Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Career Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- MCSA (Microsoft Certified Solutions Associate)
MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an information technology ...
- BIOS (basic input/output system)
BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered on.
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Amazon Web Services (AWS)
- Google - Android
- Microsoft - Windows
- Open Source
- Oracle
- Salesforce
- SAP
- VMware
- Writing for Business
Recently Published Definitions
- Amazon Transcribe Medical
Amazon Transcribe Medical is an automatic speech recognition (ASR) service that converts physician dictated notes, consultations between physicians ...
- Google Pay (Android Pay)
Google Pay is the search company’s electronic wallet and payment service offering.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

- Algorithms
- Artificial intelligence - machine learning
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quick Start Glossaries
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- system software
System software is a type of computer program that is designed to run a computer's hardware and application programs.
- Fourth Industrial Revolution
The Fourth Industrial Revolution is the current and developing environment in which disruptive technologies and trends such as the Internet of Things...
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

- Desktops and laptops
- End user hardware
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- IMEI (International Mobile Equipment Identity)
IMEI (International Mobile Equipment Identity) is a 15-17-digit code that is given to every mobile phone. This number is used by service providers to...
- social media
Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and...
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations mgmt & monitoring
- Storage hardware
- Virtualization
Recently Published Definitions
- site reliability engineer
Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are ...
- real-time monitoring
Real-time (data) monitoring is the delivery of continuously updated information streaming at zero or low latency.
IT Career Management
Search or browse for definitions about information technology technology, project management, IT career paths and professional certifications.

- Business software
- Career paths and IT certifications
- Compliance, risk and governance
- Customer experience management
- Enterprise resource planning (ERP)
- Government IT
- Healthcare IT
- Human resource management
- IT service management & procurement
- Network management
- Project management
- Security management
- SEO
- Software asset management
- Storage management
Recently Published Definitions
- CIA triad
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an ...
- positioning statement
A positioning statement is an expression of how a given product, service or brand fills a particular consumer need in a way that its competitors don’...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LAN, campus LAN)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- IPv4 address class
An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
- RFC 1918
Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Anti-virus, antimalware
- Application security
- Authentication, access control
- Malware
- Network security
- Threat management
Recently Published Definitions
- deception technology
Deception technology is a class of security tools and techniques designed to prevent an attacker who has already entered the network from doing ...
- dropper
A dropper is a small helper program that facilitates the delivery and installation of malware. Sometimes droppers are bundled with free utility ...
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

- Business intelligence - business analytics
- Customer data management
- Data and data management
- Data backup - disaster recovery
- Data deduplication
- Database management
- Enterprise content management
- Network-attached storage (NAS)
- Solid state (flash) storage
- Storage-area network (SAN)
Recently Published Definitions
- GDPR
The General Data Protection Regulation (GDPR) is legislation that updated and unified data privacy laws across the European Union (EU).
- 3Vs
The 3Vs (volume, variety and velocity) are three defining properties or dimensions of big data.
Word of the Day
SearchCompliance
-
information governance
Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...
-
enterprise document management (EDM)
Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...
SearchSecurity
-
cyber espionage
Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...
-
virus (computer virus)
A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...
SearchHealthIT
-
protected health information (PHI) or personal health information
Protected health information (PHI), also referred to as personal health information, generally refers to demographic information,...
-
HIPAA (Health Insurance Portability and Accountability Act)
HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security ...
SearchDisasterRecovery
-
risk mitigation
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
-
call tree
A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...
SearchStorage
-
cloud storage
Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...
-
cloud testing
Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...