Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- alphanumeric (alphameric)
Alphanumeric, also referred to as alphameric, is a term that encompasses all of the letters and numerals in a given language set.
- Single Responsibility Principle (SRP)
Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific ...
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Amazon Web Services (AWS)
- Google - Android
- Microsoft - Windows
- Open Source
- Oracle
- Salesforce
- SAP
- VMware
Recently Published Definitions
- data discovery platform
A data discovery platform is a complete set of tools for the purpose of detecting patterns, and those outlier results outside of patterns, in data.
- chief storyteller
A chief storyteller is an employee of an organization tasked with wording the company's mission, history and messages about their brand, also known ...
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

- Artificial intelligence - machine learning
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- logic gate
A logic gate is an elementary building block of a digital circuit. There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and XNOR.
- International Institute of Business Analysis (IIBA)
International Institute of Business Analysis (IIBA) is a non-profit association that promotes and aids in the use of business analysis.
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

- Desktops and laptops
- End user hardware
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- social media
Social media is the collective of online communications channels dedicated to community-based input, interaction and collaboration.
- Millennials (Generation Y)
Millennials, also known as Generation Y, is a demographic that includes individuals who reached adulthood around the turn of the 21st century. This ...
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations mgmt & monitoring
- Storage hardware
- Virtualization
Recently Published Definitions
- data lineage
Data lineage is the history of data, including where the data has traveled through-out the its existence within an organization.
- VM automation
VM automation is the ability for a virtual machine (VM) to perform basic functionality and maintain necessary balances to optimize its performance on...
IT Management
Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

- Business software
- Compliance, risk and governance
- Customer relationship management (CRM-CEM)
- Enterprise resource planning (ERP)
- Government IT
- Healthcare IT
- HR management (HRIS;HRMS;HCM)
- IT service management & procurement
- Network management
- Project management
- Security management
- SEO
- Software asset management
- Storage management
Recently Published Definitions
- vanity metrics
A vanity metric is a unit of measurement that looks positive but fails to provide the viewer with any information that can be used to drive future ...
- augmented intelligence
Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI's assistive role, emphasizing the fact that ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LAN, campus LAN)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- server
A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
- network topology
A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Anti-virus, antimalware
- Application security
- Authentication, access control
- Malware
- Network security
- Threat management
Recently Published Definitions
- cryptomining malware
Cryptomining malware is a form of malware that takes over a computer or mobile device's resources and uses them to perform cryptocurrency mining, a ...
- mimikatz
Mimikatz is an open source malware program used by hackers and penetration testers to gather credentials on Windows computers.
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

- Business intelligence - business analytics
- Customer data management
- Data and data management
- Data backup - disaster recovery
- Data deduplication
- Database management
- Enterprise content management
- Network-attached storage (NAS)
- Solid state (flash) storage
- Storage-area network (SAN)
Recently Published Definitions
- database automation
Database automation is the use of unattended processes and self-updating procedures for administrative tasks in a database.
- rule of five (statistics)
The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
Word of the Day
-ADS BY GOOGLE
SearchCompliance
-
compliance audit
A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
-
regulatory compliance
Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...
SearchSecurity
-
orphan account
An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...
-
voice squatting (skill squatting)
Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...
SearchHealthIT
-
HIPAA (Health Insurance Portability and Accountability Act)
HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and ...
-
electronic protected health information (ePHI)
Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or ...
SearchDisasterRecovery
-
business continuity policy
Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...
-
business continuity and disaster recovery (BCDR)
Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...
SearchStorage
-
cache memory
Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...
-
disk array
A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...