that provides a means of communication between two processes.
An identifier that an application uses to uniquely identify an end point of communication.
A means for directing data to an application in a TCP/IP network using a unique identifier that is a combination of an IP address and a port number.
|source code||Computer programs or operating systems are originally written by a human being in a programming language. This is called the source code of the software.|
|Southbridge||the chip that controls all of the computers I/O functions, such as USB, audio, serial, the system BIOS, the ISA bus, the interrupt controller and the IDE channels. In other words, all of the functions of a processor except memory, PCI and AGP.|
|spam||An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn't ask for it.|
|spectrum||A continuous range of frequencies, usually wide in extent, within which waves have some specific common characteristics.|
|Speech-to-Speech Translation||involves translating one spoken language into another. It combines speech recognition, machine translation and text-to-speech technology.|
|splitter||A simple device that takes one input and sends it to several identical ports without amplification.|
A process whereby a router responds to keep alive messages from a host rather than passing them on the remote client, thus saving call charges. Used mainly in ISDN
Of an e-mail message or network packet, falsely claiming to be from an address different from that from which it actually originated.
|spool / spooler||
Temporary storage of batch data until it is ready to be handled (for example, by a processor or printer).
Spooler: A program that handles print jobs and places them in a queue for distribution and printing on one or more printers.
|Static IP||an IP address that is assigned permanently to a computer. A static IP address is needed for any kind of server that people access through the Internet|
|Streaming||Streaming is the transfer of data in a continuous stream over the Web (usually audio or video) that allows the user to play it as it arrives. However, to receive this content you must have the right plug-in for the application such as RealPlayer?, QuickTime? viewer, etc.|
|subdomain||Subdomain is a way to divide your site into sections with short and easy to remember names. Other use of subdomains might be to let somebody else use your account.|
|submarine cable||A cable designed to be laid underwater.|
|subnet mask||A bit mask used to select bits from an Internet address for subnet addressing.|
|switch||A device, such as a PBX, that responds to originator signals and connects the caller to the desired communications destination.|
|Symbian||A joint venture launched in 1998 by Psion, Ericsson, Nokia and Motorola to develop Psion's EPOC 32 operating system into a real-time operating system for handheld phones and PDAs. Matsushita, NTT DoCoMo, Siemens and Sun Microsystems have since joined.|