Browse Definitions :

Browse Definitions by Alphabet

A-W - ADA

  • A-weighted decibels (dBA, or dBa, or dB(a)) - A-weighted decibels, abbreviated dBA, or dBa, or dB(a), are an expression of the relative loudness of sounds in air as perceived by the human ear.
  • A/B testing (split testing) - A/B testing, sometimes called split testing, is an assessment tool for identifying which version of something helps an individual or organization meet a business goal more effectively.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • AAA server (authentication, authorization and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization and accounting (AAA) services.
  • Aadhaar - Aadhaar is a 12-digit unique identification number issued by the Indian government to every individual resident of India in the form of a card.
  • AARRR metrics - AARRR metrics are a measured performance analysis of a startup businesses statistics centered around the response of customers.
  • abacus - An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame.
  • abandoned call - An abandoned call is a call or other type of contact initiated to a call center that is ended before any conversation occurs.
  • abandonware - Abandonware is computer software (such as an operating system, word processor, interactive game, or audio file) that is no longer marketed or distributed by the company that created it, but is obtainable from some other source.
  • ABAP (Advanced Business Application Programming) - ABAP (Advanced Business Application Programming) is the primary programming language supported on the SAP NetWeaver ABAP application server platform and applications that run on it, such as SAP ERP (formerly R/3), S/4HANA and CRM.
  • ABC analysis (Pareto analysis) - ABC analysis, also known as Pareto analysis, is a method used to categorize something according to its importance or value in a given context.
  • ABC classification - ABC classification is a ranking system for identifying and grouping items in terms of how useful they are for achieving business goals.
  • abend (abnormal end) - An abend (abnormal end) is an unexpected or abnormal termination of an application or operating system that results from a problem with the software.
  • absolute link - An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other addressable item on the Internet.
  • absolute truth - In general, absolute truth is whatever is always valid, regardless of parameters or context.
  • absolute value - Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system.
  • abstract class - In Java and other object oriented programming (OOP) languages, objects and classes (categories of objects) may be abstracted, which means that they are summarized into characteristics that are relevant to the current program’s operation.
  • Abstract Window Toolkit (AWT) - Abstract Window Toolkit (AWT) is a set of application program interfaces (APIs) used by Java programmers to create graphical user interface (GUI) objects, such as buttons, scroll bars, and windows.
  • abstraction - Abstraction (from the Latin abs, meaning away from and trahere, meaning to draw) is the process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
  • AC-3 (Dolby Digital) - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • academic analytics - Academic analytic's is the application of business intelligence (BI) tools and strategies to guide decision-making practices in educational institutions.
  • Accelerated Mobile Pages (AMP) - Accelerated Mobile Pages (AMP) is an open source project created to improve the performance of web pages for mobile delivery.
  • accelerometer - An accelerometer is a device that measures changes in gravitational acceleration in a device it may be installed in.
  • acceptable spam report rate - An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • acceptance testing - Acceptance testing is a quality assurance (QA) process that determines to what degree an application meets end users' approval.
  • acceptance test–driven development (ATDD) - Acceptance test–driven development (ATDD) is a collaborative process where developers, testers and business representatives come together to work out requirements, perceive potential pitfalls and reduce the chance of errors before coding begins.
  • access - Access is simply being able to get to what you need.
  • access control - Access control is a security technique that regulates who or what can view or use resources in a computing environment.
  • access control list (ACL) - An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.
  • access governance (AG) - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts.
  • access layer - The access layer is where host computers and end users connect to the network.
  • access list (AL) - An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.
  • access log - An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website.
  • access method - In computing, an access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
  • access network - An access network is a user network that connects subscribers to a particular service provider and, through the carrier network, to other networks such as the Internet.
  • Access Network Query Protocol (ANQP) - The Access Network Query Protocol (ANQP) is a query and response protocol that defines services offered by an access point (AP), typically at a Wi-Fi hot spot.
  • access provider - An access provider is any organization that arranges for an individual or an organization to have access to the Internet.
  • access recertification - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.
  • access time - Access time is the time from the start of one storage device access to the time when the next access can be started.
  • AccessEnum - AccessEnum is a free Sysinternals tool that offers administrators a view of the full file system and registry security settings to ensure that users have appropriate permissions to access files and directories.
  • account - An account is a unique record for each type of asset, liability, equity, revenue and expense.
  • account-based experience (ABX) - Account-based experience (ABX) is a methodology in which separate teams in an organization work closely with one another to ensure all brand interactions are focused on the end user.
  • account-based marketing (ABM) - Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on targeted accounts within a specific market.
  • accountability - Accountability means being held responsible or answerable for one's actions (or perhaps lack of action where one should have been taken).
  • accountable care organization (ACO) - An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.
  • accounting error - What is an accounting error?An accounting error is a non-fraudulent discrepancy in financial documentation.
  • accounts payable - Accounts payable is a liability account in the general ledger (GL).
  • accounts receivable (AR) - Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.
  • accumulator - An accumulator is a type of register for short-term, intermediate storage of arithmetic and logic data in a computer's central processing unit (CPU).
  • ACF2 or CA-ACF2 (Access Control Facility) - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ACID (atomicity, consistency, isolation, and durability) - ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device for learning and remembering the four primary attributes ensured to any transaction by a transaction manager (which is also called a transaction monitor).
  • ACK - In some digital communication protocols, ACK is the name of a signal that data has been received successfully (for example, with an acceptable number of errors).
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • acquihire - An acquihire is the purchase of one company by another for the sole purpose of retaining the business' staff.
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • Actifio - Actifio is a software vendor in Waltham, Mass.
  • action item - An action item is a discrete task that must be accomplished, usually by a single individual or a small team or group.
  • action plan - An action plan is a document that lists what steps must be taken in order to achieve a specific goal.
  • actionable - Actionable, in a business context, is an adjective referring to things that can be acted upon.
  • actionable insights - Actionable insights are conclusions drawn from data that can be turned directly into an action or a response.
  • actionable intelligence - Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • active archive - An active archive is a collection of data that is too valuable for a company to discard, but only needs to be accessed occasionally.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active cooling - Active cooling is the use of fans to reduce the heat of computer components.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Active Directory Certificate Services (AD CS) - Active Directory Certificate Services (AD CS) is an Active Directory tool that lets administrators customize services in order to issue and manage public key certificates.
  • Active Directory domain (AD domain) - An Active Directory domain is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree - An Active Directory (AD) tree is a collection of domains within a Microsoft Active Directory network.
  • active learning (active learner algorithm) - Active learning, in an AI context, is the capacity of a machine learning algorithm to query sources for more data during its processes.
  • active man-in-the-middle attack (MitM) - Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website.
  • active reconnaissance - Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • Active Template Library (ATL) - Active Template Library (ATL), formerly called ActiveX Template Library) is a Microsoft program library (set of prepackaged program routines) for use when creating Active Server Page (ASP) code and other ActiveX program components with C++ (including Visual C++).
  • ActiveX - ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.
  • ActiveX controls - ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.
  • ActiveX Data Objects (ADO) - ActiveX Data Objects (ADO) is an application program interface from Microsoft that lets a programmer writing Windows applications get access to a relational or non-relational database from both Microsoft and other database providers.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • Acxiom - Acxiom is an identity based marketing company and data broker that specializes in personalized marketing.
  • ad blocker - An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.
  • ad exchange - An ad exchange is a software-based automated marketplace that allows publishers to sell their ad inventory and advertisers to bid on and purchase the inventory in real time.
  • ad fraud - Ad fraud is a type of scam in which the perpetrator fools advertisers into paying for something useless to them, such as fake traffic, fake leads or ineffective and misrepresented ad placement.
  • ad hoc - Ad hoc is an adjective used to describe things that are created on the spot, usually for a single use.
  • ad hoc analysis - Ad hoc analysis is a business intelligence (BI) process designed to answer specific business questions by using company data from various sources.
  • ad hoc testing - Ad hoc testing is a non-methodical approach to assessing the viability of a product.
  • ad inventory (advertising inventory) - Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.
  • ad server - An ad server is software that stores advertising content and delivers it to websites and applications.
  • Ada Lovelace (Augusta Ada King) - Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer.
  • adapter - An adapter is a physical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface.
  • adaptive cruise control - Adaptive cruise control (ACC) is a driver assistance technology that sets a maximum speed for vehicles and automatically slows the speed of the car when traffic is sensed in front of the vehicle.
  • adaptive enterprise (or adaptive organization) - An adaptive enterprise (or adaptive organization) is a corporation, institution, or agency in which the business demand and the IT (information technology) supply are matched and synchronized at all times.
  • Adaptive Insights (formerly called Adaptive Planning) - Adaptive Insights (formerly called Adaptive Planning) is a cloud-based corporate performance management software (CPM) vendor headquartered in Mountain View, California.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
SearchCIO
SearchHRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.

  • recruitment management system

    A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.

  • applicant tracking system (ATS)

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close