Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- productivity software
Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, spreadsheets and ...
- menu
A menu is a set of options presented to the user of a computer application to help them find information or execute a function.
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- software testing
Software testing is the process of assessing the functionality of a software program.
- volt per meter (V/m)
Volt per meter is the standard unit of electric field (E field) strength.
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- electron
An electron is a negatively charged subatomic particle that can be either bound to an atom or free (not bound).
- Stefan-Boltzmann constant
The Stefan-Boltzmann constant, symbolized by the lowercase Greek letter sigma (σ), is a physical constant expressing the relationship between the ...
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- x and y coordinates
X and y coordinates are, respectively, the horizontal and vertical addresses of a point in any two-dimensional (2D) space, such as a sheet of paper ...
- Markov model
A Markov model is a stochastic method for randomly changing systems that possess the Markov property.
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- interrupt
An interrupt is a signal emitted by a device attached to a computer or from a program within the computer.
- File Allocation Table (FAT)
File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- operation (computing)
An operation, in computing, is an action that is carried out to accomplish a given task.
- soft copy
A soft copy (sometimes spelled 'softcopy') is an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer's display or ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- northbound interface/southbound interface
A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a ...
- intermediate distribution frame (IDF)
An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- segregation of duties (SoD)
Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for ...
- ESG
Environmental, social and governance (ESG) is a term used to represent an organization's corporate financial interests that focus mainly on ...
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- deprecated
In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where...
- Karnaugh map (K-map)
A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex ...
Word of the Day
-
network packet
A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
Domain-based Message Authentication, Reporting and Conformance (DMARC)
The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...
-
data breach
A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...
-
data privacy (information privacy)
Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...
-
leadership skills
Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...
-
applicant tracking system (ATS)
An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...
-
HRIS (human resource information system)
A human resource information system (HRIS) is software that provides a centralized repository of employee master data that the ...
-
recommerce
Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...