S for Script

abbreviation / acronyms term definition
S+ Security+ A CompTIA certification in vendor-neutral computer security training. One of the required basic certifications mandated by DoD Instruction 8570.01-M for ALL people having access, either as a military member or as a civilian support person.
S-Video Super-Video / Sony Video a technology for transmitting video signals over a cable by dividing the video information into two separate signals. One signal for color (chrominance), and the other for brightness (luminance).
S3 Simple Storage System an online storage web service offered by Amazon Web Services that first became available in the US in March 2006 and in Europe in November 2007.
SA System Administrator


The system administrator account installed with Microsoft SQL Server. This system administrator account has the username "sa".

The person who controls and manages a computer system.

SA(Source-Active) is Cisco term.

In OSI, a person who controls how the open system resources of a system or enterprise are used.

SAA Systems Application Architecture IBM's family of standard interfaces which enable software to be written independently of hardware and operating systems.
software as a service
SaaS is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network,
SAD Security Association Database In each IPsec implementation there is a nominal Security Association Database, in which each entry defines the parameters associated with one Security Association
SAIC Science Applications International Corporation Founded by J. Robert Beyster, Ph.D., and a small group of scientists in 1969, a FORTUNE 500® company http://www.saic.com
SALT Speech Application Language Tags Lightweight set of extensions to existing markup languages, in particular HTML and XHTML that enable multimodal and telephony access to information, applications and Web services from PCs, telephones, tablet PCs and wireless personal digital assistants

security account manager

Serial Access Memory

software asset management

An integral subsystem that maintains a database of information about user accounts, including passwords, any account groups a given user belongs to, the access rights each user is allowed, and any special privileges a given user has.

a serial register built into a VRAM to enable it to transfer large quantities of data from the DRAM portion of the device to a graphics controller or frame buffer.

A process for making software acquisition and disposal decisions. It includes strategies that identify and eliminate unused or infrequently used software, consolidating software licenses or moving toward new licensing models

SAML Security Assertion Markup Language An XML-based mechanism that enables disparate entities to exchange identity-related security information. This information is presented as assertions about authentication, authorization or various attributes of the identity in question.
SAN / SANs Storage Area Network(s)

A storage network that consists of two tiers:

The first tier — the storage plumbing tier — provides connectivity between nodes in a network and transports device-oriented commands and status.

The second tier — the software tier — uses software to provide value-added services that operate over the first tier.


SysAdmin, Audit, Network, Security

System Administration, Networking and Security institute

the most trusted and by far the largest source for information security training and certification in the world

Organization that develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.

SAP Service Access Point

A logical address that allows a system to route data between a remote device and the appropriate communications support.

In OSI architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.

The protocol and credentials associated with a data center device for authentication of remote operations.

Service Advertising Protocol

Secondary Audio Program

Systeme, Anwendungen, Produkte

Novell's Protocol provides information about what servers are available on the network.

An NTSC audio channel used for auxiliary transmission, such as foreign language broadcasting or teletext.

A german company that produces the leading suite of client-server business software ("Systems, Applications and Products in data processing"). www.sap.com

SAR segmentation and reassembly the process used to fragment and rebuild packets that allows them to be transported across asynchronous transfer mode (ATM)

Secure Attention Sequence

Serial Attached SCSI

single attachment station

Statistical Analysis System

A key sequence that begins the process of logging on or off. The default sequence is CTRL+ALT+DEL

A replacement for the Parallel SCSI physical storage interface. Serial Attached SCSI offers much faster communication and easier configuration.

Device attached only to the primary ring of a FDDI ring. Also known as a Class B station.

SAS Institute, a business intelligence software vendor, founded in 1976 and headquartered in Cary, North Carolina. www.sas.com

SAS 70 Statement on Auditing Standards No. 70 defines the standards an auditor must employ in order to assess the contracted internal controls www.sas70.com
SASL Simple Authentication and Security Layer An extensible authentication scheme that allows the Open Directory Password Server to support a variety of network user authentication methods required.
SAST Static application security testing a set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.
Sat Nav Satellite navigation software which finds your physical geographical location then gives you directions on which way to travel. This is most commonly used in specialist hand-held devices as well as mobile phones.
SATA Serial ATA a disk-interface technology developed by a group of the industry's leading vendors to replace parallel ATA. It is the natural successor to IDE. Serial ATA only requires seven wires per device (4 data and 3 ground) and the cables can be up to 1m long.
SAV Symantec AntiVirus Previously called Norton AntiVirus (NAV)
SAX Simple API for XML A public-domain alternative to DOM for enabling programming languages to work with XML documents. SAX is API that uses "start events" and "stop events" to parse an XML document so that an application can interact with it.
SB Sound Blaster Sound Blaster brand by Creative Labs
SBAS Satellite-Based Augmentation System systems broadcast free correction signals from geo-stationary satellites to improve the accuracy, integrity and availability of the GPS network
SBB Storage Bridge Bay specification created in March 2006 by a nonprofit working group, including collaborative vendors such as Intel, Dell, EMC and LSI, which defines SBB as the mechanical/electrical interface between a passive backplane drive array and the electronics packages that give the array its personality.

Session Border Controller

single-board computer

An appliance that simplifies handling of VoIP at the border of a network

a complete computer that resides on a single printed circuit board, usually a small one.


single-byte character set

Smart Business Communications

A coded character set in which each character is represented by a 1-byte code.

Cisco unified communications appliance that provides voice and data communications, voicemail, automated attendant, video, security, and wireless capabilities while integrating with existing desktop applications

SBL Spamhaus Block List Realtime database of IP addresses of verified spam sources and spam operations, maintained by the Spamhaus Project team and supplied as a free service to help email administrators better manage incoming email streams.
SBLOG spam blog a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
SBM Subnet Bandwidth Manager An IETF proposed standard for handling resource reservations on shared and switched IEEE 802-style local-area media
SBS Small Business Server Taken to refer to Small Business Server 2003 (or earlier versions) from Microsoft.

www.microsoft.com/windowsserver2003/sbs/default.mspx - Windows Small Business Server 2003 Home

SBSD Slow But Sure Death term used by hardware repair people that refers to the fact that computers are not in question as to IF they will crash and die; it is only a matter of when. The three lethal factors are heat, power that is not clean and cigarette smoke residue.
SCA Service component architecture a collection of specifications (proposed and published) by a consortium of vendors.
SCADA Supervisory Control And Data Acquisition Used extensively by power, water, gas and other utility companies to monitor and manage distribution facilities. They are also used to monitor and control end user usage levels for purposes such as remote meter reading and load shedding.
SCAI Switch-to-Computer Applications Interface Protocol that allows subscriber’s computer to interact with digital switch, making it possible to coordinate information in database with incoming and outgoing phone calls to allow company representative to receive customer call and simultaneously receive customer's file for viewing on desktop workstation.
SCAM SCSI Configured Auto-Magically This SCAM is actually a good thing. It allows SCSI devices to automatically be configured with an ID number, even if they aren’t assigned one.
SCCM Software change and configuration management

SCCM tools are products and suites that support the structured approval, assignment, monitoring, execution and reporting of changes to software products for teams and teams of teams.

SCCP Signaling Connection and Control Part SS7 protocol that provides additional functions to Message Transfer Part (MTP). Typically supports Transaction Capabilities Application Part (TCAP).
SCCS Source Code Control System A suite of utilities to administrate source code such that only one person can change any given file at any given instant.

Service Control Manager

Specifc Coverage Metric

Source Code Management

Source configuration management

supply chain management

The Windows component that maintains a database of installed services and manages each service's state.

A code database used to enable the collaborative development of large projects by multiple engineers. SCM repositories are managed by specific tools, which manage the repository and handle check-ins and check-outs of code resources by engineers.

How much of an application’s functionality is tested for security

a set of activities to control change by identifying the software work products that are likely to change, establishing relationships among them, defining mechanisms for managing different versions, and auditing and reporting.

The process of optimizing the delivery of goods, services and information from supplier to customer. SCM is a set of business processes that engages a trading-partner community in the common goal of satisfying the end customer.

SCO Santa Cruz Operation software company based in Santa Cruz, California which was best known for selling three UNIX variants for Intel x86 processors: Xenix, SCO UNIX, and UnixWare. http://www.sco.com/
SCOM System Center Operation Manager End-to-end service-management product that is the best choice for Windows because it works seamlessly with Microsoft software and applications, helping organizations increase efficiency while enabling greater control of the IT environment
SCORM Sharable Courseware Object Reference Model a set of technical standards that enable Web-based learning systems to find, import, share, reuse, and export learning content in a standardized way.

Secure Copy

Service/Signal Control Point

A secure protocol for transferring files over a network.

A part of SS7. A SCP is usually a host computer with databases.

SCPC single channel per carrier A transmission system in which a physical channel is allocated solely to one carrier for the duration of the transmission.
SCR Sustainable Cell Rate an upper bound on the conforming average rate of an ATM connection over time scales which are long relative to those for which the PCR is defined.
SCSI Small Computer System Interface

An ANSI-standard electronic interface that allows personal computers to communicate with peripheral hardware

A peripheral interface for up to seven devices. SCSI provides a high-speed, parallel data transfer of up to 40 megabits per second (Mbps).

SCSL Sun Community Source Licensing The Sun Microsystems license model for Java. The agreement leverages a community-based development model similar to "open-source software" initiatives that have existed over the years.
ScTP screened twisted pair A cable where the twisted pair is screened from electromagnetic interference by a thin aluminum screen.
SCTP Stream Control Transmission Protocol set of rules for transmitting multiple streams of data at the same time between two end points that have an established network connection.
SCWCD Sun Certified Web Component Developer A specialty performance-based certification program offered by Sun Microsystems (part of Oracle Corporation) that targets information regarding Java components related to Web applications, specifically Servlets and JSP.
SD Sales and Distribution

Secure Digital

Span Destination

SD is SAP term.

SD is a type of memory card used for storing data in devices such as digital cameras, PDAs, mobile phones, portable music players, and digital voice recorders.

SD is Cisco term

SDDL Security Descriptor Definition Language a formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system. The security descriptor may also provide an access control list for an object or group of objects.
SDDS Sony Dynamic Digital Sound Multi-channel (5.1 or 7.1) digital audio format, compressed from PCM at 48 kHz. The data rate can go up to 1280 kbps
SDDM source distributed data manager In a distributed data management network, programming support that translates local data management requests for remote files or SQL requests for a remote database into a DDM request
SDEP sequential dependent segment A segment of a data entry database that is chained off the root segment and inserted (last-in first-out) into the last part of a DEDB area.
SDFI Secure Digital Forensic Imaging Asynchronous method of telemedicine. It denotes a specific process that ensures the fast, safe and secure capture, storage and instant delivery of digital forensic evidence

Synchronous Data Hierarchy

Synchronous Digital Hierarchy

The European standard for using optical media as the physical transport for high-speed, long-haul networks.

ITU-TSS International standard, similar to SONET. A technique for assembling and transmitting component digital signals, for example for individual phone calls, into a single high bit rate digital data stream.

SDK software development kit A set of development utilities for writing software applications, usually associated with specific software environments (for example, the Java Development Kit).
SDMA spatial division multiple access a satellite communications mode for using data from antenna arrays in wireless communications systems.

Secondary Directory Number

Software Defined Network

A telephone number that is picked up on a telephone set, but which is a PDN on another instrument.

Software Defined Network

SDO Service Data Objects An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way, based on the concept of a disconnected data graph.
SDP Service Delivery Platform Oracle's platfrom contains the telephony functionality,
is geared toward service providers and not toward enterprises.
SDRAM Synchronous Dynamic Random Access Memory A type of high-speed DRAM that can transfer bursts of non-contiguous data at 100 MB/second or greater and works with up to 100 MHz processor speeds.

Software development life cycle

Synchronous Data Link Control

methodologies are based on the principle that security implementation shouldn't be an isolated process, but rather part of a comprehensive software engineering process.

A link-level communications protocol used in an IBM SNA network that manages synchronous, code-transparent, serial information transfer over a link connection

SDLT Super Digital Linear Tape A Quantum storage product architecture that extends the capacity and transfer rate of DLT drives.
SDO Service Data Objects Framework that simplifies and unifies data application development in a SOA. It supports and integrates XML and incorporates J2EE patterns and best practices
SDP Session Description Protocol A text file used with QuickTime Streaming Server that provides information about the format, timing, and authorship of a live streaming broadcast and gives the user’s computer instructions for tuning in.
SDR software-defined radio software-defined radio
SDS Sudden Death Syndrome Used in digital photography when your camera dies a sudden death
SDSL Symmetric Digital Subscriber Line
SDSL is a type of of DSL, which is used for transferring data over copper telephone lines. The "symmetric" part of the term means that an SDSL connection has the same maximum upload and download speeds.
SDTV Standard Definition television the digital television format that provides a video quality near the equivalent of DVD. SDTV and HDTV are the two designations of display formats for digital television (DTV) transmissions, which are standards as of 2004.
SDVO Serial Digital Video Output Makes it possible to use a 16-lane PCI express slot to add additional video signaling interfaces such as VGA and DVI monitor outputs, SDTV and HDTV television outputs, or TV tuner inputs to a system board containing an integrated Intel 9xx-series graphics processor.
SDX Storage Data Acceleration This technology was introduced by Western Digital. The idea behind it is that slower drives such as CD and DVD drives would attach directly to larger, faster hard drives.
SE secure element

a generic term that describes the place where a mobile contactless application is stored securely.

SEA-ME-WE Southeast Asia-Middle East-Western Europe 2 A submarine cable network that went into operation in 1994, linking over one dozen countries from France to Singapore.
SEA-ME-WE 3 Southeast Asia-Middle East-Western Europe 3 A fiber-optic submarine cable network that went into service in 1999, linking over 30 countries between Western Europe and Southeast Asia.
SEAL simple and efficient AAL method of relaying ATM cells between ATM Layer and a higher layer
SEAS SaaS-enabled application server platform middleware that is specially designed with multitenant capabilities in transaction isolation, data access isolation, and security and performance isolation to support the design and deployment of SaaS-style business applications.
SEC Siemens Enterprise Communications a joint venture of the Siemens parent company and The Gores Group, emerging as a significant competitor in the enterprise UC market.
SECAM Sequential Couleur a Memoire A color television broadcasting system using 625 picture lines and a 50-hertz field frequency, in which the two color-difference signals are transmitted sequentially instead of simultaneously. It was developed in France and is also used in the former Soviet Union.
SEG secure e-mail gateway solutions that provide enterprise message transfer agent (MTA) capabilities, offer protection against inbound and outbound e-mail threats
SEM Strategic Enterprise Management A suite of SAP analytical applications that support integrated planning, decision making and performance monitoring. SEM uses multidimensional OLAP functionality to process data held in SAP's Business Information Warehouse.
SEN Siemens Enterprise Communications provides professional business solutions, managed services & unified communications to all business types. www.siemens-enterprise.com
SEO Search Engine Optimization
Just about every Webmaster wants his or her site to appear in the top listings of all the major search engines. Say, for example, that Bob runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes."
SERK Server Extensions Resource Kit Microsoft Frontpage server extensions additional documentation and software
SERP Search Engine Results Page the page that you see after you perform a search using a search engine. It includes a list of search results that are relevant to the search phrase or keywords you entered.


Severely Errored Seconds

A simple push-button configuration method that automates wireless network connection setup between Linksys routers and wireless devices

A unit used to specify the error performance of T carrier systems. This indicates a second containing ten or more errors, usually expressed as SES per hour, day, or week.

SET Secure Electronic Transaction A standard in conceived 1995 by Visa and MasterCard to ensure that all Internet-based payment transaction details are encrypted, the parties authenticated, acknowledgments fully recorded and the customer payment details made available only to the bank.
SETI Search of Extraterrestrial Intelligence the collective name for a number of activities to detect intelligent extraterrestrial life. SETI projects survey the sky to detect the existence of transmissions from a civilization on a distant planet.
SEX Sun Users' Group & elsewhere A technique invented by the blue-green algae hundreds of millions of years ago to speed up their evolution, which had been terribly slow up until then.
SFA Sales Force Automation The process of using software to automate the business tasks of sales, including order processing, contact management, information sharing, inventory monitoring and control, order tracking, customer management, sales forecast analysis and employee performance evaluation.
SFD Start-of-Frame Delimiter A data packet on the wire is called a frame. A frame begins with Preamble and SFD, following which each Ethernet frame features an Ethernet header featuring source and destination MAC addresses.
SFF Small Form Factor A device that is smaller than others in its field.
SFP Small Form-factor Pluggable A standard hot swappable small multi-pin conector used mostly for fibre channel optical modules on disk array controllers.

SSH File Transfer Protocol

(or Program)

A network protocol providing file transfer and manipulation over a secure data stream.

SFTP client is a command-line program that implements the client part of SFTP , such as that supplied with OpenSSH.

SFU Services For Unix A set of tools to better integrate existing Unix and Windows environments
SGC Server Gated Cryptology SGC is a technology for another level of transaction and operation security on the Internet. It is associated with online banking.
SGF Structured Graphics Format An application of the XML, that is used to describe a Web site so that its pages and content can be displayed and accessed in a structured, usually tabular form.
SGI Silicon Graphics Incorporated SGI was founded by Dr. James Clark in 1982 and had its initial public offering in 1986. It is best known for products used to develop computer graphics such as those used to create special effects and animation in motion pictures. HTTP://WWW.SGI.COM
SGML Standard Generalized Markup Language Developed in 1986 SGML provides a rich set of rules for defining new data formats. A well-known example of using SGML is XML, which is a subset of SGML: The definition of XML is all of SGML minus a couple of dozen items. SGML is an International Standards Organization (ISO) standard: ISO 8879:1986.
SGRAM Synchronous Graphics Random Access memory a type of memory that is optimized for graphics use. SGRAM is capable of running at much higher speeds than fast page or EDO DRAM.
SGSN Service GPRS Support Node mediates access to network resources on behalf of mobile subscribers (MS) and implements the packet scheduling policy between different QoS classes.
SHA Secure Hash Algorithm A hashing algorithm that generates a 160-bit hash value (SHA-1). Used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places
S-HTTP Secure Hypertext Transport Protocol Also known as HTTPS, this is an extension of Hypertext Transport Protocol (HTTP) that provides security services for transaction confidentiality, authenticity and integrity between HTTP servers and clients.

system integration

system integrator

The process of creating a complex information system. This process may include designing or building a customized architecture or application, and integrating it with new or legacy hardware, packaged and custom software, and communications.

An organization or an individual that performs system integration. Major system integration projects often require the assistance of a specialty firm that has the resources and expertise to manage a project plan that could last over several months or even years.

SID Security Identifier A unique value assigned to an object by which it is identified. Security zones - A technique used in IE to allow you to assign different levels of security to different sets of Web sites depending on where they're located or how much you trust them.
SIEM (SEM & SIM) Security Information and Event Management Originally tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. This is spreading into software and appliances that are beginning to play a big role in proactive security.
Sig Block signature block The signature block that automatically appears at the end of every outgoing e-mail message.
SIIA Software & Information Industry Association An association for software companies. See also http://www.siia.net/
SIIT Stateless Ip/Icmp Translation algorithm Translates between IPv4 and IPv6 packet headers (including ICMP headers) in separate translator "boxes" in the network without requiring any per-connection state in those "boxes"
SIL Safety Integrity Level a relative level of risk-reduction provided by a safety function, or to specify a target level of risk reduction

Security Information Management

subscriber identity module

Software designed to automate the collection of event log data from security devices and helping users make sense of it through a common management console

A small, programmable smart card containing a cellular service subscriber's identity key. The SIM contains codes to identify a subscriber to a digital mobile service and the details of the special services the subscriber has elected to use.

SIMD Single Instruction Multiple Data A processor instruction that can perform operations across multiple data instructions.
SIMM single in-line memory module a small circuit board that can hold a group of memory chips. Typically, SIMMs hold up 8 (on Macintoshes) or 9 (on PCs) RAM chips. On PCs, the ninth chip is often used for parity error checking. Unlike memory chips, SIMMs are measured in bytes rather than bits.
Simulcast simultaneous broadcast A simulcast is a broadcast that can be shared live with multiple sites.

Session Initiation Protocol

The IP equivalent of ITU Standard Number 7 Signaling (SS7). A control protocol developed within IETF for creating, modifying and terminating multiparty sessions, particularly Internet conferencing and Internet telephony sessions.

SIPP Stable Image Platform Program A program launched by Intel in June 2003. SIPP aims to give PC manufacturers and enterprises greater platform stability and advanced notice of future PC desktop and notebook changes.
SiS Silicon Integrated Systems a worldwide leader in the development, manufacturing and marketing of leading-edge logic products, including core logic, multimedia, connectivity and information appliances

Single Instance Store

student information system

Architecture designed to maintain duplicate files with a minimum of disk, cache, and backup media overhead

A system used in academic environments to enroll and register students, and to track student information such as prior transcripts, courses taken, grades received and progress toward a degree.

SISMAPI Siebel Internet Session Network API a proprietary (originally Siebel Systems, now Oracle) message format protocol used for communications between various Siebel application components.
SITA Societe Internationale de Telecommunications Aeronautiques A European provider of telecommunications and IT services to the airline industry, headquartered in Geneva.
SIU smallest installable unit The file or set of files that comprise the atomic (non-aggregated) installable unit (IU) that is intended to be deployed into a single hosting environment.
SIX Shared with Intent eXclusive Database management system's locking attribute
SKMS Service Knowledge Management System Service Knowledge Management System
SKU Stock Keeping Unit

The number of each specific product available for sale. For example, if a hardware device or software package comes in different versions, there is an SKU for each one.

SL Scientific Linux Scientific Linux (SL) is a Linux distribution produced by Fermi National Accelerator Laboratory and the European Organization for Nuclear Research (CERN).
SLA Service Level Agreement Defines how a service should perform and the sanctions if it fails to perform. http://www.slf4j.org/
SLI Scalable Link Interface Method for linking two (or more) video cards together to produce a single output. It is an application of parallel processing for computer graphics, meant to increase the processing power available for graphics
SLIC Subscriber Line Interface Card Interface between home phone lines and CO
SLIP Serial Line Internet Protocol A standard that was popular in the early 1990's for using a regular telephone line (a serial line) and a modem to connect a computer as a realInternet site. SLIP has largely been replaced by PPP.
SLM service level management The disciplined, proactive methodology used to ensure that adequate levels of service are delivered to all IT users in accordance with business priorities and at acceptable cost.
SLP DA Service Location Protocol Directory Agent A protocol that registers services available on a network and gives users easy access to them. When a service is added to the network, the service uses SLP to register itself on the network.
SLR Scalable Linear Recording A quarter-inch tape format developed by storage vendor Tanberg Data.
SLS Softlanding Linux System One of the first Linux distributions, originally shipped on a number of floppies, that eventually became the Slackware distribution.
SLSI Super Large Scale of Integration The process of placing from 50,000 to 100,000 circuit components. Also, the quality of their connections
SM/SI Social Mining and Social Intelligence processes for developing and applying analytics to social content. These technologies will enable organizations to discover and make sense of the knowledge, behaviors, affiliations and tendencies of Web communities, societies and environments.
SMART Self-Monitoring Analysis And Reporting Technology
It is used to protect and prevent errors in hard drives. The SMART technology basically monitors and analyzes hard drives (hence the name), then checks the health of your hard drive and lets you know if there are any problems.
SMASH Simple, Many And Self-Healing Supercomputing architecture by IBM
SMATV satellite master antenna television Transmission of television programming to a Satellite Master Antenna installed on top of an apartment building, a hotel, or at another central location from where it serves a private group of viewers. The transmission usually is done in C-band to 1.5 or 2 meter dishes.
SMB Server Message Block A common format for sharing files, directories and devices in Microsoft's operating systems
SMBP Server Message Block Protocol This architecture provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network, local or distant.
SMD Storage Module Device An industry-standard interface used for large-capacity, high-performance disks
SMDR station message detail recording A computer generated report showing internal usage on a telephone system; usually includes extension number, trunk number used, phone number dialed, time of call, duration and operator involvement.
SMDS Switched Multimegabit Data Service public, packet-switched service aimed at enterprises that need to exchange large amounts of data over the wide-area network on a nonconstant or "bursty" basis.
SMF Semantic Modelling Format XML-based language that can be used to persist English Query model information
SMI Structure of Management Information In the SNMP, the rules used to define the objects that can be accessed by means of a network management protocol.
SMiShing SMS phishing a type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink, which, if clicked would download a Trojan horse to the mobile phone.
SMLT Split Multi-Link Trunking an improvement over Multi-Link Trunking (MLT), a method of link aggregation that allows multiple Ethernet links to be aggregated together, and handled as a single logical trunk.

Simple Management Protocol

Symetric MultiProcessing

another name for SNMP2. SNMP2 is an enhanced version of the SNMP with features required to support larger networks operating at high data transmission rates.

A multiprocessing architecture developed by Intel and a group of leading PC manufacturers. The architecture describes how multiple processors in the same server can share the same system memory and provide increased performance/scalability.


Security Management System

Short Message Service

Systems Management Server

TippingPoint Appliance manages multiple IPS systems

A bidirectional paging function that is built into GSM systems. Each message can be up to 160 characters long. The network stores messages for several days and attempts to deliver the messages whenever the portable phone is switched on.

Microsoft's premier remote, large-batch computer management application. Used to inventory large numbers, determine capabilities of each, and deploy selected software to systems that are capable of receiving the software.


Short Messaging Service Center

Smart Mixed-Signal Connectivity

On a wireless network, SMSC allows short text messages to be exchanged between mobile cell telephones and other networks.

global supplier of semiconductor solutions that distribute video, sound, photos and data in the home, automobile, office and factory. www.smsc.com

SMSI Simplified Message Service Interface A Lucent Technologies service that transmits out-of-band information between DirectTalk and certain switches.
SMTP Simple Mail Transfer Protocol

A TCP/IP protocol governing electronic mail transmission and reception.

SN Sequence Number A cell sent periodically on each link of an AIMUX to indicate how many cells have been transmitted since the previous SN cell.
S/N Signal-to-Noise The ratio of the signal power to the noise power at a point in a system (usually expressed in decibels).

Social Network Analysis

Systems Network Architecture

a technique for analyzing patterns of relationships among people in groups, and the roles that individuals play in an informal network. It involves collecting data from multiple sources, analyzing the data to identify relationships and mining it for new information.

An IBM-developed network architecture, with layers similar to those of the OSI network reference model

SNAP Sub-Network Access Protocol a standard for the transmission of IP datagrams over IEEE 802 networks.
SNC Supply Network Collaboration SAP's SCM tool
SNI Switch Node Interface The link(s) between a PPN and an EPN over which control information is passed.
SNIPS System & Network Integrated Polling Software a system and network monitoring software that runs on Unix systems and can monitor network and system devices. It is capable of monitoring DNS, NTP, TCP or web ports, host performance, syslogs, radius servers, BGP peers, etc. New monitors can be added easily

Simple Network Management Protocol

A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches. A device is said to be SNMP compatible if it can be monitored and /or controlled using SNMP messages.

SNS social networking site any Web site that enables users to create public profiles within that Web site and form relationships with other users of the same Web site who access their profile. Social networking sites can be used to describe community-based Web sites, online discussions forums, chatrooms and other social spaces online.
SOA Service Oriented Architecture

Start of Authority

When businesses grow, they often add new products and services. While these additions may help make the business larger, it is often difficult to implement them in an efficient manner. The goal of SOA is to make it easy for businesses to grow and add new services. more...

SOA is for domain name system record

SOAP Simple Object Access Protocol
SOAP is a method of transferring messages, or small amounts of information, over the Internet. SOAP messages are formatted in XML and are typically sent using HTTP (hypertext transfer protocol). Both are widely supported data transmission standards.

Security Operation Centre

Separation Of Concerns

Security Operation Centre

Software development technique used in aspect-oriented programming (AOP)

SOCKS SOCKetS protocol for handling TCP though a proxy server; library of software added to an individual application for secure communication through the firewal
SODIMM Small Outline Dual Inline Memory Module These memory modules are typically used in laptop and notebook computers where space and low power consumption is a major consideration. SODIMM's are about half the size of its DIMM counterpart.
SOH Start Of Header A control character that is used to indicate the start of a header that precedes the messages text.
SoIP Storage over IP the merging of Fibre Channel technologies with IP-based technology to allow for accessing storage devices over TCP/IP networks
SOM Self-Organizing Map Algorithm used to visualize and interpret large high-dimensional data sets. Typical applications are visualization of process states or financial results by representing the central dependencies within the data on the map
SONET Synchronous Optical Network A ITU standard for high-speed communications over fiber-optic networks. It offers synchronous transmission at speeds up to multigigabit rates and includes features to enable multivendor interoperability, improved troubleshooting and network survivability.
SONIC Science Of Networks In Communities

SAC On-Line Interactive Controller

SONIC stands for Science Of Networks In Communities

SONIC stands for SAC On-Line Interactive Controller

SORBS Spam and Open Relay Blocking System DNSBL includes more than 3 million listed hosts that are considered to be compromised
SOS Sophisticated Operating System

Symbian Operating System

Secure Object Store

SOS is Apple /// OS

Symbian Operating System

Lotus Notes database system

SOW statement of work A document that provides comprehensive descriptions of required services — along with realistic information concerning the current environment — to ensure that vendors deliver what the enterprise needs at the price that has been negotiated.
SOX Sarbanes-Oxley Act Most significant piece of corporate securities legislation since the Securities Act of 1933 and The Securities and Exchange Act of 1934. The Act's requirements are significant and have brought about substantial change in the work and role of auditors and the operations and financial disclosures of publicly traded corporations.


storage processor

A minor software product revision that contains feature updates or bug fixes, but not enough new code to warrant a new version number. e.g. SP1 or SP2

an intelligent RAID controller that is enclosed within a storage device.

SPAN Switched Port Analyzer Feature of the Catalyst 5000 switch that extends the monitoring capabilities of existing network analyzers into a switched Ethernet environment. SPAN mirrors the traffic at one switched segment onto a predefined SPAN port.
SPARC Scalable Processor ARChitecture Architecture based on a RISC concept. Sun and its suppliers designed the architecture to significantly improve price and performance
Sphairon Sphere, luminary, global and Elektron, Technology (vision) One of the leading producer of ISDN- NTs worldwide and a specialist for DSL broadband network solutions. website: www.sphairon.com
SPB Stored Procedure Builder Development environment for creating, installing and testing stored procedures
SPC stored program control A method whereby instructions are placed in the memory of a common controlled switching unit for use as a reference when processing calls. Instructions may include: class marks, code conversions, routing and trouble analysis.

Serial Presence Detect

System Products Division

An 8-pin serial EEPROM chip available on some SDRAM memory that keeps specific information about a DIMM’s size, speed, voltage, drive strength, number of row and column addresses, DIMM manufacturer, and RAM manufacturer.

Proprietary AS/400 I/O bus

S/PDIF Sony/Philips Digital Interface An audio transfer file format that allows the transfer of audio from one file to another without converting it to and from an analog format, which could degrade the quality of the file.

Synergistic Processor Element

System Policy Editor

In the Cell Broadband Engine architecture, a grouping of multiple Synergistic Processor Units (SPUs).

It provides an administrator with the means to centrally manage Windows desktop environments, and is a flexible alternative to mandatory user profiles


Sender Policy Framework

Shortest Path First

allows the e-mail address owner to specify which mail servers they use to send mail from their domain to prevent sender address forgery.

A routing algorithm in which each router uses the length of the path to determine the shortest-path spanning tree.


Serial Peripheral Interface

Stateful Packet Inspection

An inexpensive bus for chip interconnection that is popular on circuit boards.

A firewall mechanism which examines each incoming network packet and only allows through those packets which are for a known open connection.

SPICE Simple Protocol for Independent Computing Environment a hosted virtual desktop protocol and a key part of Red Hat Enterprise Virtualization for Desktops.
SPIM Spam over Instant Messaging a type of spam that uses IM platforms as the transport medium. Users of different public IM systems, who use public profiles are quite likely to receive unsolicited advertising messages from spammers.
SPIT Spam over Internet Telephony SPIT offers spammers a low-cost alternative to unsolicited marketing. Mass marketing using automated voice messages is accomplished literally with the push of a button.

Sender Policy Framework

Sound Pressure Level

an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.

A measure in decibels of the sound power produced by an object. It is measured with a sound level meter.


Statistical Packet Multiplexing

supplier performance management

Technology to dynamically allocate bandwidth to active circuits

products use dashboard and reporting mechanisms to aggregate information on suppliers, their financial condition, their certifications and social responsibility performance, and their track record of meeting requirements

SPML Service Provisioning Markup Language SaaS industry standards
SPOF Single point of failure a generic phrase for any component of a system that upon failure will cause a malfunction in the entire system. A SPOF can be a hardware or electrical component or a software component.
SPOI Signaling Point Of Interface The demarcation point on the SS7 signaling link between a LEC network and a Wireless Services Provider (WSP) network.
SPOT Smart Personal Objects Technology SPOT is the result of a Microsoft research project to embed more intelligence in a variety of everyday devices such as clocks. Microsoft is by no means the first vendor to promote such a vision, but the specificity and practicality of Microsoft's approach sets it apart from many earlier efforts.
SPREAD Systems Programming, Research, Engineering And Development Systems Programming, Research, Engineering And Development by IBM
SPSS Statistical Package for the Social Sciences A statistical analysis software package invented in 1968, which became the founding product of Chicago-based analytical-software firm SPSS, Inc., acquired by IBM
SPU Synergistic Processor Unit A 128-bit processor with single-instruction multiple-data (SIMD) capabilities specialized for computationally-intensive tasks.
SPX Sequenced Packet Exchange A Novell NetWare session-based communications protocol used to govern the transport of messages across a network. It is designed to provide reliable end-to-end data transport, including error detection between two end-user devices.
SR Speech Recognition

Speech recognition is the process by which a computer identifies spoken words. Basically, it means talking to your computer, AND having it correctly recognize what you are saying.

Structured Query Language
SQL is a standardized query language for requesting information from a database.
SQL PL SQL procedural language A language extension of SQL that consists of statements and language elements that can be used to implement procedural logic in SQL statements.
SQR Security to Quality Defect Ratio The ratio of the number of security defects to the number of all identifed defects
SR-IOV Single-root I/O virtualization standards developed by the PCI Special Interest Group (PCI- SIG) and enables VM migration. The Intel Ethernet
Server Adapter’s implementation assists direct connectivity from the adapter to the virtual machines to provide near-native performance.
SRAM static random access memory a type of memory that is faster and more reliable than the more common DRAM. The term static is derived from the fact that it doesn't need to be refreshed like dynamic RAM.
SRAT Static Resource Affinity Table Can be used to describe the physical location of processors and memory in large-scale systems, allowing threads and memory to be grouped in an optimal manner
SRGS Speech Recognition Grammar Specification Grammar intended for use by speech recognizers and other grammar processors so that developers can specify the words and patterns of words to be listened for by a speech recognizer
SRL Singing Return Loss

The frequency-weighted measure of return loss at the edges of the voiceband (SRL Low, 260 to 500 Hz and SRL High, 2200 to 3400 Hz), where singing (instability) problems are most likely to occur.

SRM storage resource management SRM refers to software that manages storage from a capacity, utilization, policy and event-management perspective.
SRS Shared Registry Server The central system for all accredited registrars to access and register/control domain names.

Source Routing Transparent

(formerly) Souris River Telecommunications

An IETF Bridging Standard combining Transparent Bridging and Source Route Bridging.

the largest telecommunications cooperative in North Dakota, with telephone, wireless phone, broadband Internet, security systems, and cable tv services. http://www.srt.com/

SRV Service records SRV Records represent a data category in the Domain Name System that localizes specific domain related services such as FTP and SIP.

Signaling System 7

Defined by ITU-T, SS7 is an international out-of-band signaling protocol that provides two major capabilities: high-speed circuit-switched connections for faster call setup and remote database access for transaction processing. SS7 has been deployed throughout the PSTN.


Social Security Administration

Survivable Systems Analysis

an independent agency of the United States federal government that administers Social Security www.ssa.gov

Practical engineering process that enables you to systematically assess the survivability properties of proposed systems, existing systems, and modifications to existing systems

SSAP Source Service Access Point part of the LLC LSAP for data type.
SSB sequential store buffer A sequential store buffer is a technique for dividing the cost of a write-barrier by remembering which objects are modified and updating remembered sets (and so on) at a later stage.
SSSCE Short Self-Contained Correct (or Compilable) Example Preferred form of code snippets posted in newsgroups and bug reports. http://sscce.org/
SSD Solid-State Drive a data storage device that uses solid-state memory to store persistent data

Simple Sharing Extension

Streaming Simd Extensions

Extensions to RSS

Xeon CPU extension to the instruction set

SSH Secure Shell A set of applications and protocols to provide secure encrypted message transmission between two computers on an insecure (e.g. public) network.

Server-Side Includes

Small Scale Integration

Instructs the server to include some dynamic information in a Web page before it is sent to a client. This dynamic information could be current date, an opinion poll, etc.

Chips containing tens of transistors, but not hundreds.

SSID Service Set identifier Identifies a network consisting of one or more access points. Such a network is also known as an Extended Service Set (ESS).
SSIM Symantec Security Information Manager enables a documented, repeatable process for security threat response and IT policy compliance via integrated log management and incident response solutions.

Secure Sockets Layer

A protocol designed by Netscape Communications to enable encrypted, authenticated communications across the internet. SSL used mostly in communications between web browsers and web servers.

SSLE sequential systems of linear equations an infeasible QP-free method based on the update of the inverse of the symmetric matrix
SSMP Simple Screen Management Protocol A communications protocol for text-based terminals.

single sign-on

System Security Officer

A term used to describe technology that enables a user to access multiple computer platforms or application systems after being authenticated just one time.

A person responsible for enforcement or administration of the security policy that applies to the system.

STA Single Threaded Apartment A threading context for components that require a message queue or thread affinity. Access to components in an STA is by definition synchronized
STEP Standard for the exchange of product a draft ISO standard for the exchange of CAD data.
STK Satellite ToolKit Graphical, object-oriented software for satellite and space station orbital and sensor coverage analysis [
STM scanning tunneling microscopes scanning tunneling microscopes
STM Synchronous Transport Module

A system of fiber-optic transmission rates defined in the Synchronous Digital Hierarchy (SDH) scheme (see SDH). STM levels are the European equivalent of Synchronous Optical Network (SONET) Optical Carrier Level N (OC-N) hierarchy in North America (see SONET and OC-N). Each level quadruples as follows:

STM-4: 622 Mbps

STM-16: 2.5 gigabits per second (Gbps)

STM-64: 10 Gbps

STM-256: 40 Gbps

STOCK Strategic and Operational
Customer Knowledge
MDM project that provides a single customer database shared by all applications managing customer data

shielded twisted pair

Soa Tools Platform

Spanning Tree Protocol

Straight Through Processing

Switching Transfer Points or Single Transfer Points

A cable where the twisted pair is shielded from electromagnetic interference.

Open source collaborative software development project dedicated to providing a generic, extensible, standards-based tool platform for producing Service Oriented Architecture (SOA) applications

provides a loop free topology for any LAN or bridged network.

Ability to take a financial transaction though complete confirmation automatically

part of SS7. STPs are packet switches.

STS Security Token Service Service used to issue tokens
STT Secure Transaction Technology Technology developed by software companies and credit companies to protect financial dealings over the Internet and prevent fraud.
STUN Session Traversal Utilities for NAT an Internet standards-track suite of methods, including a network protocol, used in NAT traversal for applications of real-time voice, video, messaging.
STX Start Of Text A control character that is used to indicate the beginning of a message and is placed immediately behind the header in a transmit ted block.
SUA Single User Account Allows multiple users to share a single IP address (either dynamic or static) assigned by your Internet Service Provider (ISP)
SUS Software Update Services Software update management solution by Microsoft
SUT System Under Test The real open system in which the Implementation Under Test (IUT) resides.
SVBR Semantics of Business Vocabulary and Business Rules vocabularies exist for specific vertical industries — for example, Health Level Seven (HL7), the Agency for Co-operation and Research in Development (ACORD), and the Society for Worldwide Interbank Financial elecommunication
SVC Scalable Video Coding traffic handling techniques, an extension of H.264
SVC supervisor call

A request that serves as the interface into operating system functions, such as allocating storage.

An instruction that interrupts the program being run and passes control to the supervisor so that it can perform the specific service indicated by the instruction.

SVC Switched Virtual Circuit

Virtual connection set up only for the duration of a single communications session.

In OSI, a temporary association between two DTEs that is initiated when one DTE makes a call request to the network.

SVD Secondary Virtual Disk a VD configured using hybrid RAID levels like RAID10 or RAID50. Its elements
are BVDs.
SVG Scalable Vector Graphics an XML file that is used to hold graphical data that can be resized without loss of quality. SVG data can be kept in its own file, or even embedded within a web page
SVGA Super Video Graphics Array A display standard defined by the Video Electronics Standards Association. It provides higher resolution than the 640 x 480 VGA standard, and supports as many as 16 million colors, depending on the computer system and amount of available memory.
SVPCo Small Value Payments Co. A banking consortium, formed in July 1998, that is governed by 12 large U.S. banks SVPCo is concentrating on Electronic Check Presentment (ECP), which requires cooperation from many banks in order to succeed.
SW or S/W Software a computer program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware).
SWAP Shared Wireless Access Protocol A protocol used for wireless voice and data networking in the home, developed by the HomeRF Working Group.
SWAT Samba Web Administration Tool

Solutions with Advanced Technologies

Samba Web Administration Tool

SWAT is Cisco term

SWIFT Society for Worldwide Interbank Financial Telecommunication A self-describing messaging format used in the banking and finance industry to support electronic funds transfer.
SWIM System Wide Information Management System Wide Information Management
SWL short wavelength A type of fiber optic cabling that is based on 850-mm lasers and supports 1.0625-Gbps link speeds.
SWOP Specifications for Web Offset Publications These specifications standardize the submission of materials supplied to web offset publications, and areas of responsibility for each of the involved industry segments. See http://www.swop.org/
SWT Standard Widget Toolkit An Eclipse toolkit for Java developers that defines a common, portable, user interface API that uses the native widgets of the underlying operating system.
Sync Synchronisation pulse ensures that the monitor displaying the information is synchronized at regular intervals with the device supplying the data, thus displaying the data at the right location.
syslog system logging Syslog is the system logging facility for Unix systems.
Sysop System Operator Anyone responsible for the physical operations of a computer system or network resource. For example, a System Administrator decides how often backups and maintenance should be performed and the System Operator performs those tasks.
SYSVOL System Volume a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain in Microsoft Windows.
salt In password protection, salt is a random string of data used to modify a password hash. Salt can be added to the hash to prevent a collision by uniquely identifying a user's password, even if another user in the system has selected the same password.
A trial environment online where you can test something out without breaking anything.
SANergy A product of IBM Tivoli that delivers shared data access at the speed of a SAN, using fibre channel, the SCSI, or the iSCSI.
satellite phone They operate both on either GSM/AMPs networks, and via satellite, in areas where there is no coverage.
scam A fraudulent scheme that is used to attempt to obtain money from a person via the Internet.
script A series of statements, written in a scripting language such as AppleScript or Perl, that instruct an application or the operating system to perform various operations. Interpreter programs translate scripts.
seamless In software, it means that what takes place between the user and the application or applications accessed by the user is perfectly smooth to the user and the software being used by the user will work easily with other software the user is using.
Server A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running
server farm
Secure facility that hosts a large number of Web servers.
shadow password A password that’s stored in a secure file on the server and can be authenticated using a variety of conventional authentication methods
Silicon Valley A nickname for the region south of San Francisco that contains an unusually high concentration of computer companies. Silicon is the most common semiconductor material used to produce chips.
site license A license that gives a customer permission to use a software package on more than one system. Site licenses provide a bulk rate to companies and schools that want to use software on many computers.
Six Sigma Six Sigma is a disciplined, data-driven approach and methodology for eliminating defects in any process and is broadly applied, from manufacturing to transactional processes within product to service sectors.
slamming Changing an end user's primary local exchange carrier or Interexchange Carrier without the end user's authorization.
slave This usually refers to an IDE setting on a hard drive or other IDE device. When two devices are used on a single IDE channel, one is set to master and the other to slave.
slot a slot, or expansion slot, is an engineered technique for adding capability to a computer in the form of connection pinhole type contact points
Smart card A tamper-resistant hardware device the size of a credit card, that can be used for the storage of secure information such as personal information, electronic cash and private encryption keys.

A copy of the data in a database at any given point in time.

A copy of changed data in the active files and directories of a file system with the exception of the inode number

sniff / sniffer

The process of listening to network traffic that you are not authorized to receive.

Sniffer: network management tool that monitors data packets on a network to help administrators ensure message integrity and service quality.

Social Analytics describes the process of measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas.

a receptacle that provides a means of communication between two processes.

An identifier that an application uses to uniquely identify an end point of communication.

A means for directing data to an application in a TCP/IP network using a unique identifier that is a combination of an IP address and a port number.

source code Computer programs or operating systems are originally written by a human being in a programming language. This is called the source code of the software.
Southbridge the chip that controls all of the computers I/O functions, such as USB, audio, serial, the system BIOS, the ISA bus, the interrupt controller and the IDE channels. In other words, all of the functions of a processor except memory, PCI and AGP.
spam An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn't ask for it.
spectrum A continuous range of frequencies, usually wide in extent, within which waves have some specific common characteristics.
Speech-to-Speech Translation involves translating one spoken language into another. It combines speech recognition, machine translation and text-to-speech technology.
splitter A simple device that takes one input and sends it to several identical ports without amplification.

A process whereby a router responds to keep alive messages from a host rather than passing them on the remote client, thus saving call charges. Used mainly in ISDN

Of an e-mail message or network packet, falsely claiming to be from an address different from that from which it actually originated.

spool / spooler

Temporary storage of batch data until it is ready to be handled (for example, by a processor or printer).

Spooler: A program that handles print jobs and places them in a queue for distribution and printing on one or more printers.

Static IP an IP address that is assigned permanently to a computer. A static IP address is needed for any kind of server that people access through the Internet
Streaming Streaming is the transfer of data in a continuous stream over the Web (usually audio or video) that allows the user to play it as it arrives. However, to receive this content you must have the right plug-in for the application such as RealPlayer?, QuickTime? viewer, etc.
subdomain Subdomain is a way to divide your site into sections with short and easy to remember names. Other use of subdomains might be to let somebody else use your account.
submarine cable A cable designed to be laid underwater.
subnet mask A bit mask used to select bits from an Internet address for subnet addressing.
switch A device, such as a PBX, that responds to originator signals and connects the caller to the desired communications destination.
Symbian A joint venture launched in 1998 by Psion, Ericsson, Nokia and Motorola to develop Psion's EPOC 32 operating system into a real-time operating system for handheld phones and PDAs. Matsushita, NTT DoCoMo, Siemens and Sun Microsystems have since joined.