Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- Tata Consultancy Services (TCS)
Tata Consultancy Services (TCS) is one of the largest multinational IT service and consulting companies.
- stack overflow
A stack overflow is a type of buffer overflow error that occurs when a computer program tries to use more memory space in the call stack than has ...
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- volt per meter (V/m)
Volt per meter is the standard unit of electric field (E field) strength.
- Web 3.0 (Web3)
Web 3.0 (Web3) is the third generation of the evolution of web technologies.
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- resolution
Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera ...
- complementary metal-oxide semiconductor (CMOS)
A complementary metal-oxide semiconductor (CMOS) is the semiconductor technology used in most of today's integrated circuits, also known as chips or ...
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- truncation error
A truncation error is the difference between an actual and a truncated, or cut-off, value.
- googol and googolplex
A googol is 10 to the 100th power, which is 1 followed by 100 zeros. While this is an unimaginably large number, there's still an infinite quantity ...
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- interrupt
An interrupt is a signal emitted by a device attached to a computer or from a program within the computer.
- File Allocation Table (FAT)
File Allocation Table (FAT) is a file system that Microsoft developed to support small disks and simple folder structures.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- WYSIWYG (what you see is what you get)
WYSIWYG (pronounced wiz-ee-wig) is a type of editing software that allows users to see and edit content in a form that appears as it would when ...
- virtual reality
Virtual reality is a simulated 3D environment that enables users to explore and interact with a virtual surrounding in a way that approximates ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- northbound interface/southbound interface
A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a ...
- intermediate distribution frame (IDF)
An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting a telecommunications cable between ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- ESG
Environmental, social and governance (ESG) is a term used to represent an organization's corporate financial interests that focus mainly on ...
- Information Technology Amendment Act 2008 (IT Act 2008)
The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act 2000.
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- Karnaugh map (K-map)
A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex ...
- template
A template is a form, mold or pattern used as a guide to make something.
Word of the Day
-
network packet
A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
data breach
A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...
-
insider threat
An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.
-
leadership skills
Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...
-
data governance policy
A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...
-
applicant tracking system (ATS)
An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...
-
HRIS (human resource information system)
A human resource information system (HRIS) is software that provides a centralized repository of employee master data that the ...
-
recommerce
Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...