Browse Definitions :

Browse Definitions by Alphabet

  • anti-spyware software - Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
  • antimalware (anti-malware) - Antimalware is a type of software program created to protect IT systems and individual computers from malicious software, or malware.
  • antispoofing - Antispoofing is a technique for identifying and dropping packets that have a false source address.
  • antitrust - Antitrust is a group of laws established to regulate business practices in order to ensure that fair competition occurs in an open-market economy for the benefit of consumers.
  • antivirus software (antivirus program) - Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
  • Apache - In computers, the Apache Software Foundation is a nonprofit organization dedicated to maintaining many open source software projects.
  • Apache Flink - Apache Flink is a distributed data processing platform for use in big data applications, primarily involving analysis of data stored in Hadoop clusters.
  • Apache Hadoop YARN - Apache Hadoop YARN is the resource management and job scheduling technology in the open source Hadoop distributed processing framework.
  • Apache JMeter - Apache JMeter is an open source, Java-based load testing tool that can analyze the functional behavior of a system and measure the performance of a system under a load test.
  • Apache Kafka - Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time.
  • Apache OpenOffice - Apache OpenOffice is an open source office productivity suite used to create and edit documents (Writer), presentations (Impress), spreadsheets (Calc), graphics (Draw), mathematical formulas (Math) and databases (Base).
  • Apache OpenWhisk - Apache OpenWhisk is an open source and serverless cloud platform that performs functions in response to events.
  • Apache Solr - Apache Solr is an open source search platform built upon a Java library called Lucene.
  • Apache Spark - Apache Spark is an open source parallel processing framework for running large-scale data analytics applications across clustered computers.
  • Apache ZooKeeper - Apache ZooKeeper is an open source file application program interface (API) that allows distributed processes in large systems to synchronize with each other so that all clients making requests receive consistent data.
  • Apex (Salesforce) - Salesforce Apex is a Microsoft-certified framework for building software as a service (SaaS) apps on top of Salesforce's customer relationship management (CRM) functionality.
  • API economy - The API economy refers to the set of business models and practices designed around the use of application programming interfaces (APIs) in today's digital economy.
  • API endpoint - An API endpoint is a point at which an API -- the code that allows two software programs to communicate with each other -- connects with the software program.
  • API gateway (application programming interface gateway) - An API gateway is a software pattern that sits in front of an application programming interface (API) or group of microservices to facilitate requests and delivery of data and services.
  • API key - An API key is a unique identifier used to connect to, or perform, an API call.
  • API lifecycle management - API lifecycle management is a part of application programming interface management that supports the design, development and maintenance of APIs, including their transitioning from design and testing to a production environment.
  • API management - API management is the process by which an organization creates, oversees and controls application programming interfaces (APIs) in a secure, scalable environment.
  • API proxy - An API proxy is a thin application program interface (API) server that exposes an interface for an existing service or services.
  • API security - Application program interface (API) security refers to policies and procedures that protect APIs against malicious attacks and vulnerabilities.
  • API testing - API testing is a type of software testing that analyzes an application program interface (API) to verify that it fulfills its expected functionality, security, performance and reliability.
  • API-centric application - An API-centric application is a web service that is built using application programming interfaces (APIs) to exchange data with other applications.
  • Apigee - Apigee, pronounced App-ih-gee, is an API gateway management tool offered by Google to exchange data across cloud services and applications.
  • APK file (Android Package Kit file format) - An APK file (Android Package Kit file format) is the file format for applications used on the Android operating system (OS).
  • apogee - When a satellite follows a non-circular orbit around the earth, the satellite's path is an ellipse with the center of the earth at one focus.
  • app - 'App' is an abbreviated form of the word 'application.
  • app store (application store) - An app store (application store) is an online portal through which software programs are made available for procurement and download.
  • app virtualization (application virtualization) - App virtualization (application virtualization) is the separation of an installation of an application from the client computer accessing it.
  • app wrapping (application wrapping) - App wrapping (application wrapping) is applying a management layer to an existing mobile app.
  • apparent power - Apparent power is a measure of alternating current (AC) power that is computed by multiplying the root-mean-square (rms) current by the root-mean-square voltage.
  • Apple - Apple Inc. (formerly Apple Computer Inc.
  • Apple 3D Touch - Apple 3D Touch was a hardware-based feature Apple introduced in iPhone 6s and 6s Plus devices running iOS 9 that perceives the amount of force a user puts on the touchscreen to activate different functions.
  • Apple AirDrop - Apple AirDrop is a native feature in iOS and macOS that lets users share data from one device to another on the same Wi-Fi network.
  • Apple Authorized Service Provider (Apple AASP) - An Apple Authorized Service Provider (AASP) is a business that provides repair services for Apple products.
  • Apple Automated Device Enrollment - The Apple Automated Device Enrollment program, formerly known as the Device Enrollment Program (DEP), is a device enrollment service that's included with Apple Business Manager (ABM) and Apple School Manager (ASM).
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • Apple Business Manager - Apple Business Manager (ABM) is an online portal for IT administrators who deploy Mac OS, iOS and tvOS devices in an enterprise or educational setting.
  • Apple iOS - Apple iOS is a proprietary mobile operating system that runs on mobile devices such as the iPhone and iPad.
  • Apple Push Notification service (APNs) - Apple Push Notification service (APNs) is a cloud service that allows approved third-party apps installed on Apple devices to send push notifications from a remote server to users over a secure connection.
  • Apple TV (Apple TV 4) - Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.
  • Apple User Enrollment - Apple User Enrollment (UE) is a form of mobile device management (MDM) for Apple products that supports iOS 13 and macOS Catalina.
  • Apple Watch - Apple Watch is a wearable smartwatch that allows users to accomplish a variety of tasks, including making phone calls, sending text messages and reading email.
  • Apple watchOS (Apple Watch operating system) - Apple watchOS is the operating system (OS) designed specifically for the Apple Watch wearable device, with features that take advantage of the smaller screen and location of the device on the user's wrist.
  • applet - An applet is a small computer program that performs a specific task.
  • applicant tracking system (ATS) - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • application - An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.
  • application architecture - An application architecture is a structural map of how an organization's software applications are assembled and how those applications interact with each other to meet business or user requirements.
  • application blacklisting (application blocklisting) - Application blacklisting --increasingly called application blocklisting -- is a network or computer administration practice used to prevent the execution of undesirable software programs.
  • application containerization (app containerization) - Application containerization is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine for each app.
  • application delivery controller (ADC) - An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.
  • application firewall - An application firewall is an enhanced firewall that limits access by applications to the operating system (OS) of a computer.
  • application layer - The application layer sits at Layer 7, the top of the Open Systems Interconnection (OSI) communications model.
  • application layering (app layering) - Application layering (app layering) is a technology for delivering virtual applications that run in layers separate from a virtual desktop, but interact with the operating system and other apps as if they are installed natively on the base image.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning and development, through testing and maintenance, and into decommissioning and retirement.
  • Application Load Balancer - The Application Load Balancer is a feature of Elastic Load Balancing that allows a developer to configure and route incoming end-user traffic to applications based in the AWS public cloud.
  • application manager (app manager) - An application manager (app manager) is programming for overseeing the installation, patching and updating and perhaps access of software applications.
  • application migration - Application migration is the process of moving an application program from one environment to another.
  • Application Performance Index (Apdex) - Application Performance Index, also known as Apdex, is an open standard intended to simplify reports of application performance.
  • application platform - An application platform is a framework of services that applications rely on for standard operations.
  • application portfolio management (APM) - Application portfolio management (APM) is a framework for managing enterprise IT software applications and software-based services.
  • application programming interface (API) - An application programming interface (API) is code that enables two software programs to communicate.
  • application release automation (ARA) - Application release automation (ARA) is a process that automatically packages and deploys an application, or application updates, through the stages of development to production.
  • application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.
  • application security - Application security, or appsec, is the practice of using security software, hardware, techniques, best practices and procedures to protect computer applications from external security threats.
  • application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • application support engineer (ASE) - An application support engineer (ASE) is an IT professional who provides technical support for the range of software their employer uses.
  • application whitelisting - Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.
  • Appreciative inquiry (AI) - Appreciative Inquiry (AI) is a change management approach that focuses on identifying what is working well, analyzing why it is working well and then doing more of it.
  • AppX file - AppX is the application distribution file format that was introduced with Microsoft Windows 8.
  • archive - An archive is a collection of data moved to a repository for long-term retention, to be kept separate for compliance reasons or moved off primary storage media.
  • AribaPay - AribaPay is a system for electronic payments for goods and services on the SAP Ariba Network, a global business trading community.
  • arithmetic-logic unit (ALU) - An arithmetic-logic unit (ALU) is the part of a central processing unit (CPU) that carries out arithmetic and logic operations on the operands in computer instruction words.
  • Arm processor - An Arm processor is one of a family of CPUs based on the RISC architecture for computer processors.
  • Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
  • ARPANET - The U.S.
  • artifact (software development) - An artifact is a byproduct of software development that helps describe the architecture, design and function of software.
  • artificial general intelligence (AGI) - Artificial general intelligence (AGI) is the representation of generalized human cognitive abilities in software so that, faced with an unfamiliar task, the AI system could find a solution.
  • artificial intelligence (AI) - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • artificial intelligence (AI) governance - Artificial intelligence governance is the legal framework for ensuring AI and machine learning technologies are researched and developed with the goal of helping humanity adopt and use these systems in ethical and responsible ways.
  • Artificial Intelligence as a Service (AIaaS) - Artificial Intelligence as a Service (AIaaS) is the third-party offering of artificial intelligence (AI) outsourcing.
  • artificial intelligence of things (AIoT) - Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
  • artificial neuron - An artificial neuron is a connection point in an artificial neural network.
  • artificial superintelligence (ASI) - Artificial superintelligence (ASI) is a software-based system with intellectual powers beyond those of humans across a comprehensive range of categories and fields of endeavor.
  • AS/400 (IBM iSeries, AS/400e, eServer iSeries/400, Power Systems) - The IBM Application System/400 -- or AS/400 -- is a family of midrange computers that was released in 1988, succeeding both System/36 and System/38 platforms.
  • ASAP, ALAP and ATAP - ASAP, ATAP and ALAP are acronyms that stand for, respectively, as soon as possible, as timely as possible and as late as possible.
  • ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
  • ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) - ASHRAE was formed in 1959 by the merger of the American Society of Heating and Air-Conditioning Engineers (ASHAE), founded in 1894, and the American Society of Refrigerating Engineers (ASRE), founded in 1904.
  • Asilomar AI Principles - Asilomar AI Principles are 23 guidelines for the research and development of artificial intelligence (AI).
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • aspect-oriented programming (AOP) - Aspect-oriented programming (AOP) is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
  • assembler - An assembler is a computer program that takes in basic instructions and converts them into a pattern of bits that the computer's processor can use to perform basic operations.
  • asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
  • asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
  • assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close