Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- digital accessibility
Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable ...
- nonprofit organization (NPO)
A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it...
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- Web 3.0 (Web3)
Web 3.0 (Web3) is the third generation of the evolution of web technologies.
- chatting
While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, ...
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- accumulator
An accumulator is a type of register for short-term, intermediate storage of arithmetic and logic data in a computer's central processing unit (CPU).
- World Wide Web (WWW)
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers ...
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- binary-coded decimal
Binary-coded decimal is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base 10) number.
- hexadecimal
Hexadecimal is a numbering system with base 16. It can be used to represent large numbers with fewer digits.
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- memory management
Memory management is the process of controlling and coordinating a computer's main memory.
- volatile memory
Volatile memory is a type of memory that maintains its data only while the device is powered.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- firmware
Firmware is programming that's written to a hardware device's non-volatile memory.
- bit (binary digit)
A bit (binary digit) is the smallest unit of data that a computer can process and store. A bit is always in one of two physical states, similar to an...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host...
- round robin
A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- acceptable use policy
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the ...
- Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a ...
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- binary file
A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
- data abstraction
Data abstraction is the reduction of a particular body of data to a simplified representation of the whole.
Word of the Day
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
network functions virtualization (NFV)
Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...
-
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning.
-
X.509 certificate
An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...
-
chief digital officer (CDO)
A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...
-
security audit
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...
-
performance and accountability reporting (PAR)
Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an ...
-
chief human resources officer (CHRO)
Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...
-
first call resolution (FCR)
First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.