Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.
- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- STEMinism
STEMinism is a portmanteau that combines the acronym STEM (science, technology, engineering and math) with feminism.
- SMB
SMB is an abbreviation for a small and medium-sized business, sometimes called a small and midsize business.
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.
Recently Published Definitions
- agri-tech
Agri-tech, sometimes ag-tech, agtech or digital agriculture, is the application of technology and digital tools to farming.
- What is Web 3.0 (Web3)? Definition, guide and history
Web 3.0 promises a more personalized and intelligent web that uses blockchain decentralization to give control back to users. Here's how to sort ...
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.
Recently Published Definitions
- heat
Heat is the transfer of thermal energy from one physical system to another system or from one region in a physical system to another region.
- meter per second (m/s)
The meter per second (m/s) is the standard unit of speed and velocity in the International System of Units.
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.
Recently Published Definitions
- AI hallucination
An AI hallucination is when a large language model (LLM) generates false information.
- generative design
Generative design is a computer-aided design technique and category of software that uses AI to optimize the design process.
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.
- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- logical block addressing (LBA)
Logical block addressing (LBA) is a technique to specify the addresses of blocks of data on a storage device, such as a hard disk.
- OS X
OS X, also referred to as macOS X or Mac OS X, is Apple's proprietary, Unix-based operating system. Released in 2001 as the successor to Mac OS 9, OS...
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.
- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- uptime and downtime
In computing, uptime is a measure of how long a computer or service is on and available. Downtime is the measure of how long it is not available.
- hotkey
A hot key is a key or a combination of keys on a computer keyboard that, when pressed at one time, performs a task (such as starting an application) ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.
- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- flow control
Flow control is a technique used to regulate data transfer between computers or other nodes in a network.
- access network
Access networks are the communication networks that connect end-user devices, such as computers, smartphones and tablets, to a wide area network (WAN...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.
- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- decentralized identity
Decentralized identity is an approach to identify and authenticate users and entities without a centralized authority.
- passkey
A passkey is an alternative method of user authentication that eliminates the need for usernames and passwords.
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.
Recently Published Definitions
- pseudocode
Pseudocode is a detailed yet readable description of what a computer program or algorithm should do.
- polymorphism
Polymorphism is a popular concept in object-oriented programming (OOP), referring to the idea that an entity in code such as a variable, function or ...
Word of the Day
-
loose coupling
Loose coupling is an approach to interconnecting the components in a system, network or software application so that those ...
-
Nessus
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, ...
-
Occupational Safety and Health Administration (OSHA)
The Occupational Safety and Health Administration (OSHA) is responsible for protecting worker health and safety in the United ...
-
phishing
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...
-
ledger database
A ledger database is somewhat modern and commonly refers to a type of database that uses cryptographic techniques, including ...
-
SIPOC (suppliers, inputs, process, outputs, customers) diagram
A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from ...
-
diversity, equity and inclusion (DEI)
Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...
-
employee Net Promoter Score (eNPS)
The employee Net Promoter Score (eNPS) is a metric used by employers to assess employee loyalty.
-
RFx
RFx (request for x) encompasses the entire formal request process and can include request for bid (RFB), request for information ...
-
customer engagement
Customer engagement is the way a company creates a relationship with its customer base to foster brand loyalty and awareness.