Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- menu
A menu is a set of options presented to the user of a computer application to help them find information or execute a function.
- fuzzy search
A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- volt per meter (V/m)
Volt per meter is the standard unit of electric field (E field) strength.
- Web 3.0 (Web3)
Web 3.0 (Web3) is the third generation of the evolution of web technologies.
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- electron
An electron is a negatively charged subatomic particle that can be either bound to an atom or free (not bound).
- Stefan-Boltzmann constant
The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (σ), is a physical constant expressing the relationship between the ...
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- Markov model
A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
- x and y coordinates
X and y coordinates are, respectively, the horizontal and vertical addresses of a point in any two-dimensional (2D) space, such as a sheet of paper ...
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- interrupt
An interrupt is a signal emitted by a device attached to a computer or from a program within the computer.
- File Allocation Table (FAT)
File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- latitude and longitude
Latitude and longitude are parameters or coordinates that help determine the location of any place on Earth.
- WYSIWYG (what you see is what you get)
WYSIWYG (pronounced wiz-ee-wig) is a type of editing software that allows users to see and edit content in a form that appears as it would when ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- northbound interface/southbound interface
A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a ...
- intermediate distribution frame (IDF)
An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- ESG
Environmental, social and governance (ESG) is a term used to represent an organization's corporate financial interests that focus mainly on ...
- Information Technology Amendment Act 2008 (IT Act 2008)
The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act 2000.
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- Karnaugh map (K-map)
A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex ...
- template
A template is a form, mold or pattern used as a guide to make something.
Word of the Day
-
network packet
A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
data breach
A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...
-
insider threat
An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
-
data privacy (information privacy)
Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...
-
leadership skills
Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...
-
applicant tracking system (ATS)
An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...
-
HRIS (human resource information system)
A human resource information system (HRIS) is software that provides a centralized repository of employee master data that the ...
-
recommerce
Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...