Security Information and Event Management: a solution that aggregates and analyzes log data from across an organization's IT infrastructure to detect security threats, generate alerts, and support inc...
Definition
Glossary
Browse our comprehensive glossary of technical terms, definitions, and concepts.
The native file format for Trimble SketchUp, a 3D modeling tool popular in architecture, interior design, and landscape architecture.
DefinitionSimple Mail Transfer Protocol: the standard protocol for sending email messages between servers. SMTP handles the routing and delivery of outgoing mail and is typically used alongside POP3 or IMAP for...
DefinitionSimple Network Management Protocol: a protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. SNMP is wide...
DefinitionShared Object: the equivalent of DLL on Unix/Linux systems. It is a shared library loaded at runtime for code reuse across programs.
DefinitionSecurity Operations Center: a centralized facility staffed by security analysts who continuously monitor, detect, analyze, and respond to cybersecurity incidents using a combination of technology solu...
DefinitionSuper NES SPC700 sound file: contains audio data ripped from Super Nintendo games, playable by specialized emulator-based audio players.
DefinitionStandard Portable Intermediate Representation for Vulkan: a binary intermediate language for GPU shaders used by Vulkan, OpenCL, and WebGPU.
DefinitionThe Swift Package Manager manifest file defining targets, dependencies, and products for Swift library and application packages.
DefinitionSPSS Data File: the native format for IBM SPSS Statistics, used in social science, market research, and survey data analysis.
DefinitionStructured Query Language: a standard programming language for managing and manipulating relational databases. SQL enables querying, inserting, updating, and deleting data, as well as creating and mod...
DefinitionA code injection technique that exploits security vulnerabilities in an application's database layer by inserting malicious SQL statements into input fields, allowing attackers to read, modify, or del...
DefinitionA self-contained, serverless, file-based relational database engine. SQLite requires no configuration or server process and stores the entire database in a single file, making it ideal for embedded sy...
DefinitionSubRip Subtitle: the simplest and most widely used subtitle file format with sequentially numbered blocks, timestamps, and plain text.
DefinitionSecure Shell: a cryptographic network protocol for operating network services securely over an unsecured network. SSH is most commonly used for remote command-line access, file transfers (SCP/SFTP), a...
DefinitionAn SSH public key file used for passwordless authentication to remote servers. Paired with a private key for secure, encrypted communication.
DefinitionSecure Sockets Layer / Transport Layer Security: cryptographic protocols that provide secure communication over a computer network. TLS (the successor to SSL) encrypts data in transit between web brow...
DefinitionStandard for the Exchange of Product Model Data (ISO 10303): a comprehensive standard for exchanging 3D product data between different CAD systems.
DefinitionStereolithography file format: describes only the surface geometry of a 3D object using triangulated surfaces. It is the most widely used format for 3D printing.
DefinitionVobSub Subtitle: a bitmap-based subtitle format extracted from DVD VOB files, where .sub contains the images and .idx contains timing information.
Definition