Browse Definitions :

Browse Definitions by Alphabet

  • A-weighted decibel (dBA or dB(A)) - A-weighted decibel (dBA or dB(A)) is an expression of the relative loudness of sounds as perceived by the human ear.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • AAA server (authentication, authorization and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization and accounting (AAA) services.
  • AARRR metrics - AARRR metrics are a measured performance analysis of a startup businesses statistics centered around the response of customers.
  • abacus - An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame.
  • abandoned call - An abandoned call is a call or other type of contact initiated to a call center that is ended before any conversation occurs.
  • ABAP (Advanced Business Application Programming) - ABAP (Advanced Business Application Programming) is the primary programming language supported on the SAP NetWeaver ABAP application server platform and applications that run on it, such as SAP ERP (formerly R/3), S/4HANA and CRM.
  • ABC classification - ABC classification is a ranking system for identifying and grouping items in terms of how useful they are for achieving business goals.
  • abend (abnormal end) - An abend (abnormal end) is an unexpected or abnormal termination of an application or operating system that results from a problem with the software.
  • absolute link - An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other addressable item on the Internet.
  • absolute truth - In general, absolute truth is whatever is always valid, regardless of parameters or context.
  • absolute value - Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system.
  • abstract class - An abstract class is a template definition of methods and variables in a specific class, or category of objects.
  • abstraction - Abstraction (from the Latin abs, meaning away from and trahere, meaning to draw) is the process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
  • AC-3 (Dolby Digital) - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • Accelerated Mobile Pages (AMP) - Accelerated Mobile Pages (AMP) is an open source project created to improve the performance of web pages for mobile delivery.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • acceptance testing - Acceptance testing is a quality assurance (QA) process that determines to what degree an application meets end users' approval.
  • acceptance test–driven development (ATDD) - Acceptance test–driven development (ATDD) is a collaborative process where developers, testers and business representatives come together to work out requirements, perceive potential pitfalls and reduce the chance of errors before coding begins.
  • access control - Access control is a security technique that regulates who or what can view or use resources in a computing environment.
  • access control list (ACL) - An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.
  • access log - An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website.
  • access network - Access networks are the communication networks that connect end-user devices, such as computers, smartphones and tablets, to a wide area network (WAN), such as the internet.
  • account mapping - Account mapping is a strategic process that involves researching and visually organizing the key stakeholders, decision-makers and influencers within a target customer's organization.
  • account-based experience (ABX) - Account-based experience (ABX) is a business-to-business (B2B) strategy in which the sales, marketing and customer success departments work together to provide accounts with a unified, personalized experience throughout the buyer journey.
  • account-based marketing (ABM) - Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on target accounts within a specific market.
  • account-based selling - Account-based selling (ABS) is a strategic sales approach in business-to-business sales and marketing that centers around building highly personalized and targeted relationships with specific high-value accounts.
  • accountability - Accountability is an assurance that an individual or an organization is evaluated on its performance or behavior related to something for which it is responsible.
  • accountable care organization (ACO) - An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.
  • accounts receivable (AR) - Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.
  • accumulator - An accumulator is a type of register for short-term, intermediate storage of arithmetic and logic data in a computer's central processing unit (CPU).
  • ACID (atomicity, consistency, isolation, and durability) - In transaction processing, ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device used to refer to the four essential properties a transaction should possess to ensure the integrity and reliability of the data involved in the transaction.
  • ACK (acknowledgement) - In some digital communication protocols, ACK -- short for 'acknowledgement' -- refers to a signal that a device sends to indicate that data has been received successfully.
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • action plan - An action plan is a document that lists what steps must be taken to achieve a specific goal.
  • actionable insights - Actionable insights are conclusions drawn from data that can be turned directly into an action or a response.
  • actionable intelligence - Actionable intelligence is information that can be immediately used or acted upon -- either tactically in direct response to an evolving situation, or strategically as the result of an analysis or assessment.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Active Directory domain (AD domain) - An Active Directory domain (AD domain) is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree - An Active Directory (AD) tree is a collection of domains within a Microsoft Active Directory network.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • ActiveX - ActiveX is a set of object-oriented programming technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback.
  • ActiveX controls - ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.
  • ad hoc analysis - Ad hoc analysis is a business intelligence (BI) process designed to answer a specific business question by using company data from various sources.
  • Adaptive Insights (formerly called Adaptive Planning) - Adaptive Insights (formerly called Adaptive Planning) is a cloud-based corporate performance management software (CPM) vendor headquartered in Mountain View, California.
  • adaptive multifactor authentication (adaptive MFA) - Adaptive multifactor authentication (MFA) is a security mechanism intended to authenticate and authorize users through a variety of contextual authentication factors.
  • address bar - The address bar is the familiar text field at the top of a web browser’s graphical user interface (GUI) that displays the name or the URL (uniform resource locator) of the current web page.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local area network (LAN).
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity -- for example, a device, a file, a server or a networked computer.
  • address space layout randomization (ASLR) - Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
  • adiabatic cooling - Adiabatic cooling is the process of reducing heat through a change in air pressure caused by volume expansion.
  • admittance (Y) - Admittance (symbolized Y) is an expression of the ease with which alternating current (AC) flows through a complex circuit or system.
  • Adobe Experience Platform - Adobe Experience Platform is a suite of customer experience management (CXM) solutions from Adobe.
  • Adobe Flash - Adobe Flash is a software platform used to create rich digital content containing animation, graphic effects, streaming video and other interactive elements to deliver engaging user experiences over many platforms, including desktops and mobile devices.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.
  • Adobe Sign - Adobe Sign is a cloud-based service that lets an individual or organization send, secure, track and manage e-signature processes.
  • ADP Mobile Solutions - ADP Mobile Solutions allows employees to use their mobile devices to access records such as their pay, schedules, time cards, retirement funds, benefits, contacts and calendar.
  • ADSL (Asymmetric Digital Subscriber Line) - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
  • advanced analytics - Advanced analytics is a broad category of inquiry that can be used to help drive changes and improvements in business practices.
  • Advanced Encryption Standard (AES) - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • Advanced Message Queuing Protocol (AMQP) - Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.
  • advanced persistent threat (APT) - An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period.
  • advanced planning and scheduling (APS) - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • advanced shipping notice (ASN) - An advanced shipping notice (ASN) is a document that provides detailed information about a pending delivery.
  • adversarial machine learning - Adversarial machine learning is a technique used in machine learning (ML) to fool or misguide a model with malicious input.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • AF (audio frequency or a.f.) - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • affinity marketing - Affinity marketing is a type of direct marketing in which a business forms a partnership with an organization to provide goods or services in exchange for access to a new market.
  • AgentGPT - AgentGPT is a generative artificial intelligence tool that enables users to create autonomous AI agents that can be delegated a range of tasks.
  • Agile Manifesto - The Agile Manifesto is a document that identifies four key values and 12 principles that its authors believe software developers should use to guide their work.
  • Agile operations (AgileOps) - Agile operations, or AgileOps, is a digital business operating model that builds on Agile methodologies and DevOps techniques to help organizations adapt to change quickly and efficiently.
  • Agile project management (APM) - Agile project management (APM) is an iterative approach to planning and guiding project processes.
  • Agile retrospective - An Agile retrospective is a meeting that's held at the end of an iteration in Agile software development.
  • Agile software development - Agile is a type of software development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • agile test automation pyramid - The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.
  • agnostic - Agnostic, in an information technology (IT) context, refers to something that is generalized so that it is interoperable among various systems.
  • agreed-upon procedures (AUP) - Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results.
  • agri-tech - Agri-tech, sometimes ag-tech, agtech or digital agriculture, is the application of technology and digital tools to farming.
  • AHCI (Advanced Host Controller Interface) - Advanced Host Controller Interface, or AHCI, is a technical standard for an interface that enables software to communicate with Serial ATA (SATA) devices.
  • AI alignment - AI alignment is a field of AI safety research that aims to ensure artificial intelligence systems achieve desired outcomes.
  • AI art (artificial intelligence art) - AI art (artificial intelligence art) is any form of digital art created or enhanced with AI tools.
  • AI democratization - AI democratization is the spread of artificial intelligence development to a wider user base that includes those without specialized knowledge of AI.
  • AI ethics (AI code of ethics) - AI ethics is a system of moral principles and techniques intended to inform the development and responsible use of artificial intelligence technology.
  • AI hallucination - An AI hallucination is when a large language model (LLM) generates false information.
  • AI prompt - An artificial intelligence (AI) prompt is a mode of interaction between a human and a large language model that lets the model generate the intended output.
  • AI prompt engineer - An AI prompt engineer is an expert in creating text-based prompts or cues that can be interpreted and understood by large language models and generative AI tools.
  • AI watermarking - AI watermarking is the process of embedding a recognizable, unique signal into the output of an artificial intelligence model, such as text or an image, to identify that content as AI generated.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • AIDA marketing model - The AIDA marketing model is a marketing, advertising and sales approach methodology designed to provide insight into the customer's mind and represent the steps needed to cultivate leads and generate sales.
  • AIOps (artificial intelligence for IT operations) - Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning and other AI technologies to automate the identification and resolution of common IT issues.
  • air gap (air gapping) - An air gap is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
  • airplane mode - Airplane mode is a setting on cell phones, smartphones and other mobile communication devices that prevents the device from sending or receiving calls and text messages.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

CIO
  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close