Browse Definitions By Topic
- Business software
- Cloud computing
- Computer science
- Data analytics and AI
- Data centers
- IT management
- Networking
- Security
- Software development
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Enterprise resource planning (ERP)
- Human resources management
- Marketing and customer experience
- Microsoft
- Software applications
Recently Published Definitions
- digital accessibility
Digital accessibility is design of technology products and environments to help people with various disabilities not be impeded or otherwise unable ...
- nonprofit organization (NPO)
A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it...
Cloud computing
Terms related to cloud computing, including definitions about on-demand, distributed computing and words and phrases about software-as-a-service, infrastructure-as-a-service and storage-as-a-service.

Recently Published Definitions
- Web 3.0 (Web3)
Web 3.0 (Web3) is the third generation of the evolution of web technologies.
- chatting
While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, ...
Computer science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Recently Published Definitions
- World Wide Web (WWW)
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites or pages that users can access on their local computers ...
- Transistor
A transistor is a miniature semiconductor that regulates or controls current or voltage flow.
Data analytics and AI
This glossary contains definitions related to customer data analytics, predictive analytics, data visualization and operational business intelligence. Some definitions explain the meaning of words used to Hadoop and other software tools used in big data analytics. Other definitions are related to the strategies that business intelligence professionals, data scientists, statisticians and data analysts use to make data-driven decisions.

Recently Published Definitions
- hexadecimal
Hexadecimal is a numbering system with base 16. It can be used to represent large numbers with fewer digits.
- binary
Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used...
Data centers
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Data backup and disaster recovery
- Data center management
- Linux
- Operating systems
- Storage administration
- Storage architecture
- Virtualization
Recently Published Definitions
- memory management
Memory management is the process of controlling and coordinating a computer's main memory.
- volatile memory
Volatile memory is a type of memory that maintains its data only while the device is powered.
IT management
Learn about the core elements of IT management, including operations, tech support and personal computing, as well as terms related to IT careers, certifications and project management.

- Certifications
- IT career paths
- IT operations
- Personal computing
- Project management
- Technical support
Recently Published Definitions
- bit (binary digit)
A bit (binary digit) is the smallest unit of data that a computer can process and store. A bit is always in one of two physical states, similar to an...
- room-scale virtual reality (VR)
Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- High-speed networks
- Network administration
- Network hardware
- Networking and communications
- Wireless and mobile
Recently Published Definitions
- Automatic Private IP Addressing (APIPA)
Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host...
- round robin
A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Authentication and access control
- Compliance, risk and governance
- Network security
- Security management
- Threat management
Recently Published Definitions
- acceptable use policy
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the ...
- Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a ...
Software development
Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

Recently Published Definitions
- binary file
A binary file is a file whose content is in a binary format that consists of a series of sequential bytes, each of which is eight bits in length.
- data abstraction
Data abstraction is the reduction of a particular body of data to a simplified representation of the whole.
Word of the Day
-
virtual network functions (VNFs)
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
-
network functions virtualization (NFV)
Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...
-
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning.
-
X.509 certificate
An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...
-
security audit
A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...
-
chief transformation officer (CTO)
Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...
-
performance and accountability reporting (PAR)
Performance and accountability reporting (PAR) is the process of compiling and documenting factors that quantify an ...
-
chief human resources officer (CHRO)
Chief human resources officer (CHRO) is a top-level management executive in charge of an organization's employees.
-
implementation
Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...
-
first call resolution (FCR)
First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.