Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- digital accessibility
Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable ...
- nonprofit organization (NPO)
A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it...
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- volt per meter (V/m)
Volt per meter is the standard unit of electric field (E field) strength.
- Web 3.0 (Web3)
Web 3.0 (Web3) is the third generation of the evolution of web technologies.
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- Intel
Intel is the world's largest manufacturer of central processing units and semiconductors.
- accumulator
An accumulator is a type of register for short-term, intermediate storage of arithmetic and logic data in a computer's central processing unit (CPU).
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- Data Definition Language (DDL)
Data Definition Language (DDL) is used to create and modify the structure of objects in a database using predefined commands and a specific syntax.
- binary-coded decimal
Binary-coded decimal is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base 10) number.
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- File Allocation Table (FAT)
File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
- POSIX (Portable Operating System Interface)
POSIX (Portable Operating System Interface) is a set of standard operating system interfaces based on the Unix operating system.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- firmware
Firmware is programming that's written to a hardware device's non-volatile memory.
- bit (binary digit)
A bit (binary digit) is the smallest unit of data that a computer can process and store. A bit is always in one of two physical states, similar to an...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host...
- round robin
A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- Great Firewall of China
The Great Firewall of China is the name that western media has given to the combination of tools, services and rules that the government of the ...
- acceptable use policy
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the ...
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- binary file
A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
- data abstraction
Data abstraction is the reduction of a particular body of data to a simplified representation of the whole.
Word of the Day
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
network functions virtualization (NFV)
Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...
-
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning.
-
X.509 certificate
An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...
-
resource allocation
Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...
-
chief digital officer (CDO)
A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...
-
performance and accountability reporting (PAR)
Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an ...
-
chief human resources officer (CHRO)
Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...
-
first call resolution (FCR)
First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.