Browse Definitions :
Definition

serendipity

In general, serendipity is the act of finding something valuable or delightful when you are not looking for it. In information technology, serendipity often plays a part in the recognition of a new product need or in solving a design problem. Web surfing can be an occasion for serendipity since you sometimes come across a valuable or interesting site when you are looking for something else.

The term was coined by English writer Horace Walpole on January 28, 1754, in a letter written to Horace Mann. He credited it to a "silly fairy tale" he once read called 'The Three Princes of Serendip'.

According to the fairy tale, three Persian princes sailed off to make their fortunes in the "land of silk", an island called Serendip . (Today, the island is known as Sri Lanka.) Along the way, the princes made all types of wondrous and delightful discoveries about the island, and learned things they never expected. One such learning was purported to be the discovery that a mule blind in its right eye had recently traveled the same road. This was discovered when they noticed that the grass had been eaten only on the left side of the road.

The term is also sometimes used to mean "the randomness of fate," as in "whatever happens to cross my desk today."

This was last updated in December 2006

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

This is the best explanation of the term "serendipity" that I have ever come across in any dictionary or web-site.
Very well-explained.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close