Browse Definitions by Alphabet
APP - AWS
- application portfolio management (APM) - Application portfolio management (APM) is a framework for managing enterprise IT software applications and software-based services.
- application programming interface (API) - An application programming interface (API) is code that enables two software programs to communicate.
- application rationalization (AR) - Application rationalization is the process of identifying which business applications should be kept, replaced, retired or consolidated across an organization to improve business operations.
- application release automation (ARA) - Application release automation (ARA) is a process that packages and deploys an application, or application updates, through the stages of development to production automatically.
- application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.
- application security - Application security, or appsec, is the practice of using security software, hardware, techniques, best practices and procedures to protect computer applications from external security threats.
- application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
- application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
- application support engineer (ASE) - An application support engineer (ASE) is an IT professional who provides technical support for the range of software their employer uses.
- application whitelisting - Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.
- application-aware storage - Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.
- Appreciative inquiry (AI) - Appreciative Inquiry (AI) is a change management approach that focuses on identifying what is working well, analyzing why it is working well and then doing more of it.
- AppX file - AppX is the application distribution file format that was introduced with Microsoft Windows 8.
- archive - An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for moving off primary storage media.
- areal density - Areal density measures the amount of data that can be stored on a given amount of physical space on a disk drive.
- AribaPay - AribaPay is a system for electronic payments for goods and services on the SAP Ariba Network, a global business trading community.
- arithmetic-logic unit (ALU) - An arithmetic-logic unit (ALU) is the part of a central processing unit (CPU) that carries out arithmetic and logic operations on the operands in computer instruction words.
- Arm processor - An Arm processor is one of a family of CPUs based on the RISC architecture for computer processors.
- Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
- ARPANET - The U.S.
- artifact (software development) - An artifact is a byproduct of software development that helps describe the architecture, design and function of software.
- artificial general intelligence (AGI) - Artificial general intelligence (AGI) is the representation of generalized human cognitive abilities in software so that, faced with an unfamiliar task, the AI system could find a solution.
- Artificial Intelligence as a Service (AIaaS) - Artificial Intelligence as a Service (AIaaS) is the third-party offering of artificial intelligence (AI) outsourcing.
- artificial intelligence of things (AIoT) - The artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
- artificial neuron - An artificial neuron is a connection point in an artificial neural network.
- artificial superintelligence (ASI) - Artificial superintelligence (ASI) is a software-based system with intellectual powers beyond those of humans across a comprehensive range of categories and fields of endeavor.
- AS/400 (IBM iSeries, AS/400e, eServer iSeries/400, Power Systems) - The IBM Application System/400 -- or AS/400 -- is a family of midrange computers that was released in 1988, succeeding both System/36 and System/38 platforms.
- ASAP, ALAP and ATAP - ASAP, ATAP and ALAP are acronyms that stand for, respectively, as soon as possible, as timely as possible and as late as possible.
- ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
- ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) - ASHRAE was formed in 1959 by the merger of the American Society of Heating and Air-Conditioning Engineers (ASHAE), founded in 1894, and the American Society of Refrigerating Engineers (ASRE), founded in 1904.
- Asilomar AI Principles - Asilomar AI Principles are 23 guidelines for the research and development of artificial intelligence (AI).
- ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
- aspect-oriented programming (AOP) - Aspect-oriented programming (AOP) is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
- assembler - An assembler is a program that takes basic computer instructions and converts them into a pattern of bits that the computer's processor can use to perform its basic operations.
- asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
- asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
- assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
- association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
- astronomical unit (AU) - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
- asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
- asymmetric cryptography (public key cryptography) - Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
- asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
- Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.
- asynchronous replication - Asynchronous replication is an approach to data backup in which data is written to primary storage and then replicated to a replication target.
- at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
- athenahealth Inc. - athenahealth Inc.
- ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
- atom - An atom is a particle of matter that uniquely defines a chemical element.
- atomic data - In a data warehouse, atomic data is the lowest level of detail.
- atomic mass unit (AMU or amu) - The atomic mass unit (AMU or amu) of an element is a measure of its atomic mass.
- attack surface - An attack surface is defined as the total number of all possible entry points for unauthorized access into any system.
- attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
- attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
- attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
- attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
- attribute - In general, an attribute is a property, quality, or characteristic that something or someone has.
- ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
- audio - Audio is sound that is within the acoustic range of human hearing.
- audit log (AL) - An audit log is a document that records an event in an information (IT) technology system.
- audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
- augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
- augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
- augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
- augmented reality gaming (AR gaming) - Augmented reality gaming (AR gaming) is the real-time integration of virtual game elements with the physical environment of the player.
- Aura framework - Aura is a user interface framework for developing dynamic Web apps for mobile and desktop devices.
- Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
- authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
- authenticated security scan - An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user.
- authentication - Authentication is the process of determining whether someone or something is, in fact, who or what it says it is.
- authentication factor - An authentication factor is a category of credential used for identity verification.
- authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
- authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
- authoritarian leadership - Authoritarian leadership is a management style in which an individual has total control over making decisions for a group or organization, with little or no input from his or her subordinates.
- auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
- autocorrect - Autocorrect is a word processing feature that identifies misspelled words, and uses algorithms to identify the words most likely to have been intended, and edits the text accordingly.
- autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
- Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the Automated Clearing House financial transaction network.
- automated machine learning (AutoML) - Automated machine learning (AutoML) is the process of applying machine learning (ML) models to real-world problems using automation.
- automated reasoning - Automated reasoning is the area of computer science that is concerned with applying reasoning in the form of logic to computing systems.
- automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
- Automatic Data Processing Inc. (ADP) - Automatic Data Processing Inc.
- Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
- Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
- automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
- automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
- autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
- autoplay video - Autoplay video is audiovisual content that starts automatically when someone goes to the host web page.
- AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
- autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
- AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment systems and related product descriptions and reviews.
- availability bias - In psychology, the availability bias is the human tendency to rely on information that comes readily to mind when evaluating situations or making decisions.
- availability zones - Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
- Avaya - Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).
- AWS ADS (AWS Application Discovery Service) - AWS Application Discovery Service (AWS ADS) is a tool that helps an enterprise plan application migrations to the Amazon Web Services public cloud.
- AWS Artifact - AWS Artifact is a portal that provides an enterprise with access to security and compliance reports that apply to the Amazon Web Services (AWS) public cloud.
- AWS Auto Scaling - AWS Auto Scaling is a service that automatically monitors and adjusts compute resources to maintain performance for applications hosted in the Amazon Web Services (AWS) public cloud.
- AWS Batch - AWS Batch is a service that enables IT professionals to schedule and execute batch processing jobs in the Amazon Web Services public cloud.
- AWS certification - AWS certification is a level of Amazon Web Services cloud expertise that an IT professional obtains after passing one or more exams the public cloud provider offers.
- AWS Certified Solutions Architect - Associate - AWS Certified Solutions Architect - Associate is a category of technical certifications offered by Amazon Web Services (AWS) for beginners and professionals who run enterprise architecture programs, as well as solutions architects.
- AWS Certified Solutions Architect - Professional - AWS Certified Solutions Architect - Professional certification is a category of technical certifications offered by Amazon Web Services (AWS) for professionals who design applications and systems using the AWS platform and who have professional experience deploying AWS cloud architecture.