CbeckAds

NETELLER - Play Safe

Monday, October 17

IT Glossary and Definitions


Q

QA (quality assurance)

The historic focus of the National Committee on Quality Assurance (NCQA), fundamentally based on measures of compliance to standards or processes.

QAM (quadrature amplitude modulation)

A combination of amplitude and phase modulation (and shift-keying) techniques used to transmit 9,600 bits per second (bps) over a 2,400-baud line.

QoS (quality of service)

A negotiated contract between a user and a network provider that renders some degree of reliable capacity in the shared network.

quad-band

Mobile device that supports voice and data communications conforming to one bearer technology, such as GSM, but on four different sets of frequencies. For example, many European and Asia/Pacific countries/markets have licensed deployment of GSM networks on 900MHz and 1,800MHz spectrums, and in North America GSM has been deployed on 800MHz and 1,900MHz. A quad-band phone allows the user to roam automatically among networks on any of these frequencies in any of these countries, providing that the "home" operator has roaming agreements with local mobile network operators. See also dual-band, dual-mode and tri-band.



R

RAAD (rapid architected applications development)

An approach to large-scale applications development (AD) that includes the following phases, which are executed by up to 10 teams of 10 people each during a period of no more than 18 months:
  • Phase 1: Business and technical architecture reconciliation.
  • Phase 2: Functional requirements gathering and specification.
  • Phase 3: Initial architecture design, building and implementation.
  • Phase 4: First building and testing of application, including user interface, data access and business logic.
  • Phase 5: Initial installation of application.
  • Phase 6: Concurrent engineering for subsequent builds.
  • Phase 7: Rapid release plan.

rack

A framework or structure that holds computer servers or networking equipment, usually by means of shelves or mounting plates. The height of computer equipment is expressed in rack units (U), which equal the distance between shelf increments in a standard rack (see rack unit).

rack density

The rack density describes the height of a unit. The standard height of one unit is 1.75 inches, so rack density is described in terms of the number of units, such as one unit (1U), 2U and so on. Blade servers are noted as "number of blades per blade chassis/height" (in standard U height), so 14 blades per blade chassis height of 7U would be listed as "14/7U."

rack mount

  • Rack mountable – A system that can be mounted in a rack or as a stand-alone
  • Rack-Optimized – A system that has to be run in a server cabinet
  • Tower/stand-alone – A system optimized for stand-alone installation only
  • Blade – A discrete CPU card that slides vertically into a shared chassis. Typically several blade cards are housed in a cabinet or a stand-alone chassis, which houses a common power supply, cooling element, and network switches and connections.

rack unit (RU)

A standard increment used to express the height of a piece of rack-mounted computer or networking equipment, abbreviated as "U" and equal to 1.75 inches. For example, a server with a height of 4U takes up seven inches of vertical rack space. The most common dimensions for an industry-standard rack are 42U (73.5 inches) high and 19 inches wide.

RAD (rapid application development)

An application development (AD) approach that includes small teams (typically two to six people, but never more than 10) using joint application development (JAD) and iterative-prototyping techniques to construct interactive systems of low to medium complexity within a time frame of 60 to 120 days.

radio PAD (radio packet assembler/disassembler)

PAD with an integrated radio transceiver for use with packet radio systems.

RAID (redundant array of independent disks)

A method of mirroring or striping data on clusters of low-end disk drives; data is copied onto multiple drives for faster throughput, error correction, fault tolerance and improved mean time between failures.
With the exception of RAID 0, all RAID levels provide automated recovery of data in the event of a disk failure. The RAID levels and their key features are:
  • RAID-0 – provides disk striping without parity information; data is written by segment across multiple disks sequentially until the end of the array is reached, and then writing starts at the beginning again. Provides greater logical disk capacity with faster access time on reads (multiple segments read simultaneously). However, RAID-0 provides no data redundancy – if one drive fails, the entire disk array subsystem is unavailable.
  • RAID-1 – provides fault tolerance by using disk mirroring (also called shadowing). Each byte of data on a disk is duplicated on another physical drive, providing 100 percent data redundancy. RAID-1 provides immediate access to data when either the primary or secondary drive fails, but it has the highest cost of all RAID types, since duplicate hardware is required.
  • RAID-2 – eliminates the 100 percent redundancy overhead of RAID-1 by using a powerful error detection and correction code (Hamming), with bits of the data pattern written across multiple disks.
  • RAID-3 – similar to RAID-2, but uses a single check disk per group that contains the bit parity of the data disks; data is interleaved across all disks. Because disk reads are performed across the entire array and all data is transferred to the controller in parallel, RAID-3 is well suited for applications that require high data read/write transfer rates for large sequential files.
  • RAID-4 – instead of interleaving blocks of data across all drives, writes the first block on drive 1, the second block on drive 2, and so on. This technique dramatically improves read time, since many reads are single block (single drive), freeing other drives for additional read requests.
  • RAID-5 – eliminates the dedicated parity drive by writing parity with the data across all drives in the array. Consequently, the single-write restriction and some performance degradation of RAID-1 through RAID-4 are eliminated. If a drive fails, the controller can rebuild the data from the parity and data on the remaining drives.
  • RAID-6 – provides two-disk parity and one spare, so that two simultaneous disk failures per array of disks can be tolerated. With the occurrence of a failure, a spare is brought online and transparent reconstruction begins automatically in the background with negligible impact on performance.
  • RAID-10 – a combination of RAID-0 and RAID-1 that provides the benefits of striping and fault tolerance (disk mirroring).

RAS (reliability, availability and serviceability)

A reference to a product's quality, availability of optional features, and ease of diagnosis and repair.

RBISO (role-based IS organization)

A distributed type of IS organization that represents an association of multiple IS organizational styles and sources fulfill different roles for the enterprise. Instead of a single, integrated IT function within the enterprise, this newer RBISO encompasses consultants, business liaisons, resource pools and services.

RDBMS (relational database management system)

A database management system (DBMS) that incorporates the relational-data model, normally including a Structured Query Language (SQL) application programming interface. It is a DBMS in which the database is organized and accessed according to the relationships between data items. In a relational database, relationships between data items are expressed by means of tables. Interdependencies among these tables are expressed by data values rather than by pointers. This allows a high degree of data independence.

RDM (requirements definition and management)

Requirements definition and management (RDM) tools streamline development teams' analysis of requirements, capture requirements in a database-based tool to enable collaborative review for accuracy and completeness, ease use-case and/or test-case creation, provide traceability, and facilitate documentation and versioning/change control. Increasingly, RDM tools support business analysts with graphical tools for process workflow definition, application simulation and prototyping, and other visual, collaborative tools. The database approach uses special-purpose repositories that are part of the requirements management solution or ship with a general-purpose commercial database integrated with the tool.

real time

The description for an operating system that responds to an external event within a short and predictable time frame. Unlike a batch or time-sharing operating system, a real-time operating system provides services or control to independent ongoing physical processes. It typically has interrupt capabilities (so that a less important task can be put aside) and a priority-scheduling management scheme.

receiver sensitivity

Measurement of the weakest signal that a wireless receiver can receive and still translate into data. Receiver sensitivity is affected greatly by a number of factors, including location and placement within the wireless device.

record management

The systematic organization and managed storage of diverse information sources through the end of their life cycles. Record management can be viewed as a subset of integrated document management (IDM) and is one of the five most important IDM library service functions. The others are check-in/check-out, version control, document-level security and attribute, and full-text index search and retrieval.

redundancy

  1. Portion of the total information contained in a message that can be eliminated without loss of essential information.
  2. Provision of duplicate, backup equipment or links that immediately take over the function of equipment or transmission lines that fail.

relational DBMS

The RDBMS architecture is based on a formal method of constructing a database in rows and columns using rules that have formal mathematical proofs. RDBMSs originated in the work of E.F. Codd. In an RDBMS, relationships among tables are created by comparing data, such as account numbers and names. In addition, an RDBMS has the flexibility to take any two or more tables and generate a new table from the rows that meet the matching criteria.
RDBMSs are implemented in many different ways. For example, they can be implemented on disk storage using relational or row storage techniques, stored as columns or indexes as in column-based storage, implemented in memory as the in-memory storage model, and even implemented in flash memory. In addition, RDBMS engines are available with different footprints that can be used as embedded DBMS engines in edge devices, as well as in portable or mobile devices. We also do not distinguish data types any longer because most RDBMSs available today allow multiple data types, including objects, user-defined data types, BLOBs and native XML structures.

repeatable solutions

Replicable, integrated solutions to a specific process improvement or application requirement. A repeatable solution typically exhibits the following characteristics:
  • Fixed pricing, sometimes with a shared business-benefit upside.
  • Fixed delivery schedule with rapid implementation.
  • Specified performance.
  • Initial pilot solution with rapid prototype, followed by roll-out and incremental additions.
  • A prime contractor with one point of contact for the client.
  • Long-standing and battle-proven partner relationships.
  • Joint research and development (R&D) and joint marketing among the partners.
  • Opportunity for residual values in the form of royalties, licensing, etc.
Repeatable solutions, as the basis for the portfolio of technology solutions (POTS), must be targeted at specific processes, technologies, subindustries or topical issues. They require high-end professional services such as business process re-engineering, system and network integration and software customization.

repository

A facility for storing descriptions and behaviors of objects in an enterprise, including requirements, policies, processes, data, software libraries, projects, platforms and personnel, with the potential of supporting both software development and operations management. As a single point of definition for all system resources, it should stimulate both program and installation management productivity. A system repository would include configuration definitions, tuning parameters and performance goals, while an application repository would include data definitions.

residential/small-office gateway/router with embedded DSL modem

This device is part of a home networking solution for residential consumers, but can also be used in a small office/home office (SOHO) environment. It can be a wired device or include a wireless access point. Most residential/SOHO gateways incorporate a built-in DSL modem, routing functionality, a wireless access point and a firewall.

resource requirements planning

The process of converting the production plan or the master production schedule into the impact on key resources, e.g., man hours, machine hours, storage, standard cost dollars, shipping dollars and inventory levels.

response time

The time period between a terminal operator's completion of an inquiry and the receipt of a response. Response time includes the time taken to transmit the inquiry, process it by the computer, and transmit the response back to the terminal. Response time is frequently used as a measure of the performance of an interactive system.

retail sales

This category includes the additional collection of sales applications required for a retail environment. It includes point-of-sale applications for recording sales transactions, usually a cash register and merchandising software.

retirements

Number of mobile devices ceasing to be in use during a given year. The retirements figure is complicated by the existence of secondhand equipment. When a used mobile device from one region is sold in another region in conjunction with a new connection, the device is not added to the sales-to-end-user line, but it is accounted for in the installed baseline. A high number of secondhand sales may lead to a negative figure for retirements.

reuse

An application development methodology that catalogs and makes available application components so that they may be incorporated into other applications.

revenue

Revenue consists of the gross billings generated by a vendor, measured in unit currency.

RFID (radio frequency identification)

Radio frequency identification (RFID) is an automated data collection technology that uses radio waves to transfer data between a tag and a reader to identify, track or locate the item attached to the tag. The transfer of data is then transmitted from the reader to a computer or server for processing and management. RFID does not need a line of sight or contact between the reader and the tag. The market is segmented into hardware and software.

RFID reader

An RFID reader is a radio frequency device that emits a signal through an antenna. This signal is received by RFID tags that respond to interrogation by the reader. Responses are read by the reader, and through a variety of protocols the reader can communicate with all the RFID tags in its field. Readers generally take three forms. Portal readers are fixed in one location; RFID tags pass through them and communicate with the reader. Handheld readers are portable devices that can communicate with RFID tags. Mounted readers are a special type, placed on mobile equipment such as forklifts and cranes. They often communicate with tags in fixed locations.

RFID tags

RFID tags are generally small devices that respond to an RFID reader's interrogation via radio frequency. Tags vary in terms of memory, the range over which they can be read, the level of read and write capabilities, and the availability of other computational functions. The tag can hold just a product's serial number all the way up to a mass of information about the product and its history.
Passive RFID
A passive RFID tag has no battery. It harvests all its power from the radio interrogation of the RFID reader, including enough power to respond. This yields fairly low-cost devices, but they can be read only at a fairly short range (about 20 feet in the best operating conditions).
Active RFID
Active tags have batteries attached to them so that they can respond to a reader with more power. They are much more expensive than passive tags but have a much-greater range (up to 300 feet).
Smart Cards
Contactless smart cards are often referred to as RFID tags. From a technical perspective, they are just a specially packaged form of RFID tags.
Sensors
RFID tags don't tell you anything about their environment. They can only tell you what is in the memory of the tag. However, a common application of RFID is to attach the tag to a sensor that can fill the tag's memory with data. This is then communicated to other systems through RFID protocols. The sensory technology, while intertwined with RFID, is independent.

RISC (reduced instruction set computer)

A processor architecture that shifts the analytical process of a computational task from the execution or runtime to the preparation or compile time. By using less hardware or logic, the system can operate at higher speeds. RISC cuts down on the number and complexity of instructions, on the theory that each one can be accessed and executed faster, and that less semiconductor real estate is required to process them. The result is that for any given semiconductor technology, a more powerful microprocessor can be produced with RISC than with complex instruction set computer (CISC) architectures.
This simplification of computer instruction sets gains processing efficiencies. That theme works because all computers and programs execute mostly simple instructions. RISC has five design principles:
  • Single-cycle execution – In most traditional central processing unit (CPU) designs, the peak possible execution rate is one instruction per basic machine cycle, and for a given technology, the cycle time has some fixed lower limit. Even on complex CPUs, most compiler-generated instructions are simple. RISC designs emphasize single-cycle execution, even at the expense of synthesizing multi-instruction sequences for some less-frequent operations.
  • Hard-wired control, little or no microcode – Microcode adds a layer of interpretive overhead, raising the number of cycles per instruction, so even the simplest instructions can require several cycles.
  • Simple instructions, few addressing modes – Complex instructions and addressing modes, which entail microcode or multicycle instructions, are avoided.
  • Load and store, register-register design – Only loads and stores access memory; all others perform register-register operations. This tends to follow from the previous three principles.
  • Efficient, deep pipelining – To make convenient use of hardware parallelism without the complexities of horizontal microcode, fast CPUs use pipelining. An n-stage pipeline keeps up to "n" instructions active at once, ideally finishing one (and starting another) every cycle. The instruction set must be carefully tuned to support pipelining.

RM (relationship manager)

A staff member who acts as an organizational liaison, typically between an information services (IS) department and business-unit or function. The relationship manager may fulfill a combination of roles that correspond to the degree of trust and authority granted to the person in that role by his/her customer. The job content of the position (in order of increasing business trust and responsibility) is classified in four levels:
  • Level 1: Inform and Communicate
  • Level 2: Advise and Influence
  • Level 3: Coordinate and Integrate
  • Level 4: Manage and Oversee
Relationship management is essentially a matrixed position, with reporting requirements to at least two managers (typically a chief information officer – CIO – and business function or division manager). In practice, however, the position is usually linked more strongly to one side than another, and is most often aligned to the business management side.

RMA (record management application)

An application that enables enterprises to manage electronic and paper-based records throughout the life cycles of those records.

RNC (radio network controller)

Plays a role similar to the BSC in a GSM network, but supports B nodes used in UMTS networks.

roaming

Ability of a mobile user to access cellular services while away from the home network. This includes automated roaming between GSM networks, SIM-based roaming, where a user switches the SIM card into a mobile phone from a different network, or roaming across technologies (for example, between a WCDMA network and the GSM network of another operator). Roaming can take place within one country and across national boundaries. In a WLAN context, roaming occurs when a mobile device disassociates from one access point and then re-associates with a new access point.

ROC (return on competitiveness)

A nomenclature and philosophy that goes beyond the traditional return on investment (ROI) concept by focusing the metric or calculation on how competitiveness is affected by investment. A good way to visualize and quantify the overall return on IT competitiveness is to build a spider diagram that identifies and maps all the relevant dimensions of competitiveness within a given industry sector, and then measure the changes in the overall mapping area during a given time interval (e.g., a year).

ROE (return on equity)

A measure of a company's financial performance (net income divided by the value of the stockholders' equity, and expressed in percent).

ROI (return on investment)

Financial gain expressed as a percentage of funds invested to generate that gain.

ROIT (return on information technology)

Financial gain expressed as a function of an enterprise's investment in information technology.

ROLAP (relational online analytical processing)

A relational approach to multidimensionality, offering multidimensional operations (initially read only) on top of relational data (heavily denormalized).

RSA (rural service area)

Geographic area designation used for the allocation of 1,900MHz cellular licenses to mobile service providers in the U.S. that determines where they can operate. An RSA is a non-urban area. There are 306 MSAs and 428 RSAs in the U.S. There is considerable overlap with the older BTA and MTA designations. See also BTA, MSA and MTA.

RTT (round-trip time)

Measure (in milliseconds) of the latency of a network – that is, the time between initiating a network request and receiving a response. High latency tends to have a greater impact than bandwidth on the end-user experience in interactive applications, such as Web browsing. See also latency.

R-UIM (removable user identity module)

Introduced by the CDMA Development Group (CDG) and the 3GPP2, an R-UIM card is a smart card for use with CDMA-based mobile phones. It enables customers to switch phones without changing their mobile numbers, stores frequently called numbers and provides some functions similar to the SIM card in GSM mobile phones.



S

SaaS (software as a service)

See Our software as a service definition.

SAC (subscriber acquisition cost)

Cost to operator of net subscriber addition, typically including the cost of sales and marketing, and handset subsidies, if applicable.

SAE (system architecture evolution)

3GPP architectural framework for the evolution of the core network to LTE. The SAE provides a lower-latency, packet-optimized system that supports multiple radio access technologies, including UTRAN, Wi-Fi and WiMAX, as well as wired technologies.

sales configuration systems

These systems are used to configure ship-to-order, assemble-to-order and engineer-to-order products and to configure nonproduct information and customized financing plans.

sales to end users

Branded, finished, new products sold directly to end users or leased for the first time during the year in question. Products distributed by manufacturers into a country or region ("sell in") – but not connected to networks in that region – are excluded. Conversely, products sold by a manufacturer to a distributor in one region but sold by that distributor in another region are counted as sales ("sell through") to end users in the latter region.

SAM (software asset management)

A process for making software acquisition and disposal decisions. It includes strategies that identify and eliminate unused or infrequently used software, consolidating software licenses or moving toward new licensing models.

SAM tools (systems administration management tools)

A flexible set of application maintenance utilities and application administration tools. The key value of such tools is derived from how well they manage changes. A well-designed tool permits an administrator to describe either a database or a form field change, ensures the integrity of all of the application components tied to the change and propagates the change to all affected users. SAM tools for central administration are used by system administrators and thus provide a level of technical competency, whereas administrative functionality for managers (e.g., sales managers, marketing content managers and call center supervisors) must be limited by the capabilities of the end user.

SAN (storage area network)

A SAN consists of two tiers: The first tier – the storage plumbing tier – provides connectivity between nodes in a network and transports device-oriented commands and status. At least one storage node must be connected to this network. The second tier – the software tier – uses software to provide value-added services that operate over the first tier.

satellite broadcasting operator

An entity that leverages satellite  infrastructure to transmit TV channels to viewers as a main business.

satellite communications

The use of geostationary orbiting satellites to relay transmissions from one earth station to another or to multiple earth stations.

satellite communications operator

An entity that leverages satellite network to provide telecommunication services.

satellite computer

A programmable machine that relieves a primary processor of such time-consuming operations as compiling, editing, and controlling input/output devices.

satellite dish

Parabolic microwave antenna used to transmit and receive satellite signals. On the downlink, the dish collects data or video signals from orbiting satellites and focuses them to where a feed horn collects them and passes the signal on to be amplified and sent to a satellite receiver or IRD. The term is derived from the shape of the reflector surface but also represents the entire antenna subsystem, including the feed horn and antenna structure.

satellite phone (satphone)

Handheld device that uses satellite infrastructure to effect wireless voice and SMS communications without the use of a terrestrial infrastructure. Satphones can be handheld, fixed or portable and use satellites that can be stationary or orbiting. The user requires line of sight to a satellite in the coverage area of the service provider. Services typically include two-way voice, low-speed data, SMS and fax. Satphone service providers include Globalstar, Inmarsat, Iridium Satellite and Thuraya.

SAX (Simple API for XML)

A public domain alternative to Document Object Model (DOM) that defines an event-oriented interface for Java applications.

S-band

The portion of the electromagnetic spectrum allotted for satellite transmission in the 2GHz to 4GHz frequency range. A number of MSS providers operate part of their satellite networks using the S-band. See also Ka-band, Ku-band and L-band.

SBM (skills-based management)

A program that objectively defines what skills an enterprise possesses, what skills it will need in the future, when it will need those skills, what strategic value it will place on those skills and how the information technology (IT) employees' competency levels match the value of the strategically significant skills. It is, in effect, a road map for developing competency improvement programs and other methods to fill any skill gaps.

SCADA (supervisory control and data acquisition)

A system used in manufacturing for acquiring measurements of process variables and machine states, and for performing regulatory or machine control across a process area or work cell.

scalability

The measure of a system's ability to increase or decrease in performance and cost in response to changes in application and system processing demands. Examples would include how well a hardware system performs when the number of users is increased, how well a database withstands growing numbers of queries, or how well an operating system performs on different classes of hardware. Enterprises that are growing rapidly should pay special attention to scalability when evaluating hardware and software.

scanner

A device that resolves a two-dimensional object, such as a business document, into a stream of bits by raster scanning and quantization.

scattering

A cause of light wave signal loss in optical fiber transmission. Diffusion of a light beam caused by microscopic variations in the material density of the transmission medium.

SCCM (software change and configuration management)

Software change and configuration management (SCCM – mainframe and distributed) tools implement a set of disciplines used to stabilize, track and control the versions and configurations of a set of software items and also may include development change management, defect tracking, change automation, development release management, integrated test management, integrated build management and other related processes.

SCE (supply chain execution)

Supply chain execution (SCE) is focused on execution-oriented applications, including warehouse management systems (WMSs), transportation management systems (TMSs), global trade management (GTM) systems and other execution applications, such as real-time decision support systems (for example, dynamic routing and dynamic sourcing systems) and supply chain visibility systems within the enterprise, as well as throughout the extended supply chain. Sometimes, order management systems are also included in SCE, but, generally, Gartner does not include order management in its definition of SCE. Typical modules and applications include:
  • WMSs:
  • Labor management systems
  • Yard/dock management
  • Returns management
  • Inventory control
  • TMSs:
  • Domestic transportation management software
  • Global multimodal transportation management (managing transportation around multimodal processes)
  • GTM systems:
  • Trade compliance
  • International/global logistics
  • Global order management
  • Global trade financial management

SC-FDMA (single-carrier frequency division multiple access)

A multiplexing technique similar to OFDMA but where the subcarriers assigned to each user must be contiguous, which reduces the processing power and battery requirements for mobile devices. See also OFDMA.

SCIV (supply chain inventory visibility)

Applications that allow enterprises to monitor and manage events across the supply chain to plan their activities more effectively and pre-empt problems. SCIV systems enable enterprises not only to track and trace inventory globally on a line-item level, but also submit plans and receive alerts when events deviate from expectations. This visibility into orders and shipments on a real-time basis gives enterprises reliable advance knowledge of when goods will arrive.

SCM (software configuration management)

Also known as "software change management," SCM is a methodology for software problem/change request initiation and tracking; change impact analysis; version control; security administration of software assets; software promotion; quality reviews; and software distribution.

SCM (supply chain management)

SCM is a business strategy to improve shareholder and customer value by optimizing the flow of products, services and related information from source to customer. SCM encompasses the processes of creating and fulfilling the market's demand for goods and services. It is a set of business processes that encompasses a trading partner community engaged in a common goal of satisfying the end customer. Thus, a supply chain process can stretch from a supplier's supplier to a customer's customer.
At a high level, SCM software is segmented into planning, execution and procurement components. Planning typically deals with activities to develop demand forecasts, establish relations with suppliers, plan and schedule manufacturing, and develop metrics to ensure efficient and cost-effective operations. Execution functions manage the processes and activities to ensure completion of the plans, including creating purchase orders, taking customer orders, updating inventory, managing movement of products in the warehouse, and delivering goods to the customer. Procurement applications are used to help companies understand and improve the terms and conditions of trade to understand enterprise spending.

SCP (supply chain planning)

Supply chain planning (SCP) is the forward-looking process of coordinating assets to optimize the delivery of goods, services and information from supplier to customer, balancing supply and demand. An SCP suite sits on top of a transactional system to provide planning, what-if scenario analysis capabilities and real-time demand commitments, considering constraints. Typical modules include:
  • Available/capable to promise
  • Sales and operations planning/integrated business planning
  • Collaborative planning (including forecasting and replenishment)
  • Vendor-managed inventory/direct point of sale
  • Event planning (promotion, life cycle)
  • Demand planning
  • Inventory planning
  • Production/factory planning and scheduling
  • Distribution planning (unconstrained, distribution requirements planning [DRP] and deployment)
  • Strategic network design
  • Inventory strategy optimization (simultaneous, multitiered)
  • Supply planning (optimized, DRP and deployment)
  • Production/multiplant capacity planning (master production scheduling, rough-cut capacity planning)

SCPC (single channel per carrier)

A transmission system in which a physical channel is allocated solely to one carrier for the duration of the transmission.

SCR (sustainable cell rate)

In asynchronous transfer mode (ATM), the average cell rate a source is allowed to maintain.

scrambler

A coding device applied to a digital channel that produces an apparently random bit sequence. A corresponding device is used to decode the channel, i.e., the coding is reversible.

screening

Prevention of electric, magnetic, or electromagnetic fields from escaping or entering an enclosed area by means of a barrier. Also called shielding.

screen popping

Populating a call center agent's screen with just-in-time customer information.

screen sharing

Similar to application sharing, but not all parties can update the document simultaneously.

SDH/SONET

SDH/SONET technology differs by region. SONET is sold only in North America. SDH is sold outside North America and comes in two types: SDH (Japan) is sold only in Japan, while SDH (ETSI) is sold in the rest of the world. SDH/SONET supports ring and mesh topologies, and protection of circuits through automatic protection switching (APS) is standard, via various protection programs.
SDH/SONET comes in standardized bit rates, with SDH circuits referred to as synchronous transfer mode (STM)-x (where x = 1, 4, 16, 64 and 256) connections and SONET circuits known as Optical Carrier Rate (OC)-n (where n = 3, 12, 48, 192, 768) connections. The standardized bit rates are:
  • STM-1/OC-3 (155 Mbps).
  • STM-4/OC-12 (622 Mbps).
  • STM-16/OC-48 (2.5 Gbps).
  • STM-64/OC-192 (10 Gbps).
  • STM-256/OC-768 (40 Gbps).
Originally, the SDH/SONET standards were defined as a rigid hierarchy optimized specifically to handle circuit-based voice traffic. With the requirement to support data services becoming more evident, additions were made to the SDH/SONET standards to allow for more flexible traffic handling, especially with regard to data services in general and Ethernet services in particular. New features such as the Generic Framing Procedure (GFP) and LCAS were added to the standards, as well as support for increased control plane functionality as defined in the standards for Automatic Switched Transport Network (ASTN)/Automatic Switched Optical Network (ASON).
In addition, vendors have added cross-connect functionality to SDH/SONET equipment to support add/drop functionality. Also, convergence between SDH/SONET and WDM products has become the norm in the optical transport market.

SDK (software development kit)

A set of development utilities for writing software applications, usually associated with specific environments (e.g., the Windows SDK).

SDMA (spatial division multiple access)

Advanced multiple antenna technique that increases the spectral efficiency, range and bandwidth available to moving wireless devices. Traditional cellular base stations radiate power in all directions, because they have no information about where the mobile device is located. This wastes power and causes interference to adjacent cells, as well as making it harder to distinguish weaker incoming signals from among the noise and interference. By using smart antenna technology to track the spatial location of mobile devices, the radiation pattern of the base station can be adjusted to optimize both transmission and reception for each user device. By rapidly adjusting the phase of signals from several antennas, the base station can effectively steer a beam or a spot of RF power to or from each user. Unlike MIMO, only one antenna is required at the client device, potentially reducing customer premises equipment (CPE) costs. SDMA techniques are used in proprietary wireless broadband systems, such as Navini Networks' Ripwave and ArrayComm's iBurst, and are likely options for mobile WiMAX and LTE. See also smart antenna.

SDR (software-defined radio)

Radio hardware and software design that can tune to any frequency across a wide range of spectrum and can decode any modulation technique or protocol – all under software control. SDRs are complex and expensive to build and have mainly been used for military applications until recently, but have now been introduced into cellular base stations. The low cost and increasing power of modern digital signal processors, as well as the huge and growing market for multiband, multimode mobile phones, will make consumer SDR devices practical and economically feasible by 2010. For example, to support global roaming and today's feature set, a mobile phone requires six frequency bands (800MHz, 900MHz, 1,800MHz, 1,900MHz, 2.1GHz and 2.4GHz) and at least three protocol families – GSM/GPRS/EDGE/WCDMA, Wi-Fi and Bluetooth. By 2010, support will likely require two more bands (2.3GHz and 3.5GHz) and two more protocols – LTE and WiMAX.

SDSL (symmetric digital subscriber line)

A digital subscriber line (DSL) technology that operates over voice-grade lines at 1.5 megabits per second one way, or 768 kilobits per second both ways, over an 8,000-foot distance.

search engine

A large, searchable index of Web pages that is automatically updated by spiders or Web crawlers and housed on a central server connected to the Internet. Examples include Yahoo and AltaVista.

secondary channel

A low-speed channel established on a four-wire circuit over which diagnostic or control information is passed. User data is passed on the primary, high-speed channels of the circuit.

secondary station

On a communications pathway, a terminal device that has been selected to operate under the control of another terminal device.

secondhand market

Previously owned or used mobile devices that are sold or given free to other users who typically obtain a new network connection. Secondhand devices sometimes are refurbished systematically before resale in other countries or passed on to other users in their original condition. Although most countries have a small secondhand market, it is a significant factor in price-sensitive developing markets such as China, where marginal subscribers are looking for the lowest-cost, entry-level device.

secret key

The symmetric key used in secret-key cryptography. It is a secret shared between communicating parties, but is not truly private. See secret-key cryptography, private key and public-key cryptography.

secret-key cryptography

In this cryptography method (also known as symmetric-key cryptography), the single key needed to encrypt and decrypt messages is a shared secret between the communicating parties. The biggest problem with this method is that the secret key must be communicated through an external mechanism separate from the communication channel over which the encrypted text flows. In addition, secret-key systems do not support digital signatures. These limitations are addressed in public-key cryptography (see separate entry).

secure web gateway

Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. These gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included.

security information and event management software

This category includes security information and event management software products providing:
  • Security event management – The ability to process near-real-time data from security devices and systems to determine when security events of interest have occurred
  • Security information management – Reporting and historical analysis to support security policy compliance management and the generation of security metrics

seiban

Japanese management practice of numbering all aspects of manufacturing.

selective sourcing

Gartner defines selective sourcing when an internal IT organization decouples or carves up the scope of business or IT processes for purposes of individually or selectively sourcing each component separately and distinctly. The main business driver is to determine the best risk/reward combination for each individual scope of work. Most often, this is done to allow for extensive competition to achieve the highest-quality performance at the best price point. The overall role of overseeing (program management) and managing the delivery, risk and overall legal compliance across the entire scope of services across all the individual components lies with the internal IT organization.

selector

The last octet of an asynchronous transfer mode (ATM) address.

self-describing messages

A message that contains data as well as the metadata that describes the format and the meaning (i.e., the syntax and the semantics) of that data. For example, Extensible Markup Language (XML) is a self-describing message format that consists of tag/value pairs.

self-relocating program

A group of instructions capable of assigning blocks of memory as they are needed.

self-service business intelligence

Self-service business intelligence is defined here as end users designing and deploying their own reports and analyses within an approved and supported architecture and tools portfolio.

self-test and fault isolation

Most systems include a processor-check capability that allows the controlling computer to test itself and the rest of the system. If a fault is found, an alarm light is lit and a message is given on the system printer teletype, if one is provided. This feature also expedites service since the computer can pinpoint faulty equipment, saving diagnostic time.

sell side

Processes for companies to sell their products, including catalogs, transaction processors, payment processors, and supply chain management methods and tools.

semantic data model

A method of organizing data that reflects the basic meaning of data items and the relationships among them. This organization makes it easier to develop application programs and to maintain the consistency of data when it is updated.

Semantic nets

A type of knowledge representation that uses nodes (representing objects or events) and links (representing relationships between those objects or events).

semi-mobile wireless

Includes client device support for roaming among base station coverage areas at pedestrian speeds. At a minimum, the client mobile device is transportable to secondary fixed locations with no connection while in transit. The terms "nomadic" and "portable," in use by the WiMAX Forum, fit into this category. The terms "nomadic," "portable" and "mobile" often vary in definition when used by vendors. See also fixed wireless and mobile wireless.

senpai

Japanese for mentor, used in lean enterprises to describe an accomplished lean practitioner who takes on a kohai.

sensei (also lean sensei)

A master teacher of lean techniques. Similar in experience to a Black Belt or Master Black Belt in the Six Sigma methodology but more focused on facilitation and teaching than on actual practice.

sensor and RFID-based inventory and asset management business process application software

Innovative business models and processes will be the main way that RFID begins to be justified. But enterprises don't have many applications to manage these processes today. For example, real-time management of inventory in a retail environment is almost unheard of today, and retailers will need entirely new applications to deal with it. Vendors providing these solutions are fragmented, and each solution will probably emerge as a separate market.

sensor and RFID-based inventory and asset management infrastructure software

Enterprises need software and development patterns to deal with RFID data and hardware. Currently, the most popular approach is to put in middleware that acts like an integration broker between RFID readers and business applications that need to receive the data.

serial dot matrix

An output device that creates a character image by selectively placing individual dots on the substrate using mechanical force. These include the following:
  • 9 pin – Devices with 9-wire print heads
  • 18 pin – Devices with 18-wire print heads
  • 24 pin – Devices with 24-wire print heads

serial inkjet

An output device that creates the desired image by emitting ink from an array of orifices or nozzles. The array of nozzles shuttles across the page, printing one character at a time, or serially. This category includes the following types of device:
  • Piezo electric inkjet – Print heads in which ink is ejected by electrically actuating a special crystalline or ceramic component to compress the ink and force it out of the nozzle.
  • Thermal inkjet – Heat is used to generate vapor bubbles, which are ejected through nozzles that project droplets onto a surface to form text or images. Thermal inkjet's advantages include small and highly controlled droplets and high system reliability. Thermal inkjet print heads are used in a wide range of serial and line inkjets. Originally developed for desktop printers, thermal inkjet printing has spread to specialty applications, such as direct-mail addressing, wide-format printing and package coding operations.

serial interface

An interconnection that transmits information bit by bit rather than a whole character at a time. It is much slower and cheaper than a parallel interface.

serial transmission

A method whereby the bits of a character are sent sequentially on a single transmission channel. See parallel transmission.

server

A system or a program that receives requests from one or more client systems or programs to perform activities that allow the client to accomplish certain tasks. A processor that provides a specific service to systems on a network. Routing servers connect subnetworks of like architecture; gateway servers connect networks of different architectures by performing protocol conversions; and terminal, printer and file servers provide interfaces between peripheral devices and systems on the network.

server appliance

A type of computing appliance that creates, manipulates or provides information to other network-connected computing devices. Unlike storage appliances, server appliances use an application context for the creation, manipulation or provision of information.

serverless printing

Serverless printing is peer-to-peer printing over Internet Protocol. This permits the removal of a dedicated print server for managing print queues, distributing printer drivers, and so on.

server virtualization infrastructure

Server virtualization infrastructure includes the hypervisor, VM and virtual machine monitors (VMMs). The key to "virtualizing" a server is the hypervisor. A hypervisor is a layer of software (the term "software" can mean preloaded software that runs in a protected area or microcode/firmware, depending on the implementation) that runs directly on hardware and allows the definition of fixed partitions with predefined priorities for accessing hardware resources. These partitions are incomplete VMs because they prioritize, but do not share, all hardware resources. To support flexible configuration, a hypervisor in general is implemented with a VMM. The VMM virtualizes all hardware needed for VMs to run. Most products currently labeled hypervisors bundle a VMM.

server virtualization management

Server virtualization management tools comprise management tools embedded in the hypervisor sale, as well as operations management and administration management tools. Server virtualization management technology can be found in two types of delivery vehicles. The first is embedded within the infrastructure itself – in this case, as part of the package that includes the hypervisor (companies such as VMware have historically referred to this as "virtual infrastructure").
Gartner is seeing more manageability built into infrastructure components because they provide technology suppliers with an additional source of revenue and a basis for competitive differentiation of their core technologies. Management technology can also be sourced from third-party independent software vendors, as well as emerging firms with only a virtualization-oriented lineage. In addition, hypervisor vendors are providing additional management tooling on top of that already provided within their virtualization platforms in areas such as administrative consoles, capacity planning, and process and workflow automation.

service bureau

A company that processes various types of data for a client for a fee. Station message detail reporting (SMDR) and call-costing reports are typically provided.

service desk

A help desk that is equipped with the resources for resolving service requests and problem calls. It gives the customer service representative or end user the ability to efficiently diagnose, troubleshoot and correct technical-support problems, rather than being a "pass through."

serving area

  1. The region surrounding a broadcasting station where signal strength is at or above a stated minimum.
  2. The geographic area handled by a telephone exchange, generally equivalent to a local access and transport area (LATA).

servlet

A form of server-based Java that operates in conjunction with a Web server and offers an alternative to using Common Gateway Interface (CGI) and server application programming interfaces (SAPIs) to communicate with Web server processes. In addition, servlets are independent of a given type of Web server, as the most prominent Web servers support servlets.

service provider routers and switches

Routers are a class of network controller that determines the best route for data and voice transmissions between a transmitter (sender) and a receiver. They are typically controlled by software and can be programmed to provide the most inexpensive, fastest or least-busy routes available. Routers operate at Layer 3 of the International Organization for Standardization (ISO)/Open Systems Interconnection (OSI) model. This definition applies to service provider routers only.

session border controllers

SBCs connect IP networks (enterprise to service provider) and introduce new edge requirements in three major areas: security, service assurance and law enforcement. SBCs sit at the edge of the service provider's network and complement established routers with their ability to perform required control functions by integrating session signaling and media control. SBCs operate as SIP back-to-back user agents, MGCP proxy/network-address translations (NATs) and/or H.323 back-to-back gateways. They are both the source and the destination of all signaling messages and media streams entering and leaving the provider's network.
Vendors and products in this category include:
  • Acme Packet: Net-Net Session Director.
  • AudioCodes: nCite 1000, nCite 4000 session border controllers.
  • Ditech Networks: PeerPoint Session Border Controller.
  • Genband: Multiprotocol Session Controllers.
  • Quintum Technologies: Tenor Call Relay Session Border Controllers.
The SBC space has been largely cornered by startup vendors, but other equipment vendors have taken two approaches: they have partnered with the SBC vendors or embedded SBC functionality into some of their existing solutions, such as routers. Gartner recognizes that there are some embedded solutions with SBC function, but counts only those that are stand-alone. Vendors such as Cisco and Sonus Networks have integrated SBCs into their routing and switching platforms.

seven wastes

A framework of seven types of activity that do not add value; originally defined by Toyota: overproducing – producing product before there's a valid order; unnecessary waiting – lengthened cycle time, which reduces agility; unnecessary transportation – unnecessary transportation of material between sites; overprocessing – processes longer or more complex than necessary; unnecessary inventory – buildup of work-in-process or raw materials; unnecessary movement – inefficient workplace; layout causing extra work; and too many defects – poor process quality and too much rework. This list was extended by Gartner and others to include an eighth waste: asset underutilization or other underutilization of resources. The eight wastes are often referred to by the acronym "DOWNTIME," meaning "Defects, Overproduction, Waiting, Nonutilized resources, Transportation, Inventory, Motion and Excessive processing."

SFA (sales force automation)

Using technology to automate the sales process. Some technologies that can be used for sales automation are:
  • Laptop computers
  • Personal digital assistants
  • Contact databases
  • Interactive selling systems

SFA (sales force automation) – direct sales (field sales/inside sales)

Direct sales software builds on the attributes of technology, functionality and value of order management systems and also includes the functionality for sales execution and sales operations. The direct B2B sales organization is the traditional sales channel, composed of internal sales resources focused on the selling of products or services directly into the client, customer and prospect base as employees of the provider company. Direct sales resources may be field-based, calling on customers face to face at their locations, or inside sales, selling from a desk environment over the phone.

SFC (shop floor control)

A system of computers and/or controllers tools used to schedule, dispatch and track the progress of work orders through manufacturing based on defined routings. SFCs typically calculate work in process based on a percentage of completion for each order and operation that are useful in inventory valuations and materials planning.

SFDR (software failure detection and recovery)

Should support the concept of a transaction, including atomicity (either all changes take place or none take effect) to enable operating-system or application data recovery mechanisms to be implemented.

SFF-LR (small-form-factor, legacy-reduced)

Small footprint PC that has reduced support for legacy technologies such as mouse and keyboard ports, PCI slots, serial and parallel ports.

SFM (store-and-forward manager)

A component that handles interapplication, asynchronous messaging for data consistency and multistep process coordination.

SGSN (serving GPRS support node)

Part of the GPRS infrastructure, the SGSN provides switching functionality, security and authentication via the HLR for GPRS users. The SGSN's primary interfaces are with the GGSN, HLR and PCU.

shadow/mirror databases

A system-level facility to enable shadowing or mirroring (i.e., duplication) of selected databases to a separate disk or disk set. The purpose is to minimize the space required for backup data while providing for the continuation of critical processing in the event of the loss of a disk containing related databases.

shared services

Gartner defines "shared services" as a delivery model in which a shared-service center, supported by dedicated people, processes and technologies, acts as a centralized provider of a defined business function for use by multiple enterprise constituencies. The service center may be physical, virtual or logical. The enterprise constituencies that use the services must either govern the services or be well-represented in the decision-making body. Shared services typically involve standardizing and streamlining data, processes, and infrastructure, as well as implementing financial disciplines around the services being delivered, regardless of whether they are delivered internally, by external service providers or by a combination of the two.shell.
A cross-application operating environment accessed through a single user interface. A network connectivity shell is the environment used to access network resources – e.g., a suite with a single user interface for host, Transmission Control Protocol/Internet Protocol (TCP/IP) and Web access.

shielded pair

A pair of conductors in a cable that are wrapped with metallic foil designed to insulate the pair from interference.

shim

A software modification inserted into an operating system or application, to intercept the normal data flow and provide additional functionality. Often used by third party vendors to provide enhanced networking features.

shipments

In Gartner's statistics for mobile network infrastructure, the additional equipment required to support an increase in traffic or coverage. Shipments are calculated by subtracting the current year's installations from the following year's installations.

shojinka

Continuous optimization of workers in a work center, which relies on multiskilled workers and optimized work center design.

shrink-wrapped

  1. A term used to refer to packaged software applications (from the shrink-wrapped packaging typical of such products).
  2. Term initially used to describe an unsigned software license agreement that is deemed accepted when the user breaks a shrink-wrapped seal or opens an enclosed sealed envelope in the package containing the software media, such as a floppy disk or CD. Use of the term has been expanded to refer to software license agreements that are accepted electronically. See click-wrapped.

S-HTTP (Secure Hypertext Transport Protocol)

Also known as HTTPS, this is an extension of Hypertext Transport Protocol (HTTP) that provides security services for transaction confidentiality, authenticity and integrity between HTTP servers and clients. For the purposes of Internet browsers, S-HTTP is a competitive alternative to the more widely used Secure Sockets Layer (SSL) standard. S-HTTP was designed for use in browser applications, so it cannot be used to secure non-browser-based Internet applications.

SI (systems integrator)

An enterprise that specializes in implementing, planning, coordinating, scheduling, testing, improving and sometimes maintaining a computing operation. SIs try to bring order to disparate suppliers.

sideband

A frequency band on either the upper or lower side of the carrier frequency within which fall the frequencies produced by the process of modulation.

signaling gateways/IP-STPs

These are an NGN component, facilitating the crossing of a policy boundary or performing protocol conversion. NGN IP-STP products include products using protocols such as SIP, Session Initiation Protocol for Telephony (SIP-T), Parlay, Electronic Numbering (ENUM) and XML. SGs use SS7 and SIGTRAN protocols.

signal-to noise ratio

Measurement of the quality of the wireless signal that is expressed as the ratio between the power of the transmitting signal and the noise that is present trying to corrupt that signal.

signature

Any mark or symbol accepted by both parties to show intent, approval of, or responsibility for, a document. In e-business, for example, a "from" line on an e-mail, a mouse click of acceptance of terms, an e-mail closing, a biometric and electronic signatures of several types are accepted as signatures. Some laws specify a written signature to be legally acceptable. New laws give the same status to electronic signatures as written signatures.

signature verification

A biometric technique that uses characteristics of a person's signature (including pressure, pen lifts, speed and direction of pen strokes) to authenticate identity. Signature is less accurate than some other biometrics (e.g., fingerprints, iris) but is popular in document authentication applications that have traditionally used written signatures. Some growth may be fueled by the adoption of pen-based devices (e.g., the Palm Pilot) that can double as a signature input tablet.

SIM card (subscriber identity module) card

Programmable smart card in a mobile device that gives access to a network. It contains codes (such as the IMSI) to identify a subscriber to a digital mobile service and the details of the special services the subscriber has elected to use. A SIM card may be a removable plastic card with embedded memory and a processor chip or may be fixed within the mobile device.

SIMD (single instruction, multiple data)

A design for parallel computers characterized by instructions that can directly trigger a large number (in parallel) of data operations on different data. Vector processors fall into this category.

SIM toolkit (SIM application toolkit)

ETSI standard that allows additional information and functionality to be preprogrammed on to the SIM card, providing a customized menu/user interface on the phone. This helps users directly access services provided by network operators and service providers, such as banks and entertainment organizations.

SIMM (single in-line memory module)

A small printed circuit board that plugs into a socket on a personal computer and increases the available random-access memory (RAM).

simplex

Pertaining to the capability to transmit in one direction only. See half duplex and full duplex.

simplex circuit

A circuit permitting the transmission of signals in one specified direction only. Also known as single duplex.

simulation

The use of a mathematical or computer representation of a physical system for the purpose of studying constraint effects.

simulation routines

Various routines using historical information to simulate future alternatives for supply chain operations design. Usually strategically focused for use in future operations, these may then be optimized or prioritized.

single-image mode

A mode of operation in which multiple physical central processing units (CPUs) within a complex logically appear as one system running under control of a single copy of the operating system.

single-mode fiber

A fiber with a small core diameter allowing the propagation of a single light path.

single-pass device

A color page device that passes the paper once through a print engine containing four or more imaging stations. A full-color image is built up as the paper passes each color station sequentially.

single threading

A group of instructions that completes the processing of one message before starting another. See multithreading.

sink

The terminal connection that collects overflow transmissions on a communications pathway.

SIO (strategic information office)

A business-unit-neutral information office whose role is to propagate the importance of enterprise information management to all business units, generate excitement for these initiatives, negotiate organizational and technological issues across the enterprise, and enforce implementation of and compliance with standards at all levels of the enterprise. Members of the SIO should have in-depth knowledge of, and experience in, both business and technology, with at least one representative from senior management.

SIP (Session Initiation Protocol)

Text-based protocol, similar to HTTP and SMTP, for initiating interactive communication sessions among users for voice and data communications.

SITE (strategy, iteration, testing, enablement)

Information systems (IS) departments have a history in applications development of following a design process of planning, prototyping, testing and development, resulting in justifiable design decisions. SITE is a Gartner concept that seeks to build on this long-established IS department practice by creating a structured framework within which both business unit (BU) managers and IS staff see clearly identified roles maximize their talents and skills. As a result, issues such as staffing, success factors, return on investment (ROI) guidelines, request for proposals (RFPs), interface design and graphic design are addressed in an environment where decisions are not arbitrary. Whether final execution is in-house or outsourced, adhering to SITE principles provides a project blueprint meaningful to multiple audiences.

Six Sigma

Six Sigma is a business management strategy aimed at improving the quality of process outputs by identifying and removing the causes of defects and minimizing variability. "Six Sigma" refers to a six standard deviation distance between a process norm and its nearest specification limit; in practice, Six Sigma is also known by its improvement process steps: "Define, Measure, Analyze, Improve, Control" (DMAIC).

skill mining

A knowledge management (KM) functionality that automatically identifies the skills of knowledge workers by analyzing past behavior. This behavior may be implicit (e.g., looking for recurring concepts in documents that the worker has produced), or explicit (e.g., a worker's willingness and ability to answer a question in the past). Skill mining enables users to identify who in their enterprise has the expertise to address specific questions or problems.

SKU (stock-keeping unit)

A unique identification number that defines an item at the identifiable inventory level; for example, in retail applications, the SKU may designate style, size and color. A more detailed level would be at the serial number or unique identifier level.

SLA (service-level agreement)

An agreement that sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems and the metrics by which the effectiveness of the process is monitored and approved.

SLED (single large expensive disk)

Traditional disk drive. That is, a conventional large-system disk system that has, on average, almost twice the diameter of a lower-cost redundant array of independent disks (RAID) system and, as its name implies, is significantly more expensive to manufacture.

SLM (service-level management)

The ongoing process of using service-level agreements (SLAs) to maintain high quality in the provision of services – and to ensure that service-level objectives (SLOs) and performance meet the changing needs of the recipient's business – through continuous improvement of service activities, functions and processes. See SLA and SLO.

SLM (software license management)

A mechanism for systematically ensuring compliance with system vendor and independent software vendor (ISV) software licenses – for example, maximum users, maximum nodes and maximum MIPS. Examples include Digital Equipment's License Management Facility and Hewlett-Packard's Network License Server.

SLO (service-level objective)

Within service-level agreements (SLAs), SLOs are the objectives that must be achieved – for each service activity, function and process – to provide the best opportunity for service recipient success (see SLA).

SMA (service management agreement)

A tool for monitoring, measuring, managing and demonstrating the contribution of IT to the enterprise.

smart antenna

Also known as adaptive antennas, these use an array of antennas in combination with smart signal processing algorithms that track the location of a mobile client device using techniques such as the direction of arrival of a signal. The location or angular direction is then used to calculate beam-forming vectors to focus more of the power of the antenna beam on the mobile target. Smart antennas are used in cellular mobile phone systems and in proposed wireless broadband technologies such as 802.16e-2005 (WiMAX) and 802.11n (MIMO). See also SDMA.

smart card

A plastic card that contains a microprocessor and a memory chip or just a memory chip. The microprocessor card has the ability to add, delete and manipulate information on the card. A memory-chip card, such as a phone card, can only add information. By maintaining all necessary functions and information on the card, smart cards do not require access to remote databases. Growing interest in smart cards crosses barriers of geography, industry and business functions. However, the variety of smart card applications belies the fact that smart cards are capable of only three functions:
  1. Information Storage and Management: Storing data off-line is an important feature of the smart card. It can maintain, for example, all of an individual's health-related information. Data can be stored and updated continuously either in a write-once format (e.g., a patient's blood type or known allergies) or in a read/write memory (e.g., a patient's last visit to the doctor). Memory can store information that does not change, build a history of transactions, or maintain a current data value (as in a phone card). The ability to add and subtract data value from the card makes it particularly useful in financial transactions that use electronic cash or credit and debit. The basic technique is the same whether it is applied to monetary values or frequent-flyer miles. Because the records are always in the user's possession, privacy is enhanced since duplicate information may be stored at a secure, off-line site in case the card is lost or damaged.
  2. Authentication: Smart cards can manipulate the data they contain to enable real-time transactions. Authentication is the process that determines whether the card will allow a transaction.
  3. Encryption/Decryption: Encryption changes data into a form that can be read only by the intended receiver. To decipher the message, the receiver of the encrypted data must have the proper decryption key. By its very nature, data encryption and decryption must take place in a local, secure environment. The capability of smart cards to perform this function within the embedded chip means that secure data does not have to be transferred from the card to a reader or other device. This reduces the chance that information can be stolen from the card.

smart grid

The smart grid is a vision of the future electricity delivery infrastructure that improves network efficiency and resilience, while empowering consumers and addressing energy sustainability concerns...

smartphone

Mobile communications device that uses an identifiable open OS. An open OS is supported by third-party applications written by a notable developer community. Examples are Symbian, Linux (including Android), Windows Mobile, RIM and Apple iPhone OS. Third-party applications can be installed and removed, and they can be created for the device's OS and application programming interfaces (APIs). Alternatively, developers must be able to access APIs through a discrete layer such as Java. The OS must support a multitasking environment and user interface that can handle multiple applications simultaneously. For example, it can display e-mail while playing music.

smart terminal

A display terminal that can operate in either conversational or block mode and can support a full range of local editing capabilities.

SMBs (small and midsize businesses)

Businesses which, due to their size, have different IT requirements – and often face different IT challenges – than large enterprises, and whose IT resources (usually budget and staff) are often highly constrained. For the purposes of its research, Gartner defines SMBs using the following approximate size categories:
  • Small business: In the United States, less than $50 million in annual revenue and up to 100 employees; in Europe, less than $10 million in annual revenue and up to 75 employees
  • Midsize business: In the United States, between $50 million and $300 million in annual revenue and between 100 and 1,000 employees; in Europe, between $10 million and $150 million in annual revenue and between 75 and 300 employees

SME (small-to-midsize enterprise)

Another name for an SMB – see SMBs (small and midsize businesses).

SMED (single minute exchange of die)

Acronym for "single minute exchange of die" – a lean approach that minimizes changeover or setup time in a process such that it can be accomplished in less than 10 minutes (the "single" referring not to one minute but single digits; i.e., less than 10).

SMFP (smart MFP)

A regular MFP can print, fax, copy and scan paper documents. An SMFP can also be programmed by a third party, the user or the technology provider to perform custom functions; easily integrates with office and enterprise applications; is management-friendly, with consistent architecture and user interface; works well on the network; and is based largely on open industry standards. SMFPs can perform usage tracking and other functions that help organizations actively manage their office printer/MFP fleet.

SMP (symmetric multiprocessing)

A multiprocessor architecture in which all processors are identical, share memory and execute both user code and operating-system code.

SMR (specialized mobile radio)

A wireless communications technology in competition with analog cellular services. In an SMR system, the base station equipment supplier is the licensee of the transmitters. Users have access to the multiple channels of the network rather than the limited number of channels of a private mobile radio network. Many users share all of the available channels. Sharing is accomplished on a first-come, first-served basis. When users want to initiate a call, they activate the push-to-talk button on the handset. Assuming the portable unit (and dispatcher or other portable unit) is tuned to an available channel, a communication path is established. If channels that the sender and receiver can use are not available, the call cannot be completed, and the operator must wait for another opportunity to try again.

SMS (short message service)

Facility developed as part of the GSM standard that enables a mobile device to send, receive and display messages of up to 160 characters in Roman text and variations for non-Roman character sets. Messages received are stored in the network if the subscriber device is inactive and are relayed when it becomes active. SMS has become available increasingly in CDMA networks and in some fixed networks.

SMS (system-managed storage)

The term used for the conceptualization of an architecture for attachment, management and reconfiguration of secondary storage. Among the SMS basic design goals is the separation of logical-device management from physical-device management.

SMTP (Simple Mail Transfer Protocol)

A messaging protocol governing electronic-mail transmission in Transmission Control Protocol/Internet Protocol (TCP/IP) networks. It is used to transfer e-mail between computers. It is a server-to-server protocol. SMTP supports only text and cannot handle attachments. It supports negative delivery notifications, not the positive notifications required by electronic data interchange (EDI).

sniffer

A network management tool that monitors data packets on a network to help administrators ensure message integrity and service quality.

SNMP (Simple Network Management Protocol)

A Transmission Control Protocol/Internet Protocol (TCP/IP)-derived protocol governing network management and the monitoring of network devices. Strictly speaking, SNMP is the Management Information Base (MIB) described in the SNMP standard; extensions to this MIB proposed by the Electronic Messaging Association permit the monitoring and reporting of all conforming messaging components through standard SNMP management tools for network components.

SNOMED (Systematized Nomenclature of Medicine)

A nomenclature created by the College of American Pathologists (CAP) for use in pathology. SNOMED has gradually been extended to cover other domains of medicine. It contains over 150,000 items and includes coverage for numerous medical specialties. CAP is also developing SNOMED RT for reference terminology and SNOMED CT for combined terminology.

SOA (service-oriented architecture)

Service-oriented architecture (SOA) is the dominant architectural style for agile business applications, and is used when enterprises anticipate application sharing and frequent system changes. SOA helps business managers and analysts develop new business processes, and modify processes more quickly and at a lower cost...

SOA governance technologies

SOA governance technologies are a set of tools and technologies that are used to enact and enforce governance processes and policies. They include technologies for SOA policy management, SOA registries and repositories, and SOA quality assurance and validation.

SOAP (Simple Object Access Protocol)

A protocol introduced by Microsoft in conjunction with some small vendors. Designed to be simple, it creates transparent mapping of the Distributed Component Object Model (DCOM) interface definition language (IDL) and the Extensible Markup Language (XML) definitions. It provides the key technology for transport in the next-generation Internet as a set of e-services.

SOAP (subjective, objective, assessment and plan)

A process used by clinicians to identify and assess a patient's health status, and the subsequent treatments or course of therapy to improve this status.

SOC (software oversight committee)

A healthcare committee charged with ensuring that patients are not placed at risk by implemented software solutions. SOCs contain representative from all aspects of the healthcare enterprise. It has been suggested that SOCs be formed along the lines of the Joint Commission on Accreditation of Healthcare Organizations' (JCAHO's) institutional review boards (IRBs). IRBs typically are composed of risk management lawyers, medical ethicists, physicians and other interested parties within the care delivery organization (CDO).
Because of the technical nature of the task, an SOC must have information systems (IS) representation. An SOC should meet on a regular basis to review all current and planned medical software implementations. In addition, it should form, and possibly enforce, a policy designed to ensure patient safety where medical software is concerned.
Specific SOC responsibilities include validating that applications perform reliably and as expected, for example, by creating and running trial scenarios looking at both system and clinical functionality. A SOC should ensure that all decision support applications are based on accurate data, that they are implemented correctly and that the rule base is kept current. It should also examine how the various packages operate in tandem, paying close attention to combinations of functions that could potentially lead to errors that place patients at risk.

social BPM

"Social BPM" is a concept that describes collaboratively designed and iterated processes. These processes mirror the way work is performed from a "doer" perspective and experienced from a "receiver" perspective to harness the power of continuous learning from "the collective."

social CRM

Social CRM is "a business strategy that entails the extension of marketing, sales and customer service processes to include the active participation of customers or visitors to an Internet channel (Web or mobile) with the goal of fostering participation in the business process."

social media

An online environment where content is created, consumed, promoted, distributed, discovered or shared for purposes which are primarily related to communities and social activities rather than functional, task-oriented objectives. "Media" in this context is an environment characterized by storage and transmission, while "social" describes the distinct way that these messages propagate in a one-to-many or many-to-many fashion. A distinction is drawn in this definition between media (the enabling environment) and content (what the environment contains).

social software

Gartner defines "social software" as the tools that encourage, capture, and organize open and free-form interaction between employees, customers, and partners. It is a "socializing" technology – sometimes also referred to as Enterprise 2.0 – that enables a grassroots approach to creating and exploiting collective knowledge.

sockets

The Berkeley interprocess communications model. A socket specifies the end points of a two-way communications channel which connects two processes together so they can exchange information.

softswitch architecture

Softswitch architecture comprises softswitches/MGCs, VoIP gateways and application servers. These are among the terms used to identify the major network elements of softswitch architecture. For our purposes, the terms "softswitch" and "softswitch architecture" refer to the softswitch/VoIP gateway/application server approach to distributed switching technology.
Softswitches for cable networks are essentially the same as those used by traditional telephone companies, but they must comply with the NG standards from Cable Television Laboratories (CableLabs) for packetized voice-over-cable networks.
Softswitch architectures are mostly being deployed in traditional operators' core networks for wireline or mobile trunking, and in the networks of long-distance service providers. Many voice-over-broadband networks are based on Class 5 architecture to provision Class 5 services, as well as calling card services using VoIP technology. In mobile networks, deployment of mobile softswitches in the radio access network (RAN) is limited by the slow deployment of third-generation (3G) infrastructure and the highly optimized TDM architecture in the RAN.
With the migration to SIP, softswitch architecture lends itself to the 3GPP and ETSI TISPAN standards to develop IMS-compliant applications.

softswitches

To provide services without a physical switch, a softswitch is connected to a server (a Sun Microsystems or Unix machine, for instance) that runs the application. A softswitch is also connected to a media gateway, which is the element that physically connects to the PSTN, IP network or ATM network.
A softswitch is also known as a call agent, a call server or an MGC. It is a device that provides the traditional call control functions or switching matrix of a Class 4 and Class 5 switch. In a mobile network, a softswitch is also called a mobile switching center (MSC). At minimum, a softswitch provides:
  • Intelligence that controls connection services for a media gateway or native IP endpoint.
  • The ability to select processes that can be applied to a call.
  • Routing for a call in the network, based on signaling and customer database information.
  • The ability to transfer control of a call to another network element.
  • Interfaces to, and support for, management functions, such as provisioning fault-tolerant billing.
  • Support for multiple protocols, including some subsets of MGCP, Media Gateway Control Protocol (Megaco), SIP, SS7, call processing language, H.323 and Q.931/Q.2931.
  • DiffServ, Resource Reservation Protocol, Real-Time Transport Protocol, Real-Time Control Protocol, MPLS and Institute of Electrical and Electronics Engineers (IEEE) 802.11p.
  • Compliance/interoperation with some subsets of standards from the International Telecommunication Union (ITU), Internet Engineering Task Force (IETF), Frame Relay Forum, ATM Forum, IEEE's IMS Forum and 3GPP/3GPP2.

software as a service (SaaS)

Gartner defines SaaS (software as a service) as software that's owned, delivered and managed remotely by one or more providers. If the vendor requires user organizations to install software on-premises using their infrastructure, then the application isn't SaaS...

software development

Project management, specifications, design, programming, testing, installation and training associated with a specific application development project of any size.

software maintenance

Updating software, adding new functions, fixing bugs and solving problems. Technology vendors often sell a maintenance contract with their software. This contract is usually calculated as an annual fee based on some percentage of the total software cost. It generally provides for overall support and maintenance of a software product, including applications. Support may include telephone assistance time as well.

software support services

Software support services are generally technical support or break/fix services that are delivered for specific software products. These services include revenue derived from long-term technical-support contracts or pay-as-you-go, incident-based support. Software support services typically include remote troubleshooting capabilities, installation assistance and basic usability assistance. Remote troubleshooting capabilities may be delivered via telephone and online communication media or without human assistance through automated means that reside on the customer's device or are available on the Web.
Software support services may include new product installation services, installation of product updates, migrations for major releases of software, other types of proactive or reactive on-site services, and support for custom application or infrastructure software. Services may be delivered by a product vendor, a consulting firm or third-party software maintainers.
Software products and technologies covered under this category include commercial and custom operating systems, application software, and infrastructure software. Software support services do not include software license code updates and upgrades, which vendors often report as software maintenance.
The segments covered in software support map directly to market segments covered in Gartner software market statistics.

SOHO (small office/home office)

A market segment for office equipment or computing peripherals (e.g., printers or copiers). Products targeted to the SOHO market tend to be lower in price and functionality than those designed to support large, corporate office environments.

SONET (Synchronous Optical Network)

A International Telecommunications Union Telecommunications standard for synchronous transmission up to multigigabit speeds. The standard includes multivendor interoperability, improved troubleshooting and network survivability. As a Layer 1 standard, it is a foundation for Broadband Integrated Services Digital Network (B-ISDN) services.

source encoding

A compression technique that takes into account the nature of the information to be compressed. See entropy encoding.

source routing

A technique used in local-area networks (LANs) in which the source of the frame specifies the route that the frame has to follow; the source furnishes a routing information field that designates the entire route to the destination.

source traffic descriptor

In asynchronous transfer mode (ATM), a set of parameters used during the setting up of a connection.

SOW (statement of work)

The statement of work includes an objectives section allowing the customer to emphasize the desired end state or performance metric to be achieved. It also mandates the assessment of past performance, technical approach and cost for each task order. The customer determines the relative importance of each criterion.

SP (service pack)

A minor revision to a software product that contains feature updates or bug fixes, but not enough new code to warrant a new version number.

space segment

In-orbit satellite portion of a particular satellite communications system or network. See also ground segment.

spaghetti chart

A graphical representation of movement of materials, people or process steps to identify motion or transport wastes for elimination.

spam

Usenet messages flooded to many newsgroups indiscriminately. The term is also loosely applied to junk mail.

spamdexing

A slang term for the practice of hiding a slew of words or phrases in a Web page to increase the number of hits the page will register in Internet searches.

SPC (statistical process control)

Maintaining or improving process capability by employing statistical techniques to analyze process outputs and provide feedback for process control loops.

speaker verification

A biometrics-based alternative to typed passwords or personal identification numbers. A computer matches a person's spoken voice to an electronically captured voice sample (analogous to a unique fingerprint).

SPEC (System Performance Evaluation Cooperative)

A vendor consortium that selects and standardizes benchmark programs submitted by members or others, for the purpose of rating and comparing the performance of processors.

SPECfp (SPEC floating point)

A test of floating-point computations, established by the System Performance Evaluation Cooperative (SPEC).

specialty center

A specialty center, or center of excellence, is a group of people dedicated to identifying best practices in an area of expertise and to building an internal service organization around that expertise. A center of excellence is a central clearinghouse for knowledge capital that is used across all business transformation projects. Specialty centers are an excellent means to leverage specialized skill sets, and are typically staffed to address a known demand.

SPECint (SPEC integer)

A System Performance Evaluation Cooperative (SPEC) benchmark to measure the integer performance of a processor.

spectrum

A continuous range of frequencies, usually wide in extent, within which waves have some specific common characteristics.

spectrum harmonization

A global effort under the auspices of the ITU to encourage governments and regulators to allocate RF spectrum consistently across borders, thereby enabling global roaming, interoperability and global markets for telecom equipment. Every four years, the ITU holds the World Radiocommunication Conference, where global/regional spectrum assignments are negotiated and agreed. A recent example is the 1.9GHz to 2.1GHz band, which has been allocated to UMTS in almost every geography. The WiMAX Forum is undertaking similar efforts to support global allocation of 2.5GHz and 3.5GHz for wireless broadband.

speech circuit

A circuit designed for the transmission of speech, either analog or encoded, but which can also be used for data transmission or telegraphy.

speech recognition

A computer's ability to convert spoken input to text. Special software takes vocal sounds, digitizes them and then compares them to a library of sound patterns. When matches are found, the computer can use those words just as if they had been typed on a keyboard. Speech recognition can improve personal productivity in the workplace, increase the effectiveness of interactive voice response (IVR) systems, and bring computing to untraditional environments (e.g., a hospital emergency room). The term "voice recognition" is also commonly used to refer to the ability of a machine or program to recognize and carry out voice commands or take dictation.
Speech recognition software generally falls into three categories along a continuum:
  • Command systems were the earliest and simplest form; the computer learns a small number of voice commands like "open file" or "print document," freeing the user from having to use a keyboard or mouse to perform those tasks.
  • Discrete speech recognition, the second stage in this evolution, can be used for dictation and other natural speaking conditions, but pauses are required between words.
  • Continuous speech recognition software is emerging today. These systems understand natural speech without pauses, and their vocabularies and accuracy will continue to expand and improve.

SPF (Shortest Path First)

A link-state protocol that uses a set of user-defined parameters to find the optimum route between two points.

spider

A piece of software (also called a Web crawler) designed to follow hyperlinks to their completion, and return information on Internet addresses passed.

spoofing

  1. A process whereby a router responds to keep alive messages from a host rather than passing them on the remote client, thus saving call charges. Used mainly in Integrated Services Digital Network (ISDN).
  2. Of a packet, falsely claiming to be from an address different from that from which it actually originated.

spot beam

An antenna radiation pattern designed to focus on or serve a relatively small or isolated geographic area, usually with high gain or power. A spot beam is the RF equivalent of a spotlight. Many next-generation satellite designs, including newer, high-capacity Ka-band satellites, have spot beam technology that can be activated to direct service to key markets where demand is highest. When combined with frequency reuse capabilities, DVB-S2 and MPEG-4 advanced compression technology, spot beams can significantly boost an operator's satellite capacity more than older Ku-band, MPEG-2, DVB-S satellite systems. See also DVB-S2, frequency reuse, Ka-band and Ku-band.

SPP (service parts planning)

Service parts planning (SPP) supports the optimal stock quantities and location of items used to service internal assets or customer equipment in the aftermarket. SPP applications address processes such as:
  • Forecasting and demand planning
  • Inventory planning and optimization
  • Distribution/allocation and supply planning
  • Collaboration
  • Workforce planning
  • Analytics and BAM (such as visibility and event management)
  • Pricing optimization
  • Returns and repair center management

spread spectrum

Radio technology that enables a number of radio communication links to use the same band of frequencies simultaneously without mutual interference.

SQL (Structured Query Language)

A relational data language that provides a consistent, English keyword-oriented set of facilities for query, data definition, data manipulation and data control. It is a programmed interface to relational database management systems (RDBMSs). IBM introduced SQL as the main external interface to its experimental RDBMS, System R, which it developed in the 1970s. SQL statements include:
  • Data manipulation language statements: SELECT, INSERT, UPDATE and DELETE
  • Data definition language statements, including the CREATE and DROP statements for tables and indexes
  • Statements that control data consistency, and grant and revoke authority
SQL statements are called "dynamic" when they are not completely specified until the program is executed. They are called "static" when they are completely specified when the program is compiled. SQL is precise, because it is based on predicate logic, but is difficult for average users to deal with, and its most fruitful position is as a protocol for software-to-software connectivity, rather than for human-to-software access.

SRM (storage resource management)

Storage resource management (SRM) products provide data collection and automation agents that consolidate and operate on information from multiple platforms supporting storage management tools on multiple OSs, storage devices and storage area network (SAN) devices. Key functions include capacity reporting and analysis, performance reporting and analysis, capacity and performance management automation, resource availability, storage provisioning, storage management product integration, application and database integration, and hardware integration. Basic network and system management (NSM) integration should provide the ability of the SRM product to externalize events to other management products. Product-specific integration includes the ability to launch the SRM product from the NSM console. Integration with device resource management products and media management products should include launch of hardware configuration utilities from the SRM console, collection and reporting of agent information, and integration of logical-level data. Typical SRM tools require a SAN management tool to manage and collect data from heterogeneous devices on the SAN. Stand-alone SAN management tools are also included in the SRM segment. Products that provide for discovery, topology mapping and monitoring of SAN components are also included in this segment because many are being included with SRM suites or are expanding to include SRM functionality. SRM tools may offer real-time or historical views into one or several of the physical, volume/virtual, file or database levels, and/or point and time copy views.

SSB (single sideband)

To make efficient use of the frequency band available, the carrier and the unwanted sideband of an amplitude-modulated wave can be filtered out so that only the sideband that contains all the information is transmitted. This is known as SSB transmission.

SSEM (System and Server Evaluation Model)

A Gartner model that focuses on the six major categories of differentiation that exist between server platforms: performance and scalability, high availability, software vendor enthusiasm, platform architectural longevity, systems and network management software, and maintenance.

SSL (Secure Sockets Layer)

An Internet security standard from Netscape Communications, used for its browser and server software.

SSN (switched service network)

A telephone network consisting of terminals, transmission links, and at least one exchange, on which any user can communicate with any other user at any time.

SSO (single sign-on)

A term describing the function of consolidating the number of log-on processes for end users among various information technology (IT) resources.

SSP (service switching point)

The telecommunications switch in an intelligent network which handles a call with reference to supplementary routing and database information contained at a service control point (SCP).

SSP (storage service provider)

A company that provides computer storage capacity and management services. In addition to the storage itself, SSPs typically offer periodic backup and archiving, and some offer to consolidate data from multiple enterprise locations so that all locations can share the data effectively.

SSPC (structure, scripting, populating and channel outputs)

A framework for creating documents that requires four core mechanisms for defining the structure, scripting, populating (filling) and output channels of documents.
  1. Structure definition consists of tools to define components (e.g., title, author, introduction, conclusion) and their sequence (e.g., "introductions" precede "conclusions"). The defined sequence cannot be modified or removed through editing.
  2. Scripting is procedural logic that defines how to derive (i.e., calculate) content, and how to access or create queries that test and conditionally incorporate content from external sources (e.g., databases), other applications and content repositories.
  3. Populating executes scripts against the structural definition to create an instance of the content model expressed in the document definition. This includes executing data and content retrieval, queries and computations to generate a fleshed-out document (an "instance") from the document skeleton defined by the structural and scripting elements.
  4. Output channels control the content so that the same content can be formatted and composed for multiple media, such as print, Web or CD-ROM delivery.

stalking horses

Conceptual models used to test out new concepts and stimulate dialog about them.

standard

A document that recommends a protocol, interface, type of wiring, or some other aspect of a system. It may even recommend something as general as a conceptual framework or model (e.g., a communications architecture). De jure standards are developed by internationally or nationally recognized standards bodies or vendors. De facto standards are widely used vendor-developed protocols or architectures.

standards

Specifications or styles that are widely accepted by users and adopted by several vendors. Standards are critical to the compatibility of hardware, software, and everything in between. Industry standards enable the essential elements of a computer and related infrastructure to work together. Standards provide specifications to hardware manufacturers and software developers that allow them to create products that will work together. Deviation from standards could result in the following problems:
  • A plug on a keyboard does not fit into the related outlet on a computer.
  • A piece of software does not work with a particular operating system.
  • An Internet browser cannot read a certain page on the Web because the page is not formatted according the browser requirements.
  • Proprietary software does not work on the Internet.

statistical multiplexing

A time-division multiplexing technique in which time slots are dynamically allocated on the basis of need (i.e., slots are allocated to equipment with data to be transmitted).

statistical quality control/statistical process control

A set of techniques based on statistical principles and methods used to regulate the quality of products and processes.

STDM (statistical time-division multiplexing)

Time shared dynamically between active channels on a multiplexer.

STE (signal-terminating equipment)

A network node used in the interconnection of public data networks.

STEP (specification, tracking, evaluation, production)

The four stages on which essential activities in the successful deployment of advanced technology are based. They are:
  • Specification – which aligns corporate strategy and technology focus
  • Tracking – which assesses individual technologies for maturity and business impact
  • Evaluation – which involves prototyping and other in-depth evaluation activities to further gauge the readiness and relevance of the technology
  • Production – which sees the technology being piloted and, if successful, rolled out into full deployment.

stickiness

The general term applied to Web site qualities that attract and hold visitors. A sticky Web site is assumed to be offering higher value than one that is not sticky.

STM (synchronous transfer mode)

A technique for multiplexing several circuits over transmission links and switches whereby time is divided into slots or buckets, and circuits are given time units whether or not they have any data to transmit. See asynchronous transfer mode.

storage appliance

A type of computing appliance that provides data to, or manages data for, other network-connected computing devices. Unlike server appliances, storage appliances provide or manage data without an application context. This category of computing devices includes network-attached storage (NAS) and storage-area network (SAN) devices. See computing appliance, server appliance, NAS and SAN.

storage management software

The storage management software market includes all software products that are sold as value-added options to run on a server, storage network device or storage device to aid in managing the device or managing and protecting the data. Revenue is for new license sales and for maintenance and support services that include new version license sales to update an existing license to a new version, telephone support and on-site remedial support. Revenue does not include professional services. For products to be included in this coverage, they must represent a revenue stream for the company that is separately tracked and not be only part of a bundled product or service.
Storage management software coverage spans from the desktop to the mainframe and includes products that focus on a single or limited set of devices, as well as those products that support a heterogeneous set of devices.
The storage management software market is divided into seven segments. Storage management software is the sum of all the segments and represents all the tools needed to manage capacity, performance and availability of data stored on disks, tapes and optical devices, as well as the networking devices that the data may pass through.

storage subsystem hardware services

This segment includes other storage subsystem services and redundant array of independent disks (RAID)-based storage system services.
  • RAID-based storage system services – This category includes the total of all external controller-based RAID-based disk storage, host-based external RAID storage, host-based internal RAID storage and network-attached storage. RAID refers to a set of disk drives (at least two) with input/output activity that is managed by external-based or host-based RAID technology.
  • Other storage subsystem services – This category includes tape libraries, optical libraries and hard-disk drive upgrades/replacements.

storage support services

This segment includes tape libraries, optical libraries, hard-disk drive upgrades/replacements, and RAID-based storage system services.

strategic document outsourcing

Subset of business process outsourcing focused on the printed and electronic publication of customer communications, including content creation, multimedia presentation and incoming-document processing. The outsourced documents may be transactional forms, sales collateral, direct-marketing pieces or informational materials.

streaming

Technique that supports the continuous, one-way transmission of audio and/or video data via the Internet and, more recently, via a mobile network. In contrast to audio (for example, MP3) and movie (for example, MPEG) files that must first be downloaded, streaming media begins playing within a few seconds of the request. Streaming requires a streaming encoder (which converts the audio or video source to a data stream), a streaming server that delivers the encoded media over a network, and a client media player that cooperates with the server to deliver uninterrupted media. To compensate for variations in network quality and latency, the client buffers a few seconds of audio or video before beginning delivery, then tries to stay ahead during playback. Examples of streaming systems include Windows Media, QuickTime and RealPlayer.

sub-11GHz proprietary BWA

Sub-11GHz proprietary broadband wireless access (BWA) systems are not WiMAX-certified or designed for IEEE 802.16. They include technologies such as IPWireless, Flarion and iBurst. In most cases, they are deployed to provide service providers with quick and easy access to business subscribers or to allow the delivery of broadband data services or fast Internet access to business and residential subscribers. In addition, these systems enable cost-effective network access in remote rural areas. Sub-11GHz proprietary BWA systems provide more than 1 Mbps per subscriber.

subnet

A portion of network that may be physically independent of another network portion, but both portions of the network share the same network address, and the portion is distinguished by a subnet number.

subnet mask

The bits of an Internet Protocol (IP) address used for a subnetwork.

subnet number

The portion of the Internet address that designates a subnet. It is used for intranet routing but is ignored for Internet-routing purposes.

subscriber

Person who controls the subscription. Because subscribers may have more than one connection (multiple connections), it cannot be assumed that one connection equals one subscriber.

sub-voice-grade channel

A channel with a bandwidth narrower than that of voice-grade channels. Such channels are usually subchannels of a voice-grade line.

super-3G

3GPP working group formed in January 2005 by a consortium of mobile carriers and infrastructure vendors led by NTT DoCoMo and Vodafone. It proposed an alternative to HSDPA and HSUPA known as HSOPA. The working group evolved into what is now known as LTE. See also LTE.

superserver

Multiprocessor machines designed as network servers, combining input/output (I/O) capabilities of minicomputers with the capability to run industry-standard network operating systems.

Supranet

A Gartner term describing the emerging, ubiquitous network infrastructure that links the "e-world" (i.e., the world of electronic devices such as computers, phones and televisions) and the "p-world" (i.e., the physical world of paper, houses, people, vehicles and other objects) within natural human interactions.
The Supranet is enabled by four key phenomena:
  • Embedded computers in many everyday objects
  • Next-generation wireless networking, providing global indoor and outdoor connectivity to the Internet
  • Interfacing technologies that enable bidirectional communication between p-world and e-world components (e.g., bar code scanning, speech recognition and electronic identification)
  • The design of applications that satisfy user needs in a natural way with combinations of media and devices

SVC (switched virtual circuit)

A virtual connection with a call establishment and tear-down procedure to allow its temporary use.

SVG interface (Scalable Vector Graphics interface)

An imaging application and language written in XML, supported by key electronic publishing vendors. The SVG interface offers a solution to the problem of sharing many sophisticated, Web-based images. Vector graphics are more compact than bitmapped images and can potentially be altered by client devices to best suit display parameters.

SVGA (Super Video Graphics Array)

A Video Electronics Standards Association (VESA) display standard that provides higher resolution than the 640 x 480 Video Graphics Array (VGA) standard. It can support as many as 16 million colors, depending on the computer system and amount of available memory.

SWAP (Simple Workflow Access Protocol)

An Internet-based protocol designed to provide a Hypertext Transport Protocol (HTTP)-based way to access a generic workflow service or a workflow enabled process or to interoperate with it. SWAP, which has been endorsed by the Workflow Management Coalition (WfMC), will offer a set of standard definitions for the type and structure of messages passed between cooperating workflow systems. SWAP will allow a workflow system to start, monitor, exchange data with and control workflow instances on a different workflow system. It will also provide a way to integrate workflow systems with other Web-based services.

SWIFT (Society for Worldwide Interbank Financial Telecommunication)

A self-describing messaging format that is used within the banking and finance industry to support electronic funds transfer. SWIFT is also the name of the format's creator, an organization that provides messaging and transaction-processing services to member banks and other financial organizations, including brokers, securities depositories, clearing organizations and stock exchanges.

switch

A device that makes, breaks, or changes the connections in an electrical circuit; to shift to another electrical circuit by means of a switch. In the telecommunications industry, the term is often used as a synonym for private branch exchange (PBX) or central office (CO) switch.

switched line

One of a series of lines that can be interconnected through a switching center; a line on the public telephone network.

switched network

A multipoint communications pathway with circuit-switching capabilities, e.g., the telephone network.

switching

The establishment of a transmission path from a particular inlet to a particular outlet, within a group of such inlets and outlets.

switching center

A location that terminates multiple circuits and is capable of interconnecting circuits or transferring traffic between circuits.

switchover

When a failure occurs in the equipment, a switch to an alternative component can occur. Also called failover.

Symbian

A mobile OS originally derived from Psion's EPOC. Up until 2009 Symbian was developed by an independent company jointly owned by Nokia, Ericsson, Sony Ericsson, Panasonic, Siemens and Samsung, which licensed the platform to mobile handset manufacturers. In 2009 Nokia bought out the other owners and converted Symbian into an open source foundation. From 2010, Symbian will be run as an open source project managed by the Symbian Foundation, the governing body for open source Symbian.

synchronization

Establishment of common timing between sending and receiving equipment.

synchronous

Having a constant time interval between successive bits, characters or events. Synchronous transmission uses no redundant information to identify the beginning and end of characters, and is faster and more efficient than asynchronous transmission, which uses start and stop bits. The timing is achieved by transmitting sync characters prior to data; usually synchronization can be achieved in two-or three-character times.

synchronous communications

High-speed transmission of contiguous groups of characters. The stream of monitored and read bits uses a clock rate.

synchronous network

A network in which all the communications links are synchronized to a common clock.

synchronous transmission

Timing is achieved by transmitting sync characters prior to data. It does not use such redundant information as the start and stop bits in asynchronous transmission to identify the beginning and end of characters and is thus faster and more efficient.

SyncML (Synchronization Markup Language)

An initiative originally set up to develop a uniform synchronization protocol operating on any device over any network and among various vendors' products. The protocol was intended to provide support for a wide range of transports and media types.

syntax

Message format or grammar (e.g., field lengths and delineators, headers, footers and optional fields).

systems management

Any of a number of "housekeeping" activities intended to preserve, maintain or correct the operation of a computer system. Included are such routine but critical processes as hardware diagnostics, software distribution, backup and recovery, file and disk integrity checking, and virus scanning.

systems integration

The process of creating a complex information system that may include designing or building a customized architecture or application, integrating it with new or existing hardware, packaged and custom software, and communications. Most enterprises rely on an external contractor for program management of most or all phases of system development. This external vendor generally also assumes a high degree of the project's risks.

systems integrator

An organization or an individual that integrates two or more systems so they work together. For example, an organization can integrate its payroll system with its check processing system to process paychecks. System integration can be done internally or through an external contract. It requires specific technical knowledge of the programming languages. Major systems integration projects often require the assistance of a specialty firm that has the resources and expertise to manage a project plan that could last over several months or even years.

No comments:

Post a Comment