Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- reinforcement theory
Reinforcement theory is a psychological principle suggesting that behaviors are shaped by their consequences, and that individual behaviors can be ...
- closed loop control system
A closed loop control system is a mechanical or electronic device that automatically regulates a system to maintain a desired state or set point ...
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- social networking
Social networking is the practice of using a dedicated online platform to maintain contacts, interact and collaborate with like-minded individuals, ...
- 404 error
404 is a status code that tells a web user that a requested page is not available.
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- volt-ampere (VA)
A volt-ampere (VA) is a measurement of power in a direct current (DC) electrical circuit.
- instruction set
An instruction set is a group of commands for a central processing unit (CPU) in machine language.
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- algorithm
An algorithm is a procedure used for solving a problem or performing a computation.
- Fibonacci sequence
The Fibonacci sequence is a set of integers (the Fibonacci numbers) that starts with a zero, followed by a one, then by another one, and then by a ...
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- EEPROM (electrically erasable programmable read-only memory)
EEPROM (electrically erasable programmable read-only memory) is a user-modifiable ROM.
- command prompt
A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- instance
In object-oriented programming (OOP), an instance is a specific realization of any object.
- Master Boot Record (MBR)
The Master Boot Record (MBR) is the information in the first sector of a hard disk or a removable drive.
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- network slicing
Network slicing overlays multiple virtual networks on top of a shared network domain, that is, a set of shared network and computing resources.
- desktop management interface (DMI)
The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a ...
- bitcoin mining
Bitcoin mining is the process of verifying new transactions to the Bitcoin digital currency system, as well as the process by which new bitcoin enter...
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- monolithic architecture
A monolithic architecture is the traditional unified model for the design of a software program.
- XML Schema Definition (XSD)
XML Schema Definition or XSD is a recommendation by the World Wide Web Consortium (W3C) to describe and validate the structure and content of an XML ...
Word of the Day
-
software-defined networking (SDN)
Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network to make ...
-
What is 6G? Overview of 6G networks & technology
6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies ...
-
man in the browser (MitB)
Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...
-
Patch Tuesday
Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...
-
e-business (electronic business)
E-business (electronic business) is the conduct of business processes on the internet.
-
business resilience
Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...
-
performance and accountability reporting (PAR)
Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an ...
-
chief human resources officer (CHRO)
Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
-
clickstream data (clickstream analytics)
Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...
-
neuromarketing
Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...