Browse Definitions :
Definition

serendipity

In general, serendipity is the act of finding something valuable or delightful when you are not looking for it. In information technology, serendipity often plays a part in the recognition of a new product need or in solving a design problem. Web surfing can be an occasion for serendipity since you sometimes come across a valuable or interesting site when you are looking for something else.

The term was coined by English writer Horace Walpole on January 28, 1754, in a letter written to Horace Mann. He credited it to a "silly fairy tale" he once read called 'The Three Princes of Serendip'.

According to the fairy tale, three Persian princes sailed off to make their fortunes in the "land of silk", an island called Serendip . (Today, the island is known as Sri Lanka.) Along the way, the princes made all types of wondrous and delightful discoveries about the island, and learned things they never expected. One such learning was purported to be the discovery that a mule blind in its right eye had recently traveled the same road. This was discovered when they noticed that the grass had been eaten only on the left side of the road.

The term is also sometimes used to mean "the randomness of fate," as in "whatever happens to cross my desk today."

This was last updated in December 2006

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

This is the best explanation of the term "serendipity" that I have ever come across in any dictionary or web-site.
Very well-explained.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close