Browse Definitions by Alphabet
- application integration (enterprise application integration or EAI) - Application integration (sometimes called enterprise application integration or EAI) is the process of bringing data or a function from one application program together with that of another application program.
- application layer - The application layer sits at Layer 7, the top of the Open Systems Interconnection (OSI) communications model.
- application layering (app layering) - Application layering (app layering) is a technology for delivering virtual applications that run in layers separate from a virtual desktop, but interact with the operating system and other apps as if they are installed natively on the base image.
- application lifecycle management (ALM) - Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning and development, through testing and maintenance, and into decommissioning and retirement.
- Application Load Balancer - The Application Load Balancer is a feature of Elastic Load Balancing that allows a developer to configure and route incoming end-user traffic to applications based in the AWS public cloud.
- application migration - Application migration is the process of moving an application program from one environment to another.
- application platform - An application platform is a framework of services that applications rely on for standard operations.
- application portfolio management (APM) - Application portfolio management (APM) is a framework for managing enterprise IT software applications and software-based services.
- application release automation (ARA) - Application release automation (ARA) is a process that automatically packages and deploys an application, or application updates, through the stages of development to production.
- application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and management and mobile application management (MAM) that limits the environments in which certain code can execute.
- application security - Application security, or appsec, is the practice of using security software, hardware, techniques, best practices and procedures to protect computer applications from external security threats.
- application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
- application support engineer (ASE) - An application support engineer (ASE) is an IT professional who provides technical support for the range of software their employer uses.
- application whitelisting - Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.
- Appreciative inquiry (AI) - Appreciative Inquiry (AI) is a change management approach that focuses on identifying what is working well, analyzing why it is working well and then doing more of it.
- AppX file - AppX is the application distribution file format that was introduced with Microsoft Windows 8.
- archive - An archive is a collection of data moved to a repository for long-term retention, to be kept separate for compliance reasons or moved off primary storage media.
- AribaPay - AribaPay is a system for electronic payments for goods and services on the SAP Ariba Network, a global business trading community.
- arithmetic-logic unit (ALU) - An arithmetic-logic unit (ALU) is the part of a central processing unit (CPU) that carries out arithmetic and logic operations on the operands in computer instruction words.
- Arm processor - An Arm processor is one of a family of CPUs based on the RISC architecture for computer processors.
- Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
- ARPANET - The U.S.
- artifact (software development) - An artifact is a byproduct of software development that helps describe the architecture, design and function of software.
- artificial intelligence of things (AIoT) - Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
- artificial neuron - An artificial neuron is a connection point in an artificial neural network.
- AS/400 (IBM iSeries, AS/400e, eServer iSeries/400, Power Systems) - The IBM Application System/400 -- or AS/400 -- is a family of midrange computers that was released in 1988, succeeding both System/36 and System/38 platforms.
- ASAP, ALAP and ATAP - ASAP, ATAP and ALAP are acronyms that stand for, respectively, as soon as possible, as timely as possible and as late as possible.
- ASCII (American Standard Code for Information Interchange) - ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet.
- ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) - ASHRAE was formed in 1959 by the merger of the American Society of Heating and Air-Conditioning Engineers (ASHAE), founded in 1894, and the American Society of Refrigerating Engineers (ASRE), founded in 1904.
- Asilomar AI Principles - Asilomar AI Principles are 23 guidelines for the research and development of artificial intelligence (AI).
- aspect-oriented programming (AOP) - Aspect-oriented programming (AOP) is an approach to programming that allows global properties of a program to determine how it is compiled into an executable program.
- assembler - An assembler is a computer program that takes in basic instructions and converts them into a pattern of bits that the computer's processor can use to perform basic operations.
- asset performance management (APM) - Asset performance management (APM) is both a strategy and a set of software tools for tracking and managing the health of an organization's physical assets.
- asset turnover ratio - The asset turnover ratio is a measurement that shows how efficiently a company is using its owned resources to generate revenue or sales.
- assistive technology (adaptive technology) - Assistive technology is a set of devices intended to help people who have disabilities.
- association rules - Association rules are if-then statements that show the probability of relationships between data items within large data sets in various types of databases.
- asymmetric communications - Asymmetric communications is a term pertaining to any system in which the data speed or quantity, when averaged over time, is different in one direction from the other.
- asymmetric cryptography - Asymmetric cryptography, also known as public key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
- asymmetric cyber attack - An asymmetric cyber attack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure.
- asynchronous replication - Asynchronous replication is a store-and-forward approach to data backup and protection.
- at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
- athenahealth Inc. - athenahealth Inc.
- ATM jackpotting - ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash.
- atomic data - In a data warehouse, atomic data is the lowest level of detail.
- atomic mass unit (AMU or amu) - The atomic mass unit (AMU or amu) of an element is a measure of its atomic mass.
- attack surface - An attack surface is the total number of all possible entry points for unauthorized access into any system.
- attack vector - An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome.
- attention training - Attention training is a technique or system designed to help people focus on the issue at hand, concentrate more effectively, procrastinate less and make better decisions in less time.
- attenuation - Attenuation is a general term that refers to any reduction in the strength of a signal.
- attribute - In general, an attribute is a property, quality, or characteristic that something or someone has.
- audio - Audio is sound that is within the acoustic range of human hearing.
- audit program (audit plan) - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.
- augmented reality (AR) - Augmented reality (AR) is the integration of digital information with the user's environment in real time.
- augmented reality app (AR app) - An augmented reality app (AR app) is a software application that integrates digital visual content (and sometimes audio and other types) into the user’s real-world environment.
- augmented reality gaming (AR gaming) - Augmented reality gaming (AR gaming) is the real-time integration of virtual game elements with the physical environment of the player.
- Australian Assistance and Access Bill - The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support law enforcement and security agencies in their ability to collect evidence from electronic devices.
- authentic leadership - Authentic leadership is a type of management style in which people act in a real, genuine and sincere way that is true to who they are as individuals.
- authentication - Authentication is the process of determining whether someone or something is who or what they say they are.
- authentication factor - An authentication factor is a category of credential that is intended to verify, sometimes in combination with other factors, that an entity involved in some kind of communication or requesting access to some system is who, or what, they are declared to be.
- authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
- authoritarian leadership - Authoritarian leadership, also known as autocratic leadership, is a management style where an individual possesses total decision-making power and retains as much authority as possible, often requiring followers to strictly adhere to their directives without much freedom or participation.
- auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
- autocorrect - Autocorrect is a word processing feature that identifies misspelled words, and uses algorithms to identify the words most likely to have been intended, and edits the text accordingly.
- autofill - Autofill, also called autocomplete, is a software feature that automatically inserts previously entered personal information into web form fields for the user's convenience.
- Automated Clearing House fraud (ACH fraud) - ACH fraud is the theft of funds through the U.
- automated machine learning (AutoML) - Automated machine learning (AutoML) is the process of applying machine learning models to real-world problems using automation.
- automated reasoning - Automated reasoning is the area of computer science concerned with applying reasoning in the form of logic to computing systems.
- automated testing - Automated testing is a software testing technique that automates the process of validating the functionality of software and ensures it meets requirements before being released into production.
- Automatic Identification and Data Capture (AIDC) - Automatic Identification and Data Capture (AIDC) is a broad set of technologies used to collect information from an object, image or sound without manual data entry.
- Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
- automatic transfer switch (ATS) - An automatic transfer switch (ATS) is a device that automatically transfers a power supply from its primary source to a backup source when it senses a failure or outage in the primary source.
- autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
- autoscaling - Autoscaling provides users with an automated approach to increase or decrease the compute, storage or networking resources they have allocated, as traffic spikes and use patterns demand.
- AV (audio/video) - AV, an abbreviation for audio/video, is frequently used as a generic term for the audio and video components and capabilities in home entertainment systems and related product descriptions and reviews.
- availability bias - In psychology, the availability bias is the human tendency to rely on information that comes readily to mind when evaluating situations or making decisions.
- Avaya - Avaya is an American technology company that specializes in business communications services, such as unified communications (UC) and contact center (CC).
- Average handle time (AHT): What it is and how to improve it - Average handle time (AHT) is the average amount of time it takes a call center agent to complete a customer phone call.
- AWS certification - AWS certification is a level of Amazon Web Services cloud expertise that an IT professional obtains after passing one or more exams the public cloud provider offers.
- AWS Certified Solutions Architect - Associate - AWS Certified Solutions Architect - Associate is a category of technical certifications offered by Amazon Web Services (AWS) for beginners and professionals who run enterprise architecture programs, as well as solutions architects.
- AWS Certified Solutions Architect - Professional - AWS Certified Solutions Architect - Professional certification is a category of technical certifications offered by Amazon Web Services (AWS) for professionals who design applications and systems using the AWS platform and who have professional experience deploying AWS cloud architecture.
- AWS CloudFormation (Amazon Web Services CloudFormation) - AWS CloudFormation is a free service that provides Amazon Web Services customers with the tools they need to create and manage the infrastructure a particular software application requires to run on AWS.
- AWS CloudTrail - AWS CloudTrail is an application program interface (API) call-recording and log-monitoring service offered by Amazon Web Services (AWS).
- AWS Direct Connect - Direct Connect is a network service that allows an enterprise customer to establish a dedicated network connection between one of Amazon's Direct Connect locations and the customer's data center or colocation environment.
- AWS Educate (Amazon Web Services Educate) - AWS Educate is a free, online learning program that teaches students about cloud computing.
- AWS Elastic Beanstalk - AWS Elastic Beanstalk is a cloud deployment and provisioning service that automates the process of getting applications set up on the Amazon Web Services (AWS) infrastructure.
- AWS Fargate - AWS Fargate is a service that enables a user to run containers on Amazon's cloud computing platform without the need to manage the underlying infrastructure.
- AWS Firewall Manager - AWS Firewall Manager is a tool from Amazon Web Services that an organization can use to configure policies for the cloud vendor's native web application firewall (WAF) service.
- AWS Key Management Service (AWS KMS) - AWS Key Management Service (KMS) is a managed service provided by Amazon Web Services (AWS) that allows companies to create, control and manage the cryptographic keys that encrypt and protect their data.
- AWS Management Console - The AWS Management Console is a web-based application that lets users access the broad range of services included in the Amazon Web Services (AWS) platform.
- AWS Network Load Balancer (NLB) - AWS Network Load Balancer (NLB) is an Amazon Web Services tool that distributes high-performance traffic across multiple cloud instances and provides automatic scaling of resources to ensure low latency and high throughput for applications.
- AWS On-Demand Instances (Amazon Web Services On-Demand Instances) - AWS On-Demand Instances (Amazon Web Services On-Demand Instances) are virtual servers that run in AWS Elastic Compute Cloud (EC2) or AWS Relational Database Service (RDS) and are purchased at a fixed rate per hour.
- AWS Partner Network (APN) - The Amazon Web Services (AWS) Partner Network (APN) is a classification endorsed by AWS for a global community of cloud service providers and vendors once they qualify for certain benchmarks.
- AWS Reserved Instances - AWS Reserved Instances (RIs) refer to compute capacity that can be reserved on Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Relational Database Service (Amazon RDS) to take advantage of discounted pricing.
- AWS Secrets Manager - AWS Secrets Manager is a security service to centrally manage sensitive information and eliminate the need to hard-code that information into an application.
- AWS Single Sign-On (AWS SSO) - AWS Single Sign-On (AWS SSO) is a service from Amazon Web Services that enables IT to manage user access to multiple applications and AWS accounts from a single, centralized console.
- Azure Container Instances (ACI) - Azure Container Instances (ACI) is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.
- Azure Data Studio (formerly SQL Operations Studio) - Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.
- Azure DevOps - Azure DevOps -- rebranded from Visual Studio Team Services (VSTS) in 2018 -- is a software-as-a service (SaaS) platform from Microsoft designed to provide a comprehensive toolchain for developing and deploying software projects.
- Azure Kubernetes Service (AKS) - Azure Kubernetes Service (AKS) is a managed container orchestration service based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.
- Azure Migrate - Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.