Browse Definitions:

Browse Definitions by Topic

Application Development

Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

Back to Top

Business Software

Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

Back to Top

Computer Science

Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

Back to Top

Consumer Technology

Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

Back to Top

Data Center Management

Definitions used in data center management, including hardware, virtualization and cloud computing.

Back to Top

IT Management

Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

Back to Top


Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

Back to Top


This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

Back to Top

Storage and Data Mgmt

Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.