Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- MCSA (Microsoft Certified Solutions Associate)
MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an information technology ...
- BIOS (basic input/output system)
BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Amazon Web Services (AWS)
- Google - Android
- Microsoft - Windows
- Open Source
- Oracle
- Salesforce
- SAP
- VMware
- Writing for Business
Recently Published Definitions
- Amazon Transcribe Medical
Amazon Transcribe Medical is an automatic speech recognition (ASR) service that converts physician dictated notes, consultations between physicians ...
- Google Pay (Android Pay)
Google Pay is the search company’s electronic wallet and payment service offering.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

- Algorithms
- Artificial intelligence - machine learning
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quick Start Glossaries
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- Fourth Industrial Revolution
The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things...
- prime number
A prime number is a whole number greater than 1 whose only factors are 1 and itself. A factor is a whole numbers that can be divided evenly into ...
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

- Desktops and laptops
- End user hardware
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- IMEI (International Mobile Equipment Identity)
IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone. This number is used by service providers to...
- social media
Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and...
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations mgmt & monitoring
- Storage hardware
- Virtualization
Recently Published Definitions
- site reliability engineer
Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are ...
- real-time monitoring
Real-time (data) monitoring is the delivery of continuously updated information streaming at zero or low latency.
IT Management
Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

- Business software
- Career paths and IT certifications
- Compliance, risk and governance
- Customer experience management
- Enterprise resource planning (ERP)
- Government IT
- Healthcare IT
- Human resource management
- IT service management & procurement
- Network management
- Project management
- Security management
- SEO
- Software asset management
- Storage management
Recently Published Definitions
- positioning statement
A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’...
- acronym
An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LAN, campus LAN)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- IPv4 address class
An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
- RFC 1918
Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Anti-virus, antimalware
- Application security
- Authentication, access control
- Malware
- Network security
- Threat management
Recently Published Definitions
- dropper
A dropper is a small helper program that facilitates the delivery and installation of malware. Sometimes droppers are bundled with free utility ...
- Presidential Policy Directive 21 (PPD-21)
Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and ...
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

- Business intelligence - business analytics
- Customer data management
- Data and data management
- Data backup - disaster recovery
- Data deduplication
- Database management
- Enterprise content management
- Network-attached storage (NAS)
- Solid state (flash) storage
- Storage-area network (SAN)
Recently Published Definitions
- 3Vs
The 3Vs (volume, variety and velocity) are three defining properties or dimensions of big data.
- correlation coefficient
A correlation coefficient is a statistical measure of the degree to which changes to the value of one variable predict change to the value of another.
Word of the Day
SearchCompliance
-
enterprise document management (EDM)
Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...
-
risk assessment
Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.
SearchSecurity
-
cyber attack
A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...
-
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
SearchHealthIT
-
protected health information (PHI) or personal health information
Protected health information (PHI), also referred to as personal health information, generally refers to demographic information,...
-
HIPAA (Health Insurance Portability and Accountability Act)
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security ...
SearchDisasterRecovery
-
risk mitigation
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
-
call tree
A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...
SearchStorage
-
cloud SLA (cloud service-level agreement)
A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...
-
NOR flash memory
NOR flash memory is one of two types of non-volatile storage technologies.