Browse Definitions :

Browse Definitions by Alphabet

  • asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
  • asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
  • assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
  • association rules - Association rules are 'if-then' statements, that help to show the probability of relationships between data items, within large data sets in various types of databases.
  • astronomical unit (AU) - An astronomical unit (AU) is the mean distance between the center of the Earth and the center of the sun.
  • asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
  • asymmetric cryptography - Asymmetric cryptography, also known as public key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
  • asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
  • Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects or events that are not coordinated in time.
  • asynchronous replication - Asynchronous replication is a store-and-forward approach to data backup and protection.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
  • athenahealth Inc. - athenahealth Inc.
  • ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
  • atom - An atom is a particle of matter that uniquely defines a chemical element.
  • atomic data - In a data warehouse, atomic data is the lowest level of detail.
  • atomic mass unit (AMU or amu) - The atomic mass unit (AMU or amu) of an element is a measure of its atomic mass.
  • attack surface - An attack surface is the total number of all possible entry points for unauthorized access into any system.
  • attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
  • attention economy - The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus.
  • attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
  • attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
  • attribute - In general, an attribute is a property, quality, or characteristic that something or someone has.
  • ATV (advanced television) - ATV (Advanced Television) is the name given by the U.
  • audio - Audio is sound that is within the acoustic range of human hearing.
  • audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
  • augmented analytics - Augmented analytics is the use of machine learning (ML) and natural language processing (NLP) to enhance data analytics, data sharing and business intelligence.
  • augmented intelligence - Augmented intelligence is the use of technology to enhance a human's ability to execute tasks, perform analysis and make decisions.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
  • augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
  • augmented reality gaming (AR gaming) - Augmented reality gaming (AR gaming) is the real-time integration of virtual game elements with the physical environment of the player.
  • Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
  • authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
  • authentication - Authentication is the process of determining whether someone or something is who or what they say they are.
  • authentication factor - An authentication factor is a category of credential that is intended to verify, sometimes in combination with other factors, that an entity involved in some kind of communication or requesting access to some system is who, or what, they are declared to be.
  • authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
  • authentication, authorization and accounting (AAA) - Authentication, authorization and accounting (AAA) is a security framework for controlling and tracking user access within a computer network.
  • authoritarian leadership - Authoritarian leadership, also known as autocratic leadership, is a management style where an individual possesses total decision-making power and retains as much authority as possible, often requiring followers to strictly adhere to their directives without much freedom or participation.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • Auto-GPT - Auto-GPT is an experimental, open source autonomous AI agent based on the GPT-4 language model.
  • autocorrect - Autocorrect is a word processing feature that identifies misspelled words, and uses algorithms to identify the words most likely to have been intended, and edits the text accordingly.
  • autofill - Autofill, also called autocomplete, is a software feature that automatically inserts previously entered personal information into web form fields for the user's convenience.
  • Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the U.
  • automated machine learning (AutoML) - Automated machine learning (AutoML) is the process of applying machine learning (ML) models to real-world problems using automation.
  • automated reasoning - Automated reasoning is the area of computer science concerned with applying reasoning in the form of logic to computing systems.
  • automated testing - Automated testing is a software testing technique that automates the process of validating the functionality of software and ensures it meets requirements before being released into production.
  • Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • autonomous artificial intelligence (autonomous AI) - Autonomous artificial intelligence (AI) is a branch of AI in which systems and tools are advanced enough to act with limited human oversight and involvement.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • AutoRABIT - AutoRABIT is an end-to-end release management suite specifically aimed at streamlining the development and release of Salesforce.
  • autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
  • AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment systems and related product descriptions and reviews.
  • availability bias - In psychology, the availability bias is the human tendency to rely on information that comes readily to mind when evaluating situations or making decisions.
  • availability zones - Availability zones (AZs) are isolated locations within data center regions from which public cloud services originate and operate.
  • Avaya - Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).
  • AWS ADS (AWS Application Discovery Service) - AWS Application Discovery Service (AWS ADS) is a tool that helps an enterprise plan application migrations to the Amazon Web Services public cloud.
  • AWS Artifact - AWS Artifact is a portal that provides an enterprise with access to security and compliance reports that apply to the Amazon Web Services (AWS) public cloud.
  • AWS Auto Scaling - AWS Auto Scaling is a service that automatically monitors and adjusts compute resources to maintain performance for applications hosted in the Amazon Web Services (AWS) public cloud.
  • AWS certification - AWS certification is a level of Amazon Web Services cloud expertise that an IT professional obtains after passing one or more exams the public cloud provider offers.
  • AWS Certified Solutions Architect - Associate - AWS Certified Solutions Architect - Associate is a category of technical certifications offered by Amazon Web Services (AWS) for beginners and professionals who run enterprise architecture programs, as well as solutions architects.
  • AWS Certified Solutions Architect - Professional - AWS Certified Solutions Architect - Professional certification is a category of technical certifications offered by Amazon Web Services (AWS) for professionals who design applications and systems using the AWS platform and who have professional experience deploying AWS cloud architecture.
  • AWS CloudFormation (Amazon Web Services CloudFormation) - AWS CloudFormation is a free service that provides Amazon Web Services customers with the tools they need to create and manage the infrastructure a particular software application requires to run on AWS.
  • AWS CloudTrail - AWS CloudTrail is an application program interface (API) call-recording and log-monitoring service offered by Amazon Web Services (AWS).
  • AWS CodeStar - AWS CodeStar is a planning and management service designed for a team of developers working on a project in the Amazon Web Services (AWS) public cloud.
  • AWS Cost Management - AWS Cost Management is a collection of tools that provide insight into Amazon Web Services (AWS) public cloud cost and usage.
  • AWS Educate (Amazon Web Services Educate) - AWS Educate is a free, online learning program that teaches students about cloud computing.
  • AWS Fargate - AWS Fargate is a service that enables a user to run containers on Amazon's cloud computing platform without the need to manage the underlying infrastructure.
  • AWS Firewall Manager - AWS Firewall Manager is a tool from Amazon Web Services that an organization can use to configure policies for the cloud vendor's native web application firewall (WAF) service.
  • AWS Glue - AWS Glue is a cloud service that prepares data for analysis through automated extract, transform, load (ETL) processes.
  • AWS Instance Scheduler - AWS Instance Scheduler is a tool from Amazon Web Services that automates when and where a user's virtual machine instances are deployed on the public cloud.
  • AWS Key Management Service (AWS KMS) - AWS Key Management Service (KMS) is a managed service provided by Amazon Web Services (AWS) that allows companies to create, control and manage the cryptographic keys that encrypt and protect their data.
  • AWS Lambda (Amazon Web Services Lambda) - AWS Lambda is an event-driven computing service that allows developers to program serverless functions on a pay-per-use basis.
  • AWS Landing Zone - AWS Landing Zone is software provided by Amazon to help AWS customers set up a secure, multi-account AWS environment.
  • AWS Managed Services - AWS Managed Services is a set of services and tools that automate infrastructure management tasks for Amazon Web Services (AWS) deployments.
  • AWS Management Console - The AWS Management Console is a web-based application that lets users access the broad range of services included in the Amazon Web Services (AWS) platform.
  • AWS Migration Hub - AWS Migration Hub is a service that monitors the progress of application migrations to the Amazon Web Services (AWS) public cloud.
  • AWS Network Load Balancer (NLB) - AWS Network Load Balancer (NLB) is an Amazon Web Services tool that distributes high-performance traffic across multiple cloud instances and provides automatic scaling of resources to ensure low latency and high throughput for applications.
  • AWS On-Demand Instances (Amazon Web Services On-Demand Instances) - AWS On-Demand Instances (Amazon Web Services On-Demand Instances) are virtual servers that run in AWS Elastic Compute Cloud (EC2) or AWS Relational Database Service (RDS) and are purchased at a fixed rate per hour.
  • AWS Outposts - AWS Outposts is an on-premises IT as a service (ITaaS) platform provided by Amazon Web Services (AWS).
  • AWS Partner Network (APN) - The Amazon Web Services (AWS) Partner Network (APN) is a classification endorsed by AWS for a global community of cloud service providers and vendors once they qualify for certain benchmarks.
  • AWS PrivateLink - AWS PrivateLink is a networking feature provided by Amazon Web Services (AWS) that eases and secures connectivity between Amazon Virtual Private Clouds (VPCs), other Amazon cloud services and on-premises applications.
  • AWS Reserved Instances (Amazon Reserved Instances) - AWS Reserved Instances are virtual servers spun up in Amazon Web Services, allowing cloud administrators to purchase computing power at contract pricing.
  • AWS Secrets Manager - AWS Secrets Manager is a security service to centrally manage sensitive information and eliminate the need to hard-code that information into an application.
  • AWS Serverless Application Model (AWS SAM) - AWS Serverless Application Model (AWS SAM) is a framework a developer can use to create and deploy serverless applications that run on Amazon's cloud.
  • AWS Single Sign-On (AWS SSO) - AWS Single Sign-On (AWS SSO) is a service from Amazon Web Services that enables IT to manage user access to multiple applications and AWS accounts from a single, centralized console.
  • AWS Snowball Edge - AWS Snowball Edge is a physical appliance intended to help an enterprise migrate large volumes of data into and off of the AWS public cloud.
  • AWS Step Functions - AWS Step Functions is a cloud service from Amazon Web Services that enables a developer to manage and visualize the components of distributed, multi-component applications.
  • Azure Container Instances (ACI) - Azure Container Instances (ACI) is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
  • Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
  • Azure DevOps - Azure DevOps -- rebranded from Visual Studio Team Services (VSTS) in 2018 -- is a software-as-a service (SaaS) platform from Microsoft designed to provide a comprehensive toolchain for developing and deploying software projects.
  • Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
  • Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.
  • Azure Quantum - Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.
  • Azure Reserved Virtual Machine Instances - Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.
  • Azure SQL Data Warehouse - Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare) - The Patient Protection and Affordable Care Act (more commonly referred to as the Affordable Care Act, ACA or Obamacare) is a healthcare law passed by Congress in 2010 during the administration of President Barack Obama.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close