MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
    Results : Starting with S
  • Security Accounts Manager (SAM)

    A database in the Windows OS that contains user names and passwords. SAM is part of the registry and can be found on the hard disk. Each user account can be assigned encrypted Local Area Network (LAN) password and Windows password. 

  • Security as a Service (SaaS)

    An outsourcing model for security management. Typically, it involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided in-house by an external organization.

  • Security Assertion Markup Language (SAML)

    An Extensible Markup Language (XML) standard that allows a user to log on once for affiliated but separate Web sites. SAML is designed for business-to-business (B2B) and business-to-consumer (B2C) transactions.

  • Security audit

    A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria. 

  • Security Cameras

    A security camera is a camera which is used to monitor an area for security purposes. The footage from the camera may be reviewed continuously to look for potential security breaches, or examined after the fact in the hopes of getting a glimpse of a criminal or a situation. There are a number of different environments in which a security camera can be used, and security cameras have grown increasingly common in many parts of the world. Some privacy advocates have raised concerns about the proliferation of security cameras.

  • Security Descriptor Definition Language (SDDL)

    A formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system. The security descriptor may also provide an access control list for an object or group of objects.

  • Security event

    A change in the everyday operations of a network or information technology service, indicating that a security policy may have been violated or a security safeguard may have failed.

  • Security identifier (SID)

    In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.  

  • Security Information and Event Management (SIEM)

    An approach to security management that seeks to provide a holistic view of an organization's IT security. SIEM combines SIM(security information management) and SEM (security event management) functions into one security management system.  

  • Security Information Management (SIM)

    A system that automates the practice of collecting, monitoring and analyzing security-related data from computer logs.

  • Security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and IT assets. 

  • Security, Trust and Assurance Registry (STAR)

    An online registry of cloud provider security controls. Cloud customers can use STAR to research the security practices of participating cloud providers.

  • Security/authentication token

    A small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.

  • Selendroid

    Selendroid is a test automation framework which drives of the UI of Android native and hybrid applications (apps) and the mobile web with Selendroid. Tests are written using the Selenium 2 client API and for testing the application under test must not be modified. Selendroid can be used on emulators and real devices and can be integrated as a node into the Selenium Grid for scaling and parallel testing.

  • Selenium

    Selenium is a portable software testing framework for web applications. Selenium provides a record/playback tool for authoring tests without learning a test scripting language (Selenium IDE). It also provides a test domain-specific language (Selenese) to write tests in a number of popular programming languages, including Java, C#, Groovy, Perl, PHP, Python and Ruby. The tests can then be run against most modern web browsers. Selenium deploys on Windows, Linux, and Macintosh platforms.

    IT Courses & Reviews (3)
  • Self-destructing email

    An electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. 

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to