Browse Definitions :
Definition

serendipity

In general, serendipity is the act of finding something valuable or delightful when you are not looking for it. In information technology, serendipity often plays a part in the recognition of a new product need or in solving a design problem. Web surfing can be an occasion for serendipity since you sometimes come across a valuable or interesting site when you are looking for something else.

The term was coined by English writer Horace Walpole on January 28, 1754, in a letter written to Horace Mann. He credited it to a "silly fairy tale" he once read called 'The Three Princes of Serendip'.

According to the fairy tale, three Persian princes sailed off to make their fortunes in the "land of silk", an island called Serendip . (Today, the island is known as Sri Lanka.) Along the way, the princes made all types of wondrous and delightful discoveries about the island, and learned things they never expected. One such learning was purported to be the discovery that a mule blind in its right eye had recently traveled the same road. This was discovered when they noticed that the grass had been eaten only on the left side of the road.

The term is also sometimes used to mean "the randomness of fate," as in "whatever happens to cross my desk today."

This was last updated in December 2006

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

This is the best explanation of the term "serendipity" that I have ever come across in any dictionary or web-site.
Very well-explained.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close