Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- API key
An API key is a unique identifier used to connect to, or perform, an API call.
- operating system (OS)
An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application ...
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.

- Amazon Web Services (AWS)
- Google - Android
- Microsoft - Windows
- Open Source
- Oracle
- Salesforce
- SAP
- VMware
- Writing for Business
Recently Published Definitions
- Amazon Transcribe Medical
Amazon Transcribe Medical is an automatic speech recognition (ASR) service that converts physician dictated notes, consultations between physicians ...
- Google Pay (Android Pay)
Google Pay is the search company’s electronic wallet and payment service offering.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.

- Algorithms
- Artificial intelligence - machine learning
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quick Start Glossaries
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- teleoperations (telerobotics)
Teleoperation, also called telerobotics, is the technical term for the remote control of a robot.
- curiosity artificial intelligence (curiosity AI)
Curiosity artificial intelligence (curiosity AI) is the simulation of human curiosity in artificial intelligence.
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

- Desktops and laptops
- End user hardware
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- Robert Metcalfe
Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
- digital native
A digital native is a person who grew up with the presence of digital technology or in the information age.
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.

- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations mgmt & monitoring
- Storage hardware
- Virtualization
Recently Published Definitions
- real-time monitoring
Real-time (data) monitoring is the delivery of continuously updated information streaming at zero or low latency.
- edge virtualization
Edge virtualization is the practice of using software versions of physical computing resources at the edge of a network, closest to the devices that ...
IT Management
Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.

- Business software
- Career paths and IT certifications
- Compliance, risk and governance
- Customer experience management
- Enterprise resource planning (ERP)
- Government IT
- Healthcare IT
- Human resource management
- IT service management & procurement
- Network management
- Project management
- Security management
- SEO
- Software asset management
- Storage management
Recently Published Definitions
- conversion rate optimization
In online marketing, conversion rate optimization (CRO) is a strategic approach to increasing the percentage of website visitors who follow a desired...
- E-Verify
E-Verify is a free web service that allows employers to confirm the legal eligibility of an individual who wants to work in the United States.
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LAN, campus LAN)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- proxy server
A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a ...
- G-putty
G-putty is a polysilicone polymer infused with graphene. Polysilicone polymer is better known as Silly Putty®, a stretchy, moldable product sold in ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.

- Anti-virus, antimalware
- Application security
- Authentication, access control
- Malware
- Network security
- Threat management
Recently Published Definitions
- Presidential Policy Directive 21 (PPD-21)
Presidential Policy Directive 21 (PPD-21) is an infrastructure protection and resilience directive in the United States that aims to strengthen and ...
- Five Eyes Alliance
The Five Eyes Alliance (abbreviated as FVEY in government documents) is a cooperative intelligence network that monitors the electronic ...
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.

- Business intelligence - business analytics
- Customer data management
- Data and data management
- Data backup - disaster recovery
- Data deduplication
- Database management
- Enterprise content management
- Network-attached storage (NAS)
- Solid state (flash) storage
- Storage-area network (SAN)
Recently Published Definitions
- Western Digital Corporation (WDC)
Western Digital Corporation (often referred to as WDC, Western Digital) is a data storage device manufacturer founded in 1970 and headquartered in ...
- enterprise content services
Enterprise content services are the evolution of enterprise content management (ECM); their goal is to adapt to the changing needs of enterprises and...
Word of the Day
Newest and Updated Terms
Buzzword Alert
virtual CPU (vCPU)
A virtual CPU (vCPU) also known as a virtual processor, is a physical central processing unit (CPU) that is assigned to a virtual machine (VM).
Read MoreKnow-IT-All
What are the risks of canceling an ERP project?
In response to the COVID-19 pandemic, many business and technology leaders are deciding whether to cancel or pause an ERP implementation. Here are some risks to factor into the decision.
What should be on your cloud audit checklist?
Although strenuous, audits are a critical part of a cloud compliance strategy. Learn about the different types of cloud audits to better prepare for your next review.
Wireless certifications that matter
Find out which wireless certifications are worth pursuing. This expert advice dives into vendor-specific, vendor-neutral and specialized certification options.
Essential Knowledge
COVID-19 tech will fail without employee privacy
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without ...
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN ...
SDP vs. VPN vs. zero-trust networks: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter SDP and zero-trust models, which are similar yet offer stricter and ...
3 approaches for how to prevent DDoS attacks on networks
DDoS attacks on networks can result in devastating and expensive damage for organizations. Learn three ways to prevent and respond to DDoS attacks to...
- Tech Accelerator
What Is Supply Chain Management (SCM) and Why Is It Important?
Learn all the essentials of supply chain management (SCM), including key components like logistics, demand planning and procurement, and understand how SCM software, combined with emerging technologies such as IoT and blockchain, can optimize supply chain efficiency.
Get up to speed - Tech Accelerator
The CIO role, from IT operator to business strategist
The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today.
Get up to speed - Tech Accelerator
What Is Data Management and Why Is It Important?
Learn how the distinct responsibilities of security, IT ops and development teams fit together in a DevSecOps model.
Get up to speed - Tech Accelerator
Ultimate guide to incident response and management
Learn actionable incident response strategies that your IT and enterprise security teams can use to meet today's security threats and vulnerabilities more effectively.
Get up to speed