MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with S
  • Search Engine Results Page (SERP)

    The listing of results returned by a search engine in response to a keyword query.

  • Search Engines

    Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found. A search engine is really a general class of programs, however, the term is often used to specifically describe systems like Google, Bing and Yahoo! Search that enable users to search for documents on the World Wide Web.

  • Second screening

    A.k.a. companion device, refers to an additional electronic device which content can be synchronized with the content the consumer are consuming such as TV shows movies, or video games.

  • Second-Generation Language (2GL)

    An assembler language.  

  • Secure Digital card (SD card)

    A tiny memory card used to make storage portable among various devices. It features a high data transfer rate, low battery consumption, and uses flash memory to provide nonvolatile storage.

  • Secure Digital Extended Capacity card (SDXC)

    A tiny flash memory card that resembles a SD card, but with far greater storage capacity. The Extended Capacity (XC) format increases maximum SD storage capacity from the previous 32 GB (gigabytes) to 2 TB (terabytes).

  • Secure Electronic Transaction (SET)

    A system for ensuring the security of financial transactions on the Internet. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures.

  • Secure HTTP (S-HTTP)

    An extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web. Each S-HTTP file is either encrypted, contains a digital certificate, or both. 

  • Secure Multi-Purpose Internet Mail Extensions (S/MIME)

    A secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system. S/MIME is included in the latest versions of Microsoft Web browsers and Netscape  browsers.

  • Secure Real-Time Transport Protocol (Secure RTP)

    An extension to RTP that incorporates enhanced security features. Like RTP, it is intended particularly for VoIP (Voice over IP) communications. SRTP uses encryption and authentication to minimize the risk of Denial of Service ( DoS ) attacks. 

  • Secure Shell (SSH)

    A.k.a. Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely. 

  • Secure Shell Charter (SSH Charter)

    A set of papers produced by the SSH Working Group. It is used to securely access and remotely control computers and servers. 

  • secure socket layer

    Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http

  • Secure Sockets Layer Virtual Private Network (SSL VPN)

    A form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer.

  • Security

    In information technology, security is the protection of information assets through the use of technology, processes, and training.    

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to