Browse Definitions :

Browse Definitions by Alphabet

  • K-12 - K-12, a term used in education and educational technology in the United States, Canada and some other countries, is a short form for the publicly supported school grades prior to college.
  • Kaizen (continuous improvement) - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.
  • kanban - Kanban is a visual system used to manage and keep track of work as it moves through a process.
  • Karnaugh map (K-map) - A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex theorems or equation manipulations.
  • Kbps (kilobits per second) - In the U.S.
  • Kebab case - Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.
  • kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • Kerberos - Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet.
  • kernel - The kernel is the essential foundation of a computer's operating system (OS).
  • kernel panic - A kernel panic refers to a computer error from which the system's operating system (OS) cannot quickly or easily recover.
  • Kessler Syndrome - The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.
  • key fob - A key fob is a small, programmable device that provides access to a physical object.
  • key performance indicators (KPIs) - Key performance indicators (KPIs) are quantifiable business metrics that corporate executives and other managers use to track and analyze factors deemed crucial to the success of an organization.
  • key results indicator (KRI) - A key result indicator (KRI) is a metric that measures the quantitative results of business actions to help companies track progress and reach organizational goals.
  • key risk indicator (KRI) - A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be successful.
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • keyboard wedge (KBW) - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
  • keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone.
  • keystone jack - A keystone jack is a female connector used in audio, video and data communications.
  • kibi, mebi, gibi, tebi, pebi and exbi - Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC).
  • kill switch - A kill switch in an IT context is a mechanism used to shut down or disable a device or program.
  • Kilo, mega, giga, tera, peta, exa, zetta and all that - Kilo, mega, giga, tera, peta, exa and zetta are among the binary prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.
  • kilobyte (KB or Kbyte) - A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage.
  • kilogram-meter per second - The kilogram-meter per second is the standard unit of momentum.
  • kinematics - Kinematics is the study of the motion of mechanical points, bodies and systems without consideration of their associated physical properties and the forces acting on them.
  • kinetic energy - Kinetic energy is the energy of motion, observable as the movement of an object or subatomic particle.
  • kiosk mode (Windows assigned access) - Kiosk mode is a feature in Windows operating system (OS) that allows a device to run only specified applications and settings.
  • KLOC (thousands of lines of code) - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • Klout score - A Klout score is a measure of a social influence that aggregates one's reach on various social media platforms.
  • Knative - Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the cloud, on premises or in a third-party data center.
  • knowledge base - In general, a knowledge base is a centralized repository of information.
  • knowledge engineering - Knowledge engineering is a field of artificial intelligence (AI) that tries to emulate the judgment and behavior of a human expert in a given field.
  • knowledge graph in ML - In the realm of machine learning (ML), a knowledge graph is a graphical representation that captures the connections between different entities.
  • knowledge management (KM) - Knowledge management is the process an enterprise uses to gather, organize, share and analyze its knowledge in a way that's easily accessible to employees.
  • knowledge-based authentication - Knowledge-based authentication (KBA) is an authentication method in which users are asked to answer at least one secret question.
  • knowledge-based systems (KBSes) - Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to provide a method for problem-solving.
  • Kong - Kong is an open source API gateway and platform that acts as middleware between compute clients and the API-centric applications.
  • Korn shell (ksh) - The Korn shell (ksh) is an operating system (OS) command shell that was developed for Unix by David Korn at Bell Labs.
  • Kotlin - Kotlin is a statically typed, object-oriented programing language that is interoperable with the Java virtual machine, Java Class Libraries and Android.
  • Kubernetes - Kubernetes, also referred to as K8s for the number of letters between K and S, is an open source platform used to manage containerized applications across private, public and hybrid cloud environments.
  • Kubernetes node - A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.
  • Kubernetes operator - A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.
  • Kubernetes pod - Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.
  • Kubernetes scheduler - The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.
  • Kubernetes volume - A Kubernetes volume is a directory containing data accessible to containers in a given pod, the smallest deployable unit in a Kubernetes cluster.
  • Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model) - Unfreeze, Change, Refreeze or Kurt Lewin's Change Management Model is a model to understand and manage organizational change.
Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close