Browse Definitions :

Browse Definitions by Alphabet

ART - AWS

  • artificial general intelligence (AGI) - Artificial general intelligence (AGI) is the representation of generalized human cognitive abilities in software so that, faced with an unfamiliar task, the AI system could find a solution.
  • artificial intelligence (AI) - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • artificial intelligence (AI) governance - Artificial intelligence governance is the legal framework for ensuring AI and machine learning technologies are researched and developed with the goal of helping humanity navigate the adoption and use of these systems in ethical and responsible ways.
  • Artificial Intelligence as a Service (AIaaS) - Artificial Intelligence as a Service (AIaaS) is the third-party offering of artificial intelligence (AI) outsourcing.
  • artificial intelligence of things (AIoT) - Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
  • artificial neuron - An artificial neuron is a connection point in an artificial neural network.
  • artificial superintelligence (ASI) - Artificial superintelligence (ASI) is a software-based system with intellectual powers beyond those of humans across a comprehensive range of categories and fields of endeavor.
  • AS/400 (IBM iSeries, AS/400e, eServer iSeries/400, Power Systems) - The IBM Application System/400 -- or AS/400 -- is a family of midrange computers that was released in 1988, succeeding both System/36 and System/38 platforms.
  • ASAP, ALAP and ATAP - ASAP, ATAP and ALAP are acronyms that stand for, respectively, as soon as possible, as timely as possible and as late as possible.
  • ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
  • ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) - ASHRAE was formed in 1959 by the merger of the American Society of Heating and Air-Conditioning Engineers (ASHAE), founded in 1894, and the American Society of Refrigerating Engineers (ASRE), founded in 1904.
  • Asilomar AI Principles - Asilomar AI Principles are 23 guidelines for the research and development of artificial intelligence (AI).
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • aspect-oriented programming (AOP) - Aspect-oriented programming (AOP) is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
  • assembler - An assembler is a computer program that takes in basic instructions and converts them into a pattern of bits that the computer's processor can use to perform basic operations.
  • asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
  • asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
  • assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • astronomical unit (AU) - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric cryptography (public key cryptography) - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
  • Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.
  • asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
  • athenahealth Inc. - athenahealth Inc.
  • ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
  • atom - An atom is a particle of matter that uniquely defines a chemical element.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic mass unit (AMU or amu) - The atomic mass unit (AMU or amu) of an element is a measure of its atomic mass.
  • attack surface - An attack surface is defined as the total number of all possible entry points for unauthorized access into any system.
  • attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attribute - In general, an attribute is a property, quality, or characteristic that something or someone has.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • audio - Audio is sound that is within the acoustic range of human hearing.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Augmented reality gaming (AR gaming) is the real-time integration of virtual game elements with the physical environment of the player.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
  • authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.
  • authentication factor - An authentication factor is a category of credential that is intended to verify, sometimes in combination with other factors, that an entity involved in some kind of communication or requesting access to some system is who, or what, they are declared to be.
  • authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • Auto-GPT - Auto-GPT is an experimental, open source autonomous AI agent based on the GPT-4 language model.
  • autocorrect - Autocorrect is a word processing feature that identifies misspelled words, and uses algorithms to identify the words most likely to have been intended, and edits the text accordingly.
  • autofill - Autofill, also called autocomplete, is a software feature that automatically inserts previously entered personal information into web form fields for the user's convenience.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
  • automated machine learning (AutoML) - Automated machine learning (AutoML) is the process of applying machine learning (ML) models to real-world problems using automation.
  • automated reasoning - Automated reasoning is the area of computer science concerned with applying reasoning in the form of logic to computing systems.
  • automated testing - Automated testing is a software testing technique that automates the process of validating the functionality of software and ensures it meets requirements before being released into production.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
  • AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
  • autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
  • AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment systems and related product descriptions and reviews.
  • availability bias - In psychology, the availability bias is the human tendency to rely on information that comes readily to mind when evaluating situations or making decisions.
  • availability zones - Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
  • Avaya - Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).
  • AWS ADS (AWS Application Discovery Service) - AWS Application Discovery Service (AWS ADS) is a tool that helps an enterprise plan application migrations to the Amazon Web Services public cloud.
  • AWS Artifact - AWS Artifact is a portal that provides an enterprise with access to security and compliance reports that apply to the Amazon Web Services (AWS) public cloud.
  • AWS Auto Scaling - AWS Auto Scaling is a service that automatically monitors and adjusts compute resources to maintain performance for applications hosted in the Amazon Web Services (AWS) public cloud.
  • AWS Batch - AWS Batch is a service that enables IT professionals to schedule and execute batch processing jobs in the Amazon Web Services public cloud.
  • AWS certification - AWS certification is a level of Amazon Web Services cloud expertise that an IT professional obtains after passing one or more exams the public cloud provider offers.
  • AWS Certified Solutions Architect - Associate - AWS Certified Solutions Architect - Associate is a category of technical certifications offered by Amazon Web Services (AWS) for beginners and professionals who run enterprise architecture programs, as well as solutions architects.
  • AWS Certified Solutions Architect - Professional - AWS Certified Solutions Architect - Professional certification is a category of technical certifications offered by Amazon Web Services (AWS) for professionals who design applications and systems using the AWS platform and who have professional experience deploying AWS cloud architecture.
  • AWS CloudFormation (Amazon Web Services CloudFormation) - Amazon Web Services CloudFormation is a free service that provides developers with a simple way to create and manage an assortment of Amazon Web Service resources while keeping them organized.
  • AWS CloudTrail - AWS CloudTrail is an application program interface (API) call-recording and log-monitoring service offered by Amazon Web Services (AWS).
  • AWS CodeBuild - AWS CodeBuild is a managed cloud service that enables an IT developer to automate and manage server builds for applications that reside in the Amazon Web Services (AWS) public cloud.
  • AWS CodeCommit (Amazon Web Services CodeCommit) - AWS CodeCommit is a source code storage and version-control service for Amazon Web Services' public cloud customers.
  • AWS CodePipeline (Amazon Web Services CodePipeline) - AWS CodePipeline is an Amazon Web Services product that automates the software deployment process, allowing a developer to quickly model, visualize and deliver code for new features and updates.
  • AWS CodeStar - AWS CodeStar is a planning and management service designed for a team of developers working on a project in the Amazon Web Services (AWS) public cloud.
  • AWS Command Line Interface - The AWS Command Line Interface (AWS CLI) is an Amazon Web Services tool that enables developers to control Amazon public cloud services by typing commands on a specified line.
  • AWS Config (Amazon Web Services Config) - AWS Config is an Amazon cloud auditing tool that provides an inventory of existing resources, allowing an administrator to accurately track AWS assets to analyze compliance levels and security.
  • AWS Cost Explorer - AWS Cost Explorer is a tool provided by Amazon Web Services (AWS) that allows users to visualize their AWS usage and bills by service.
  • AWS Cost Management - AWS Cost Management is a collection of tools that provide insight into Amazon Web Services (AWS) public cloud cost and usage.
  • AWS Data Pipeline (Amazon Data Pipeline) - AWS Data Pipeline is an Amazon Web Services (AWS) tool that enables an IT professional to process and move data between compute and storage services on the AWS public cloud and on-premises resources.
  • AWS Educate (Amazon Web Services Educate) - AWS Educate is a free, online learning program that teaches students about cloud computing.
  • AWS Fargate - AWS Fargate is a service that enables a user to run containers on Amazon's cloud computing platform without the need to manage the underlying infrastructure.
  • AWS Firewall Manager - AWS Firewall Manager is a tool from Amazon Web Services that an organization can use to configure policies for the cloud vendor's native web application firewall (WAF) service.
  • AWS Glue - AWS Glue is a cloud service that prepares data for analysis through automated extract, transform, load (ETL) processes.
  • AWS GovCloud (Amazon Web Services GovCloud) - AWS GovCloud is an isolated data center region of the Amazon Web Services (AWS) cloud designed to meet strict compliance requirements as defined by the U.
  • AWS Greengrass - AWS Greengrass is a service that extends Amazon Web Services functionality to internet of things (IoT) devices, allowing a business to perform data collection and analysis closer to its origin.
  • AWS Import/Export - AWS Import/Export is a program that enables an IT team to move large amounts of data into and out of the Amazon Web Services public cloud with portable storage devices.
  • AWS Instance Scheduler - AWS Instance Scheduler is a tool from Amazon Web Services that automates when and where a user's virtual machine instances are deployed on the public cloud.
  • AWS IoT (Amazon Web Services internet of things) - AWS IoT is an Amazon Web Services platform that collects and analyzes data from internet-connected devices and sensors -- called the internet of things -- and connects that data to AWS cloud applications.
  • AWS Key Management Service (AWS KMS) - AWS Key Management Service (KMS) is a managed service provided by Amazon Web Services (AWS) that allows companies to create, control and manage the cryptographic keys that encrypt and protect their data.
Networking
  • remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT ...

  • port address translation (PAT)

    Port address translation (PAT) is a type of network address translation (NAT) that maps a network's private internal IPv4 ...

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

Security
  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • governance, risk and compliance (GRC)

    Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following...

  • total risk

    Total risk is an assessment that identifies all the risk factors associated with pursuing a specific course of action.

CIO
  • enterprise IT (enterprise-class IT)

    Enterprise-class IT (also known as enterprise-grade, or enterprise IT) is hardware, software and other IT services designed to ...

  • microtargeting

    Microtargeting (also called micro-niche targeting) is a marketing strategy that uses consumer data and demographics to identify ...

  • business process

    A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should ...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • skill-based learning

    Skill-based learning develops students through hands-on practice and real-world application.

  • gamification

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

Customer Experience
  • Microsoft Dynamics 365

    Dynamics 365 is a cloud-based portfolio of business applications from Microsoft that are designed to help organizations improve ...

  • Salesforce Commerce Cloud

    Salesforce Commerce Cloud is a cloud-based suite of products that enable e-commerce businesses to set up e-commerce sites, drive ...

  • Salesforce DX

    Salesforce DX, or SFDX, is a set of software development tools that lets developers build, test and ship many kinds of ...

Close