Browse Definitions :

Algorithms

Terms related to procedures or formulas for solving a problem by conducting a sequence of specified actions. In computing, algorithms in the form of mathematical instructions play an important part in search, artificial intelligence (AI) and machine learning.
  • pascal - The pascal (Pa) is the unit of pressure or stress in the International System of Units (SI).
  • perceptron - A perceptron is a simple model of a biological neuron in an artificial neural network.
  • point-to-point graph (line graph) - A point-to-point graph, also called a line graph, is a pictorial rendition of data in which specific values of a function are plotted as dots on a coordinate plane.
  • prediction error - A prediction error is the failure of some expected event to occur.
  • prime number - A prime number is a whole number greater than 1 whose only factors are 1 and itself.
  • pseudo-random number generator (PRNG) - A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed.
  • Q format - Q (number) format is a fixed-point method of coding fractional and whole integers for processing by a computer’s CPU or a digital signal processor (DSP).
  • random numbers - As the term suggests, a random number is a number chosen by chance -- i.
  • recurrent neural networks - A recurrent neural network (RNN) is a type of artificial neural network commonly used in speech recognition and natural language processing.
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
  • RSA algorithm (Rivest-Shamir-Adleman) - The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network, such as the internet.
  • second (s or sec) - The second (s or sec) is the International System of Units (SI) unit of time measurement.
  • self-service business intelligence (self-service BI) - Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and explore data sets even if they don't have a background in BI or related functions such as data mining and statistical analysis.
  • space - Space is a term that can refer to various phenomena in science, mathematics and computing and generally encompasses the concept of an area or region.
  • specific gravity - Specific gravity, more formally known as relative density, is a measure of the density of a substance in comparison to the density of water.
  • square meter (meter squared) - The square meter, also called the meter squared, is the International System of Units (SI) unit of area.
  • standing wave ratio (SWR) - Standing wave ratio (SWR) is the ratio of the maximum magnitude or amplitude of a standing wave to its minimum magnitude.
  • statistical analysis - Statistical analysis is the collection and interpretation of data in order to uncover patterns and trends.
  • STEM (science, technology, engineering, and mathematics) - STEM is an educational approach that prepares primary and secondary students for college, graduate study and careers in the fields of science, technology, engineering and mathematics (STEM).
  • support vector machine (SVM) - A support vector machine (SVM) is a type of supervised learning algorithm used in machine learning to solve classification and regression tasks.
  • Top searches of 2008 - What were people searching the WhatIs.
  • traveling salesman problem (TSP) - The traveling salesman problem (TSP) is an algorithmic problem tasked with finding the shortest route between a set of points and locations that must be visited.
  • truncation error - A truncation error is the difference between an actual and a truncated, or cut-off, value.
  • truth table - A truth table is a breakdown of all the possible truth values returned by a logical expression.
  • Twofish - Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.
  • unique identifier (UID) - A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  • unsupervised learning - Unsupervised learning is a type of machine learning (ML) technique that uses artificial intelligence (AI) algorithms to identify patterns in data sets that are neither classified nor labeled.
  • vertical bar - The vertical bar ( | ) is a symbol used in mathematics, computing and other areas to represent a specific type of logic or operation, depending on its context.
  • What is artificial intelligence (AI)? Everything you need to know - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • What is machine learning and how does it work? In-depth guide - Machine learning (ML) is a type of artificial intelligence (AI) focused on building computer systems that learn from data.
  • x and y coordinates - X and y coordinates are, respectively, the horizontal and vertical addresses of a point in any two-dimensional (2D) space, such as a sheet of paper or a computer display screen.
  • Zipf's Law - Zipf’s Law is a statistical distribution in certain data sets, such as words in a linguistic corpus, in which the frequencies of certain words are inversely proportional to their ranks.
Networking
  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

  • What is SD-WAN (software-defined WAN)? Ultimate guide

    Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and onboarding qualified job candidates.

  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close