Browse Definitions :
Definition

monolithic

Monolithic, in information technology, means either very large (and possibly imposing) or composed all in one piece, depending on the particular context; the term is used in different ways to describe integrated circuits, organizations, applications and storage systems, among other things.

A few examples of how the term is used in IT:

A monolithic architecture is the traditional programming model, which means that elements of a software program are interwoven and interdependent. That model contrasts with more recent modular approaches such as a microservice architecture (MSA).

A monolithic integrated circuit (IC) is a set of circuitry on a single semiconductor plate or chip rather than built of separate elements as a discrete circuit is.

A monolithic storage array has disks fixed into the array frame and connected to controllers through cache memory; modular arrays, on the other hand, are usually based on dual controllers connected to a separate power source and connected to the disks through cables.

A monolithic corporation is a large, separate and undiversified organization.

In a general context, a monolith is a single, separate and large stone feature that may be geographic or man-made. Examples include a mountain that is not part of a range, a standing stone and a monument. The word comes from the Ancient Greek μονόλιθος (monolithos), from μόνος (one) and λίθος (stone).

This was last updated in May 2016

Continue Reading About monolithic

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close