A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0-9
Browse By Category
Ad Tech
Technology Word | Meaning |
Ad Blocking | Ad blocking or ad filtering is a type of software that can remove or alter advertising content from a webpage, website, or a mobile app. Ad blockers are available for a range of computer platforms, including desktop and laptop computers, tablet computers and smartphones. |
Ad Exchange | A technology platform that facilitates the buying and selling of media advertising inventory from multiple ad networks |
Ad Fraud | Ad fraud (also referred to as Invalid Traffic) is concerned with theory and practice of fraudulently representing online advertisement impressions, clicks, conversion or data events in order to generate revenue. |
Ad Networks | A company that connects advertisers to web sites that want to host advertisements. |
Ad Servers | The technology and service that places advertisements on web sites. |
Ad Verification | A process which attempts to verify that a campaign has executed according to the agency's or advertiser's choices and exclusions. |
Addressable TV Advertising | Technologies that enable advertisers to selectively segment TV audiences and serve different ads or ad pods within a common program or navigation screen. |
Adobe Advertising Cloud | Adobe Advertising Cloud, formerly Adobe Media Optimizer, is an independent, end-to-end platform for managing advertising across traditional TV and digital formats. |
AdSense | Google AdSense is a program run by Google that allows publishers in the Google Network of content sites to serve automatic text, image, video, or interactive media advertisements, that are targeted to site content and audience. |
AdWords | An online advertising service where advertisers pay to display brief advertising copy to web users |
Agency Trading Desk | A massive media buyer and re-seller, which functions as an independent working unit within a large media buying concern |
Amazon Marketing Services (AMS) | Amazon Marketing Services (AMS) offers effective tools to help vendors stand out against their competitors and drive traffic to product detail pages and branded pages. |
Audience Data | Audience data is information about the people who respond to your advertisements and buy your business's products or the people that visit your site these are the audience segments you will want to target during future marketing campaigns. |
Audience Management Platform | Helps you target mobile ads to specific audience segments. |
Creative Optimization | A form of programmatic advertising that allows advertisers to optimize the performance of their creative using real-time technology. |
Data Management Platform (DMP) | A centralized data management platform that allows you to create target audiences based on a combination of in-depth first-party and third-party audience data |
Demand Side Platform (DSP) | Technology used to manage and optimize ad campaigns |
DoubleClick Bid Manager | A next-generation demand-side-platform providing trading desks, agencies, and advertisers with great transparency and performance in global display media buying across ad exchanges. |
DoubleClick Search (DS) | DoubleClick Search (DS) is a search management platform that helps agencies and marketers efficiently manage some of the largest search marketing campaigns in the world, across multiple engines and media channels. |
First-Party Data | Loosely defined as information you yourself have collected about your audience. |
Inbound Marketing Software | Marketing software that automates content creation, distribution, lead capture and management, and the measuring of ROI |
Intent Data | Data collected about a web user and possibly indicating some intent or future action |
Internet Marketing Automation | The concept of automate marketing actions via the internet |
Lead Generation Software | Software that automates the capture, segmentation and assignment of leads to improve targeted marketing communications and shorten sales cycles |
Marketing Automation Tools | Software platforms and technologies designed to more effectively market on multiple channels online (such as email, social media, and websites) and automate repetitive tasks |
Marketing Email | The process of sending a commercial message, typically to a group of people, using email |
Marketing Management Software | Software that supports marketing operations management. |
Marketing Reporting | A market report reflects the market condition in terms of product or service. |
Marketing ROI | Return on marketing investment is the contribution to profit attributable to marketing divided by the marketing 'invested' or risked. |
Marketing Tools | Product development and promotional strategies and actions that a company uses to develop and promote its products or services. |
Online Lead Generation | The initiation of consumer interest or inquiry into products or services of a business via the internet |
Outbound Marketing | A traditional form of marketing where a company initiates the conversation and sends its message out to an audience |
Pixels | A minute area of illumination on a display screen, one of many from which an image is composed. |
Predictive Lead Scoring | A marketing tool that uses an algorithm to predict qualified leads that should be pursued by the sales team |
Pricing Best Practices | Pricing best practices provides a reference against which current practices and proposals can be tested. |
Pricing Software | Pricing software delivers insight into pricing practices. |
Product Feeds | A product feed or product data feed is a file made up of a list of products and attributes of those products organized so that each product can be displayed, advertised or compared in a unique way. |
Programmatic | Of the nature of or according to a program, schedule, or method. |
Programmatic Buying | The use of software to purchase digital advertising, as opposed to the traditional process that involves RFPs, human negotiations and manual insertion orders |
Real-Time Bidding (RTB) | A means by which advertising inventory is bought and sold on a per-impression basis, via programmatic instantaneous auction, similar to financial markets |
Retargeting | A form of online targeted advertising by which online advertising is targeted to consumers based on their previous Internet actions. |
Rich Media | An Internet advertising term for a Web page ad that uses advanced technology such as streaming video, downloaded applet s programs that interact instantly with the user, and ads that change when the user's mouse passes over it. |
Roadblocking | When an advertising campaign creative is the only brand on a particular page or website, taking over all ad sizes at once. |
Sales and Marketing Automation | Refers to the software that exists with the goal of automating marketing actions. |
Second-Party Data | Somebody else's first party data. |
Sell Side Platform (SSP) | A technology platform to enable web publishers to manage their advertising space inventory, fill it with ads, and receive revenue. |
Sizmek | Sizmek is the largest independent buy-side advertising platform that creates impressions that inspire. Sizmek provides powerful, integrated solutions that enable data, creative, and media to work together for optimal campaign performance across the entire customer journey. |
Tag Management | Designed to help manage the lifecycle of e-marketing tags, which are used to integrate third-party software into digital properties. |
Third-Party Data | Data that a marketer acquires from a multitude of outside sources. |
Web Beacons | An object embedded in a web page or email, which unobtrusively allows checking that a user has accessed the content |
Web Marketing | A form of marketing and advertising which uses the internet to deliver promotional marketing messages to consumers |
Analytics & Reporting
Technology Word | Meaning |
Actionable Insights | Actionable insight is a term in data analytics and big data for information that can be acted upon or information that gives enough insight into the future that the actions that should be taken become clear for decision makers. |
Ad Hoc Analytics | Ad hoc analysis is a business intelligence process designed to answer a single, specific business question. |
Advanced Analytics | Advanced Analytics is the autonomous or semi-autonomous examination of data or content using sophisticated techniques and tools, typically beyond those of traditional business intelligence (BI), to discover deeper insights, make predictions, or generate recommendations. |
Agile Business Intelligence (BI) | Agile Business Intelligence refers to the use of Agile software development for BI projects to reduce the time it takes for traditional BI to show value to the organization, and to help in quickly adapting to changing business needs. |
Analytics as a service (AaaS) | Analytics as a service (AaaS) refers to the provision of analytics software and operations through web-delivered technologies. These types of solutions offer businesses an alternative to developing internal hardware setups just to perform business analytics. |
Analytics Software | Refers to analytics specific to software systems and related software development processes. |
Anomaly Detection | the identification of items, events, or observations which do not conform to an expected pattern or other items in a dataset. |
Big Data | Extremely large data sets that may be analyzed computationally to reveal patterns, trend, and associations, especially relating to human behavior and interactions. |
Big Data Analytics | The process of examining large and varied data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions. |
BlueKai (Oracle Data Cloud) | Cloud based big data platform that enables companies to personalize online, offline, and mobile marketing campaigns with richer and more actionable information about targeted audiences. |
Business Intelligence | An umbrella term that includes the applications, infrastructure and tools, and best practices that enable access to and analysis of information to improve and optimize decisions and performance. |
Business Intelligence Analytics | An umbrella term including data warehousing, business intelligence, enterprise information management, enterprise performance management, analytic applications, and |
Cluster Analysis | The task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups. |
Cognitive Analytics | A field of analytics that tries to mimic the human brain by draw inferences from existing data and patterns, draws conclusions based on existing knowledge bases and then inserts this back into the knowledge base for future inferences - a self learning feedback loop. |
Comparative Analysis | A type of analysis used in various of sciences and in different modifications: criminology and forensics: comparative contextual analysis - criminology. |
Complex Event Processing (CEP) | Event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances. |
Connection Analytics | Creating new revenue and cost saving opportunities by modeling and analyzing connections. |
Contextual Analytics | A method to analyze the environment in which a business operates. |
Correlation Analysis | A method of statistical evaluation used to study the strength of a relationship between two, numerically measured, continuous variables. |
Data Analytics | Refers to qualitative and quantitative techniques and processes used to enhance productivity |
Data Hub | A database which is populated with data from one or more sources and from which data is taken to one or more destinations. |
Data Management Software | A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. |
Data Management System | Software that handles the storage, retrieval, and updating of data in a computer system. |
Data Mining | The practice of examining large databases in order to generate new information. |
Data Science | An interdisciplinary field about scientific methods, processes, and systems to extract knowledge or insights from data in various forms, either structured or unstructured, similar to data mining. |
Data Visualization | A general term that describes any effort to help people understand the significance of data by placing it in a visual context. |
Descriptive Analytics | Descriptive Analytics is analysis of data that provides information about current data. |
Digital Assessment | Digitization of the assessment process, from student work to the recording of marks is occurring now but haphazardly and is often only a relocation of the paper assessment. |
Embedded Analytics | Embedded analytics is the integration of analytic content and capabilities within business process applications. It provides relevant information and analytical tools designed for the task at hand so users can work smarter and more efficiently in the applications they use every day. |
Embedded Business Intelligence | Embedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications. BI tools support an enhanced user experience with visualization, real-time analytics and interactive reporting. |
Embedded Reporting | The integration of analytic content and capabilities within business process applications. |
Enterprise Data Management | Referring to the ability of an organization to precisely define, easily integrate and effectively retrieve data for both internal applications and external communication. |
Enterprise Value (EV) | Enterprise value (EV), total enterprise value (TEV), or firm value (FV) is an economic measure reflecting the market value of a business. It is a sum of claims by all claimants: creditors (secured and unsecured) and shareholders (preferred and common). Enterprise value is one of the fundamental metrics used in business valuation, financial modeling, accounting, portfolio analysis, and risk analysis. |
HPE Vertica | An analytic database management software company. |
IBM Cognos | IBM Cognos Business Intelligence is a web-based integrated business intelligence suite by IBM. It provides a toolset for reporting, analytics, scorecarding, and monitoring of events and metrics. |
IBM SPSS | One of the most popular statistical packages which can perform highly complex data manipulation and analysis with simple instructions. |
Infrastructure Performance Layer | Enables a software system to interact with external systems by receiving, storing and providing data when requested. |
Instagram Analytics | Instagram Analytics are tools used to track and monitor certain factors of an Instagram account to help individuals or businesses have an idea of how to boost the effectiveness of the account's purpose. |
Interactive Visualization | Interactive visualization or interactive visualization is a branch of graphic visualization in computer science that involves studying how humans interact with computers to create graphic illustrations of information and how this process can be made more efficient. |
Konstanz Information Miner (KNIME) | KNIME, the Konstanz Information Miner, is a free and open-source data analytics, reporting and integration platform.KNIME integrates various components for machine learning and data mining through its modular data pipelining concept. |
Location Analytics | The ability to gain business insight from the location component of business data. |
MapD | MapD is a Lightning-Fast GPU Database Platform for Interactive SQL and Real-Time Visual Analytics on Massive Datasets. |
Monitor and Analyze Performance | A special discipline involving systematic observations to enhance performance and improve decision making, primarily delivered through the provision of objective statistical and visual feedback. |
Network Analytics | Provides operators and enterprises with a deep understanding of the network, enabling smarter, data-driven decisions. |
OLAP | Performs multidimensional analysis of business data and provides the capability for complex calculations, trend analysis, and sophisticated data modeling. |
Operational BI | The process of reviewing and evaluating operational business processes, activities and data for the purpose of making tactical, strategic business decisions. |
Operational Intelligence (OI) | Operational Intelligence (OI) is a form of real-time dynamic, business analytics that delivers visibility and insight into business operations. OI solutions run query analysis against live feeds and event data to deliver real-time visibility and insight into business and IT operations. |
Oracle Endeca Information Discovery | Oracle Endeca Information Discovery is a data visualization and exploration tool. |
Performance Indicator | A key performance indicator is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success at reaching targets. |
Power BI | A free, self-service business intelligence cloud service that provides non-technical business users with tools for aggregating, analyzing, visualizing and sharing data. |
Power BI for Office 365 | A cloud based suite of business analytics tools that enables anyone to connect to, visualize, and analyze data with greater speed, efficiency, and understanding. |
Predictive Analytics | The practice of extracting information from existing data sets in order to determine patterns and predict future outcomes and trends. |
Price Optimization | The use of mathematical analysis by a company to determine how customers will respond to different prices for its products and services through different channels. |
Pricing Analytics | Refers to the analysis of consumer response to theoretical prices in survey research. |
Profitability Management | An analytic application that models business processes to accurately determine process, product and customer cost and profitability. |
Real-Time Analytics | The use of, or the capacity to use, data and related resources as soon as the data enters the system. |
Reporting Software | Used to generate human- readable reports from various data sources. |
Salesforce Einstein | Salesforce Einstein is artificial intelligence (AI) technology that has been developed for the Salesforce Customer Success Platform. |
SAS (Statistical Analysis System) | A software site developed by SAS Institute for advanced analytics, multivariate analyses, business intelligence, data management, and predicative analytics. |
Scalability | Scalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth. |
Self-Service Analytics | An approach to advanced analytics that allows business users to manipulate data to spot business opportunities, without requiring them to have a background in statistics or technology. |
Single Customer View (SCV) | An aggregated consistent and holistic representation of the data known by an organization about its customers that can be viewed in one place, such as a single page. |
Social Media Analytics (SMA) | Social Media Analytics (SMA) refers to the approach of collecting data from social media sites and blogs and evaluating that data to make business decisions. This process goes beyond the usual monitoring or a basic analysis of retweets or "likes" to develop an in-depth idea of the social consumer. |
Software as a Service (SaaS) Analytics | Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company's firewall at a hosted location and accessed by an end user with a secure Internet connection. |
Text Analytics | The process of deriving information from text sources. |
Topological Data Analysis (TDA) | An approach to the analysis of dataset using techniques from topology. Extraction of information from datasets that are high-dimensional, incomplete and noisy is generally challenging. |
Twitter Analytics | Twitter analytics provides a wealth of information that can help you create meaningful Tweets that will resonate with your target audience. |
Visual Analytics | An outgrowth of the fields of information visualization and scientific visualization that focuses on analytical reasoning facilitated by interactive visual interfaces. |
Warehouse Management Solutions | A software application that supports the day-t0-day operations in a warehouse. |
Workforce Analytics | Combination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management. |
APIs & Services
Technology Word | Meaning |
Android API | An Android API is an API that can be used for building Android applications. |
Ansible | Ansible is software that automates software provisioning, configuration management, and application deployment. |
API Gateway | An API gateway enables clients to retrieve data from multiple services with a single round-trip. Fewer requests also means less overhead and improves the user experience. |
API Management | The process of publishing, documenting and overseeing application programming interfaces in a secure, scalable environment. |
Application Integration | The process of bringing data or a function from one application program together with that of another application program. |
Application Platform | Application platforms play a fundamental role in modern computing environments. Applications and the data they use provide all of the value that information technology brings, and virtually every application depends on an application platform. |
Application Services | A business providing computer-based services to customers over a network; such as access to a particular software application using a standard protocol. |
Authentication | The process or action of proving or showing something to be true, genuine, or valid. |
AWS Lambda | An event driven computing cloud service from amazon Web Services that allows developers to provision resources for a programming function on a pay-per-use basis without having to be concerned about what amazon storage or compute resources will support it. |
B2B Firmographic APIs | Firmographics are used to define a target market and open APIs integrate real-time B2B data and intelligence into applications. |
Batch Processing / Batch Services | The processing of previously collected jobs in a single batch. |
Distributed Computing | A field of computer science that studies distributed systems. |
Electronic Data Interchange (EDI) | The electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. |
Electronic Data Transfer (EDT) | An interactive document management system that both simplifies and expedites the process of registering data reports, conveniently accomplished through the Internet. |
Event Automation | Scripts that automate network troubleshooting and network management. |
Interoperability | The ability of computer systems or software to exchange and make use of information. |
iOS API | An iOS API is an API that can be used for building iOS applications. |
Java Message Service (JMS) | The Java Message Service (JMS) API is a Java Message Oriented Middleware (MOM) API[1] for sending messages between two or more clients. It is an implementation to handle the Producer-consumer problem. |
Job Scheduling / Workload Automation | The practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions. |
Mashery | The leading provider of web services and API management solutions enabling software-driven companies to unlock and accelerate their web services channel. |
Microservices | Microservices, also known as the microservice architecture, is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities. |
Microsoft Technology Stack | Layered structure of different services that are used to develop Microsoft application solutions. |
Middleware | Software that acts as a bridge between an operating system or database and applications, especially on a network. |
OpenStack | A set of software tools for building and managing clouds computing platforms for public and private clouds. |
Platform as a Service (PaaS) | A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. |
Platforms | A system that consists of a hardware device and an operating system that an application, program or process runs upon. |
Remote Automation | Systems that control assets remotely |
REST | An approach to communications that is often used in the development of Web Services. |
Restful API | A RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data. |
RESTful API Modeling Language (RAML) | RESTful API Modeling Language (RAML) is a YAML-based language for describing RESTful APIs.[2] It provides all the information necessary to describe RESTful or practically RESTful APIs. |
SAP Fiori | SAP Fiori is a platform that provides the porting of applications on mobile devices and is based on SAP's technology platform called NetWeaver. SAP Fiori enables applications to be used on desktop computers, tablets and smartphones. |
Simple Object Access Protocol (SOAP) | A messaging protocol that allows programs that run on disparate operating systems to communicate using HTTP and its XML. |
Systems Integration | The process of bringing together the component sub-systems into one system and ensuring that the subsystems function together as a system, and in information technology as the process of linking together different computing systems and software applications physically or functionally, to act as a coordinated whole. |
Systems Integrators | A company that markets commercial integrated software and hardware systems. |
Vert.x | Vert.x is a polyglot event-driven application framework that runs on the Java Virtual Machine. |
Business Solutions
Technology Word | Meaning |
Automated Contract Management | Management of contracts using automated technology |
Avaya IP Office™ | The Avaya IP Office is Avaya's primary product line for small to medium-sized businesses. It is a hybrid PBX that is legacy digital technology at the core, but adds on VoIP and SIP support. |
B2B Secure Collaboration | Businesses working with others to do a task and to achieve shared goals, such as security. |
B2B Technology | Technology that supports services or information between businesses. |
Bar Coding | To mark with a bar code. |
Barcode Software | Generates and reads serial bar codes with the sequence generator and data import function. |
Bomgar | A remote support solution that allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile device. |
Building Management System (BMS) | A computer-based control system installed in buildings that controls and monitors the building's mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems. |
Business Integration | Businesses depend on a very complex and heterogeneous mix of information like solving a customer problem, managing a workflow, establishing a supply chair or designing a new product that requires integrating many different sources of information from many different enterprise systems. |
Cisco Collaboration | Cisco Collaboration solutions connect culture, process, and technology to bring the collaboration experience to life. |
Cisco Spark | The Cisco Spark service encrypts messages, files, and room names on your device before sending them to the cloud. |
Cloud Digital Asset Management | Consists of management tasks and decisions surrounding the ingestion, annotation, cataloguing, storage, retrieval and distribution of digital assets. |
Collaboration Portal | Typically used for intranets, publishing portals contain but a subset of the lists, libraries and subsite template types you find in a collaboration portal site definition template. |
Commercial Off-The-Shelf (COTS) | Commercial off-the-shelf or commercially available off-the-shelf satisfy the needs of the purchasing organization, without the need to commission custom-made, or bespoke, solutions. |
Contact Center Outsourcing | Contracting out call center services. |
Contact Center Solutions | Businesses who provide technical set up, software and customer support for call centers. |
Containerization | A lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment. |
Content Integration | A marketing buzzword for middleware software technology, often used within large organizations, that connects together various types of computer systems that manage documents and digital content. |
Continuous Process | A streamlined process that involves ongoing production of end products or services. |
Corporate Website | Corporate or Business websites differ from e-commerce or portal sites in that they provide information to the public about the company. |
Crowdsourcing | The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet. |
Customer Self Service | A process that facilitates users support via processes and methods in that don't require the assistance of a customer service representative. |
Data as a Service (DaaS) | A service provider that enables data access on demand to users regardless of their geographic location. Also called Data as a Service (DaaS), data services are similar to Software as a Service (SaaS) in that the information is stored in the cloud and is accessible by a wide range of systems and devices. |
Deal Management | Deal Management is for controlling all phases of a deal lifecycle from initial deal evaluation through due diligence to closing. |
Device-as-a-Service (DaaS) | Device as a Service (DaaS) helps organizations mitigate these costs by taking a typical hardware device (such as a laptop, desktop, tablet, or mobile phone), bundling it with a variety of services and software, and offering it to a customer for a monthly subscription fee. |
End User Transformation | The push for transforming to next generation end user computing comes from changes in today's organizational behaviors and social behaviors - time is money and users want to be empowered to do more, faster, anytime, anywhere and with any device. |
Enterprise Contact Center | Enterprises of every size and every industry are now reducing their dependence on premise-based contact center solutions. |
eProcurement | The business to business to consumer or business to government purchase and sale of supplies, work, and services through the Internet as well as other information and networking systems, such as electronic data interchange, etc. |
Executive Information Systems | A type of management information system that facilitates and supports senior executive information and decision-making needs. |
Expert Systems | A piece of software programmed using artificial intelligence techniques. |
Facial Recognition | Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person's facial contours. |
Field Service Automation | The process of streamlining all your field service processes to increase productivity and efficiency. |
Help Desk / Service Desk | A service providing information and support to computer users, especially within a company. |
Hosted Contact Center | Offers all the utilities associated with running a customer service outfit with a pay as you go plan. |
IBM SoftLayer | A dedicated server, managed hosting, and cloud computing provider. |
Inside Sales | Inside sales is the dominant sales model for reps in B2B, tech, SaaS, and a variety of B2C industries selling high-ticket items. Put simply, inside sales is sales that is handled remotely. |
Intelligent Automation | Intelligent automation systems that streamline decision making typically use tools for aggregating, extracting, and analyzing information often, complex information such as human speech or unstructured text. |
JIRA | Jira is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions. |
Kiosks | A small structure in a public area used for providing information or displaying advertisements, often incorporating a n interactive display screen or screens. |
Krow PSA | Krow PSA is a resource and project management tool. |
LiquidPlanner | An online project management software company based in Seattle. |
Logistics and Procurement | A procurement supply chain person is directly responsible for the purchasing or procurement of any product or services. A logistics supply chain person is focused on the logistical cost and efficiencies within the supply chain of an organization, |
Mechanical Turk | A crowdsourcing Internet marketplace enabling individuals and businesses to coordinate the use of human intelligence to perform tasks that computers are currently unable to do. |
Media Asset Management | A business process for organizing, storing, and retrieving rich media and managing digital rights and permissions. |
Microsoft PowerApps | Microsoft PowerApps is a service that lets you build business apps that run in a browser or on a phone or tablet, and no coding experience is required. |
Microsoft Teams | Microsoft Teams is a platform that combines workplace chat, meetings, notes, and attachments. The service integrates with the company's Office 365 subscription office productivity suite, including Microsoft Office and Skype, and features extensions that can integrate with non-Microsoft products. |
Mid-Market Technology | Services that help mid-market companies leverage 'big company' solutions, such as cloud-based services and business analytics tools that can impact operational capabilities and productivity, and provide competitive insights. |
Mobile Workforce Automation | Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams. |
Open Source Audit | Open source audits identify building blocks (files or software module or packages, or even five lines of external code) that are used in a product or exist in the code inventory of an organization. |
Open Source Security | Open-source software security is the measure of assurance of guarantee in the freedom from danger and risk inherent to an open-source software system. |
OpenShift Container Platform | OpenShift Container Platform (formerly known as OpenShiftEnterprise) is Red Hat's on-premises private platform as a service product, built around a core of application containers powered by Docker, with orchestration and management provided by Kubernetes, on a foundation of Red Hat Enterprise Linux. |
Partner Management Software | Used to optimize relationships with business partners like contractors, distributors, resellers and other services. |
Partner Relationship Management (PRM) | A system of methodologies, strategies, software, and web-based capabilities that help a vendor to manage partner relationships. |
Point of Sale (POS) System | A POS System is a computerized network operated by a main computer and linked to several checkout terminals |
Portal Solutions | Deliver agent portal capabilities such as workflow and transaction capabilities including quote, binding, and service. |
Predictive Apps | Apps that leverage big data and predictive analytics to anticipate and provide the right functionality and content on the right device at the right time for the right person by continuously learning about them. |
Process Control | An engineering discipline that deals with architectures, mechanisms and algorithms for maintaining the output of a specific process within a desired range. |
Process Improvement | The proactive task of identifying, analyzing and improving upon existing business processes within an organization for optimization and to meet new quotas or standards of quality. |
Process Simulation | Used for the design, development, analysis and optimization of technical processes such as chemical plants, chemical processes, environmental systems, power stations, complex manufacturing operations, biological processes, and similar technical functions. |
Procurement Solutions | Procurement Solutions create greater efficiencies and help convert procurement data into intelligence that can be leveraged to make informed decisions faster. |
Professional Services Automation | Software designed to assist professionals, such as lawyers, auditors, and IT consultants, with project management and resource management for client projects. |
Program Management | Program management or programmer management is the process of managing several related projects, often with the intention of improving an organization's performance. |
QuickBooks | Intuit Inc's set of software solutions designed to manage payroll, inventory, sales and other needs of a small business. |
Real-Time Data Processing | Real-time data processing is the execution of data in a short time period, providing near-instantaneous output. The processing is done as the data is inputted, so it needs a continuous stream of input data in order to provide a continuous output. |
Request For Proposal (RFP) | A request for proposal (RFP) is a document that solicits proposal, often made through a bidding process, by an agency or company interested in procurement of a commodity, service, or valuable asset, to potential suppliers to submit business proposals. |
Sales Dialing Automation | Refers to a system that is designed to improve sales productivity by automating various sales processes. |
SAP Leonardo | SAP Leonardo is an umbrella brand for SAP's collection of software and services that organizations can use to develop digital transformation projects. |
Self Service Portal | A website that enables users-whether they are customers, employees suppliers, or partners - to perform high value transactions, from simple account updates to paying bills, managing support tickets, and more. |
Self-Service Technology | Technological interfaces allowing customers to produce services independent of involvement of direct service employee. |
Services Procurement | Services Procurement as a process for buying and managing strategic outsourcing of work and consultancy through a statement of work. |
Small Business Printing | Printing as applied to small businesses. |
Smart Retail | Smart retail is a term used to describe a set of smart technologies that are designed to give the consumer a greater, faster, safer and smarter experience when shopping. |
Smartsheet | A software as a service application for collaboration and work management that is developed and marketed by Smartsheet.com, Inc. |
Software as a Service (SaaS) | A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. |
Speech Recognition | The ability of a computer to identify and respond to the sounds produced in human speech. |
Splunk | American multinational corporation based in San Francisco, CA, that produces software for searching, monitoring, and analyzing machine-generated big data via a web-style interface. |
Stock Keeping Unit (SKU) | In the field of inventory management, a stock keeping unit is a distinct type of item for sale such as a product or service, and all attributes associated with the item type that distinguish it from other item types. |
System Center | A suite of individually sold systems management products. |
Technical and Competitive IT (TaCIT) | Opportunities to integrate cutting-edge scientific research with innovative IT. |
T-Systems | German global IT services and consulting company headquartered in Frankfurt. |
Universal Product Code (UPC) | The more formal term for barcode. |
Vendor Managed Inventory (VMI) | Vendor-managed inventory (VMI) is a family of business models in which the buyer of a product provides certain information to a supplier (vendor) of that product and the supplier takes full responsibility for maintaining an agreed inventory of the material, usually at the buyer's consumption location (usually a store). |
Vendor Management System | A vendor management system (VMS) is an Internet-enabled, often Web-based application that acts as a mechanism for business to manage and procure staffing services temporary, and, in some cases, permanent placement services as well as outside contract or contingent labor. |
Vertical Applications | Any software application that supports a specific business process and targets a smaller number of users with specific skill sets and job responsibilities within an organization. |
Voice Recognition | The ability of a machine or program to receive and interpret dictation, or to understand and carry out spoken commands. |
Warehouse Management System | A Warehouse Management System is a software application, designed to support and optimize warehouse functionality and distribution center management. |
Watson IoT Platform | A fully managed, cloud hosted service on IBM Bluemix designed to simplify internet of Things development so you can derive more value from your IoT data. |
Work Management | Work management is a set of software products and services that apply workflow structure to the movement of information as well as to the interaction of business processes and human worker processes that generate the information. |
Workflow Automation | Workflow is the definition, execution and automation of business processes where tasks, information or documents are passed from one participate to another for action, according to a set of procedural rules. |
Workflow Software | A workflow application is a software application which automates, to at least some degree, a process or processes. |
Workplace by Facebook | Workplace by Facebook is a collaborative platform run by Facebook, Inc. started on October 10, 2016. It may be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environment. |
Workplace by Facebook | Workplace is a collaborative platform run by Facebook, Inc., started on October 10, 2016. It may be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environment. |
Workplace Technology | Technology in the workplace allows businesses to expand quickly and efficiently. |
Wrike | A privately held project management application service provider based in San Jose CA. Wrike's primary product is an online tool for project management and collaboration. |
Cloud
Technology Word | Meaning |
Adobe Marketing Cloud (AMC) | Adobe Marketing Cloud includes a set of analytics, social, advertising, media optimization, targeting, Web experience management and content management products[2] aimed at the advertising industry and hosted on Amazon Web Services. |
Amazon Elastic Compute Cloud (EC2) | Amazon Elastic Compute Cloud (EC2) forms a central part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), by allowing users to rent virtual computers on which to run their own computer applications. |
Amazon Virtual Private Cloud (VPC) | Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides users a virtual private cloud, by "provision[ing] a logically isolated section of Amazon Web Services (AWS) Cloud". |
AT&T Netbond | AT&T NetBond cloud connect solutions facilitate the orchestration of public and private cloud resources in a secure networking environment. |
Autoscaling | Autoscaling, also spelled auto scaling or auto-scaling, and sometimes also called automatic scaling, is a method used in cloud computing, whereby the amount of computational resources in a server farm, typically measured in terms of the number of active servers, scales automatically based on the load on the farm. It is closely related to, and builds upon, the idea of load balancing. |
AWS Elastic Beanstalk | A cloud deployment and provisioning service that automates the process of getting applications et up on the Amazon Web Services infrastructure. |
AWS OpsWorks | AWS OpsWorks (Amazon Web Services OpsWorks) is a cloud computing service from Amazon Web Services (AWS) that manages infrastructure deployment for cloud administrators. |
Azure Data Lake | A highly scalable data storage and analytics service. |
Bare-Metal Cloud | A descriptive term for a computer server to distinguish it from modern forms of virtualization and cloud hosting. |
Big Data-as-a-Service (BDaaS) | A term typically used to refer to services that offer analysis of large or complex data sets, usually over the internet , as cloud hosted services. |
Cloud Access Security Broker (CASB) | A cloud access security broker (CASB) (sometimes pronounced cas-bah) is on-premises or cloud based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. |
Cloud Applications | An application program that functions in the cloud, with some characteristics of a pure desktop app and some characteristics of a pure Web app. |
Cloud Architect | An IT professional who is responsible for overseeing a company's cloud computing s |
Cloud as a Service | Any service made available to users on demand via the internet from a cloud computing provider's servers as opposed to being provided from a company's own on="premises" servers. |
Cloud Backup / Recovery | A type of service through which cloud computing resources and infrastructure are used to create, edit, manage and restore data, services or application backup. |
Cloud Communications | Internet-based voice and data communications where telecommunications applications, switching and storage are hosted by a third-party outside of the organization using them, and they are accessed over the public Internet. |
Cloud Compliance | Cloud compliance is an issue for anyone using cloud storage or backup services. ... By moving data from your internal storage to someone else's you are forced to examine closely how that data will be kept so that you remain compliant with laws and industry regulations. |
Cloud Computing | The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. |
Cloud Data | Cloud Data can be defined as digital data stored within cloud storage. |
Cloud ERP | An approach to enterprise resource planning that makes use of cloud computing platforms and services to provide a business with more flexible business process transformation. |
Cloud IDE | A web-based integrated development platform. |
Cloud Infrastructure | Refers to a virtual infrastructure that is delivered or accessed via a network or the internet. |
Cloud Integration | Cloud integration is the process of configuring multiple application programs to share data in the cloud. |
Cloud Management | The software and technologies designed for operating and monitoring applications, data and services residing in the cloud. |
Cloud Migration | Cloud migration is the process of moving data, applications or other business elements from an organization's onsite computers to the cloud, or moving them from one cloud environment to another. |
Cloud Orchestration | Consists of these elements: comprising of architecture, tools, and processes used by humans to deliver a defined Service. Stitching of software and hardware components together to deliver a defined Service. Connecting and Automating of workflows when applicable to deliver a defined Service. |
Cloud OS | A marketing term used to describe a lightweight operating system intended for netbooks or tablet PCs that access Web-based applications and stored data from remote servers. |
Cloud Providers | A company that offers some component of cloud computing - typically Infrastructure as a Service, Software as a Service or Platform as a Service - to other businesses or individuals. |
Cloud Provisioning | The allocation of a cloud provider's resources to a customer. |
Cloud Security | The set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use. |
Cloud Services | Any service made available to users on demand via the Internet from a cloud computing provider's servers as opposed to being provided from a company's own on-premises servers. |
Cloud Services Brokerage | An IT role and business model in which a company or other entity adds value to one or more cloud services on behalf of one or more consumers of that service via three primary roles including aggregation, integration and customization brokerage. |
Cloud Storage | A cloud computing model in which data is stored on remote servers accessed from the Internet, or cloud. |
Cloud Strategy | The concomitant use of two or more cloud services to minimize the risk of widespread data loss or downtime due to a localized component failure in a cloud computing environment. |
Cloud VC | Can be used without the hardware generally required by other video conferencing systems, and can be designed for use by SMEs, or larger international companies like Facebook. |
Cloud-Based Analytics | A cloud-based analytics solution helps to glean, clean and draw insights as data is available real-time; Offers increased flexibility: |
Cloud-Based Unified Communications | Marketing buzzword describing the integration of real-time enterprise communication services such as instant messaging, presence information, voice, mobility features, audio, web & video conferencing, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services such as a unified messaging, |
Cloud-Connected Audio | An audio conferencing service from the secure WebEx Cloud, and it natively integrates into WebEx meetings. |
Contact Center as a Service (CCaaS) | Contact Center as a Service (CCaaS) is a cloud-based customer experience solution that allows companies to utilize a contact center provider's software. |
Containers | An OS-level virtualization method for deploying and running distributed applications without launching an entire VM for each application. |
Data Lake | A storage repository that holds a vast amount of raw data in its native format until it is needed. |
Desktop as a Service (DaaS) | A form of virtual desktop infrastructure in which the VDI is outsourced and handled by a third party. |
Digital Transaction | A way of payment which is made through digital modes. |
Digital Transaction Management (DTM) | A category of cloud services designed to digitally manage document-based transactions. |
Disaster Recovery as a Service (DRaaS) | A cloud computing and backup service model that uses cloud resources to protect applications and data from disruption caused by disaster. |
Enterprise Mobility Suite | A set of tools that are deeply integrated to provide you with all you need to administer, provision and secure the devices that are used in your enterprise. |
FIFO (First In, First Out) | The oldest inventory items are recorded as sold first but do not necessarily mean that the exact oldest physical object has been tracked and sold. |
Google Cloud | A suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search and YouTube. |
Hosted Application | A hosted application is a software as a service (SaaS) solution that allows users to execute and operate a software application entirely from the cloud on a recurring subscription. |
HP Cloud Services | A set of cloud computing services available from Hewlett-Packard that offered public cloud, private cloud, hybrid cloud, managed private cloud, and other cloud services. |
Hybrid Applications | An app that combines elements of both native and Web applications. |
Hybrid Cloud | A cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. |
IBM Bluemix | A cloud platform as a service developed by IBM. |
IBM Cloud Services | Consists of the infrastructure, hardware, provisioning, management, integration and security that serve as the underpinnings of a private or hybrid cloud. |
iCloud | A suite of free cloud-based services from Apple that helps users store and synchronize digital content across computers and numerous iOS-supported devices such as iPhones, iPads, and iPod Touches. |
Identity as a Service (IDaaS) | An authentication infrastructure that is built, hosted and managed by a third-party service provider. |
Integrated Cloud Services | The process of configuring multiple application programs to share data in the cloud. |
IT as a Service (ITaaS) | A technology-delivery method that treats IT as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee. |
Microsoft Azure | A cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. |
Native Cloud Application (NCA) | Refers to a type of computer software that natively utilizes services and infrastructure provided by cloud computing providers such as amazon EC2 or Force.com. |
OneDrive | A file hosting service operated by Microsoft as part of its suite of online services. |
Private Cloud | A type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture. |
Public Cloud | Based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the internet. |
Reference Architecture | A document or set of documents to which a project manager or other interested party can refer for best practices. |
Remote Procedure Call (RPC) | In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remote interaction. |
Sales Cloud | Sales Cloud is a fully customizable product that brings all the customer information together in an integrated platform that incorporates marketing, lead generation, sales, customer service and business analytics and provides access to thousands of applications through the AppExchange. |
Salesforce Commerce Cloud | Salesforce Commerce Cloud is a highly scalable, cloud-based software-as-a-service (SaaS) eCommerce solution. It offers best-in-class features and functionality developed and refined over many years to provide a highly optimized eCommerce experience. |
ServiceNow | The heart of the cloud service that helps track configuration item relationships, automatically define IT services and manage IT processes in one system. |
SolidFire | A business division of NetApp Inc specializing in the production of all-flash storage systems. |
ViPR | A software-defined storage offering from EMC Corporation that abstracts storage from disparate arrays into a single pool of storage capacity. |
Virtual Private Cloud | An on-demand configurable pool of shared computing resources allocated within a public cloud environment, providing a certain level of |
VSPEX | A platform specification rom Dell EMC to guide the building of systems for converged and hyper-converged infrastructure. |
Web-Scale IT | Used to reference a global-class of computing - or an architectural approach - used to deliver the capabilities of large cloud service providers within an terries IT setting. |
Windows Intune | A cloud based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice. |
Consumer Technology
Technology Word | Meaning |
Bluetooth | Wireless technology for exchanging data over a short range between devices |
Dongle | Device for enabling wireless access |
Firewire | Device that allows high-speed data exchange between devices or peripherals |
Thunderbolt | The brand name of a hardware interface developed by Intel (in collaboration with Apple) that allows the connection of external peripherals to a computer. |
USB (Universal Serial Bus) | Technology that allows a person to connect an electronic device to a computer. |
WiFi | Wireless technology for connecting devices to a wireless network |
Acoustic Camera | An acoustic camera is an imaging device used to locate sound sources and to characterize them. It consists of a group of microphones also called microphone array that are simultaneously acquired to form a representation of the location of the sound sources. |
Digital Cameras | Device for storing and recording photographic images in a digital form |
Digital Photo Frame | Device for displaying digital photos on a screen |
DSLR Cameras | Digital camera that features a single-lens reflex design and a digital imaging sensor |
Fitness and Health Device | Wearable device that tracks fitness-related metrics |
Google Glass | Optical head mounted display worn as glasses |
Home Entertainment | Aggregate of devices used for diversion at home |
Oculus Rift | Virtual reality headset |
Radar Detector | Device used to detect radar activity |
Robotic Vacuum Cleaner | Machine that is programmed to function as a vacuum cleaner automatically |
Smart Watch | Computerized device worn as a watch |
Kinect | Motion sensing peripheral for use with the Xbox gaming console |
Microsoft Xbox | Gaming console created by Microsoft |
Nintendo Wii | Gaming console created by Nintendo |
Sony Playstation | Gaming console created by Sony |
Android Apps | Android Apps are applications that can be used on Android devices. |
App Store | Marketplace used for distributing computer software |
iOS Apps | iOS Apps are mobile applications that can be used on iOS devices |
iOS Push Notifications | An iOS push notification is a message delivered to applications on an iOS device. |
Mobile Apps | Software application used on mobile devices |
Mobile Commerce | The phrase mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean the delivery of electronic commerce capabilities directly into the consumer's hand anywhere via wireless technology. |
Smartphone | Cellular phone capable of accessing the internet and running downloaded applications |
SMS (Short Message Service) | Text messaging service component of most telephone, World Wide Web, and mobile telephony systems. |
Square | Magstripe reader used for taking debit or credit card payments on a mobile device |
Texting | An electronic message sent over a cellular network from one cell phone to another by typing words, often in shortened form. |
Touch Screen | Touch-sensitive display screen |
Windows Mobile | Family of mobile operating systems developed by Microsoft |
2-in-1 PCs | Hybrid computer having features of both a tablet and a laptop |
All-in-One PCs | Desktop computer that integrates all components into the same case as the display |
B2C Technology | Technology that facilitates commerce between businesses and end user consumers |
Chromebook | Laptop that runs Chrome OS |
Desktop Computer | Personal computer meant to remain in a fixed location |
Laptop | Portable computer |
Macintosh | Line of personal computers developed by Apple |
Comma-Separated Values (CSV) | In computing, a comma-separated values (CSV) file is a delimited text file that uses a comma to separate values (many implementations of CSV import/export tools allow other separators to be used). |
File Sharing | Practice of distributing or providing access to digital content |
Gmail | Email service provided by Google |
Google Apps | Suite of cloud computing and collaboration software tools provided y Google |
Google Drive | File storage and synchronization software provided by Google |
Keynote | Presentation software developed by Apple |
Kubernetes | Kubernetes (commonly stylized as K8s) is an open-source system for automating deployment, scaling and management of containerized applications that was originally designed by Google and now maintained by the Cloud Native Computing Foundation. |
Microsoft Access | Database management system provided by Microsoft |
Microsoft Excel | Spreadsheet software developed by Microsoft |
Microsoft Forefront Identity Manager | State based identity management software product designed to manage users' digital identities, credentials and groups throughout the lifecycle of their membership of an enterprise computer system. |
Microsoft Forefront Unified Access Gateway | A computer software solution that provides secure remote access to corporate networks for remote employees and business partners. |
Microsoft Office | Office suite of applications developed by Microsoft |
Microsoft OneNote | Collaborative information management software provided by Microsoft |
Microsoft Outlook | Personal information manager provided by Microsoft |
Microsoft PowerPoint | Presentation software developed by Microsoft |
Microsoft Project | Project management software developed by Microsoft |
Microsoft Publisher | Desktop publishing software provided by Microsoft |
Microsoft SharePoint | Highly configurable collaboration and content management platform provided by Microsoft |
Microsoft Visio | Diagramming and vector graphics application provided by Microsoft |
Microsoft Word | Word processing software developed by Microsoft |
Office 365 | Productivity software suite provided by Microsoft |
Office for Mac | Version of Microsoft Office developed for use on Apple computers |
Office Mobile | Microsoft Office companion for use on mobile devices running Android |
Office Online | Online office suite provided by Microsoft |
Presentation Applications | Software used to display information in the form of a slide show |
Unified Messaging | Integration of messaging platforms into a single interface |
WPS Office | WPS Office (an acronym for Writer, Presentation and Spreadsheets,[2] previously known as Kingsoft Office) is an office suite for Microsoft Windows, Linux,[1] iOS[3] and Android OS,[4] developed by Zhuhai-based Chinese software developer Kingsoft. |
Bing | Web search engine operated by Microsoft |
Elasticsearch | Elasticsearch is a search engine based on Lucene. It provides a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents. |
Google Search | Web search engine operated by Google |
Search Engines | Software Designed to search information on the World Wide Web |
Yahoo Search | Web search engine operated by Yahoo |
Anti Spam | Security software that blocks unsolicited electronic mail |
Anti Spyware | Security software that blocks spyware |
Anti Virus | Security software that prevents malware |
Card Security Code (CSC) | A card security code (CSC) is a security feature for "card not present" payment card transactions instituted to reduce the incidence of credit card fraud. |
Computer Virus | Malware that infects computer programs |
Data Theft | Theft of digital information |
Identity Theft | Deliberate use of someone's else's identity |
Malwarebytes | Malwarebytes (formerly Malwarebytes Anti-Malware, abbreviated as MBAM) is an anti-malware software for Microsoft Windows, macOS, and Android that finds and removes malware. Made by Malwarebytes Corporation, it was first released in January 2006. |
Password Management | Method used to organize and encrypt passwords |
PGP (Pretty Good Privacy) | Software that provides cryptographic privacy and authentication for data communication, developed by Symantec |
Phishing | Activity of obtaining sensitive information for malicious purposes |
Spyware | Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. |
Worms | Self replicating virus that does not alter files but resides in active memory and duplicates itself. |
Android | Mobile operating system developed by Google |
iOS | Mobile operating system developed by Apple |
iPhone | Smartphone line designed by Apple |
LG G3 C118 / C125 | Smartphone line designed by LG |
LG Mobile | Smartphone line designed by LG |
Samsung Galaxy | Smartphone line designed by Samsung |
Windows Phone | Smartphone line designed by Windows |
Enterprise Social Networking | Use of online social networks between those who share business interests or activities |
Flickr | Image and video hosting service |
FourSquare | Application that personalizes geographical recommendations for users |
Google Groups | Communication platform for users with a common interest |
Google+ | Social networking platform developed by Google |
Image and video sharing social networking service developed by Facebook | |
Online Meetings | A meeting during which participants in different locations are able to communicate through audio and video means |
Podcasting | Method for distributing on-demand series of audio or video recordings |
Qzone | Social networking service based in China |
Skype | Application that provides video and voice call services |
Social Media Sharing | Social Media Sharing describes when social media users broadcast web content on a social network to their connections, groups, or specific individuals. |
Vine | Social networking service where users post looping 6 second videos |
Virtual Meeting | A virtual meeting is when people around the world, regardless of their location, use video, audio, and text to link up online. |
Application that provides a texting service and uses an internet connection | |
WordPress | Blog web hosting service provider |
Yammer | Enterprise social networking service for private communication within organizations |
Apple iPad | Line of tablet computers developed by Apple |
Google Nexus | Line of consumer electronics developed by Google |
Kindle | Line of e-readers developed by Amazon |
Kindle Fire | Tablet computer developed by Amazon |
Microsoft Surface | Sieries of touchscreen Windows personal computers and interactive whiteboards designed and developed by Microsoft. |
Nook | Line of e-readers developed by Barnes & Noble |
Samsung Galaxy Tab | Line of tablet computers produced by Samsung Electronics |
Tablets | Mobile computer that is primarily operated by touching the screen |
Ambient Intelligence | Concept of electronic environments that are sensitive and responsive to the presence of people |
Cognitive IoT | The use of cognitive computing technologies in combination with data generated by connected devices and the actions those devices can perform. |
Connected Cars | Vehicles that are able to connect to the internet |
Connected World | Concept of transforming markets due to smart devices |
Digital Health | Convergence of technology and individualized health and genetic information |
Internet of Things (IoT) | Concept of everyday objects being connected to a network |
Smart Home | Home equipped with devices able to be controlled remotely |
Wearable Technology | Smart electronic devices that can be worn on the body as implant or accessories. |
Amazon Fire TV | Audio/video streaming smart device developed by Amazon |
Amazon Prime | Premium subscription offered by Amazon that includes access to a variety of services |
Android TV | Smart TV platform developed by Google that creates an interactive television experience through a 10 foot user interface. |
Blu-ray | Format of DVD that allows recording, rewriting, and playback of high-definition content |
Chromecast | Line of audio/video streaming smart devices developed by Google |
Digital Terrestrial Television (DTT) | Digital terrestrial television (DTTV or DTT) is a technology for broadcast television in which land-based (terrestrial) television stations broadcast television content by radio waves to televisions in consumers' residences in a digital format. |
Google TV | Smart TV platform developed by Google and others |
High Definition (HD) | System with an image resolution substantially higher than standard-definition |
LG Television | Television produced by LG |
Organic Light-Emitting Diode (OLED) | LED in which part of the diode is made of organic compounds and is responsive to electric current |
PremierColor | Technology that delivers exceptional color accuracy and consistency featured on certain Dell monitors |
Quad High Definition (QHD) | Resolution standard for high-end monitors, televisions, and mobile devices: 2560x1440 pixels at 16x9 aspect ratio |
Ultra High Definition (UHD) | Resolution standard for televisions: includes 4K and 8K (3840x2160 and 7680x4320 pixels at 16:9 aspect ratio, respectively) |
Ultra High Definition Content | Content that meets the UHD standard |
Ultra High Definition Media Player | Smart device that is able to stream UHD content |
UltraSharp | Line of high-performance monitors offered by Dell |
Video-on-Demand | System where users choose their video or audio content from a wide selection |
VLC Media Player | VLC media player (commonly known as VLC) is a free and open-source, portable and cross-platform media player and streaming media server developed by the VideoLAN project. |
Windows Media Player | Media player software developed by Microsoft |
Chrome | Freeware web browser developed by Google |
Firefox | Freeware web browser developed by the Mozilla Foundation |
Flash Player | Freeware software used in conjunction with a browser for consuming media and executing RIAs |
Internet Explorer | Freeware web browser developed by Microsoft |
Opera | Freeware web browser developed by Opera Software |
Tor | Freeware web browser developed by the Tor Project |
CRM
Technology Word | Meaning |
Average Handle Time (AHT) | Average handle time (AHT) is a call center metric for the average duration of one transaction, typically measured from the customer's initiation of the call and including any hold time, talk time and related tasks that follow the transaction. AHT is a prime factor when deciding call center staffing levels. |
Buyer Centricity | A way of doing business with your customer in a way that provides a positive customer experience before and after the sale in order to drive repeat business, customer loyalty and profits. |
Buyer Journey | A framework that acknowledges a buyer's progression through a research and decision process ultimately culminating in a purchase. |
Churn Rate | Churn rate (sometimes called attrition rate), in its broadest sense, is a measure of the number of individuals or items moving out of a collective group over a specific period. It is one of two primary factors that determine the steady-state level of customers a business will support. |
ClearSlide | A SaaS-based Sales Engagement platform that lets users share content/sales materials via email links or their viewer's link in a 'Live Pitch'. |
Connected Experience | The ability for marketer's to connect with consumers in varied and complicated ways. |
CRM Best Practices | Different ways to manage customer relationships effectively. |
CRM Management | A term that refers to practices, strategies, and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers. |
CRM Retargeting | A relatively new, highly effective marketing technique that allows you to reach your customers in online display advertising by using your offline customer database. |
CRM Software | A category of software that covers a broad set of applications designed. |
Customer Advocacy | Customer advocacy is a specialized form of customer service in which companies focus on what is deemed to be best for the customer. It is a change in a company's culture that is supported by customer-focused customer service and marketing techniques. |
Customer Behavior | The study of individuals, groups, or organizations and the processes they use to select, secure, use and dispose of products, services, experiences, or ideas to satisfy their needs and wants. |
Customer Centricity | Customer-Centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage. |
Customer Communications | Refers to a convergent set of Information Technology solutions that help businesses achieve these objectives by providing a tool to advance the way they communicate with their customers. |
Customer Data | Customer data is information held on file about customers by a store or other business, usually including names, contact details, and buying habits. |
Customer Data Integration | The process of consolidating and managing customer information from all available sources, including contact details, customer valuation data, and information gathered through interactions such as direct marketing. |
Customer Data Management | The ways in which businesses keep track of their customer information and survey their customer base in order to obtain feedback. |
Customer Data Platform | Customer Data Platform (CDP) is a marketer-based management system. It creates a persistent, unified customer database that is accessible to other systems. |
Customer Experience and Engagement | The product of an interaction between an organization and a customer over the duration of their relationship. |
Customer Facing | Customer facing refers to the manner in which a business service feature is experienced or seen by a customer. A key customer relationship management (CRM) component, a customer facing solution is designed to deliver satisfying user experiences via all customer touch points. |
Customer Insight | An interpretation of trends in human behaviors which aims to increase effectiveness of a product or service for the consumer, as well as increased sales for mutual benefit. |
Customer Intelligence (CI) | Is the process of gathering and analyzing information regarding customers; their details and their activities, in order to build deeper and more effective customer relationships and improve strategic decision making. |
Customer Intent | Customer intent is defined as the thoughts directing a customers' decisions or actions toward a particular purchasing event. |
Customer Interaction Management | Refers to the a type of Enterprise Software Application which is responsible for managing the interaction between an organization and its customers. |
Customer Journey | The complete sum of experiences that customers go through when interacting with your company and brand. |
Customer Journey Analytics | Customer journey analytics is the weaving together of every touchpoint that a customer interacts with, across multiple channels and over time. It connects millions of events into journeys from your customers' point of view and is a data-driven approach to discovering, analyzing and influencing your customers' journeys. |
Customer Journey Map | A diagram that illustrates the steps your customers go through in engaging with your company, whether it be a product, an online experience, retail experience, or a service, or any combination. |
Customer Lifecycle | A term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service. |
Customer Lifetime Value (CLV) | In marketing, customer lifetime value (CLV or often CLTV), lifetime customer value (LCV), or life-time value (LTV) is a prediction of the net profit attributed to the entire future relationship with a customer. |
Customer Loyalty | Can said to have occurred if people choose to use a particular shop or buy one particular products, rather than use other shops or buy products made by other companies. |
Customer Profiling | Customer profiling is a way to create a portrait of your customers to help you make design decisions concerning your service. |
Customer Referrals | Customer referrals are one of the most powerful selling and marketing tools available. In fact, the best source of new business is a referral from a satisfied customer. |
Customer Relationship Management (CRM) | Customer relationship management (CRM) refers to practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer life cycle, with the goal of improving customer service relationships and assisting in customer retention and driving sales growth. |
Customer Retention | Refers to the activities and actions companies and organizations take to reduce the number of customer defections. |
Customer Review | A customer review is a review of a product or service made by a customer who has purchased and used, or had experience with, the product or service. Customer reviews are a form of customer feedback on electronic commerce and online shopping sites. |
Customer Satisfaction | A measure of how products and services supplied by a company meet or surpass customer expectation. |
Customer Segmentation | Customer segmentation is the process of dividing customers into groups based on common characteristics so companies can market to each group effectively and appropriately. |
Customer Service Automation | Designates a process of significantly reducing or entirely eliminating human labor when assisting clients. |
Customer Success Management | Customer Success Management is an integration of functions and activities of Marketing, Sales, Professional Services, Training and Support into a new profession to meet the needs of recurring revenue model companies. |
Customer Support Analytics | Customer Support Analytics refers to metrics related to customer service operations such as response time, satisfaction rating, etc. |
Digital Experience | An interaction between a user and an organization that is possible only because of digital technologies. |
Eloqua | The category defining marketing automation leader and provider of best practices expertise for marketers around the world. |
Email Management Software | A specific field of communications management for managing high volumes of inbound electronic mail received by organizations. |
First Call Resolution (FCR) | First call resolution is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call. |
High-Value Customer | A high-value customer is a client on whom the survival and profitability of a business depend on. |
Loyalty Program | A customer loyalty program is a rewards program offered by a company to customers who frequently make purchases. A loyalty program may give a customer free merchandise, rewards, coupons, or even advance released products. |
Marketing Automation | Refers to the software that exists with the goal of automating marketing actions. |
Marketo | A marketing automation tool that allows you to score leads based on their activity to determine how sales ready they are. |
Microsoft Dynamics CRM | A line of enterprise resource planning and customer relationship management software applications. |
Mobile App Engagement | Campaigns that focus on finding people interested in your appcontent. |
Net Promoter | A management tool that can be used to gauge the loyalty of a firm's customer relationships. |
Omnichannel | Denoting or relating to a type of retail that integrates the different methods of shopping available to consumers. |
Potential Customer | Potential customer is a person who may buy a particular thing. there is a high possibility of this person buying that thing. |
Progressive Profile | Progressive Profiling allows marketers to progressively gather more information over time and build a profile of the prospect. |
Relationship Marketing | A facet of customer relationship management that focuses on customer loyalty and long-tern customer engagement rather than shorter-term goals like customer acquisition and individual sales. |
Remarketing | A marketing strategy that positions targeted ads in front of a defined audience that had previously visited a particular website - as they browse elsewhere around the internet |
Reputation Management | The practice of attempting to shape public perception of a person or organization by influencing online information about that entity. |
Reputation Monitoring | Keeping track of the reputation that you have garnered. |
Retail Therapy | Retail therapy is shopping with the primary purpose of improving the buyer's mood or disposition. Often seen in people during periods of depression or stress, it is normally a short-lived habit. |
Revenue Management | Revenue management is the application of disciplined analytics that predict consumer behaviour at the micro-market level and optimize product availability and price to maximize revenue growth. |
Sales Force Automation (SFA) | An integrated application of customizable customer relationship management tool that automate and streamline sales inventory, leads forecasting, performance and analysis. |
Salesforce (CRM) | A global web-based software and cloud computing company best known for its customer relationship management product. |
Salesforce Consulting | A consultant that sells the Salesforce software. |
Salesforce Developer | A developer of the Salesforce software. |
Salesforce Partners | A partner that manages Salesforce. |
Siebel Systems | Was a software company principally engaged in the design, development, marketing, and support of customer relationship management applications. |
Social Relationship Management | Focuses on strengthening customer relationships through social media. |
Voice of the Customer | A term used in business and Information Technology to describe the in-depth process of capturing customer's expectations, preferences and aversions. |
Data Center
Technology Word | Meaning |
Application Infrastructure | A package that enables enterprise developers to build integrated multi-tier applications easily and rapidly. |
Automated Infrastructure Management (AIM) | Automated infrastructure management is a means of monitoring and managing the complex network cabling and other passive physical infrastructure within an enterprise data center. |
Carbon Management | A management process which promotes environmental effectiveness in organizations. |
Cisco ACI | Cisco ACI is a tightly coupled policy-driven solution that integrates software and hardware. |
Cisco Unified Computing System | A data center server computer product line composed of computing hardware, virtualization support, switching fabric, and management software introduced in 2009 by Cisco Systems. |
Colocation | A data center facility in which a business can rent space for servers and other computing hardware. |
Converged Infrastructure | An approach to data center management that seeks to minimize compatibility issues between servers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space. |
Cooling Systems | Generally refers to the dissipation of large amounts of heat, which is generated inside the computer tower by various hardware such as CPU, video card or even the hard drive. |
CtrlS | A Tier 4 Datacenter in India, that deals with large group of networked computer servers typically used by various organizations for the remote storage, processing, or distribution of large amounts of data. |
Data Center | A large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data. |
Data Center Automation | The process of managing and automating the workflow and the process of a data center facility. |
Data Center Consolidation | A common consideration for organizations that plan to reduce the size of a single facility or merge one or more facilities in order to reduce overall operating costs and reduce IT footprint. |
Data Center Design | the process of modeling and designing a data center's IT resources, architectural layout and entire infrastructure. |
Data Center Equipment | A facility that centralizes an organization's IT operations and equipment, and where it stores, manages, and disseminates its data. |
Data Center Infrastructure Management (DCIM) | Refers to the management of the human resources and tools required to handle all physical assets and resources in the data center to obtain a single pane view of the entire infrastructure. |
Data Center Interconnect | Refers to the networking of two or more different data centers to achieve business or IT objectives. |
Data Center Management | Refers to the role of an individual within the data center who is responsible for overseeing technical and IT issues within the data center. |
Data Center Migration | A data center migration is the process of deploying and transferring an existing data center environment to another data center operating environment. It is a comprehensive process that systematically plans for migrating the existing data center to a new facility or site. |
Data Center Power | Power needed to keep a data center running. |
Data Center Sustainability | Reduce, reuse and recycle everything from energy to materials. |
Disaster Planning | Systematic procedures that clearly detail what needs to be done, how, when and by whom before and after the time an anticipated disastrous event occurs. |
Disaster Recovery | A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. |
Environmental Controls | A constructive generic framework for maintaining temperature, humidity, and other physical qualities of air within a specific range in order to allow the equipment housed in a data center to perform optimally throughout its lifespan. |
Environmental Management | Software to keep track of potentially hazardous conditions within the datacenter. Monitors temperature, humidity, and water leakage as well as smoke, fire, and unauthorized entry alarms. |
Equinix Data Centers | Data centers that have been designed and maintained by Equinix. |
Infrastructure | The basic physical and organizational structures and facilities needed for the operation of a society or enterprise. |
Infrastructure as a Service (IaaS) | A service model that delivers computer infrastructure on an outsourced basis to support enterprise operations. |
Infrastructure Management | The management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts for overall effectiveness. |
Micro Data Center | A smaller or containerized data center architecture that is designed to solve different sets of problems tat take different types of compute workload that does not require to traditional facilities. |
Modular Data Center | A portable method of deploying data center capacity. |
Multi-Tenant Data Centers (MTDCs) | A Multi-Tenant Data Center is a data center where multiple communication networks are housed in a single facility. |
Nutanix | A storage vendor that produces a hyper converged storage system called Virtual Compute Platform. |
Power and Cooling | Cooling is the capacity of removing heat from a confined space. Power to cool comes in a variety of forms such as thermal pastes, fans, etc. |
Power Distribution | Electric power distribution is the final stage in the delivery of electric power; it carries electricity from the transmission system to individual consumers. |
Power Supply | An electronic device that supplies electric energy to an electrical load. |
Power Usage Effectiveness (PUE) | A measure of how efficiently a computer data center uses energy; specifically, how much energy is used by the computing equipment. |
Row-Based Cooling | A hot air capture architecture that neutralizes hot air from IT equipment before it has a chance to mix with the surrounding air in the room. |
Software-Defined Data Center | The phrase used to refer to a data center where all infrastructure is virtualized and delivered as a service. |
UPS Systems | A device that provides battery backup when the electrical power fails or drops to an unacceptable voltage level. |
Data Management
Technology Word | Meaning |
Amazon Elastic MapReduce (EMR) | Processes big data across a Hadoop cluster of virtual servers on Amazon Elastic compute Cloud and Amazon Simple Storage Service. |
Amazon Kinesis | Collecting and processing large streams of data records in real time. |
Anonymization | A type of information sanitation whose intent is privacy protection. |
Apache Avro | A remote procedure call and data serialization framework developed within Apache's Hadoop project. |
Apache Drill | An open source software framework that supports data-intensive distributed applications for interactive analysis of large-scale datasets. |
Apache Flume | Apache Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data. It has a simple and flexible architecture based on streaming data flows |
Apache Oozie | A server -based workflow scheduling system to manage Hadoop jobs. |
Apache Spark | An open source engine developed specifically for handling large-scale data processing and analytics. |
Apache ZooKeeper | A centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services. All of these kinds of services are used in some form or another by distributed applications. |
B2B Data | Also known as e-biz, is the exchange of products, services or information (aka e-commerce) between businesses, rather than between businesses and consumers. |
Backup and Recovery | Refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. |
Backup Software | Backup software are computer programs used to perform backup; they create supplementary exact copies of files, databases or entire computers. These programs may later use the supplementary copies to restore the original contents in the event of data loss. |
Behavioral Data | Behavioral data refers to information produced as a result of actions, typically commercial behavior using a range of devices connected to the Internet, such as a PC, tablet, or smartphone. |
Bit Error Rate Tester (BERT) | A procedure or device that measures the bit error rate of a transmission to determine if errors are introduced into the system when data is transmitted. |
Cache | A temporary storage space or memory that allows data access to data. |
Cascading | Displaying windows in a progressive order so that all the title bars appear on the screen at one time. |
Commercial Internet of Things | A term applied only to those aspects of the Internet of Things that pertain specifically to enacting business. |
Data Append | Data Append, or Data Appending, means adding data specifically to the end of a data set. |
Data Architecture | In information technology, data architecture is composed of models, policies, rules or standards that govern which data is collected, and how it is stored, arranged, integrated, and put to use in data systems and in organizations. Data is usually one of several architecture domains that form the pillars of an enterprise architecture or solution architecture. |
Data Catalogue | A data catalog belongs to a database instance and is comprised of metadata containing database object definitions like base tables, synonyms, views or synonyms and indexes. |
Data Classification | Data classification is the process of organizing data into categories for its most effective and efficient use. A well-planned data classification system makes essential data easy to find and retrieve. This can be of particular importance for risk management, legal discovery, and compliance. |
Data Cleansing / Data Scrubbing | The process of detecting and correcting corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data. |
Data Convergence | A concept based on a collection of technical reports and specifications and is currently under development within the 3rd Generation Partnership Project. |
Data Deduplication | A specialized data compression technique for eliminating duplicate copies of repeating data. |
Data Discovery | A business intelligence process for creating and using interactive reports and exploring data from multiple sources. The information technology market research firm Gartner promoted it in 2012. |
Data Distribution | The distribution of a statistical data set is a listing or function showing all the possible values of the data and how often the occur. |
Data Entry | The professional term for entering information into a computer or data-recording system using an electronic or mechanical device. |
Data Exchanges | The process of sending and receiving data in such a manner that the information content or meaning assigned to the data is not altered during the transmission. |
Data Extraction | Data extraction is the act or process of retrieving data out of data sources for further data processing or data storage. |
Data Integration | The combination of technical and business processes used to combine data from disparate sources into meaningful and valuable information. |
Data Loss | An error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. |
Data Loss Prevention | A strategy for making sure that end users do not send sensitive or critical information outside the corporate network. |
Data Preparation | Data Preparation is the process of collecting, cleaning, and consolidating data into one file or data table, primarily for use in analysis. |
Data Privacy and Protection | The relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. |
Data Profiling | Data profiling is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data. |
Data Quality | Refers to the condition of a set of values of qualitative or quantitative variables. There are many definitions of data quality but data is generally considered high quality it is 'fit for [its] intended uses in operations, decision making and planning.'. |
Data Reduction | The transformation of numerical or alphabetical digital information derived empirically or experimentally into a corrected, ordered, and simplified form. |
Data Replication and Mirroring | The creation and maintenance of redundant copies of a database. |
Data Retention | The continued storage of an organization's data for compliance or business reasons. |
Data Sharing | Data sharing is the practice of making data used for scholarly research available to other investigators. |
Data Streams | A sequence of digitally encoded coherent signals used to transmit or receive information that is in the process of being transmitted. |
Data Structures | A specialized format for organizing and storing data. |
Data Synchronization | Data synchronization is the process of maintaining the consistency and uniformity of data instances across all consuming applications and storing devices. It ensures that the same copy or version of data is used in all devices - from source to destination. |
Data Validation | In computer science, data validation is the process of ensuring that data have undergone data cleansing to ensure they have data quality, that is, that they are both correct and useful. |
Data Vaulting | Data vault modeling is a database modeling method that is designed to provide long-term historical storage of data coming in from multiple operational systems. It is also a method of looking at historical data that deals with issues such as auditing, tracing of data, loading speed and resilience to change as well as emphasizing the need to trace where all the data in the database came from. |
Digital Asset | A digital asset, in essence, is anything that exists in a binary format and comes with the right to use. Data that do not possess that right are not considered assets. |
Digital Asset Management (DAM) Software | Digital asset management software is primarily used by enterprise marketing and creative teams, so it is necessary for DAM software to accommodate a broad spectrum of creative files. |
Google BigQuery | A RESTful web service that enables interactive analysis of massively large datasets working in conjunction with Google Storage. |
Google Cloud Bigtable | A compressed, high performance, and proprietary data storage system build on Google File system, Chubby Lock Service, SSTable and a few other Google technologies. |
Hadoop | An open source, Java-based programming framework that supports the processing and storage of extremely large data sets in a distributed computing environment. |
High-Density Pods | One or more racks containing high-density equipment all clustered together with dedicated row-based cooling that is deployed as a unit. |
IBM Datastage | IBM InfoSphere DataStage is an ETL tool and part of the IBM Information Platforms Solutions suite and IBM InfoSphere. |
IBM InfoSphere DataStage | IBM InfoSphere DataStage is an ETL tool and part of the IBM Information Platforms Solutions suite and IBM InfoSphere. |
Industrial Internet of Things | The use of Internet of Things technologies in manufacturing. |
Information Architecture (IA) | Information architecture (IA) is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape. |
Location Data | Location Data is defined as any data processed in an electronic communications network or by an electronic communications service indicating the geographical position of the terminal equipment of a user of a public electronic communications service, including data relating to the latitude, longitude or altitude of the terminal equipment, the direction of travel of the user, or the time the location information was recorded. |
Machine Data | Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices. |
Master Data | Master Data represents the business objects that contain the most valuable, agreed upon information shared across an organization. It can cover relatively static reference data, transactional, unstructured, analytical, hierarchical and metadata. It is the primary focus of the information technology (IT) discipline of master data management (MDM). |
Object-Relational Mapping (ORM) | Object-relational mapping (ORM, O/RM, and O/R mapping tool) in computer science is a programming technique for converting data between incompatible type systems using object-oriented programming languages. |
Online Transaction Processing (OLTP) | A class of information systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing on a database management system. |
Point-In-Time Recovery | Point-in-time recovery (PITR) in the context of computers involves systems whereby an administrator can restore or recover a set of data or a particular setting from a time in the past. |
Protocol Analyzer | A tool used to capture and analyze signals and data traffic over a communication channel. |
Qlik Sense | Qlik Sense is a self-service data visualization and discovery application designed for individuals, groups and organizations. |
RapidMiner | RapidMiner is a data science software platform developed by the company of the same name that provides an integrated environment for data preparation, machine learning, deep learning, text mining, and predictive analytics. |
Real-Time Data | Real-time data is information that is delivered immediately after collection. There is no delay in the timeliness of the information provided. |
Recovery Point Objective (RPO) | A recovery point objective (RPO) is defined by business continuity planning. It is the maximum targeted period in which data might be lost from an IT service due to a major incident. The RPO gives systems designers a limit to work to. For instance, if the RPO is set to four hours, then in practice, off-site mirrored backups must be continuously maintained a daily off-site backup on tape will not suffice. |
Remote Sensing | Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object and thus in contrast to on-site observation. |
Search and Retrieval | The activity of obtaining information resources relevant to an information need from a collection of information resources. |
SharePoint Migration | Newborn screening is a public health program of screening in infants shortly after birth for a list of conditions that are treatable, but not clinically evident in the newborn period. |
Single Source of Truth (SSOT) | Single source of truth (SSOT), is the practice of structuring information models and associated data schema such that every data element is stored exactly once. |
Spark Streaming | An extension of the core Sparks API that enables scalable, high-throughput, fault tolerant stream processing of live data streams. |
Streaming Data | Streaming Data is data that is continuously generated by different sources. Such data should be processed incrementally using Stream Processing techniques without having access to all of the data. In addition, it should be considered that concept drift may happen in the data which means that the properties of the stream may change over time.It is usually used in the context of big data in which it is generated by many different sources at high speed. |
Database
Technology Word | Meaning |
ACID (Atomicity, Consistency, Isolation, Durability) | In computer science, ACID (Atomicity, Consistency, Isolation, Durability) of database transactions intended to guarantee validity even in the event of errors, power failures, etc. In the context of databases, a sequence of database operations that satisfies the ACID properties, and thus can be perceived as a single logical operation on the data, is called a transaction. |
Amazon Aurora | Amazon Aurora is a hosted relational database service developed and offered by Amazon since October 2014. Aurora is available as part of the Amazon Relational Database Service. |
Amazon DynamoDB | Amazon DynamoDB is a fully managed proprietary NoSQL database service that is offered by Amazon.com as part of the Amazon Web Services portfolio. |
Amazon Redshift | An internet hosting service and data warehouse product which forms part of the larger cloud-computing platform Amazon Web Services. |
Amazon Relational Database Service (Amazon RDS) | Amazon Relational Database Service (or Amazon RDS) is a distributed relational database service by Amazon Web Services. |
Analytic Database | A read-only system that stores historical data on business metrics such as sales performance and inventory levels. |
Apache Cassandra | A free and open-source distributed NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure. |
Apache CouchDB | An open source document-oriented database |
Apache HBase | The Hadoop database. |
Apache HCatalog | A table and storage management layer for Hadoop that enables users with different data processing tools to more easily read and write data on the grid. |
Apache Impala | Open source massively parallel processing query engine on top of clustered systems like Apache Hadoop. |
Apache Sqoop | Supports incremental loads of a single table or a free form SQL query as well as saved jobs which can be run multiple times to import updates made to a database since the last import. |
ArangoDB | ArangoDB is a native multi-model database system[1] developed by triAGENS GmbH. The database system supports three important data models (key/value, documents, graphs) with one database core and a unified query language AQL (ArangoDB Query Language). |
Azure Cosmos DB | Azure Cosmos DB is Microsoft's proprietary globally-distributed, multi-model database service "for managing data at planet-scale" launched in May 2017. |
Berkeley DB (BDB) | Berkeley DB (BDB) is a software library intended to provide a high-performance embedded database for key/value data. Berkeley DB is written in C with API bindings for C++, C#, Java, Perl, PHP, Python, Ruby, Smalltalk, Tcl, and many other programming languages. |
Boolean Operators | Boolean Operators are used to connect and define the relationship between your search terms. When searching electronic databases, you can use Boolean operators to either narrow or broaden your record sets. The three Boolean operators are AND, OR and NOT. |
Cloud Database | A type of database service that is built, deployed and delivered through a cloud platform. |
Cosmos DB | Azure Cosmos DB is Microsoft's proprietary globally-distributed, multi-model database service "for managing data at planet-scale" launched in May 2017. |
Database Administration | Database administration refers to the whole set of activities performed by a database administrator to ensure that a database is always available as needed. |
Database Audit | Database auditing involves observing a database so as to be aware of the actions of database users. |
Database Development | A core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one aspect of the development. |
Database Migration and Conversion | The transformation of data from one format to another and the process of transferring data between sios, formats, or systems. |
Database Security | Refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks. |
Database Servers | A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. |
Database Solutions | A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. |
Databases | A structured set of data held in a computer, especially one that is accessible in various ways. |
Electronically Stored Information (ESI) | Electronically stored information (ESI) is stored electronic information that is created and communicated in digital form. |
Enterprise Database | Used by enterprises and large organizations to manage their huge collection of data. An enterprise database is robust enough to successfully handle the queries of multiple users simultaneously, and is capable of handling a range of 100 to 10,000 users at a time. |
Extract, Transform, and Load (ETL) | Three database functions that are combined into one tool to pull data out of one database and place it into another database. |
Graph Databases | A database that uses graph structures for semantic queries with nodes, edges and properties to represent and store data. |
HDFS | A sub project of the Apache Hadoop project. |
IBM Cloudant | An IBM software product which is primarily delivered a cloud-based service. |
IBM Netezza | Designs and markets high-performance data warehouse appliances and advanced analytics applications for uses including enterprise data warehousing, business intelligence, predictive analytics and business continuity planning. |
In-Database Analytics | Consists of an enterprise data warehouse built on a an analytic database platform. |
In-Memory Technology | Processing of data stored in an in-memory database. |
InnoDB | InnoDB is a storage engine for the database management system MySQL. MySQL 5.5 and later use it by default. It provides the standard ACID-compliant transaction features, along with foreign key support. |
Interactive SQL | Interactive SQL is a utility for entering SQL statements. |
Key-Value Stores | A key-value database, or key-value store, is a data storage paradigm designed for storing, retrieving, and managing associative arrays, a data structure more commonly known today as a dictionary or hash. Dictionaries contain a collection of objects, or records, which in turn have many different fields within them, each containing data. |
LIFO (Last In, First Out) | An asset management and valuation method that assumes assets produced or acquired last are the ones used, sold or disposed of first; LIFO assumes an entity sells, uses or deposes of its newest inventory first. |
Managed Database | A collection of information that is organized so that it can be easily accessed, managed and updated. |
MariaDB | MariaDB is a community-developed fork of the MySQL relational database management system intended to remain free under the GNU GPL. |
MarkLogic | An American software business that develops and provides an enterprise NoSQL database, also named MarkLogic. |
Microsoft SQL Server | SQL Server is Microsoft's relational database management system. |
MongoDB | Several database types to arise in the mid-2000s under the NoSQL banner. |
MySQL | An open source relational database management system. |
NetWeaver | NetWeaver is an application builder designed to integrate multiple business processes and databases. NetWeaver was created by SAP AG and it enables the integration of information and processes from many geographical locations. |
NewSQL | A class of modern relational database management systems that seek to provide the same scalable performance of NoSQL systems for online transaction processing read-write workloads while still maintaining the ACID guarantees of a traditional database system. |
NoSQL | Provides a mechanism for storage and retrieval of data which is modeled in means other than the tabular relations used in relational databases. |
Open Database Connectivity (ODBC) | Open Database Connectivity (ODBC) is a standard application programming interface (API) for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and server side, with few changes to the data access code. |
Open Source Database | MySQL is an open-source relational database management system. |
Operational Data Store (ODS) | A database designed to integrate data from multiple sources for additional operations on the data. |
Oracle Database | A relational database management system from the Oracle Corporation. |
Oracle Database 12c | A high performance, enterprise-class database. |
Oracle Exadata | A database machine designed by oracle that provides users with optimized functionality pertaining to enterprise class datasets and their associated workloads. |
Oracle Multitenant | The architecture for the next generation database cloud. |
Oracle Real Application Clusters (RAC) | An option for the oracle Database software produced by Oracle Corporation and introduced in 2001 with Oracle9i - provides software for clustering and high availability in oracle database environments. |
OrientDB | OrientDB is an open source NoSQL database management system written in Java. It is a multi-model database, supporting graph, document, key/value, and object models,[2] but the relationships are managed as in graph databases with direct connections between records. |
Pivot Table | A pivot table is a table that summarizes data in another table, and is made by applying an operation such as sorting, averaging, or summing to data in the first table, typically including grouping of the data. A trivial example is a column of numbers as the first table, and the column average as a pivot table with only one row and column. |
Pivotal HAWQ | Pivotal HAWQ is a trademark and/or registered trademark of Pivotal Software, Inc. |
Redis | Redis is an open-source in-memory database project implementing a distributed, in-memory key-value store with optional durability. Redis supports different kinds of abstract data structures, such as strings, lists, maps, sets, sorted sets, hyperloglogs, bitmaps and spatial indexes. |
Relational Database Management System (RDBMS) | A database management system that is based on the relational model as invented by E.F. Codd of IBM's San Jose Research Laboratory. |
RethinkDB | RethinkDB is a free and open-source, distributed document-oriented database originally created by the company of the same name. The database stores JSON documents with dynamic schemas, and is designed to facilitate pushing real-time updates for query results to applications. |
SAP HANA | An application that uses in-memory database technology that allows the processing of massive amounts of real-time data in a short time. |
SAP IQ | A column-based, petabyte scale, relational database software system used for business intelligence, data warehousing, and data marts |
SQL | Used to communicate with a database. |
Unstructured Data | Information that either does not have a pre-defined data model or is not organized in a pre-defined manner. |
VoltDB | VoltDB is an in-memory database designed by Michael Stonebraker (who was involved in Ingres and PostgreSQL), Sam Madden, and Daniel Abadi. It is an ACID-compliant RDBMS which uses a shared nothing architecture. |
Demand Generation & Email Marketing
Technology Word | Meaning |
Above the Fold | Above the fold is the upper half of the front page of a newspaper or tabloid where an important news story or photograph is often located. Papers are often displayed to customers folded so that only the top half of the front page is visible. |
CMS Tools | CMS Tools can be defined as tools used to aid a content management system software. |
Content Aggregation | An individual or organization that gathers Web content from different online sources for reuse or resale. |
Content Governance | Content governance is the system, a set of guidelines, that determines how an organization's content gets created and published. At its most basic level, it can help you avoid getting sued or embarrassed, or both. |
Content Ingestion | The process of obtaining and importing data for immediate use or storage in a database. |
Content Management | The administration of digital content throughout its lifecycle, from creation to permanent storage or deletion. |
Content Management System (CMS) | A computer application that supports the creation and modification of digital content. It is often used to support multiple users working in a collaborative environment. |
Content Marketing | A type of marketing that involves the creation and sharing of online material (such as videos, blogs, and social media posts) that does not explicitly promote a brand but is intended to stimulate interest in its products or services. |
Content Personalization | A strategy that relies on visitor data to deliver relevant content based on audience interests and motivations. |
Content Playout | A term for the transmission of radio or TV channels from the broadcaster into broadcast networks that delivers the content to the audience. |
Content Recommendation | The transmission of radio or TV channels from the broadcaster into broadcast networks that delivers the content to the audience. |
Content Strategy | Content strategy refers to the planning, development, and management of content written or in other media. The term has been particularly common in web development since the late 1990s. |
Copywriting | The act of writing text for the purpose of advertising or other forms of marketing. |
Corporate Communications | A management function or department, like marketing, finance, or operations, dedicated to the dissemination of information to key constituencies, the execution of corporate strategy and the development of messages for a variety of purposes for inside and outside the organization. |
Employee Generated Content (EGC) | Material produced by the users of a website. |
Enterprise Content Management | Tools and strategies used to manage an organizations content |
Live Content Feed | A social IT application that provides a place to post and share content in a ServiceNow instance. |
Media Management Systems | Any task that relates to processing your media is considered to be media management, such as capturing, compressing, copying, moving, or deleting media files. |
Press Kits | A package of promotional material provided to members of the press to brief them, especially about a product, service, or candidate. |
Press Releases | An official statement issued to newspapers giving information on a particular matter. |
Print Collateral | The collection of media used to support he sales of a product or service. |
Social Content Management | Solutions to help manage outbound and incoming online interactions. |
Target Audience | A target audience is the intended audience or readership of a publication, advertisement, or other message. In marketing and advertising, it is a particular group of consumers within the predetermined target market, identified as the targets or recipients for a particular advertisement or message. |
Television Production | The system or process of producing on a distant screen a series of transient visible images, usually with an accompanying sound signal. |
User Experience (UX) | The overall experience of a person using a product such as a website or computer application, especially in terms of how easy or pleasing it is to use. |
Video Translation | Video translation is after your video audio files have been transcribed; having them translated into many different languages. |
Visual Communication | Communication through a visual aid and is described as the conveyance of ideas and information in forms that can be read or looked upon. |
WYSIWYG | A WYSIWYG editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created. WYSIWYG is an acronym for "what you see is what you get". |
Adobe Acrobat | A family of application software and Web services developed by Adobe systems to view, create, manipulate, print and manage files in Portable Document Format. |
Adobe Creative Cloud | Adobe Creative Cloud is a set of applications and services from Adobe Systems that gives subscribers access to a collection of software used for graphic design, video editing, web development, photography, along with a set of mobile applications and also some optional cloud services. |
Adobe Creative Suite | A software suite of graphic design, video editing, and web development applications developed by Adobe Systems. |
Adobe Fireworks | A discontinued bitmap and vector graphics editor, which Adobe acquired in 2005. |
Adobe Flash | A multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications and mobile games. |
Adobe Reader | Used to open PDF documents. |
Adobe Stock | Stock images for creative projects. |
Design Software | Design software refers to software that is used to create graphic designs, 3D object designs, or mathematical representations of an object or design. |
Graphic Design | The art of skill of combining text and pictures in advertisements, magazines, or books. |
Image Editing Software | Image editing software suppoers processes such as altering images, whether they are digital photographs, traditional photo-chemical photographs, or illustrations. |
Image Licensing | Image Licensing is the process of granting certain rights for the use of an image through a contract to another party. |
Photoshop | To alter a photographic image digitally using Photoshop image-editing software. |
Thumbnail | Thumbnails are reduced-size versions of pictures or videos, used to help in recognizing and organizing them, serving the same role for images as a normal text index does for words. |
Video Editing Software | Software that utilizes the process of converting an analog video signal such as that produced by a video camera or DVD player to digital video. |
Customer Acquisition | The set of methodologies and systems for managing customer prospects and inquiries that are generated by a variety of marketing techniques. |
Customer Delight | Customer delight is surprising a customer by exceeding his or her expectations and thus creating a positive emotional reaction. This emotional reaction leads to word of mouth. |
Demand Generation | The focus of targeted marketing programs to drive awareness and interest in a company's products and/or services. |
Demand Generation Consulting | Consultants that help executives of marketing the most of the latest inbound and revenue performance techniques. |
Demand Planning | Demand planning is a multi-step operational supply chain management (SCM) process used to create reliable forecasts. Effective demand planning can guide users to improve the accuracy of revenue forecasts, align inventory levels with peaks and troughs in demand, and enhance profitability for a given channel or product. |
Lead Generation | The action or process of identifying and cultivating potential customers for a business's products or services. |
Lead Generation Consulting | A consultant that helps generate marketing leads. |
Lead Generation Services | Services and strategies that generate leads. |
Lead Management | A set of methodologies, systems, and practices designed to generate new potential business clientele, generally operated through a variety of marketing campaigns or programs. |
Lead Matching | Lead Matching technologies use AI to match leads to the proper account when they are registered in a system. |
Lead Nurturing | The process of developing relationships with buyers at every stage of the sales funnel, and through every step of the buyer's journey. |
Lead Quality | A lead that can convert into an actual sale of your product or service. |
Lead Routing | Lead Routing designates a process of incoming lead distribution among sales agents. |
Lead Scoring | A methodology used to rank prospects against a scale that represents the perceived value each lead represents to the organization. |
Lead to Account Matching | Lead to Account Matching is the (automated) connecting of a lead to the account that they represent. |
Lead Tracking | The process of following up with prospects who have expressed interest in a product or service. |
Marketing Funnel | The marketing funnel is a system that helps track the stages consumers or purchasers travel through to eventually make a buying decision. |
Marketing Leads | A potential sales contact. |
Price Sensitivity | Price sensitivity is the degree to which the price of a product affects consumers' purchasing behaviors. In economics, price sensitivity is commonly measured using the price elasticity of demand. |
CAN-SPAM | The United States' first national standard for the sending of commercial e-mail and requires the DTC to enforce its provisions. |
Constant Contact | An online marketing company. |
Double Opt-In | Double opt-in is a type of email subscription where a user should confirm his or her wish to be added to the mailing list twice. |
Drip Marketing | A communication strategy that sends or 'drips' a pre-written set of messages to customers or prospects over time. |
Email Campaign | Email marketing campaigns can also be comprised of several rounds of messages meant to build familiarity and trust around a product or service. |
Email Campaigns | Email marketing campaigns can also be comprised of several rounds of messages meant to build familiarity and trust around a product or service. |
Email Deliverability | Measures the ability to deliver email messages in recipients' inboxes for email marketing campaigns and to avoid messages being lost, blocked, or driven to the spam folder. |
Email Hygiene | The removal of invalid email addresses from a file or database. |
Email List Management | Includes the tasks of publishing data cards and maximizing sales through promotional efforts. |
Email Marketing | The targeting of consumers through electronic mail. |
Email Marketing Automation | Refers to software platforms and technologies designed for marketing departments and organizations to more effectively market on multiple channels online and automate repetitive tasks. |
Email Marketing Services | Services designed to help with email marketing campaigns. |
Email Marketing Software | Service-based software that marketers use for email marketing. |
Email Marketing System | A system based on email marketing to help marketers. |
Email Marketing Tools | Tools used to service email marketing. |
Email Service Providers | A company that offers email services. |
Global Email Marketing | Global email marketing allows you to take your email marketing campaign to the next step: international audiences. |
MailChimp | An email service offered through the URL www.mailchimp.com that allows you to create, send, and manage email newsletters to individual recipients. |
Newsletter | A newsletter is a printed report containing news (information) of the activities of a business (legal name; subscription business model) or an organization (institutions, societies, associations) that is sent by mail regularly to all its members, customers, employees or people, who are interested in. |
Opt-Out | The term opt-out refers to several methods by which individuals can avoid receiving unsolicited product or service information. This ability is usually associated with direct marketing campaigns such as, e-mail marketing, or direct mail. |
Permission Email Marketing | Where Internet users sign up in advance for information about certain product categories. |
Sender Policy Framework (SPF) | Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators. |
Spam | Irrelevant or inappropriate messages sent on the Internet to a large number of recipients. |
Document Management
Technology Word | Meaning |
Adobe Sign | An Adobe Document Cloud solution is a cloud-based, enterprise-class, e-signature service that lets you replace paper and ink signature processes with fully automated electronic signature workflows. |
Digital Signature Technology | Creates a one-way has of the electronic data to be signed. |
Document Control | Procedure that describes how documents are organized, managed, and standardized within an organization |
Document Imaging | The practice of using equipment like scanners or special cameras to take a picture of information contained in another form. |
Document Management Systems (DMS) | A document management system is a system used to track, manage and store documents and reduce paper. |
Document Security | Means the security agreement, the intellectual property security |
Document Sharing | Concept of distributing or providing access to documents over a network |
Document Shredding | A mechanical device used to cut paper into either strips or fine particles. |
Document Storage | Document storage, or when we discuss document management, online document storage, is the process of storing documents as electronic files. |
Dynamic-Link Library (DLL) | Dynamic-link library (or DLL) is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. |
Electronic Document | An electronic document is any electronic media content (other than computer programs or system files) that are intended to be used in either an electronic form or as printed output. |
Enterprise Document Management | Enterprise content management is a formalized means of organizing and storing an organization's documents, and other content, that relate to the organization's processes. |
E-Signature Software | Software that allows you to sign, send, track and store documents. |
File Transfer Management | Refers to a software or a service that manages the secure transfer of data from one computer to another through a network. |
Graphics Interchange Format (GIF) | The Graphics Interchange Format, better known by its acronym GIF (/d??f/ JIF or /??f/ GHIF), is a bitmap image format that was developed by a team at the bulletin board service (BBS) provider CompuServe led by American computer scientist Steve Wilhite on June 15, 1987. |
Joint Photographic Experts Group (JPEG) | JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography. |
Portable Document Format (PDF) | The Portable Document Format (PDF) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. |
Rich Text Format (RTF) | The Rich Text Format (often abbreviated RTF) is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products. |
Right Signature | A high-;level concept meaning any electronic indication of intent to agree to a record. |
Tagged Image File Format (TIFF) | Tagged Image File Format, abbreviated TIFF or TIF, is a computer file format for storing raster graphics images, popular among graphic artists, the publishing industry,[1] and photographers. |
Video Files | A type of file format for storing digital video data on a computer system. |
Video Hosting | Allows individual end users to upload and share personal, business, or royalty-free videos and to watch them legally/ |
Virtual Data Room | A Virtual Data Room (sometimes called a VDR or deal room) is an online repository of information that is used for the storing and distribution of documents. |
Wireframing | A wireframe is a layout of a web page that demonstrates what interface elements will exist on key pages. It is a critical part of the interaction design process. |
e Commerce
Technology Word | Meaning |
Desktop Apps | An application that runs stand-alone in a desktop or laptop computer. |
Desktop Environment | An implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system, which share a common graphical user interface, sometime described as a graphical shell. |
Desktop Management | A comprehensive approach to managing all the computers within an organization. |
End User Digital | The take-away feeling an end user has after an experience in a digital environment. |
XenDesktop | XenDesktop is a desktop virtualization software platform that allows multiple users to access and run Microsoft Windows desktops that are installed at a centralized location separate from the devices from which they are being accessed. |
B2C eCommerce | B2C eCommerce or electronic commerce is used to describe a transaction conducted over the Internet between a business and a consumer for his/her personal use. |
Checkout Optimization | Checkout Optimization is a strategy used by eCommerce sites to increase conversion for online shoppers. |
Conversational Commerce | Conversational commerce is e-commerce via various means of conversation including live chat on e-commerce Web sites, live chat on messaging apps, chat-bots on messaging apps or Web sites, via voice assistants. |
IBM Blockchain | A shared, immutable ledger for recording the history of transactions. |
LevelUp | LevelUp is an American mobile ordering and mobile payments platform created by Boston, Massachusetts-based start-up SCVNGR. |
Magento | An open sourced e-commerce platform written in php. |
Online Marketplace | An online marketplace (or online e-commerce marketplace) is a type of e-commerce site where product or service information is provided by multiple third parties, whereas transactions are processed by the marketplace operator. Online marketplaces are the primary type of multichannel ecommerce and can be a way to streamline the production process. |
Payment Processing | A company, often a third party, appointed by a merchant to handle transactions from various channels such as credit cards and debit cards for merchant acquiring banks. |
PrestaShop | A free, open sour e-commerce solution. |
Recommender System | A recommender system or a recommendation system (sometimes replacing "system" with a synonym such as platform or engine) is a subclass of information filtering system that seeks to predict the "rating" or "preference" a user would give to an item. |
Shopping Cart Software | A piece of software that acts as an online store's catalog and ordering process. |
Volusion | An ecommerce solution that provides shopping cart software |
WooCommerce | An open source e-commerce plugin for WordPress. |
Email
Technology Word | Meaning |
Autoresponder | An autoresponder is a computer program that automatically answers e-mail sent to it. They can be very simple or quite complex. |
Bounced Email | A bounced email refers to any email message that is not delivered to the recipient and is returned or bounced back to the sender. |
Business Email Compromise (BEC) | A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner's identity to defraud the company or its employees, customers or partners of money. |
Domain Keys Identified Mail (DKIM) | Domain Keys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing. It allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. |
Domain-based Message Authentication, Reporting and Conformance (DMARC) | Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email-validation system designed to detect and prevent email spoofing. It is intended to combat certain techniques often used in phishing and email spam, such as emails with forged sender addresses that appear to originate from legitimate organizations. |
Email Archiving | The act of preserving and making searchable all email to/from an individual. |
Email Security | Refers to the collective measures used to secure the access and content of an email account or service. |
Email Servers | A mail server is an applications that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. |
Email Tracking | Email tracking is a method for monitoring the email delivery to the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date that an email was received or opened, as well the IP address of the recipient. |
Hosted Exchange | A service in the telecommunications industry whereby a provider makes a Microsoft e-mail box and space available on a server so its clients can host their data on the server. |
Lotus Notes | Messaging and groupware software from INM Lotus that was introduced in 1989 for OS/2 and later expanded to Windows, Mac, Unix, NetWare, As/400 and S/390. Notes provides e-mail, document sharing, workflow, group discussions and calendaring and scheduling. |
Mail Servers | A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. |
Mailing List | A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. |
Microsoft Exchange | A mail server and calendaring server developed by Microsoft. |
Outlook.com | A personal information manager from Microsoft, available as a part of the Microsoft office suite. |
Spam Filtering | A program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. |
TXT Record | A TXT record (short for text record) is a type of resource record in the Domain Name System (DNS) used to provide the ability to associate arbitrary text with a host or other name, such as human readable information about a server, network, data center, or other accounting information. |
Visual Voicemail | Visual voicemail is direct-access voicemail with a visual interface. Such an interface presents a list of messages for playback, as opposed to the sequential listening required using traditional voicemail, and may include a transcript of each message. |
Emerging Technologies
Technology Word | Meaning |
3D Printing | The action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession. |
Amplified Intelligence | Refers to the effective use of information technology in augmenting human intelligence. |
Artificial Intelligence | The theory and development of computer systems able to perform asks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages. |
Artificial Intelligence for IT Operations (AIOps) | Artificial Intelligence for IT Operations (AIOps) refers to multi-layered technology platforms that automate and enhance IT operations by using analytics and machine learning to analyze big data collected from various IT operations tools and devices, in order to automatically spot and react to issues in real time. |
Beacon Technology | Apple's technology standard, which allows Mobile Apps to listen for signals from beacons in the physical world and react accordingly. |
Chaos Group (Vray) | V-Ray is a computer-generated imagery rendering software application developed by the Bulgarian company Chaos Group |
Cognitive Computing | Cognitive computing is the simulation of human thought processes in a computerized model. |
Computer Vision | a field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that a human can do. |
Decision Manager | Decision Managers are business rules management systems used in finance, operations, event processing, fraud detection and more. |
Deep Learning | The application to learning tasks of artificial neural networks that contain more than one hidden layer. |
Digital Disruption | The change that occurs when new digital technologies and business models affect the value proposition of existing goods and services. |
Digital Twin | Digital twin refers to a digital replica of physical assets (physical twin), processes and systems that can be used for various purposes. The digital representation provides both the elements and the dynamics of how an Internet of Things device operates and lives throughout its life cycle. |
Disk Imaging | Disk imaging refers to copying the contents of a data storage device or medium, and transferring this to another, similar medium or device. |
Disruptive Technologies | A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry. |
Edge-Computing Model | A distributed information technology architecture in which client data is processed at the periphery of the network, as close to the originating source as possible. |
Emerging Technologies | A new technology that is currently being developed, or will be developed within the next five to ten years. |
Exascale Computing | Refers to computing systems capable of a least one exaFLOPS, or a billion calculations per second. |
Foundry (Modo) | Modo (stylized as MODO, originally modo)[3] is a polygon and subdivision surface modeling, sculpting, 3D painting, animation and rendering package developed by Luxology, LLC, which is now merged with and known as Foundry. |
High Performance Computing | The use of parallel processing for running advanced application programs efficiently, reliably and quickly. |
IBM Watson | A question answering computer system capable of answering questions posed in natural language, developed in IBM's DeepQA project by a research team led by principal investigator David Ferrucci. |
Image Recognition | the ability of software to identify objects, places, people, writing and actions in images. Computers can use machine vision technologies in combination with a camera and artificial intelligence software to achieve image recognition. |
Intelligent Virtual Assistants (IVA) | An Intelligent Virtual Assistant is an artificial intelligence system that emulates human interaction to perform particular tasks, like customer service. Virtual Assistants are proliferating because of deep neural networks, machine learning, and other advancements in AI technologies. |
Machine Learning | An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. |
Maxon (Cinema 4D) | CINEMA 4D is a 3D modeling, animation, motion graphic and rendering application developed by MAXON Computer GmbH in Germany. |
Mixed Reality | Mixed reality (MR), sometimes referred to as hybrid reality, is the merging of real and virtual worlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real time. Mixed reality takes place not only in the physical world or the virtual world, but is a mix of reality and virtual reality, encompassing both augmented reality and augmented virtuality via immersive technology. |
Motion Control | A sub field of automation, encompassing the systems or sub-systems involved in moving parts of machines in a controlled manner. |
Motion Graphics | Motion Graphics are pieces of digital footage or animation which create the illusion of motion or rotation, and are usually combined with audio for use in multimedia projects. |
Neural Networks | A computer system modeled on the human brain and nervous system. |
Optical Character Recognition (OCR) | The identification of printed characters using photoelectric devices and computer software. |
Projection Mapping | Also known as video mapping and spatial augmented reality, is a projection technology used to turn objects, often irregularly shaped, into a display surface for video projection. |
Projection Technology | Any technology used to project passages of text, maps, diagrams, and 3/d objects as well as video. |
Propulsion Technology | A means of creating force leading to movement. |
Raster Graphics | A raster graphics or bitmap image is a dot matrix data structure, representing a generally rectangular grid of pixels, or points of color, viewable via a monitor, paper, or other display medium. Raster images are stored in image files with varying formats. |
Realtime 3D Visualization | Realtime processing of a variety of technologies that make images and movies appear more lifelike in print, on the computer, in the cinema or on TV. |
Remote Terminal Unit | A remote terminal unit (RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects. |
Robotic Process Automation (RPA) | An emerging form of clerical process automation technology based on the notion of software robots or artificial intelligence workers. |
SideFX (Houdini) | Houdini is a 3D animation application software developed by Side Effects Software based in Toronto. Side Effects adapted Houdini from the PRISMS suite of procedural generation software tools. Its exclusive attention to procedural generation distinguishes it from other 3D computer graphics software. |
Smart Cities | A city can be defines as smart when investments in human and social capital and traditional and modern communication infrastructure fuel sustainable economical development and a high quality of life, with a wise management of natural resources, through participatory action. |
Storyboarding | A storyboard is a graphic organizer in the form of illustrations or images displayed in sequence for the purpose of pre-visualizing a motion picture, animation, motion graphic or interactive media sequence. |
Virtual Reality (VR) | Virtual reality (VR) is a computer-generated scenario that simulates experience through senses and perception. The immersive environment can be similar to the real world or it can be fantastical, creating an experience not possible in our physical reality. |
Visual Effects (VFX) | Visual Effects (abbreviated VFX) is the process by which imagery is created or manipulated outside the context of a live action shot in film making. |
Enterprise Applications
Technology Word | Meaning |
Applications Architecture | Applications architecture or application architecture is one of several architecture domains that form the pillars of an enterprise architecture (EA). |
Demand Management | Demand management is a planning methodology used to forecast, plan for and manage the demand for products and services. This can be at macro-levels as in economics and at micro-levels within individual organizations. |
Digital Process Technologies | A base two process. Digitized information is recorded in binary code of combinations of the digits 0 and 1, also called bits, which represent words and images. Digital technology enables immense amounts of information to be compressed on small storage devices that can be easily preserved and transported. |
Enterprise Agile Requirements | How an organization can adopt an Agile approach to developing the critical applications needed to survive. |
Enterprise Application Integration | The use of technologies and services across an enterprise to enable the integration of software applications and hardware systems. |
Enterprise Application Security | Refers to the protection of enterprise applications from external attacks, privilege abuse and data theft. |
Enterprise Applications | A large software system platform designed to operate in a corporate environment such as a business or government. |
Enterprise Architecture | A conceptual blueprint that defines the structure and operation of an organization. |
Enterprise Asset Management | Optimal lifecycle management of the physical assets of an organization. |
Enterprise Collaboration | A system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public internet. |
Enterprise Computing | A buzzword that refers to business oriented information technology that is critical to a company's operations. |
Enterprise Information Integration / Metadata Management | The ability to support a unified view of data and information for an entire organization. |
Enterprise Information Management (EIM) | Enterprise information management (EIM) is a field of interest within information technology. It specializes in finding solutions for optimal use of information within organizations, for instance to support decision-making processes or day-to-day operations that require the availability of knowledge. |
Enterprise Infrastructure | A type of enterprise software or program specifically designed to help business organizations perform basic tasks such as a workforce support, business transactions and internal services and processes. |
Enterprise Labeling Software | Software used to design, print and track labels. |
Enterprise Mobility | The trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks. |
Enterprise Performance Management / Balanced Scorecard | A strategic planning and management system that organizations use to communicate what they a re trying to accomplish, align the day-to-day work that everyone is doing with strategy, prioritize projects, products, and services, and measure and monitor progress towards strategic targets. |
Enterprise Service Bus | Implements a communication system between mutual interacting software applications in a service oriented architecture. |
Enterprise Software | Also known as enterprise application software, is computer software used to satisfy the needs of an organization rather than individual users. |
Enterprise Systems Management | Refers to enterprise-wide administration of distributed systems including computer systems. |
Enterprise Voice | Refers to software that provides 'internet telephone capabilities specifically designed to fit the needs of large organizations. |
Enterprise Wearables | Electronics that can be worn on the body, either as an accessory or as part of material used in clothing. |
G Suite | G Suite is a brand of cloud computing, productivity and collaboration tools, software and products developed by Google. |
Google For Work | Google for Work (also referred to as Google Apps for Work) was a service from Google that provides customizable enterprise versions of several Google products using a domain name provided by the customer. |
Host Analytics | A vendor that sells cloud-based corporate performance management software. |
Hybrid IT | An approach to enterprise computing in which an organization provides and manages some information technology resources in-house but uses cloud-based services for others. |
IBM Websphere Commerce | A suite of software products used to create and integrate appliations |
Industrial High-Performance Computing | Often refers to the application of HPC to engineering problems and includes computational fluid dynamics, simulation, modeling, and seismic tomography. |
IT Project Portfolio Management | The centralized management of the processes, methods, and technologies used by it project managers and project management offices to analyze and collectively manage current or proposed projects based on numerous key characteristics. |
Liferay | A free and open source enterprise portal software product primarily used to power corporate intranets and extranets |
Oracle Commerce Platform | An omnichannel ecommerce platform that includes B2B and B2C modules |
Oracle E-Business Suite | A group of integrated Internet-based applications from Oracle. |
Oracle HCM Cloud | Software for HR functions that balance people, process and technology to improve workforce. |
Oracle Hyperion | A comprehensive, Web-based application that delivers global financial consolidation, reporting and analysis in a single, highly scalable software solution. |
Oracle WebCenter | A web platform for creating intranets, extranets, composite applications, and self-service portals |
Seamless Integration | Seamless integration is the process where a new module or feature of an application or hardware is added or integrated without resulting in any discernable errors or complications. |
Service Catalog | The only part of the iTIL Service portfolio published to Customers, and is used to support the sale and delivery of IT Services. |
TurboTax | TurboTax is an American tax preparation software package developed by Michael A. Chipman of Chipsoft in the mid-1980s. |
Unified Operations | End of sale and end of life products offered by Cisco. |
WordPress VIP | An enterprise content management system |
Events / Web Conference
Technology Word | Meaning |
Audience Engagement | Audience Engagement during an event or conference refers to the extent to which an audience is engaged via certain methods such as interactive elements, gamifications, etc. |
Event Apps | Event Apps is an app for an event intended for use by attendees. |
Event Audio/Visual | Event Audio/Visual refers to the audio and visual equipment used for large ballrooms, breakout sessions, or other meetings held during an event or conference. |
Event Catering | Business of providing food service at a remote site or a site such as a hotel, public house, or other location. |
Event Negotiations | Event Negotiations refers to strategies used for negotiations items related to events and conferences. |
Event Planning | Includes budgeting, scheduling, site selection, acquiring necessary permits, coordinating transportation and parking, arranging for speakers or entertainers, etc. |
Event Site Selection | Event Site Selection is the process an organization goes through to select a destination (most often a city), and often also a venue (typically a convention center, hotel, or other meeting place) for a conference, tradeshow, or meeting. |
Adobe Summit | Annual digital marketing summit hosted by Adobe |
Ad-Tech Conferences | Conferences focused advertising technology |
Autodesk University (AU) | Autodesk University (AU) includes conferences for those who design, create, and make the world around us and online learning for Autodesk users to learn about our latest innovations and industry trends. |
B2B Marketing Exchange | A B2B marketing conference where over 900 marketers that consists of awards ceremonies, educational panels, and sessions all about marketing and sales |
Ban-The-Box | Ban the Box is the name of an international campaign by civil rights groups and advocates for ex-offenders, aimed at persuading employers to remove from their hiring applications the check box that asks if applicants have a criminal record. |
Bike to Work Day | Bike to Work Day is an annual event held on various days in the Spring across the United States and Canada that promotes the bicycle as an option for commuting to work. |
CFO Summit | Monthly teleconference attended by finance executives |
Consumer Electronics Show (CES) | Annual trade show organized by the Consumer Technology Association |
Corporate Counsel & Compliance Exchange | Allows corporate counsel and senior compliance executives with the unique opportunity to be updated on important legal and regulatory developments while networking. |
CRM Evolution | A conference of the brightest and most influential people in the CRM industry involving key note speakers, workshops, and other activites to generate and expand CRM knowledge and skills |
Dreamforce | Conference put on by Salesforce, a cloud-based customer service software provider. |
Enterprise Risk Management Conference | Conference focused on Enterprise Risk Management |
ERE Recruiting Conference | Annual conference for talent acquisition leaders, organized by ERE Media |
Forbes Womens Summit | Conference featuring women and exploring the intersection of power and passion. |
Forrester Events | Meetings organized by Forrester |
Gartner Events | Organizer of tech and IT conferences for executives. |
Global Finance and Credit Conference | Annual conference organized by Global New Beginnings |
GMA Legal Conference | Annual Conference for consumer packaged goods professionals, organized by he Grocery Manufacturers Association (GMA) |
HRO Conference | Annual conference for human resources professionals, organized by Human Resources Outsourcing Today Services and Technology Association |
HRO Forum | Conference for HR executives to define the future of HR services and technology. |
HubSpot INBOUND | INBOUND is a community of people who are passionate about marketing, selling, and delighting customers in an inbound way. Our annual event and year-round media platform inspire and educate hundreds of thousands of people so that they and their businesses can grow better. |
i4CP Conference | Annual conference for human resources professionals, organized by the Institute for Corporate Productivity |
IBM InterConnect | Annual conference of cloud, devops, iot, security, and other related technical professionals. |
Intellectual Property Law Conference | Annual conference focused on intellectual property law, organized by the American Bar Association |
International Association for Contract and Commercial Management (IACCM) | Professional non-profit organization that aims to promote international standards for trade relationships |
IQPC Telecom B2B Conferences | Conference for B2B practitioners. |
LegalTech Show | Annual conference for law professionals focused on legal technology |
LinkedIn Talent Connect | Annual conference for talent professionals |
Marketo Marketing Nation Summit | The Marketing Nation Summit brings together the best and brightest in digital transformation of marketing, advertising, IT, services, and beyond. |
Microsoft Ignite | An annual conference for developers and IT professionals |
Microsoft Inspire | An annual conference held by Microsoft Corporation for its partner community |
Microsoft Worldwide Partner Conference (WPC) | Annual conference to connect with partners, Microsoft employees and industry experts. |
MIT Sustainability Summit | Annual summit concerning sustainability challenges, organized by Massachusetts Institute of Technology students |
Mobile World Congress | Annual conference focused on the mobile industry, organized by the Groupe Special Mobile Association |
NASCC: The Steel Conference | NASCC: The Steel Conference is the premier educational and networking event for the structural steel industry, bringing together structural engineers, structural steel fabricators, erectors and detailers. |
Oracle Open World | Annual conference for business professionals, organized by Oracle |
Print + ePublishing Conference (PePcon) | Annual conference focusing on the digital publishing. |
RSA Conference | Annual series of IT security conferences. |
SaasStr Annual | A massive SaaS event involving workshops, CEO interviews and more. |
Shop.org | Shop.org is the annual e-commerce event that focuses on practical and usable insights for retail thinkers and doers. |
Shoptalk | Shoptalk is the world's largest retail and ecommerce conference that covers the ongoing transformation of retail and the evolution of how consumers discover, shop and buy in a digital age from new technologies and business models to the latest trends in consumer behaviors, preferences and expectations. |
SiriusDecisions Summit | An annual sales and marketing conference and seminar hosted by global B2B research and advisory firm SiriusDecisions since 2006 that brings together marketing, sales and product professionals and executives to discuss how alignment between their disciplines can solve business problems. |
Small Business Expo | Annual B2B conference for small business owners and entrepreneurs |
Social Media Strategies Summit | Annual social media conference for digital marketing and communications professionals |
Society for Human Resource Management (SHRM) | Professional organization for HR professionals |
South By Southwest (SXSW) | Annual event where film, music, and interactive media festivals take place |
Symposium | A symposium is generally defined as a meeting organized so that experts in a given field can meet, present papers, and discuss issues and trends or make recommendations for a certain course of action. |
TechCrunch Disrupt | Annual conference for investors and entrepreneurs, where startups launch their products |
TED (Technology, Entertainment, Design) | TED (Technology, Entertainment, Design) is a media organization which posts talks online for free distribution, under the slogan "ideas worth spreading". |
The Crunchies Award | Award granted by technology blogs to Silicon Valley companies and associated venture capitalists |
Women in Law Conferences | Conferences held for female law professionals |
Workforce Planning & Analytics Conference | Strategic HR conference focusing on workforce planning, talent shortages, head count strategy and analytics. |
World Business Forum | Annual international conference held for business professionals, organized by World of Business Ideas (WOBI) |
Gaming
Technology Word | Meaning |
Call Of Duty (COD) | A legal term describing the necessity to carry out a job or duty, such as a police case, military assault/wartime actions, or other military or highly important jobs. |
Cloud Gaming | Cloud gaming, sometimes called gaming on demand, is a type of online gaming. Currently there are two main types of cloud gaming: cloud gaming based on video streaming and cloud gaming based on file streaming. |
Computer-Aided Design (CAD) | Software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. |
Console Games | Any game played with a console, either via TV or computer. |
Game Makers | Game Makers was a TV show that aired on G4 from September 4, 2003,[1] to 2006. The series followed the process of video game development, as a company attempts to finish a new video game in time for shipment. |
Gaming Design | Game design is the art of applying design and aesthetics to create a game for entertainment or for educational, exercise, or experimental purposes. |
Gaming Solutions | Gaming Solutions are products or software used by game developers and companies to help build and design their game. |
Gran Turismo | A sim racing video game. |
Independent Games | A video game that is created without the financial support of a publisher. |
Massively Multiplayer Online Game | A massively multiplayer online game (MMOG, or more commonly, MMO) is an online game with large numbers of players, typically from hundreds to thousands, on the same server. |
Mobile Gaming | Mobile Gaming is gaming on a mobile device such as a smartphone or tablet. |
Online Gaming | An online game is a video game that is either partially or primarily played through the Internet or any other computer network available . |
PC Games | Video games played on a personal computer rather than a dedicated video game console or arcade machine. |
PlayStation VR | A virtual reality headset developed by Sony Interactive Entertainment. |
PlayStation Vue | American over-the-top (OTT) Internet television service that is owned by Sony. |
Smartphone and Tablet Games | A video game played on a feature phone, smartphone, smartwatch, PDA, tablet computer, portable media player or calculator. |
Social and Online Games | Playing online games that allow or require social interaction between players, as opposed to playing games in solitude. |
Virtual Worlds | A virtual world is a computer-based simulated environment which may be populated by many users who can create a personal avatar, and simultaneously and independently explore the virtual world, participate in its activities and communicate with others. |
Hardware / Peripherals
Technology Word | Meaning |
4K (Display) | One of the two resolutions of ultra high definition television targeted towards consumer television. |
4k Media Transfer | Transfer of film elements that were scanned at a 4k resolution. |
4K2K | Ultra high definition. |
5K (Display) | A computer monitor with 2,800 lines of resolution. |
Adapter Cards | Any internal expansion card that allows the computer to communicate with another peripheral such as a monitor. |
AR Hardware | Hardware components for Augmented Reality, which includes a processor, display, sensors and input devices. |
Automatic Identification and Capture (AIDC) | Refers to the methods of automatically identifying objects, collecting data about them, and entering them directly into computer systems, without human involvement. |
Backward Compatible | Backward compatible refers to a hardware or software system that can use the interface of an older version of the same product. |
Bridge | A bridge is a device that connects two local-area networks (LANs), or two segments of the same LAN. |
Cable Assemblies | A cable assembly is a group of cables or wires that are arranged into a single unit. Cable assemblies are often used for transmitting power or informational signals and provide the power of several individual cables and organize them in an easier to install package that is also easier to replace and maintain. |
Circuit Design | Can cover systems ranging from complex electronic systems all the way down to the individual transistors within an integrated circuit. |
Compute Module | A computer module is a selection of independent electronic circuits packaged onto a circuit board to provide a basic function within a computer. An example might be an inverter or flip-flop, which would require two or more transistors and a small number of additional supporting devices. |
Conference Phones | A Conference Phone is a telephone device used in conference calls. |
Coprocessor | A coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). Operations performed by the coprocessor may be floating point arithmetic, graphics, signal processing, string processing, encryption or I/O Interfacing with peripheral devices. |
Curved Monitor | A model of display technology that features three-dimensional screens instead of two-dimensional screens. |
Cyclic Redundancy Check (CRC) | A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. |
Desk Phone | A desk phone is a phone located on desk and used by employees in organization. |
Digital Versatile Disc (DVD) | DVD (an abbreviation of "digital video disc" or "digital versatile disc") is a digital optical disc storage format invented and developed by Philips and Sony in 1995. The medium can store any kind of digital data and is widely used for software and other computer files as well as video programs watched using DVD players. |
DisplayPort | DisplayPort is a digital display interface developed by a consortium of PC and chip manufacturers and standardized by the Video Electronics Standards Association. |
Double Data Rate (DDR) | DDR refers refers to a data transfer method where the data transfers on both the rising and falling edges of the clock signal (double data rate) |
Dual Monitors | Two monitors on the same computer. |
eCard | E-card is similar to a postcard or greeting card, with the primary difference being that it is created using digital media instead of paper or other traditional materials. |
Eco-Friendly Printers | Involves the use of low-VCO inks, recycled paper, energy-efficient computers and equipment, remanufactured laser toner cartridges and ink cartridges for printers, paperless information dissemination, attempts to educate the public on green printing. |
Electronic Benefits Transfer (EBT) | Electronic benefit transfer (EBT) is an electronic system that allows state welfare departments to issue benefits via a magnetically encoded payment card, used in the United States. |
Electronic Component | An electronic component is any basic discrete device or physical entity in an electronic system used to affect electrons or their associated fields. |
Electronic Logging Device (ELD) | Electronic Logging Device (ELD or E-Log) is electronic hardware that is attached to a commercial motor vehicle engine to record driving hours. The driving hours of commercial drivers (truck and bus drivers) are regulated by a set of rules known as the hours of service (HOS). |
Electronic Numerical Integrator and Calculator (ENIAC) | ENIAC (Electronic Numerical Integrator and Computer) was amongst the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve "a large class of numerical problems" through reprogramming. |
Ereader | Ereader is a handheld device on which electronic versions of books, newspapers, magazines, etc., can be read. |
GPU Clusters | A computer cluster in which each node is equipped with a Graphics Processing Unit. |
Graphics Processing Unit (GPU) | A graphics processing unit (GPU) is a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. |
Hard Drives | A high capacity, self constrained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit/ |
Hardware | The machines, wiring, and other physical components of a computer or other electronic system. |
Hardware Engineering | A person involved with the design, implementation and testing of hardware. |
Hardware Failures | A malfunction within the electronic circuits or electomechanical components of a computer system. |
Hardware Infrastructure | Refers to an enterprise's entire collection of hardware, software, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services. |
Hardware Innovation | Hardware Innovation can be defined as any new idea or development concept related to hardware that advances or improves on existing hardware. |
Hardware Resources | The assignable, addressable bus paths that allow peripheral devices and system processors to communicate with each other. |
Hardware/Peripherals | A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way. |
HDMI (High-Definition Multimedia Interface) | HDMI (High-Definition Multimedia Interface) is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device. |
Hub | A hub is the most basic networking device that connects multiple-computers or other network devices together. Unlike a network switch or router, a network hub has no routing tables or intelligence on where to send information and broadcasts all network data across each connection. |
Hybrid Computer | Computers that exhibit features of analog computers and digital computers. |
Inductor | An Inductor, also called a coil, choke or reactor, is a passive two-terminal electrical component that stores energy in a magnetic field when electric current flows through it. |
Industrial Computer | An industrial PC is an x86 PC-based computing platform for industrial applications. |
In-Plane Switching (IPS) | A screen technology for liquid crystal displays (LCDs). |
Intel Joule | Intel Joule is a high performance system-on-module (SOM) in a tiny, low-power package thus making it ideal for computer vision, robotics, drones, industrial IoT, VR, AR, micro-servers and other applications that require high-end edge computing. |
Interactive Projector | A large interactive display in the form factor of a whiteboard. |
Interactive Whiteboards | A computer driven device, allowing users to access and manipulate electronic files by means of a projector |
Large-Format Display | Most are either LED, LCD or Plasma and can be used to display television through the HDMI cable, digital signage, welcome boards and messages. |
LED Displays | A flat panel display, which uses an array of light-emitting diodes as pixels for a video display. |
Limit Switch | A limit switch is an electromechanical device that consists of an actuator mechanically linked to a set of contacts. When an object comes into contact with the actuator, the device operates the contacts to make or break an electrical connection. |
Load Balancer | A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of. servers. |
Mainframes | A large high-speed computer, especially one supporting numerous workstations or peripherals. |
Mobile Projector | A handheld projector is technology that applies the use of an image projector in a handheld device. |
Monitors | Computer screen or display. |
Motherboard | The motherboard is a computer's central communications backbone connectivity point, through which all components and external peripherals connect. |
Multi-Function Printing | An office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting. |
Multimedia Monitor | A monitor that contains built-in speakers and a camera. |
Multi-Touch Displays | A method of input on a touchscreen that allows two or more fingers to be used on the screen at one time. |
Office Printers | A device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. |
OLED Display | A display technology that offers bright, colorful images with a wide viewing angle, low power, high contrast ratio and fast response time for sports and action movies. |
Optical Drives | Uses laser light to read data from or write data to an optical disc. |
Passive Components | Passive Components are electronic components that do not require a source of energy to perform their intended functions. |
Peripheral Component Interconnect (PCI) Express | A serial expansion bus standard for connecting a computer to one or more peripheral devices. |
Position Sensors | A Position Sensor is any device that permits position measurement. |
Power Cable | A power cable is an electrical cable, an assembly of one or more electrical conductors, usually held together with an overall sheath. The assembly is used for transmission of electrical power. |
Power Connectors | Power Connectors have been engineered to connect power in applications that include home appliances, satellites, and even equipment that sits on the ocean floor. |
Pressure Sensors | A Pressure Sensor is a device for pressure measurement of gases or liquids. |
Printers | A machine for printing text or pictures onto paper, especially one linked to a computer. |
Printing Solutions | Software used to maximize and optimize printing efficiency in large or complex organizations. |
Processing Equipment | Equipment required when using physical or chemical methods for mechanical and/or thermal treatment or processing of a raw material or product. |
Processors | Another term for central processing unit. |
Projector | An object that is used to project rays of light, especially an apparatus with a system of lenses for projecting slides or film onto a screen. |
Public Address System (PA system) | A sound amplification system used to allow a person or persons to address an audience at a greater volume than would be possible or practicable without such a system. |
Quantum Computing | Is an area of study focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum level. |
Raspberry Pi | The Raspberry Pi is a series of small single-board computers developed in the United Kingdom by the Raspberry Pi Foundation to promote the teaching of basic computer science in schools and in developing countries. |
Reduced Instruction Set Computer (RISC) | The clock rate of a CPU is limited by the time it takes to execute the slowest sub-operation of any instruction; decreasing that cycle-time often accelerates the execution of other instructions. The focus on "reduced instructions" led to the resulting machine being called a "reduced instruction set computer" (RISC). |
Relays | Relays are switches that open and close circuits electromechanically or electronically. Relays control one electrical circuit by opening and closing contacts in another circuit. |
Resistors | A Resistor is a passive two-terminal electrical component that implements electrical resistance as a circuit element. |
RFID | A technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. |
Rotary Encoders | A Rotary Encoder, also called a shaft encoder, is an electro-mechanical device that converts the angular position or motion of a shaft or axle to analog or digital output signals. |
Scanner | A scanner is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.Scanners come in hand-held, feed-in, and flatbed types and for scanning black-and-white only, or color. |
Serial ATA (SATA) | Serial ATA (SATA) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. |
Set-Top Box (STB) | A set-top box is a hardware device that allows a digital signal to be received, decoded and displayed on a television. |
Single-Board Computer (SBC) | A single-board computer (SBC) is a complete computer built on a single circuit board, with microprocessor(s), memory, input/output (I/O) and other features required of a functional computer. |
Smart Board | An interactive whiteboard that uses touch detection for user input (for example scrolling and right mouse-click) in the same way as normal PC input devices. |
Smart Cards | A plastic card with a built-in microprocessor, used typically for electronic processes such as financial transactions and person identification. |
Supercomputing | A particularly powerful mainframe computer. |
Switched-Mode Power Supply (SMPS) | A switched-mode power supply (SMPS) is an electronic circuit that converts power using switching devices that are turned on and off at high frequencies, and storage components such as inductors or capacitors to supply power when the switching device is in its non-conduction state. |
System On a Chip (SoC) | A system on a chip or system on chip (SoC or SOC) is an integrated circuit (also known as an "IC" or "chip") that integrates all components of a computer or other electronic systems. |
System-on-Module (SoM) | A system on a module (SOM) is a board-level circuit that integrates a system function in a single module.' |
Torque Sensors | A Torque Sensor is a transducer that converts a torsional mechanical input into an electrical output signal. |
Touch Monitor | A computer display screen that is also an input device. |
Touch Overlay | A clear touch panel that allows the user to command the computer by touching displayed buttons on screen. |
Touch Screen Monitor | An input and output device normally layered on the top of an electronic visual display of an information processing system. |
Transformers | A Transformer is a static electrical device that transfers electrical energy between two or more circuits through electromagnetic induction. |
Transparent Displays | Transparent OLED is a breakthrough transparent display technology that displays dynamic or interactive information on a transparent surface glass. |
Transparent LCD | A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals. |
Tricorder | A tricorder is a multifunction hand-held device used for sensor (environment) scanning, data analysis, and recording data. |
Ultrasonic Sensors | Ultrasonic transducers or ultrasonic sensors are a type of acoustic sensor divided into three broad categories: transmitters, receivers and transceivers. |
Used Hardware | Hardware piece or complete setups that have preciously been used. |
Vibration Sensors | Vibration Sensors are sensors for measuring, displaying, and analyzing linear velocity, displacement and proximity, or acceleration. |
vPro Chip | vPro hardware is found in a device's CPU or chipset as well as in its wireless connectivity chips. |
Webcam | A webcam is a video camera that feeds or streams its image in real time to or through a computer to a computer network. |
Wire Harnessing | Wire Harnessing also known as cable harnessing is basically an assembly of wires which transmit electric signals. These wires are clipped together by ties, laces, tape or a conduit strung together or in a combination thereof. |
Workstations | A desktop computer terminal, typically networked and more powerful than a personal computer. |
Health Tech
Technology Word | Meaning |
Advanced Visualization | General term that describes any effort to help people understand the significance of data by placing it in a visual context. |
Appointment Management | A software system that helps keep track of and make appointments. |
Bedside Technology | Laboratory and other services provided to patients at the bedside including diagnostic and laboratory testing using automated information entry systems. |
Clinical Decision Support (CDS) | Provides clinicians, staff, patients, or other individuals with knowledge and person-specific information, intelligently filtered or presented at appropriate times, to enhance health and health care. |
Clinical Trial Management System (CTMS) | A Clinical Trial Management System (CTMS) is a software system used by biotechnology and pharmaceutical industries to manage clinical trials in clinical research. The system maintains and manages planning, performing and reporting functions, along with participant contact information, tracking deadlines and milestones. |
Computer-Assisted Coding (CAC) | Software that analyzes healthcare documents and produces appropriate medical codes for specific phrases and terms within the document. |
Computerized Physician Order Entry (CPOE) | The process of a medical professional entering medication orders or other physician instructions electronically instead of on paper charts. |
Contract Research Organization (CRO) | A contract research organization (CRO) is an organization that provides support to the pharmaceutical, biotechnology, and medical device industries in the form of research services outsourced on a contract basis. |
Datamonitor | Independent group of experts who monitor patient safety and treatment efficacy data while a clinical trial is ongoing. |
Decision Support Systems | A set of related computer programs and the data require to assist with analysis and decision-making within an organization. |
e-Forms | A computer program version of a paper form. |
e-Health | Healthcare practice supported by electronic processes and communication. |
Elastography | Medical imaging modality that maps the elastic properties of soft tissue. |
Electrocardiography (EKG) | A test that checks for problems with the electrical activity of a heart. |
Electroencephalography (EEG) | A test that detects electrical activity in your brain using small flat metal discs attached to your scalp. |
Electronic Common Technical Document (eCTD) | The electronic common technical document (eCTD) is an interface and international specification for the pharmaceutical industry to agency transfer of regulatory information. |
Electronic Data Capture (EDC) | An electronic data capture (EDC) system is a computerized system designed for the collection of clinical data in electronic format for use mainly in human clinical trials. EDC replaces the traditional paper-based data collection methodology to streamline data collection and expedite the time to market for drugs and medical devices. |
Electronic Health Record (EHR) | Electronic version of a patients medical history, that is maintained by the provider over time, and may include all of the key administrative clinical data relevant to that persons care under a particular provider, including demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. |
Electronic Health Record (EHR) Replacement | The electronic replacement of paper charts, is the record of patient health information generated by encounters at one particular provider. |
Electronic Medical Records (EMR) | A digital version of the traditional paper-based medical record for an individual. |
Electronic Prescriptions for Controlled Substances (EPCS) | Electronic prescriptions for controlled substances, also known as EPCS is a technology solution to help address the problem of prescription drug abuse in the United States. The rule Electronic Prescriptions for Controlled Substances, provides practitioners with the option of writing and transmitting prescriptions for controlled substances electronically. The regulations also permit pharmacies to receive, dispense, and archive these electronic prescriptions. |
Electronic Trial Master File (eTMF) | An electronic trial master file (eTMF) is a trial master file in electronic (digital content) format. It is a type of content management system for the pharmaceutical industry, providing a formalized means of organizing and storing documents, images, and other digital content for pharmaceutical clinical trials that may be required for compliance with government regulatory agencies. |
Endoscopy | A procedure in which an instrument is introduced into the body to give a view of its internal parts. |
Enterprise Master Patient Index (EMPI) | An Enterprise Master Patient Index is a database that is used across a healthcare organization to maintain consistent, accurate and current demographic and essential medical data on the patients seen and managed within its various departments. |
e-Prescribing | A technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions. |
Fluoroscopy | An imaging technique that uses x-rays to obtain real-time moving images of the interior of an object. |
Good Clinical Practice (GCP) | Good clinical practice (GCP) is an international quality standard that is provided by ICH, an international body that defines a set of standards, which governments can then transpose into regulations for clinical trials involving human subjects. |
Health Information Exchange (HIE) | The mobilization of health care information electorically across organizations within a region, community or hospital system. |
Health IT Consulting | Management analysts employed by the healthcare industry. |
Healthcare Big Data | Refers to electronic health data sets so large and complex that they are difficult or impossible to manage with traditional software and/or hardware; nor can they be easily managed with traditional or common data management tools and methods. |
Healthcare Interoperability | The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged. |
Healthcare Pagers | A Healthcare pager is used by either medical patients or staff members to page medical staff members. |
HL 7 Interface | Refers to a set of international standards for transfer of clinical and administrative data between software applications used by various healthcare providers. |
ICD-10 | The 10th revision of the International Statistical Classification of Diseases and Related Health Problems, a medical classification list by the World Health Organization. |
ICD-10 Conversion | The ICD-9 to ICD-10 conversion is mandated by the US government's Department of Health and Human Services. |
In Vitro Diagnostics (IVD) | In vitro diagnostic products are those reagents, instruments, and systems intended for use in diagnosis of disease or other conditions, including a determination of the state of health, in order to cure, mitigate, treat, or prevent disease or its sequelae. |
Magnetoencephalography | A functional neuroimaging technique for mapping brain activity by recording magnetic fields produced by electrical currents occurring naturally in the brain, using very sensitive magnetometers. |
Medical Devices | Medical machine, contrivance, implant, in vitro reagent, or other similar or related article, including a component part, or accessory tat is: Recognized in the official National Formulary, or the US Pharmacopoeia, or any supplement to them. |
Medical Equipment | Medical equipment (also known as armamentarium) is designed to aid in the diagnosis, monitoring or treatment of medical conditions. |
Medical Image Sharing / Exchange | A term for the electronic exchange of medical images between hospitals, physicians and patients. |
Medical Imaging | The technique and process of creating visual representations of the interior of a body for clinical analysis and medical intervention, as well as visual representation of the function of some organs or tissues. |
Medical Technology | Encompasses a wide range of healthcare products and is used to diagnose, monitor or treat diseases or medical conditions affecting humans. |
Mobile Health (mHealth) | A general term for the use of mobile phones and other wireless technology in medical care. |
MRI (Magnetic Resonance Imaging) | A technique that uses a magnetic field and radio waves to create detailed images of the organs and tissues within your body. |
Nuclear Medicine | The branch of medicine that deals with the use of radioactive substances in research, diagnosis, and treatment. |
Oracle Health Lifesciences | Technology that optimizes clinical R&D, mitigates risk, advances healthcare, and improves patient outcomes. |
PACS / Radiology / Enterprise Image | A computer network for digitized radiologic images and reports. |
Patient Administration | Developed out of the automation of administrative paperwork in healthcare organizations, particularly hospitals, and are one of the core components of a hospital's IT infrastructure. |
Patient Data | Data relating to a single patient, such as his/her diagnosis, name, age, earlier medical history etc. |
Patient Portals | A secure online website that gives patients convenient 24-hour access to personal health information from anywhere with an Internet connection. |
PET (Positron Emission Tomography) | An imaging test that helps reveal how your tissues and organs are functioning. |
Pharmacy Management Systems | Delivers care to patients, manages operations, and creates insight into your data. |
Picture Archiving Communication Systems (PACS) | A medical imaging technology which provides economical storage and convenient access to images from multiple modalities. |
Quality Management System (QMS) | A quality management system (QMS) is a collection of business processes focused on consistently meeting customer requirements and enhancing their satisfaction. It is aligned with an organization's purpose and strategic direction (ISO9001:2015). |
Radiological Information System (RIS) | A networked software system for managing medical imagery and associated data. |
Revenue Cycle Analytics | Software that gives hospitals strategic and analytical insights to improve business performance. |
Risk-based Monitoring | Risk-based monitoring is the process of ensuring the quality of clinical trials by identifying, assessing, monitoring and mitigating the risks that could affect the quality or safety of a study. |
SPECT (Single-Photon Emission Computed Tomography) | A nuclear medicine tomographic imaging technique using gamma rays. |
Standard Operating Procedure (SOP) | A standard operating procedure, or SOP, is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations. |
Teledermatology | Teledermatology is a subspecialty of dermatology and probably among the most popular applications of e-health and telemedicine. In this field, telecommuncation technologies are being used to transfer medical information over varying distances through audio, visual and data communication. |
Telehealth | The provision of healthcare remotely by means of telecommunications technology. |
Telemedicine | The remote diagnosis and treatment of patients by means of telecommunications technology. |
Telepsychiatry | Telepsychiatry is the application of telemedicine to the specialty field of psychiatry. The term typically describes the delivery of psychiatric assessment and care through telecommunications technology, usually videoconferencing. |
Teleradiology | The transmission of radiological patient images, such as x-rays |
Telestroke | Telestroke, also called telestroke services, is an approach to treating vascular strokes that allows a neurologist to provide remote treatment for a stroke victim. |
Ultrasonography | A technique using echoes of ultrasound pulses to delineate objects or areas of different density in the body. |
Vendor Neutral Archive (VNA) | A medical imaging technology in which images and documents are stored in a standard format with a standard interface, such that they can be accessed in a vendor-neutral manner by other systems. |
Virtual Hospitals | Virtual Hospitals are telehealth centers for delivering digital provider consultations and remote patient monitoring |
Wireless Health | The integration of wireless technology into traditional medicine, such as diagnosis, monitoring and treatment of illness, as well as other tools that can help individuals improve their personal health and wellbeing. |
X-Ray CT (X-Ray Computed Tomography) | Uses x-rays to create cross-sections of a physical object that can be used to recreate a virtual model without destroying the original object. |
IT Application Development / Management
Technology Word | Meaning |
Application Acceleration | Uses a number of technologies to improve application performance and response time over network connections. |
Application Management | A combination of the provision of services for application and support for the application systems throughout their entire lifecycle. |
Application Offboarding | Application Offboarding is the process of revoking application access to users, most commonly former employees or contractors. |
Application Onboarding | Application Onboarding is the process of granting application access to new users. |
Application Performance Monitoring (APM) | The monitoring and management of performance and availability of software applications. |
Atos (ATOS) | A European IT services corporation with its headquarters in Bezons, France and offices worldwide. |
Bi-Modal IT | The practice of managing two separate, coherent modes of IT delivery, one focused on stability and the other on agility. |
Business Continuity | Defined as the capability of the organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident. |
Business Relationship Management (BRM) | Business relationship management (BRM) is a formal approach to understanding, defining, and supporting inter-business activities related to business networking. |
Change and Release Management | The process of managing, planning, scheduling and controlling a software build through different stages and environments; including testing and deploying software |
Charge Back | An act of policy of allocating the cost of an organization's centrally located resources |
Choice Architecture | Choice architecture is the design of different ways in which choices can be presented to consumers, and the impact of that presentation on consumer decision-making. |
Cognizant (CTSH) | An accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used. |
Computacenter | Europe's leading independent provider of IT infrastructure services, enabling users and their business. |
Continuous Availability | An approach to computer system and application design that protects users against downtime, whatever the cause and ensures that users remain connected to their documents, data files and business applications. |
Database as a Service (DBaaS) | A cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. |
Deployment Options | The general deployment process consists of several interrelated activities with possible transitions between them. |
Disparate Systems | A disparate system or a disparate data system is a computer data processing system that was designed to operate as a fundamentally distinct data processing system without exchanging data or interacting with other computer data processing systems. |
Domain Expertise | A domain expert is a person with special knowledge or skills in a particular area of endeavor. An accountant is an expert in the domain of accountancy, for example. The development of accounting software requires knowledge in two different domains, namely accounting and software. |
Downtime | The total period that a service or component is not operational within an agreed service time. |
ELK Stack | An end-to-end stack that delivers actionable insights in real time from almost any type of structured and unstructured data source. |
Email Management | A specific field of communications management for managing high volumes of inbound electronic mail received by organizations. |
Event Management | Event Management is the process that monitors all events that occur through the IT infrastructure. |
Global Website Performance | A tool that allows you to optimize website performance. |
Hybrid IT Environments | An environment the has an approach to enterprise computing in which an organization provides and manages some information technology resources in-house but uses cloud-based services for others. |
Incident and Problem Management | The primary objectives of problem management are to prevent problems and resulting incidents from happening, to eliminate recurring incidents, and to minimize the impact of incidents that cannot be prevented. |
Infrastructure Monitoring | Composed of physical and virtual resources that support the flow, storage, processing and analysis of data. |
Infrastructure Provisioning | The enterprise-wide configuration, deployment and management of multiple types of IT system resources. |
Innovation | A combination of the management of innovation processes, and change management. |
Integration Platform as a Service (iPaaS) | Integration Platform as a Service (iPaaS) is a suite of cloud services enabling development, execution and governance of integration flows connecting any combination of on premises and cloud-based processes, services, applications and data within individual or across multiple organizations. |
International Data Corporation | A Chinese owned provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. |
IT Asset Management | The set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. |
IT Careers | The study, design, development, application, implementation, support or management of computer-based information systems. |
IT Consulting | A field of activity focused on advising organizations on how best to use information technology in achieving their goals. |
IT Cost Management | The process of planning and controlling the budget of the information technology department of a business. |
IT Efficiency | Allows for faster processing of data, easier retrieval of information, and in some cases- automation can reduce or replace physical employees. |
IT Industry | The application of computers to store, study, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise. |
IT Infrastructure | Refers to an enterprise's entire collection of hardware, software, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services. |
IT Leadership | The group of senior executives in an organization responsible for the information technology infrastructure and applications that enable and drive the overarching business strategy and goals. |
IT Management | The process whereby all resources related to information technology are managed according to an organization's priorities and needs. |
IT Operations | The set of all processes and services that are both provisioned by an it staff to their internal or external clients and used by themselves, to run themselves as a business. |
IT Operations Management | Responsible for smooth functioning of the infrastructure and operational environments that support application deployment to internal and external customers, including the network infrastructure; server and device management; computer operations; IT infrastructure and library management. |
IT Optimization | An enterprise software product category focused on helping businesses ensure that every dollar invested in information technology, every resource allocated, and every application in development or production meets business goals. |
IT Outsourcing | A company's outsourcing of computer or internet related work. |
IT Portfolio Management | The application of systematic management to the investments, projects and activities of enterprise Information Technology departments. |
IT process automation (ITPA) | IT process automation (ITPA), also known as run book automation (RBA), is the automation of an IT task through the orchestration and integration of tools, people and process through a single workflow. |
IT Service Management | Refers to the entirety of activities directed by policies, organized and structured in processes and supporting procedures that are performed by an organization to plan, design, deliver, operate and control information technology services offered to customers. |
IT Service Optimization (ITSO) | A creation of IBM and its Lotus and Tivoli subsidiaries, provides information technology professionals and customers with technical information, assistance, guidance, and training. |
IT Spending | The amount of money spent on an organization's information technology systems and services, including compensation for IT professionals and expenses related to the construction and maintenance of enterprise-wide systems and services. |
IT Strategy | Typically a long-term action plan for achieving a goal, set in the context of a rapidly changing technology environment. |
IT Transformation | A complete overhaul of an organization's information technology systems. |
ITIL | A set of detailed practices for IT service management that focuses on aligning IT services with the needs of business. |
Load Testing | The process of putting demand on a software system or computing device and measuring its response. |
Log Management | The collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system. |
Managed Services | The practice of outsourcing on a proactive basis management responsibilities and functions and a strategic method for improving operations and cutting expenses. |
Microsoft TechNet | An online resource site and web portal that includes free training resources and troubleshooting help for IT professionals. |
Mobile Application Management | Describes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings on both company-provided and bring your own smartphones and tablet computers. |
Offshore Software R&D | Offshore Software R&D is the provision of software development services by a supplier (whether external or internal) located in a different country from the one where the software will be used. |
On-Premise Applications | Is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud. |
RabbitMQ | A message-queueing software called a message broker or queue manager. |
Recovery Time Objective (RTO) | The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity. |
Routing and Switching | A device that combines the functions of a switch, which forwards data by looking at a physical device address, and a router, which forwards packets by locating a next hop address. |
SaaS Operations Management | SaaS Operations Management is automating the operational administration and security tasks that an IT department needs to do to keep their SaaS applications running effectively and securely |
Service Delivery | A set of principles, standards, policies and constraints to be used to guide the designs, development, deployment, operation and retirement of services delivered by a service provider with a view to offering a consistent service experience to a specific user community in a specific context. |
Smarter Computing | Innovation resources from IBM. |
Software Compliance | An important sub-set of software asset management and component of corporate risk management. |
Software Development Outsourcing | Outsourcing is a practice in which an individual or company performs tasks, provides services or manufactures products for another company -- functions that could have been or is usually done in-house. |
Software Licensing | A legal instrument governing the use or redistribution of software. |
Software Version Management | A component of software configuration management, version control, also known as revision control or source control, is the management of changes to documents, computer programs, large web sites, and other collections of information. |
Sustainability | The ability to be maintained at a certain rate or level. |
Sustainability Reporting | A sustainability report is an organizational report that gives information about economic, environmental, social and governance performance. |
Sustainable IT | A principle that embraces a range of policies, procedures, programs, and attitudes that run the length and breadth of any use of information technologies. |
System Architecture | A system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviors of the system. |
System Management Software | Software that manages computer systems in an enterprise, which may include any and all of the following functions: software distribution and upgrading, user profile management, version control, backup and recovery, printer spooling, job scheduling, virus protection and performance and capacity planning. |
Systems Management | Refers to enterprise-wide administration of distributed systems including computer systems. |
Technical Support (Tech Support) | Technical Support (Tech Support) refers to a plethora of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other informatic, electronic or mechanical goods. |
Technology Design & Architecture | Technology Design and Architecture is the process of development of IT specifications, models, and guidelines within a coherent IT architecture framework, following both formal and informal IT solution, enterprise, and infrastructure architecture processes. |
Technology Stack | A technology stack is a combination of software products and programming languages used to create a web or mobile application. Applications have two software components: client-side and server-side, also known as front-end and back-end. |
User Management | User management describes the ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks, SaaS services, and more. User management is a core part to any directory service and is a basic security essential for any organization. |
Virtual Collaboration | Virtual collaboration is the method of collaboration between virtual team members that is carried out via technology-mediated communication. Virtual collaboration follows the same process as collaboration, but the parties involved in virtual collaboration do not physically interact and communicate exclusively through technological channels. |
Virtualization Management | The process of overseeing and administering the operations and process of a virtualization environment. |
Visual Solutions | Software that used a project file to display the project contents and settings. |
Website Performance | Refers to the speed in which web pages are downloaded and displayed on the user's web browser. |
Windows Deployment Services | A server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services. |
Windows Management Instrumentation (WMI) | Consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification. |
Messaging / Communications
Technology Word | Meaning |
Amazon Chime | Amazon Chime is a secure, real-time, unified communications service that runs on AWS cloud. |
Amazon Simple Notification Service (SNS) | Amazon Simple Notification Service (SNS) is a notification service provided as part of Amazon Web Services. It provides a low-cost infrastructure for the mass delivery of messages, predominantly to mobile users. |
Apache ActiveMQ | Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server. |
Audio Conferencing | An audio communications session among three or more people who are geographically dispersed. |
Chatbot | A chatbot is an artificial intelligence (AI) program that simulates interactive human conversation by using key pre-calculated user phrases and auditory or text-based signals. |
Content Sharing | Refers to the strategic distribution of webpage and blog content across relevant social media such as Facebook, Twitter, LinkedIN and Google +. |
Effective Communication | An Effective Communication is a communication between two or more persons wherein the intended message is successfully delivered, received and understood. |
Instant Messaging | An electronic message sent in real time via the Internet and therefore immediately available for display on the recipient's screen. |
Instant Payment Notification (IPN) | Instant payment notification (IPN) is a method for online retailers to automatically track purchases and other server-to-server communication in real time. |
Integrated Messaging | A business term describing the integration of different electronic messaging and communications media technologies into a single interface, accessible from a variety of different devices. |
Join.me | A web based collaboration software application for screen-sharing and online meetings. |
MangoApps | A service that provides real-time messaging. |
Messaging Solutions | Sofware or products that provide email, voicemail, instant messaging and other communication needs. |
Microsoft Lync | Microsoft's system for unified communications in the enterprise. |
PowWowNow | Powwownow is an international conference call and web conferencing service. |
Presentation Sharing | Cloud-based platform where you can login and create presentations in the cloud and present and share. |
Rich Communication Services (RCS) | Rich Communication Services (RCS) is a communication protocol between mobile-telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling (for service discovery), and transmit in-call multimedia. |
Salesforce Chatter | An enterprise collaboration platform from Salesforce, a cloud-based customer relationship management vendor. |
Secure Instant Messaging | An informal means for computer users to exchange messages commonly referred to as chats. |
Skype for Business | A unified communications platform that integrates common channels of business communication and online meetings, including instant messaging, presence, voice over IP, voicemail, file transfers, video conferencing, and web conferencing. |
Slack | Real time messaging, file sharing and search. |
Video Conferencing | Telecommunication in the form of a videoconference. |
Web Conferencing | An online service by which you can hold live meetings, conferencing, presentations and training via the internet particularly on TCP/IP connections. |
Webcasting | To broadcast an event on the Internet. |
WebEx | Ay that provides on-demand collaboration, online meeting, web conferencing and videoconferencing applications. |
Webinars | A seminar conducted over the Internet. |
Mobile / Smartphones
Technology Word | Meaning |
Android Push Notifications | An Android push notification is a message delivered to applications on an Android device. |
App Analytics Companies | App Analytics Companies are organizations that offer products or services for evaluating mobile app performance or engagement. |
App Development | A term used to denote the act or process by which application software is developed for mobile devices, such as a personal digital assistant, enterprise digital assistant, or mobile phone. |
App Optimization | App Optimization focuses on improving the mobile performance of an app by reducing power consumption or disabling the app when not in use. |
Bring Your Own Device (BYOD) | Refers to the policy of permitting employees to bring personally owned devices to their workplace, and to use those devices to access privileged company information and applications. |
Call Analytics | Call Analytics is used to refer to the measurement, collection, analysis and reporting of phone call data. |
Constant Bit Rate Service (CBR) | The rate at which a codec's output data should be consumed is constant. |
Geofencing | The use of GPS or RFID technology to create a virtual geographic boundary, enabling software to trigger a response when a mobile device enters or leaves a particular area |
Google Cloud Messaging (GCM) | Google Cloud Messaging (commonly referred to as GCM) is a mobile notification service developed by Google that enables third-party application developers to send notification data or information from developer-run servers to applications that target the Google Android Operating System, as well as applications or extensions developed for the Google Chrome internet browser. |
Huawei Phones | Huawei Phones are mobile phones created by Chinese brand Huawei. |
Mobile / Wireless | Transmission over the air from a base station to a moving cellphone, tablet or laptop. |
Mobile 2.0 | Mobile 2.0,refers to a perceived next generation of mobile internet services that leverage the social web, or what some call Web 2.0. |
Mobile Computing | A technology that allows transmission of data, voice, and video via a computer |
Mobile Device Management | An industry term for the administration of mobile devices, such as a smartphones, tablet computers, laptops and desktop computers. |
Mobile Field Sales / Wireless Connectivity | Selling activities that take place over mobile devices or wireless devices. |
Mobile Integration | A form of fixed-mobile convergence that provides integration between communications carriers and enterprise networks. |
Mobile Optimization | Mobile optimization is the process of ensuring that visitors accessing your website from mobile devices have an engaging and user-friendly experience that's been optimized for that specific device. |
Mobile Payments | Generally refers to payment services operated under financial regulation and performed from or via a mobile device. |
Mobile Push | The delivery of information from a software application to a computing device without a specific request from the client. |
Mobile Security | The protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. |
Mobile Security Management | The protection of smartphones, tablets, laptops, and their portable computing devices, and the networks they connect to, from threat and vulnerabilities associated with wireless computing. |
Mobile Technology | The technology used for cellular communication. |
Mobile Wallet | A Mobile Wallet is a virtual wallet that stores payment card information on a mobile device. Mobile wallets are a convenient way for a user to make in-store payments and can be used at merchants listed with the mobile wallet service provider. |
Mobile Workers | Require a responsive support staff at the central office. |
Mobility Management | Mobility management is one of the major functions of a GSM or a UMTS network that allows mobile phones to work. The aim of mobility management is to track where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them. |
Rich Push Notifications | Rich Push Notifications are push notifications with rich media such as images or videos. |
Safaricom | A leading network operator in Kenya. |
Smart Devices | An electronic device, generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously. |
Mobile Marketing
Technology Word | Meaning |
App Store Optimization (ASO) | The process of improving the visibility of a mobile app (such as an iPhone, iPad, Android, BlackBerry or Windows Phoneapp) in an app store (such as iTunes for iOS, Google Play for Android, Windows Store for Windows Phone or BlackBerry World for BlackBerry). |
Cost Per Install (CPI) | Cost per install, or CPI, is a pricing model used in mobile user acquisition campaigns in which app advertisers pay each time a user installs their app from their ad. |
Facebook Mobile Ads | Facebook Mobile Ads are advertisements that appear within the Facebook Mobile App. |
In-App Advertising | In-App Advertising refers to the display off ads within a mobile app. |
In-App Messaging | Messages delivered to a user while they are actively using a mobile app |
iOS App Marketing | iOS App Marketing refers to the strategies used to promot an app that can be used on an iOS device. |
Mobile Advertising | Mobile advertising is a form of advertising via mobile phones or other mobile devices. It is a subset of mobile marketing. |
Mobile App Advertising Performance | Mobile App Advertising Performance refers to measuring the performance of an advertising campaign that was deployed to mobile devices. |
Mobile App Analytics | Mobile App Analytics are measurements such as user engagement or app downloads. |
Mobile App Automation | Mobile App Automation refers to the process and tools used for automating testing on mobile apps. |
Mobile App Conversion | Mobile App Conversion is the rate at which users visiting a site via a mobile device become paying customers. |
Mobile App Inbox | A Mobile App Inbox is a repository in a mobile app that accepts incoming messages. |
Mobile App Retargeting | Mobile App Retargeting is a form of advertising that lets mobile app marketers send relevant messages to their customers while they are using other mobile apps or mobile websites. |
Mobile App User Experience | Mobile App UX is the experience a user has while interacting with a mobile app. |
Mobile App User Interface | A Mobile App UI is a tool used to interact with applications on a mobile device. |
Mobile Application Performance | Mobile Application Performance is measuring various metrics of an app such as start up time, responsiveness, and memory management. |
Mobile Audience Targeting | Mobile Audience Targeting is targeting a specific audience on their mobile device. |
Mobile CRM | A Mobile CRM enables the access of customer accounts and information via a mobile device. |
Mobile Interactions | Mobile interaction is the study of interaction between mobile users and computers. |
Mobile Predictive Analytics | Mobile Predictive Analytics refers to using |
Mobile Web Development | Mobile Web Development refers to the development of web applications for use on a mobile device. |
Monthly Active Users (MAU) | Monthly active users (MAU) is one of the ways to measure the success rate of online social games, social networking services and, increasingly mobile apps. Typically, metrics are measured by counting the number of unique users during a specific measurement period, such as within the previous 30 days. |
Uninstall Tracking | Monitoring user behavior by keeping track of the uninstallation of applications |
Monitoring Sensors
Technology Word | Meaning |
Continuous Controls Monitoring | Refers to the use of automated tools and various technologies to ensure the continuous monitoring of financial transactions and other types of transactional applications to reduce the costs involved for audits. |
File Integrity Monitoring (FIM) | File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline. |
Monitoring | To maintain regular surveillance over. |
mPulse | MPulse CMMS software provides integrated tracking, scheduling, and reporting tools for equipment and facilities maintenance organizations. |
Nagios | A free and open source computer-software application that monitors systems, networks and infrastructure. |
Operational Technology (OT) | Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise. |
Proactive Monitoring | Proactive monitoring used in information technology allows teams to understand how services are performing, along with identifying potential areas of risk 7 days a week, 24 hours a day. Monitoring can apply to applications, networks, security, computers and data centers. |
Proximity Sensor | A proximity sensor is a sensor able to detect the presence of nearby objects without any physical contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return signal. |
Real User Monitoring (RUM) | Real user monitoring (RUM) is a passive monitoring technology that records all user interaction with a website or client interacting with a server or cloud-based application. |
Reliability-Centered Maintenance (RCM) | Reliability-centered maintenance (RCM) is a process to ensure that systems continue to do what their user require in their present operating context.[1] It is generally used to achieve improvements in fields such as the establishment of safe minimum levels of maintenance. |
Security Monitoring | The collection, analysis, and escalation of indications and warning to detect and respond to intrusions. |
Sensors, Test & Measurement | Electronic test equipment is used to create signals and capture responses from electronic devices under test (DUT). |
Smart Sensor | A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on. |
System Monitors | A hardware or software component used to monitor resources and performance in a computer system. |
Temperature Sensor | A temperature sensor is a device, typically, a thermocouple or RTD, that provides for temperature measurement through an electrical signal. A thermocouple (T/C) is made from two dissimilar metals that generate electrical voltage in direct proportion to changes in temperature. |
Troubleshooting | Troubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems. |
Virtual Machine Monitor | Computer software, firmware or hardware that creates and runs virtual machines. |
Networking
Technology Word | Meaning |
3G | 3G, short for third generation, is the third generation of wireless mobile telecommunications technology. It is the upgrade for 2G and 2.5G GPRS networks, for faster internet speed. |
4G | 4G is the fourth generation of broadband cellular network technology, succeeding 3G. A 4G system must provide capabilities defined by ITU in IMT Advanced. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, and 3D television. |
5G | 5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.[ |
All-IP | All-IP is the concept that all fixed network communciations will communicate end to end using the Internet Protocol. |
Application Aware Network | The capacity of an intelligent network to maintain current information about applications that connect to I and, as a result, optimize their functioning as well as that of other applications or systems that they control. |
Application Layer | An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. |
Authoring System | An authoring system is a program that has pre-programmed elements for the development of interactive multimedia software titles. Authoring systems can be defined as software that allows its user to create multimedia applications for manipulating multimedia objects. |
Backhaul | The backhaul portion of the network comprises the intermediate links between the core network, or backbone network and the small subnetworks at the 'edge' of the entire hierarchical network. |
Bandwidth | The range of frequencies within a given band, in particular that used for transmitting a signal. |
Bandwidth as a Service | Network connectivity service that allows users to request bandwidth at desired levels when and where they need it. |
Broadband | A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously. |
Business Ethernet Network | The use of high-bandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks. |
Coaxial Cables | Coaxial cable is a cable used in the transmission of video, communications, and audio. This cable has high bandwidths and greater transmission capacity. |
Communications Satellite | A communications satellite is a type of artificial satellite that is placed in Earth's orbit for the purpose of sending and receiving communication data between a source and destination. |
Content Caching | The temporary storage of files on servers that are physically closer to end users. |
Content Delivery Network (CDN) | A system of distributed servers that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the webpage and the content delivery server. CDns also provide protection from large surges in traffic. |
Content Filtering | The use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. |
Customer-Premises Equipment (CPE) | Customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc"). |
Dark Fiber | Refers to unused fiber-optic cable. |
Data Networks | A digital telecommunications network which allows nodes to share resources. |
Data Transmission | Data transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices. |
Dedicated Gig Internet | Gigabit internet is the next-generation of broadband Internet service, with true gigabit internet connections offering speeds that are over 50 times faster than today's average broadband connection. |
Deep Fiber Deployment | The trend of deploying infrastructure that will support fiber optic connections |
Desktop Sharing | A common name for technologies and products that allow remote access and remote collaboration on a person's computer desktop through a graphical Terminal emulator. |
Digital Subscriber Line (DSL) | A family of technologies that are used to transmit digital data over telephone lines. |
Ethernet | A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. |
Ethernet Network | Used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access. |
Ethernet Network Port | An opening on computer network equipment that Ethernet cables plug into. |
Ethernet Network Provider | A company that provides ethernet services. |
Ethernet Network Services | Ethernet services to customers who utilize Ethernet technology in their networks. |
Ethernet Networking | Ethernet is the most widely installed local area network technology. |
Ethernet Networking Solutions | Providers such as AT&T, Spectrum, Industrial Networking Solutions and aviso combine programmability with physical hardware to create carrier class virtual services and functions. |
Ethernet Over Copper (EoC) | Ethernet over copper (also known as EoC) is a form of Ethernet in the first mile connection that uses twisted pair copper telephone wire. |
EtherNet/IP Network | Provides plant-wide network systems using open, industry-standard networking technologies. |
Extranets | An intranet that can be partially accessed by authorized outside users, enabling business to exchange information over the Internet securely. |
Fault Tolerance | Fault tolerance is the property that enables a system to continue operating properly in the event of the failure of (or one or more faults within) some of its components. |
Fiber Connected Buildings | Commercial buildings with capabilities for a fiber connection. |
Fiber Optics | A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics has several advantages over traditional metal communications lines. Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data. Fiber optic cables are less susceptible than metal cables to interference. Fiber optic cables are much thinner and lighter than metal wires. Data can be transmitted digitally (the natural form for computer data) rather than analogically. The main disadvantage of fiber optics is that the cables |
Fiber Raceway | An Optical Fiber Raceway is a raceway designed for enclosing and routing listed optical fiber cables. |
Fibre Channel | A high-speed network technology primarily used to connect computer data storage to servers. |
File Transfer Protocol (FTP) | The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. |
Geolocation | Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal. |
Gigabit Internet | A term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE 802.3-2008 standard. |
Gigabit Networking | A network that uses gigabit technology. |
Gigabit Services | The next generation of broadband internet service which is typically delivered over fiber optic lines and provides speeds of 1000Mps, which is also referred to as 1Gbps or Gigabit internet. |
Gigabits Per Second | Gigabits per second (GBPS) is equal to 1,000 Megabits per second (Mbps), or 1,000,000,000 bits per second. GBPS is commonly used to measure data transfer speeds between hardware devices. |
Global Distribution System (GDS) | A global distribution system is a computerised network system owned or operated by a company that enables transactions between travel industry service providers, mainly airlines, hotels, car rental companies, and travel agencies. |
Global Wide Area Network | Refers to a network composed of different interconnected networks that cover an unlimited geographical area. |
Grid Computing | The collection of computer resources from multiple locations to reach a common goal. |
Hacktivism | Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. |
High Availability | Refers to systems that are durable and likely to operate continuously without failure for a long time. |
High Speed Networks | Internet access provided by a network of servers that transfers data via high-speed cable, satellite and wireless connections. |
Highway Addressable Remote Transducer (HART)Protocol | HART (Highway Addressable Remote Transducer) Protocol is an open standard used globally to send and receive digital information using analog wiring between smart devices and control systems. |
Hybrid Fiber Coaxial (HFC) | Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable. It has been commonly employed globally by cable television operators since the early 1990s. In a hybrid fiber-coaxial cable system, the television channels are sent from the cable system's distribution facility, the headend, to local communities through optical fiber subscriber lines. At the local community, a box called an optical node translates the signal from a light beam to electrical signal, and sends it over coaxial cable lines for distribution to subscriber residences. The fiberoptic trunk lines provide adequate bandwidth to allow future expansion an |
Hybrid Wide Area Networking (WAN) | A method to connect a geographically dispersed wide area network by sending traffic over two or more connection types. |
Hyperconnectivity | A state of unified communications in which the traffic-handling capacity and bandwidth of a network always exceed the demand. |
In-Building Connectivity | In-Building Connectivity refers to the ability of devices to sufficiently send and receive data from within a building and be connected to their respective networks |
Indicators of Compromise (IOC) | Indicators of Compromise (IOC) are pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network. |
Infiniband (IB) | A computer networking communications standard used in high-performance computing that features very high throughput and very low latency. |
Integrated Services Digital Network (ISDN) | Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. |
Intelligent Routing | A method of determining the best path to send your traffic over based on real-world performance or cost of the path, as opposed to the traditional routing methods, which only select paths based on configured in policy and network topology information. |
Internet Exchange Points | An Internet exchange point (IX or IXP) is the physical infrastructure through which Internet service providers (ISPs) and content delivery networks (CDNs) exchange Internet traffic between their networks (autonomous systems). |
Internet infrastructure | Internet infrastructure is made up of hardware and software that transmits and receives information from a variety of different systems and networks. |
Internet Protocol Private Branch Exchange (IP PBX) | A private branch exchange that switches calls between VoIP users on local lines while allowing all users to share a certain number of external phone lines. |
Internet Protocol Television (IPTV) | Internet Protocol television (IPTV) is the delivery of television content over Internet Protocol (IP) networks. This is in contrast to delivery through traditional terrestrial, satellite, and cable television formats. Unlike downloaded media, IPTV offers the ability to stream the source media continuously. |
Internet Protocol Version 4 (IPv4) | Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet, and was the first version deployed for production in the ARPANET in 1983. |
Internet Relay Chat (IRC) | Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model. |
Internet Speed Test | A website or web application that measures a user's internet connection speed. |
Internet Transit | The service of allowing traffic from another network to cross or transit the provider's network, usually used to connect a smaller Internet service provider to the rest of the Internet. |
Intranets | A local or restricted communications network, especially a private network created using World Wide Web software. |
IP Networks | A communication network that uses Internet Protocol to send and receive messages between one or more computers. |
IP Storage | A general term for several approaches to using the Internet protocol in a storage area network usually over Gigabit Ethernet. |
IP VPN | Uses Internet Protocol for transmission in a VPN. |
iSCSI | Works on top of the Transport Control Protocol and allows the SCSi command to be sent end-to-end over local-area networks or the Internet. |
Java Management Extensions (JMX) | Java Management Extensions (JMX) is a Java technology that supplies tools for managing and monitoring applications, system objects, devices (such as printers) and service-oriented networks. |
Juniper Networks | An American multinational corporation headquartered n Sunnyvale, CA that develops and markets networking products. |
Last Mile | The last mile or last kilometer is a colloquial phrase widely used in the telecommunications, cable television and internet industries to refer to the final leg of the telecommunications networks that deliver telecommunication services to retail end-users (customers). |
Lightweight Directory Access Protocol | The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. |
Local Area Networking (LAN) | A network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. |
Long Term Evolution (LTE) | Is a 4G wireless broadband technology developed by the Third Generation Partnership Project, an industry trade group. |
Low Latency Ethernet | Refers to the network connections used by financial institutions to connect to stock exchanges and Electronic communication networks (ECNs) to execute financial transactions. |
Managed Hosting Services | An IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single client. |
Managed Service Provider | A company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. |
Mesh Networking | A mesh network is a local network topology in which the infrastructure nodes (i.e. bridges, switches and other infrastructure devices) connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data from/to clients. |
Message Queuing Telemetry Transport (MQTT) | MQTT[1] (Message Queuing Telemetry Transport) is an ISO standard (ISO/IEC PRF 20922)[2] publish-subscribe-based messaging protocol. |
Microwave Backhaul | Microwave backhaul refers to the transportation of traffic (voice, video and data) between distributed sites and a more centralised point of presence via a radio link. |
MOST (Media Oriented Systems Transport) | MOST (Media Oriented Systems Transport) is a high-speed multimedia network technology optimized by the automotive industry. |
Multimedia over Cable Alliance (MoCA) | The Multimedia over Coax Alliance (MoCA) is an international standards consortium publishing specifications for networking over coaxial cable. |
Narrowband | Narrowband describes a channel in which the bandwidth of the message does not significantly exceed the channel's coherence bandwidth. |
Network Access Control (NAC) | Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement. |
Network Address Translation (NAT) | Network address translation (NAT) is a router function that enables public and private network connections and allows single IP address communication. |
Network Architecture | The design of a communication network. |
Network as a Service | Is sometimes listed as a separate Cloud provider along with Infrastructure as a Service, Platform as a Service, and Software as a Service. |
Network Attached Storage | A file level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. |
Network Best Practices | An industry-wide agreement that standardizes the most efficient and effective way to accomplish a desired outcome. |
Network Bottleneck | A network bottleneck refers to a discrete condition in which data flow is limited by computer or network resources. The flow of data is controlled according to the bandwidth of various system resources. |
Network Congestion | Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections. |
Network Convergence | Network convergence is the efficient coexistence of telephone, video and data communication within a single network. |
Network Densification | Network densification refers to increasing the amount of available resources on a network within the same space. |
Network Encryption | Network encryption is the process of encrypting or encoding data and messages transmitted or communicated over a computer network. |
Network Forensics | Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. |
Network Functions Virtualization (NFV) | A network architecture concept that uses the technologies of IT virtualization to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. |
Network Hardware | Physical devices which are require for communication and interaction between devices on a computer network. |
Network Infrastructure | The hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network. |
Network Latency | The amount of time a message takes to traverse a system. |
Network Load Balancing (NLB) | Network load balancing (commonly referred to as dual-WAN routing or multihoming) is the ability to balance traffic across two WAN links without using complex routing protocols like BGP. |
Network Management | Managing computer networks. |
Network Neutrality | Net neutrality is the principle that Internet service providers treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication. |
Network Operations Center (NOC) | A network operations center (NOC) is a central location from which network administrators manage, control and monitor one or more networks. The overall function is to maintain optimal network operations across a variety of platforms, mediums and communications channels. |
Network Optimization | Network optimization is technology used for improving network performance for a given environment. It is considered an important component of effective information systems management. |
Network Packet Brokers (NPBs) | A network packet broker (NPB) is a device that provides a collection of monitoring tools with access to traffic from across the network. |
Network Performance | Measures of service quality of a network as seen by the customer. |
Network Printing | A printer connected to a wired or wireless network. |
Network Protocols | Formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network. |
Network Redundancy | Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. |
Network Security | Protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system. |
Network Security Appliance | Any form of server appliance that is designed to protect computer networks from unwanted traffic. |
Network Time Protocol | Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. |
Network Topology | Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology is the topological structure of a network and may be depicted physically or logically. |
Network Traffic Analysis | Network traffic analysis is the process of recording, reviewing and analyzing network traffic for the purpose of performance, security and/or general network operations and management. |
Networking / Telecommunications | A collection of terminal nodes, links are connected so as to enable telecommunication between the terminals. |
Networking Applications | A suite of technologies that, when deployed together, provide application availability, security, visibility, and acceleration. |
Networking Solutions | A company that deals in technology, with its primary division being domain name registration that started as a technology consulting firm. |
Optical Networking | A type of data communication network built with optical fiber technology. |
Outdoor Cell Site | An Outdoor Cell Site is a wireless system fixed to a pole or building that is used to provide internet access to an outdoor area. |
Packet Switching | Packet switching is a method of grouping data which is transmitted over a digital network into packets which are made of a header and a payload. |
PAM 4 | Doubles the number of bits in serial data transmission by increasing the number of levels of pulse-amplitude modulation. |
Peer to Peer | Denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server. |
Perfect Forward Secrecy (PFS) | In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a property of secure communication protocols in which compromises of long-term keys do not compromise past session keys. Forward secrecy protects past sessions against future compromises of secret keys or passwords. |
Petabyte | The petabyte is a multiple of the unit byte for digital information. The prefix peta indicates the fifth power of 1000 and means 1015 in the International System of Units (SI), and therefore 1 petabyte is one quadrillion (short scale) bytes, or 1 billiard (long scale) bytes. The unit symbol for the petabyte is PB. |
Point-to-Point Tunneling Protocol (PPTP) | The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues. |
Primary Rate Interface (PRI) | The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user. |
Public-Key Infrastructure (PKI) | A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. |
RDMA over Converged Ethernet (RoCE) | A network protocol that allows remote direct memory access over an ethernet network. |
Remote Access | The ability to get access to a computer or a network from a remote distance. |
Remote Desktop Protocol (RDP) | Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. |
Remote Monitoring | Remote Monitoring (RMON) is a standard specification that facilitates the monitoring of network operational activities through the use of remote devices known as monitors or probes. |
Remote Network Management | A feature of Windows Vista that allows administrators to remotely run management scripts. |
Remote Networking | The ability to get access to a computer or a network from a remote distance. |
Routers | A device, or, in some cases, software on a computer, that determines the best way for a packet to be forwarded to its destination. |
Routing Protocols | Specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. |
Satellite Broadband | Satellite broadband is exactly what it sounds like - broadband that you connect to via a satellite. |
Secure Shell (SSH) | Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users. |
Serializer/Deserializer (SerDes) | A serializer/deserializer (SerDes) is an integrated circuit or device used in high-speed communications for converting between serial data and parallel interfaces in both directions. |
Server Message Block (SMB) | In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS, /s?fs/), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network. |
Session Initiation Protocol (SIP) | The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks. |
Simple Mail Transfer Protocol (SMTP) | Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with Extended SMTP additions by RFC 5321, which is the protocol in widespread use today. |
Simple Network Management Protocol (SNMP) | Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more. |
Small Cells | A small cell is an individual cell site that is smaller in size, power, and coverage radius. Small cells are typically deployed to densify or increase the capacity of the overall network. Small Cells are typically installed on a very smal area such as a cabinet. |
Software-Defined Networking (SDN) | An approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality. |
Software-Defined Wide Area Network (SD-WAN) | A specific application of software-defined networking technology applied to WAN connections, which are used to connect enterprise networks - including branch offices and data centers - over large geographic distances. |
Switching | The practice of directing a signal or data element toward a particular hardware destination. |
TCP/IP Protocol | The basic communication language or protocol of the Internet. |
Terminal / Network Computers | A computer terminal is an electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer. In networking, a terminal is a personal computer or workstation connected to a mainframe. |
Terminal Emulators | The ability to make one computer terminal, typically a PC appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type. |
Tether | To use an electronic device in order to connect a computer or other device to the Internet. |
Timestamp | A timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second. |
Tunneling | A protocol that allows for the secure movement of data from one network to another. |
Universal Plug and Play (UPnP) | Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment. |
User Datagram Protocol (UDP) | In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network. |
Very Small Aperture Terminal (VSAT) | A very small aperture terminal (VSAT) is a small telecommunication earth station that receives and transmits real-time data via satellite. |
Very-high-bit-rate Digital Subscriber Line (VDSL) | Very-high-bit-rate digital subscriber line (VDSL)[1] and very-high-bit-rate digital subscriber line 2 (VDSL2)[2] are digital subscriber line (DSL) technologies providing data transmission faster than asymmetric digital subscriber line (ADSL). |
Virtual Prototyping | Virtual prototyping is a method in the process of product development. It involves using computer-aided design (CAD), computer-automated design (CAutoD) and computer-aided engineering (CAE) software to validate a design before committing to making a physical prototype. |
Voice Revenue | Mobile phone companies' revenues. |
VPN | A network that is constructed using public wires - usually the Internet - to connect to a private network, such as a company's internal network. |
vRouter | A vRouter is a software function that replicates in software the functionality of a hardware-based Layer 3 Internet Protocol routing, which has traditionally used a dedicated hardware device. |
WAN Acceleration | The category of technologies and techniques used to maximize the efficiency of data flow across a wide area network. |
Wavelength Division Multiplexing (WDM) | Wavelength division multiplexing (WDM) is a technology or technique modulating numerous data streams, i.e. optical carrier signals of varying wavelengths (colors) of laser light, onto a single optical fiber. |
Wide Area Networking (WAN) | Consists of two or more local-area networks. |
WinSCP | WinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows. Its main function is secure file transfer between a local and a remote computer. |
Wireshark | Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. |
Zero Touch Provisioning (ZTP) | A switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network. |
Operating System OS
Technology Word | Meaning |
Active Directory | A window's OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner. |
Application Modernization | Application modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs. |
CentOS | CentOS ( from Community Enterprise Operating System) is a Linux distribution that provides a free, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL). |
Cisco IOS | Cisco IOS (Internetwork Operating System) is a software made by Cisco for use on various hardware devices such as networking routers and switches. A command-line interface governs a series of trains defined as tools for delivering Cisco software to specific platforms. |
Inter-Process Communication (IPC) | Inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. |
LinkedIn Pulse | LinkedIn Pulse was a news aggregation app for Android, iOS and HTML5 browsers, originally released in 2010. The app, in its original incarnation, was deprecated in 2015 and integrated into LinkedIn. |
Linux | An open-source operating system modelled on UNIX. |
Mac OS X | A development platform that supports multiple development technologies including UNIX, Java, the proprietary Cocoa and Carbon runtime environments, and a host of open source, Web, scripting, database and development technologies. |
Microsoft Windows | Microsoft Windows is a group of opperating systems manufactured by Microsoft which offers a graphical user interface (GUI), multitasking functionalities, virtual memory management capabilities, and support for several peripheral devices. |
Operating System | The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. |
Privilege Escalation | Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. |
Real Time Operating Systems (RTOS) | A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. |
Repair and Recovery | The process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. |
Solaris | The computer operating system that Sun Microsystems provides for its family of Scalable Processor Architecture-based processors as well as for Intel-based processors. |
Surface Hub | The Surface Hub is a brand of interactive whiteboard developed and marketed by Microsoft, as part of the Microsoft Surface family. The Surface Hub is a wall-mounted or roller-stand-mounted device with either a 55-inch (140 cm) 1080p or an 84-inch (210 cm) 4K 120 Hz touchscreen with multi-touch and multi-pen capabilities, running the Windows 10 operating system. |
tvOS | tvOS is an operating system developed by Apple Inc. for the fourth-generation and later Apple TV digital media player. tvOS was announced on September 9, 2015 at the Apple September 2015 event, alongside the 4th generation Apple TV. |
Unix | A widely used multiuser operating system. |
Windows 10 | The latest release of Microsoft's Windows operating system and the successor to the underwhelming Windows 8. |
Windows 7 | A personal computer operating system developed by Microsoft. |
Windows 8 | A personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems. |
Windows Operating System | Primarily runs on x86-based computers, although versions have run on Intel's Itanium CPUs. |
Windows Vista | Offers and advancement in reliability, security, ease of deployment, performance and manageability over Windows XP. |
Windows XP | An operating system introduced in 2001 from Microsoft's Windows family of operating systems, the previous of Windows being Windows Me. |
Other / Miscellaneous
Technology Word | Meaning |
2D Animation | Creates movement in a two-dimensional artistic space |
3D Animation | Graphics that use a three-dimensional representation of geometric data that is stored in the computer for the purposes of performing calculations and rendering 2D images. |
Adaptive E-Textbooks | Artificially intelligent software that is replacing paper textbooks. |
Application Service Provider | Defined as an enterprise that delivers application functionality and associated services across a network to multiple customers using a rental or usage-base transaction-pricing model. |
Application Software | Can be divided into two general classes: systems software and applications software. |
ArcGIS | ArcGIS is a geographic information system (GIS) for working with maps and geographic information. It is used for creating and using maps, compiling geographic data, analyzing mapped information, sharing and discovering geographic information, using maps and geographic information in a range of applications, and managing geographic information in a database. |
Audio Editing Software | Audio editing software is software which allowsediting and generating of audio data. Audio editing software can be implemented completely or partly as library, as computer application, as Web application or as a loadable kernel module. |
Big Blue | A slang term sometimes used to refer to International Business Machines Corporation (IBM). |
Biometrics | Refers to technologies used to detect and recognize human physical characteristics. |
Blueprint | A blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process on light-sensitive sheets. |
Business Card Scanning | With a business card scanner, you can scan a large numbers of business cards using specially designed software. |
Computer Aided Engineering | The broad usage of computer software to aid in engineering analysis tasks. |
Consumerization of IT | A phrase used to describe the cycle of information technology emerging in the consumer market, then spreading to business and government organizations, largely because employees are using the popular consumer market technologies and devices at home and then introducing them in the workplace. |
Data Privacy Day | Data Privacy Day (known in Europe as Data Protection Day) is an international holiday that occurs every 28 January. The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, India and 47 European countries. |
Digital Convergence | Refers to the convergence of four industries into one conglomerate, ITTCE. |
Directory Services | A customizable information store that functions as a single point from which users can locate resources and services distributed throughout the network. |
Distributed Control System | A distributed control system (DCS) is a computerised control system for a process or plant usually with a large number of control loops, in which autonomous controllers are distributed throughout the system, but there is central operator supervisory control. |
Drag and Drop | In computer graphical user interfaces, drag and drop is a pointing device gesture in which the user selects a virtual object by grabbing it and dragging it to a different location or onto another virtual object. |
eDiscovery Software | Refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. |
Electronic Warfare (EW) | Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack of an enemy, or impede enemy assaults via the spectrum. |
Engineer to Order / Make to Order | A manufacturing process in which manufacturing starts only after a customer's order is received. |
Exponential Growth | Exponential growth is exhibited when the rate of change the change per instant or unit of time of the value of a mathematical function is proportional to the function's current value, resulting in its value at any time being an exponential function of time, i.e., a function in which the time value is the exponent. |
Geographic Information Systems | A system designed to capture, store, manipulate, analyze, manage, and present spatial or geographical data. |
GPS | A radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world. |
High Dynamic Range (HDR) | High dynamic range (HDR) is a dynamic range higher than what is considered to be standard dynamic range. The term is often used in discussing display devices, photography, 3D rendering, and sound recording including digital imaging and digital audio production. |
Human-Machine Interface (HMI) | Human-machine interface (HMI) is a component of certain devices that are capable of handling human-machine interactions. The interface consists of hardware and software that allow user inputs to be translated as signals for machines that, in turn, provide the required result to the user. |
Immersive Experience | An Immersive Experience, often relating to virtual reality, is something that stimulates the senses to draw one in, transport them to another place, and enhance an everyday experience to make it more realistic, engaging, and satifying. |
Information Assurance | The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. |
Information Lifecycle Management | A comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted. |
Information Technology | The study of use of systems for storing, retrieving, and sending information. |
Intelligent Personal Assistant | Software that has been designed to assist people with basic tasks, usually providing information using natural language. |
Intelligent Vehicles | Comprise electronic, electromechanical, and electromagnetic devices. |
Interactive Content | Interactive content is a better way to educate, entertain, and engage your audience. Interactive content is content that requires the participants' active engagement more than simply reading or watching. In return for that engagement, participants receive real-time, hyper-relevant results they care about. |
Interactive Vending Machine | An automated machine that provides items such as snacks, beverages, alcohol, cigarettes and lottery tickets to consumers after money or a credit card is inserted into the machine. |
Interactive Voice Response (IVR) | A technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad. |
IT Ecosystems | Product platforms defined by core components made by the platform owner and complemented by applications made by autonomous companies in the periphery. |
IT Governance, Risk and Compliance | Refers to a company's coordinated strategy for managing the broad issues of corporate governance, enterprise rick management and corporate compliance with regard to regulatory requirements. |
Legal Hold Software | A process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. |
Linus Torvalds | The creator of the Linux kernel. |
Location-Based Services | Services offered through a mobile phone and take into account the device's geographical location. |
Machine Control | Machine control is used to accurately position earthwork machinery based on 3D design models and GPS systems, and thus aid machine operators to e.g. control the position of a road grader's blade |
Machine-to-Machine (M2M) | An important aspect of warehouse management, remote control, robotics, traffic control, logistic services, supply chain management, fleet management and telemedicine. |
Mineral Processing | In the field of extractive metallurgy, mineral processing, also known as ore dressing, is the process of separating commercially valuable minerals from their ores. |
Mobile Industry Processor Interface (MIPI) Alliance | MIPI Alliance is a global, open membership organization that develops interface specifications for the mobile ecosystem including mobile-influenced industries. It was founded in 2003 by ARM, Intel, Nokia, Samsung, STMicroelectronics and Texas Instruments. |
Open Data | Data that can be freely used, re-used and redistributed by anyone - subject only, at most, to the requirement to attribute and share alike. |
Open Invention Network | Open Invention Network (OIN) is a patent non-aggression community that supports freedom of action in Linux as a key element of open source software. OIN acquires patents and licenses them royalty-free to its community members who, in turn, agree not to assert their own patents against Linux and Linux-related systems and applications |
Open Microcredentials | The process of earning a micro-credential, which are like mini-degrees or certifications in a specific topic area. |
Panic Devices | A door-locking assembly that can be released quickly by pressure on a horizontal bar. |
Preview Pane | You can preview items in your inbox without opening them by using the reading or preview pane. |
Salesforce Appexchange | The Salesforce AppExchange is a complete marketplace offering cloud-computing applications and consulting services. Before you can make your own app or service publicly available to potential customers, you must be a Salesforce partner. |
Simulation Software | Based on the process of modeling a real phenomenon with a set of mathematical formulas. |
Smart Connected Products | Products, assets and other things embedded with processors, sensors, software and connectivity that allow data to be exchanged between the product and it environment, manufacturer, operator/user, and other products and systems. |
System Administration | System administration is a job done by IT experts for an organization. The job is to ensure that computer systems and all related services are working well. |
Ultra High Definition Broadcast | Television that includes 4K UHD and 8K UHD, which are two digital video formats that were first proposed by NHK Science and Technology Research Laboratories. |
Utility Computing | A service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. |
Printing
Technology Word | Meaning |
Commercial Printing | Commercial Printing is the process of taking artwork and transferring it onto something tangible for your business. This could mean everything from your business cards or the flyers at your local gym to the magazine you read during the evening. |
Custom Printing | Custom Printing means that you can get any image you want, in any size and on a multitude of substrates. |
Enterprise Printing | Security printing solutions developed by HP. |
Envelope Printing | Envelope Printing is simply the process of printing on an envelope. |
High Volume Printing | Combine productivity, reliability, and finishing capabilities with monthly print volumes up to 50,000 for large workgroups. |
High Yield Toner | The number of pages a user can print with a given printer and cartridge. |
HP ePrint | A feature of most HP printers and MFPs that enables printing documents attached to email messages sent to the device. |
HP Jet Intelligence | A program introduced by HP that features new toner technology, delivering more pages, performance, and productivity. |
HP JetAdvantage | Enables mobile devices to print to printers on the corporate network with a simple, Pc-like print experience, without extra steps like opening a print app or sending an email to the print queue. |
HP LaserJet | The line of dry electrophotographic laser printers marketed by HP. |
HP OfficeJet | Small printers offered by HP for small businesses. |
HP PageWide | Printer offered by HP that achieves breakthrough speed. |
HP SureSupply | A free software tool for printers. |
Ink Cartridge | A replaceable unit that holds ink and the print nozzles for inkjet printers. |
In-Vehicle Infotainment (IVI) | In-Vehicle Infotainment (IVI) is an auto industry term that refers to vehicle systems that combine entertainment and information delivery to drivers and passengers. |
Laser Printers | A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attracts toner. |
Mobile Printing | The process of sending data to a printer wirelessly from a smartphone or tablet. |
Photocopier | A machine for making photocopies. |
Print On Demand (POD) | Print-on-demand (POD) is a printing technology and business process in which book copies (or other documents) are not printed until the company receives an order, allowing prints of singular or small quantities. |
Print Quality | The quality of the hard copy or printout produced by a printer. |
Printer Cost Per Page | The price of a page of paper, which is calculated by dividing the price of ink or toner by the number of pages the manufacturer says is should cover. |
Printer Fleet Management | Solutions to help with time and money saving, in regards to printing for businesses. |
Printer Security | A term for printing tasks that meet a standard for privacy to prevent the unauthorized use of printed information. |
Printing Supplies | Items such as paper, ink, toner and devices used for printing. |
Refilled Cartridges | An OEM cartridge that has been used, but are manufactured and refilled with ink. |
Remanufactured Cartridges | An OEM cartridge that has been used, but are manufactured and refilled with ink. |
Satellite Constellation | A satellite constellation is a group of artificial satellites working in concert. Such a constellation can be considered to be a number of satellites with coordinated ground coverage, operating together under shared control, synchronized so that they overlap well in coverage, the period in which a satellite or other spacecraft is visible above the local horizon. |
Toner Cartidge | The consumable component of a laser printer. |
Product Dev Ops & Quality Analysis
Technology Word | Meaning |
Agile Analytics | Agile Analytics consists of a set of highly disciplined practices and techniques, some of which may be tailored to fit the unique data warehouse/business intelligence (DW/BI) project demands found in your organization. |
Agile Software Development | A lightweight software engineering framework that promotes iterative development throughout the life-cycle of the project, close collaboration between the development team and business side, constant communication, and tightly-knit teams. |
Agile Tools | Any tool that supports any agile methodology, be it scrum, Kanban, where you can plan, track, and manage all your agile software development projects from a single tool. |
Agile Training | Generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability. |
Application Lifecycle Management | The supervision of a software application from its initial planning through retirement. |
Defect Tracking | The process of tracking the logged defects in a product from beginning to closure, and making new versions of the product that fix the defects. |
Functional Testing | A software testing process used within software development in which software is tested to ensure that it conforms with all requirements. |
Human-Machine Interface (HMI) Design | HMI design is the processes of designing the interaction between the human and the machine to allow effective operation and control of the machine from the human end, whilst the machine simultaneously feeds back information that aids the operators' decision-making process. |
Iterative Prototyping | A design methodology based on cyclic process of prototyping, testing, analyzing, |
Iterative Software Development | Iterative development is a way of breaking down the software development of a large application into smaller chunks. |
Kanban | Kanban is a Japanese manufacturing system in which the supply of components is regulated through the use of an instruction card sent along the production line. |
Microsoft Most Valuable Professional (MVP) | Microsoft Most Valuable Professional (MVP) award is given to "technology experts who passionately share their knowledge with the community. |
Minimum Viable Product (MVP) | A Minimum viable Product is that version of a new product which allows a team to collect the maximum amount of validated learning about customers with the least effort. |
Nonprofit Software | Nonprofit Software is software designed for use by nonprofit organizations. |
Planning and Design | Design is the creation of a plan or convention for the construction of an object, system or measurable human interaction (as in architectural blueprints, engineering drawings, business processes, circuit diagrams, and sewing patterns). |
PRINCE2 | PRINCE2 (PRojects IN Controlled Environments) is a structured project management method and practitioner certification programme. PRINCE2 emphasises dividing projects into manageable and controllable stages. |
Product Configurators | Knowledge-based configuration, or also referred to as product configuration or product customization, is an activity of customizing a product to meet the needs of a particular customer. |
Product Development and Design | Product design as a verb is to create a new product to be sold by a business to its customers. A very broad concept, it is essentially the efficient and effective generation and development of ideas through a process that leads to new products. |
Product Information Management | Product information management means managing the information required to market and sell products through distribution channels. |
Product Lifecycle Management | Product lifecycle management is the process of managing the entire lifecycle of a product from inception, through engineering design and manufacture, to service and disposal of manufactured products. |
Product Management | Product management is an organizational lifecycle function within a company dealing with the planning, forecasting, and production, or marketing of a product or products at all stages of the product lifecycle. |
Project Collaboration | Project collaboration is a method by which teams and team leaders plan, coordinate, control and monitor the project they are working on. This collaborative process works across departmental, corporate and national boundaries and helps especially with projects as they grow in complexity. |
Project Management | Project management is the discipline of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria. |
Project Scheduling | The project schedule is the tool that communicates what work needs to be performed, which resources of the organization will perform the work and the timeframes in which that work needs to be performed. |
Proof of Concept (PoC) | Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. |
Quality Assurance | Quality assurance is the maintenance of a desired level of quality in a service or product, especially by means of attention to every stage of the process of delivery or production. |
Rapid Application Development (RAD) | Rapid application development is a suite of software development methodology techniques used to expedite software application development. |
Rapid Prototyping | Rapid prototyping is a group of techniques used to quickly fabricate a scale model of a physical part or assembly using three-dimensional computer aided design data. |
Rational Unified Process (RUP) | Rational Unified process is a software development methodology from Rational. |
Requirements Management | Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. |
Research and Development / Test | Research and development are activities in connection with corporate or government innovation. |
Retrospectives | Retrospective is a meeting at the end of the project during which participants of the projects evaluate the project and obtained experience, which can be used in the next project. |
Scaled Agile Framework (SAFe) | Scaled Agile Framework is an agile software development framework=" consistin"g of a knowledge-base of integrated patterns intended for enterprise-scale Lean-Agile development. |
Scrum Training | Scrum training is an iterative and incremental agile software training development framework for managing product development. |
Software Requirements | A software requirements specification is a description of a software system to be developed. |
Software Testing | Software testing is a process of executing a program or application with the intent of finding the software bugs. |
Technology Research | Applied research oriented toward engineering disciplines (but not to a specific product or process) and aimed at developing tools and test equipment and procedures, and at providing solutions to specific technical problems. |
Testing and Analysis | Test analysis is the process of looking at something that can be used to derive test information. |
Usability | Usability is the measure of a product's potential to accomplish the goals of the user. |
Usability Testing | Usability testing is a technique used in user-centered interaction design to evaluate a product by testing it on users. This can be seen as an irreplaceable usability practice, since it gives direct input on how real users use the system. |
Waterfall | Waterfall is relating to or denoting a method of project management that is characterized by sequential stages and a fixed plan of work. |
White Box Testing | White-box testing is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality. |
Programming Language & Coding
Technology Word | Meaning |
.NET | Programmers produce software by combining their source code with .NET Framework and other libraries. The framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio. |
AngularJS | A JavaScript-based open-source front-end web application framework |
ASP.NET | ASP.NET is an open-source server-side web application framework designed for web development to produce dynamic web pages. |
Aspect-Oriented Programming (AOP) | Aspect-oriented programming (AOP) is a programming paradigm that aims to increase modularity by allowing the separation of cross-cutting concerns. |
Bash | Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. |
C# | C# is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java. |
C++ | C++ is a general-purpose object-oriented programming language, and is an extension of the C language. |
Cascading Style Sheets(CSS) | Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. |
COBOL | COBOL is a computer programming language designed for use in commerce. |
Django | Django is a free and open-source web framework written in Python, which follows the model-view-template architectural pattern. |
Email Template | Email templates allow you to customize the formatting and text of emails sent by users who share your content. |
Encoders | An encoder is a device, circuit, transducer, software program, algorithm or person that converts information from on format or code to another, for the purposes of standardization, speed or compressions. |
Fortran | Fortran is a high-level computer programming language used especially for scientific computation. |
HiveQL | Hive provides an SQL dialect, called Hive Query Language for querying data stored in a Hadoop cluster. |
HTML 5 | Hypertext markup Language revision 5 is markup language for the structure and presentation of World Wide Web contents. |
Java | Java is a general purpose computer programming language designed to produce programs that will run on any computer system. |
Java Database Connectivity (JDBC) | Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. |
JavaScript | Java Script is an object-oriented computer programming language commonly used to create interactive effects within web browsers. |
Keyhole Markup Language (KML) | Keyhole Markup Language (KML) is an XML notation for expressing geographic annotation and visualization within Internet-based, two-dimensional maps and three-dimensional Earth browsers. |
Node.js | An open-source, cross-platform JavaScript run-time environmentfor executing JavaScript code server-side |
Object-Oriented Programming (OOP) | Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which may contain data in the form of fields. |
Perl | Perl is a high-level general-purpose programming language used especially for developing Web applications. |
PHP | PHP or hypertext preprocessor is defined as an HTML-embedded scripting language that is used to write web pages. |
Pig | Apache pig is a high-level platform for creating programs that run on Apache Hadoop. Pig Latin abstracts the programming from the Java MapReduce idiom into a notation which makes MapReduce programming high level, similar to that of SQL for relational database management systems. |
Postgres | PostgreSQL is an open source relational database management system developed by a worldwide team of volunteers. |
PowerShell | PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language. |
Programming Languages | Programming languages are in computer technology, a set of conventions in which instructions for the machine are written. |
Python | Python is a high-level general-purpose programming language. |
Query language | Query languages or data query languages (DQLs) are computer languages used to make queries in databases and information systems. |
R | R is an open source programming language and software environment for statistical computing and graphics that is supported by the R Foundation for Statistical Computing. |
Regular Expression | A regular expression, regex or regexp (sometimes called a rational expression) is, in theoretical computer science and formal language theory, a sequence of characters that define a search pattern. |
Ruby | Ruby is a dynamic, reflective, object-oriented, general-purpose programming language. |
Ruby on Rails | Ruby on Rails is a server-side web application framework written in Ruby under the MIT License. |
Scratch | Scratch is a visual programming language and online community targeted primarily at children. |
Scripting | A scripting or script language is a programming language that supports scripts; programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator. |
Security Assertion Markup Language (SAML) | Security Assertion Markup Language (SAML, pronounced sam-el) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. |
SPARQL | SPARQL (for SPARQL Protocol and RDF Query Language) is an RDF query language, that is, a semantic query language for databases, able to retrieve and manipulate data stored in Resource Description Framework (RDF) format. |
Swift (Apple OS) | Swift is a general-purpose, multi-paradigm, compiled programing language developed by Apple Inc. for iOS, macOS, watchOS, tvOS, and Linux. |
VBScript | VBScript is an Active Scripting language developed by Microsoft that is modeled on Visual Basic. |
XML | XML is a metalanguage which allows users to define their own customized markup languages, especially in order to display documents on the internet. |
XQuery | XQuery (XML Query) is a query and functional programming language that queries and transforms collections of structured and unstructured data, usually in the form of XML, text and with vendor-specific extensions for other data formats (JSON, binary, etc.). |
Robotics
Technology Word | Meaning |
Actuators | An actuator is a component of a machine that is responsible for moving or controlling a mechanism or system, for example by actuating (opening or closing) a valve; in simple terms, it is a mover. |
Autonomous Driving Solutions | Autonomous Driving Solutions refers to an autonomous driving service or product that may be offered by a company as a potential solution for a business need or problem. |
Cognitive Robotics | concerned with endowing a robot with intelligent behavior by providing it with a processing architecture that will allow it to learn and reason about how to behave in response to complex goals in a complex world. Cognitive robotics may be considered the engineering branch of embodied cognitive science and embodied embedded cognition. |
Drones | An unmanned aerial vehicle, commonly known as a drone, is an aircraft without a human pilot aboard. UAVs are a component of an unmanned aircraft system; which include a UAV, a ground-based controller, and a system of communications between the two |
Industrial Automation | Industrial automation is the use of control systems, such as computers or robots, and information technologies for handling different processes and machineries in an industry to replace a human being. |
Industrial Robots | An industrial robot is a robot system used for manufacturing. Industrial robots are automated, programmable and capable of movement on two or more axes.Typical applications of robots include welding, painting, assembly, pick and place for printed circuit boards, packaging and labeling, palletizing, product inspection, and testing; all accomplished with high endurance, speed, and precision. They can help in material handling and provide interfaces, |
Nanorobotics | An emerging technology field creating machines or robots whose components are at or near the scale of a nanometre (10?9 meters). More specifically, nanorobotics (as opposed to microrobotics) refers to the nanotechnology engineering discipline of designing and building nanorobots, with devices ranging in size from 0.1 10 micrometres and constructed of nanoscale or molecular components |
Robot Locomotion | Robot locomotion is the collective name for the various methods that robots use to transport themselves from place to place. |
Robotic Sensing | Robotic sensing is a subarea of robotics science intended to give robots sensing capabilities, so that robots are more human-like. Robotic sensing mainly gives robots the ability to see, touch, hear and move and uses algorithms that require environmental feedback. |
Robots | A robot is a machine especially one programmable by a computer capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed to take on human form but most robots are machines designed to perform a task with no regard to how they look. |
Swarm Robotics | Swarm robotics is an approach to the coordination of multirobot systems which consist of large numbers of mostly simple physical robots. It is supposed that a desired collective behavior emerges from the interactions between the robots and interactions of robots with the environment |
Zero Moment Point | Zero moment point is a concept related with dynamics and control of legged locomotion, e.g., for humanoid robots. It specifies the point with respect to which dynamic reaction force at the contact of the foot with the ground does not produce any moment in the horizontal direction, i.e. the point where the total of horizontal inertia and gravity forces equals 0 (zero). |
Search / Social / Website Marketing
Technology Word | Meaning |
Ad Copy | The main text of a clickable advertisement, whether it is a contextual or a pay per click ad. |
Advertising Campaign | An advertising campaign is a series of advertisement messages that share a single idea and theme which make up an integrated marketing communication (IMC). |
Branding | The process involved in creating a unique name and image for a product in the consumers' mind, mainly through advertising campaigns with a consistent theme. |
Campaign Management | Implements public relations, product development, and sales to create, execute, monitor, and measure marketing programs directed at specifically target audiences. |
Conversion Marketing | The act of converting site visitors into paying customers |
Creative Services | A department within a company that does creative work such as writing, designing, and production. |
Daily Deals | An ecommerce business model in which a website offers a single product for sale for a period of 24 to 36 hours. |
Demographics | Statistical data relating to the population and particular groups within it. |
Direct Response (DR) | A type of marketing that elicits a specific, measured response resulting from a consumer's direct response to a marketer. |
Dynamic Creative | Personalized content. |
Marketing Campaign | Marketing campaigns promote a product through different media, including television, radio, print and online platforms. |
National Cyber Security Awareness Month (NCSAM) | National Cyber Security Awareness Month (NCSAM) is observed each October since its inception in 2004 in the United States of America. |
Online Video Marketing | Using video to promote or market your brand, product, or service. |
Pay Per Click (PPC) | A business model whereby a company that has placed an advertisement on a website pays a sum of money to the host website when a use clicks on to the advertisement. |
QR Code | A machine readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone. |
Sponsorship | A person who vouches or is responsible for a person or thing. |
Enterprise Search | The practice of making content from multiple enterprise-type sources, such as databases and intranets, searchable to a defined audience. |
International Search Engine Optimization (SEO) | International SEO is the process of optimizing your website so that search engines can easily identify which countries you want to target and which languages you use for business. |
Internet Search | Web sites or software that search the internet for documents that contain a key word, phrase, or subject that is specified by the user to the search engine. |
Keywords | An informative word used in an information retrieval system to indicate the content of a document. |
Multilingual SEO Services | Multilingual SEO is the backbone of any global search marketing campaign, and often referred to as natural or organic search, SEO is the process used to improve website rankings in the Search Engine Results Pages. |
Search Engine Marketing (SEM) | A form of Internet marketing that involves the promotion of websites by increasing their visibility in search engine results pages primarily through paid advertising. |
Search Engine Optimization (SEO) | The process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine. |
Search Retargeting | A form of retargeting employed by online marketers that target an audience based on the previous searches they conduct on other websites. |
Digital Engagement | Any use of social media by a corporate organization, right through to more specific definitions around how public sector organizations promote participation in policymaking. |
Global Social Media Marketing | Global social media marketing allows you to organize your channels for an audience that speaks different languages. |
Hashtag | A hashtag is a type of metadata tag used on social networks such as Twitter and other microblogging services, allowing users to apply dynamic, user-generated tagging which makes it possible for others to easily find messages with a specific theme or content; it allows easy, informal markup of folk taxonomy without need of any formal taxonomy or markup language. |
Integrated Social Marketing | An approach to creating a unified and seamless experience for consumers to interact with the brand/enterprise; it attempt to meld all aspects of marketing communication such as advertising, sales promotion, public relations, direct marketing, and social media. |
SEO/SEM Retargeting | Closely related to site retargeting and has to do with the search terms used prior to clicking to or arriving on your site. |
Social Activation | The act of transforming your social media followers from voyeurs, into participants, into ultimately, evangelists. |
Social Analytics | Refers to the collection and analysis of statistical, digital data on how users interface with an organization, particularly online. |
Social Business | A business created and designed to address a social problem. |
Social Content and Apps | Shorthand for the terms social media and content marketing. It represents content and link sharing on various social media platforms. |
Social Engagement | Refers to one's degree of participation in a community or society. |
Social Graph | The social graph in the Internet context is a graph that depicts personal relations of internet users. In short, it is a model or representation of a social network, where the word graph has been taken from graph theory. |
Social Listening | The process of monitoring digital conversations to understand what customers are saying about a brand and industry online. |
Social Media | Websites and applications that enable users to create and share content or to participate in social networking. |
Social Media Intelligence | Social media intelligence (SMI or SOCMINT) refers to the collective tools and solutions that allow organizations to monitor social channels and conversations, respond to social signals and synthesize social data points into meaningful trends and analysis based on the user's needs. |
Social Media Marketing | Social media marketing is the use of social media platforms and websites to promote a product or service. |
Social Media Monitoring | The active monitoring of social media channels for information about a company or organization. |
Social Networking | The use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. |
Social Publishing | Defined as any form, new or emerging, of online content creation. |
Social Retargeting | Also known as remarketing, is a form of online advertising that can help you keep your brand in front of bounced traffic after they leave your website. |
Social Verification | A social psychological theory that asserts people want to be known and understood by others according to their firmly held beliefs and feelings about themselves, that is self-views. |
SocialFlow | SocialFlow uses real-time data and business rules to determine what and when to publish to your social media properties for both owned & paid social posts. |
Sprinklr | Sprinklr is a complete social media management system for the enterprise. Helping the world's largest brands do marketing, advertising, care, sales, research, and commerce on Facebook, Twitter, LinkedIn, and 21 other channels globally all on one integrated platform. |
Acquisition Strategy | The acquisition strategy is a comprehensive, integrated plan developed as part of acquisition planning activities. It describes the business, technical, and support strategies to manage program risks and meet program objectives. |
Ad Viewability | The online advertising metric which keeps the track of those impressions which are actually viewed by the customers. |
Advocacy Marketing | Advocacy Marketing is a form of marketing that emphasizes getting existing customers to talk about the company and its products. |
Alliance Marketing | Joining two or more organizations on the purpose of sharing marketing strategy, promoting concepts, services or products. |
Analyst Relations | Analyst relations is a corporate strategy, corporate communications and marketing activity in which corporations communicate with ICT industry analysts (also known as research analysts) who work for independent research and consulting firms such as the leading four. |
Attention/Engagement Analytics | Attention/Engagement metrics measure the extent to which a user is engaged when they visit a website |
Attribution Models | An attribution model is the rule, or set of rules, that determines how credit for sales and conversions is assigned to touchpoints in conversion paths. |
Audience Measurement | Audience measurement measures how many people are in an audience, usually in relation to radio listenership and television viewership, but also in relation to newspaper and magazine readership and, increasingly, web traffic on websites. |
Audience Segmentation | Audience segmentation is a process of dividing people into homogeneous subgroups based upon defined criterion such as product usage, demographics, psychographics, communication behaviors and media use. |
Benchmarking | Evaluate or check something by comparison with a standard. |
Clickstream Analytics | The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits and in what order. |
Click-Through Rate (CTR) | Click-through rate (CTR) is the ratio of users who click on a specific link to the number of total users who view a page, email, or advertisement. |
Communications Strategy | A communications strategy, or plan, is a document that expresses the goals and methods of an organization's outreach activities, including what an organization wishes to share with the public and whom the organization is trying to reach. |
Concept Testing | Concept testing is the process of using surveys to evaluate consumer acceptance of a new product idea prior to the introduction of a product to the market. |
Conversion Rate Optimization (CRO) | Conversion Rate Optimization is a system for increasing the percentage of visitors to a website that convert into customers, or more generally, take any desired action on a webpage. |
Cross-Cultural Marketing | Cross-cultural marketing is the strategic process of marketing to consumers whose culture is different from that of the marketer's own culture. |
Customer Acquisition Cost (CAC) | Customer Acquisition Cost is the cost associated in convincing a customer to buy a product/service.[1] This cost is incurred by the organization to convince a potential customer. This is an important business metric. |
Customer Advisory Board (CAB) | A Customer Advisory Council (also referred to as a Customer Advisory Board or CAB)is a form of market research whereby a group of existing customers is convened on a regular basis to advise company management on industry trends, business priorities, and strategic direction. |
Digital Strategy | A digital strategy is a form of strategic management and a business answer or response to a digital question, often best addressed as part of an overall business strategy. |
Display Advertising Metrics | Display Advertising Metrics gauge quantites such as conversions, conversion rate, cost per conversion, click through rate, and clicks. |
E-Business Strategy | An E-Business Strategy defines short-term and long-term e-business goals and involves careful and skilled planning. |
Economic Growth | The increase in the inflation-adjusted market value of the goods and services produced by an economy over time, measured as real GDP |
Enterprise Feedback Management (EFM) | Enterprise feedback management (EFM) is a system of processes and software that enables organizations to centrally manage deployment of surveys while dispersing authoring and analysis throughout an organization. |
Global Marketing | Global marketing is marketing on a worldwide scale reconciling or taking commercial advantage of global operational differences, similarities and opportunities in order to meet global objectives. |
Global Procurement | Global procurement became a way for organisations to meet the challenges of new markets and global competitors. |
Go to Market | Go-to-market or go-to-market strategy is the plan of an organization, utilizing their inside and outside resources (e.g. sales force and distributors), to deliver their unique value proposition to customers and achieve competitive advantage. |
In-Store Analytics | In-store analytics is basically the process of finding meaningful insights from customers' behavioral data. |
Intent Marketing | Is about marketing a product or a service based on consumers' intent to adopt, purchase or consume that particular service which may have been either explicitly or implicitly conveyed by the subscriber. |
Key Opinion Leader (KOL) | Key Opinion Leader (KOL) is a person or organization who has expert product knowledge and influence in a respective field. |
Magic Quadrant (MQ) | Magic Quadrant (MQ) refers to a series published by IT consulting firm Gartner of market research reports that rely on proprietary qualitative data analysis methods to demonstrate market trends, such as direction, maturity and participants. |
Market Development | A growth strategy that identifies and develops new market segments for current products |
Market Entry Strategy | A Market Entry Strategy is the planned method of delivering goods or services to a new target market and distributing them there. |
Market Expansion | The process of offering a product or service to a wider section of an existing market or into a new demographic, psychographic or geographic market. |
Market Penetration | The successful selling of a product or service in a specific market, and it is measured by the amount of sales volume of an existing good or service compared to the total target market for that product or service |
Market Research | The action or activity of gathering information about consumers' needs and preferences. |
Marketing Analytics | The practice of measuring, managing and analyzing marketing performance |
Marketing Attribution | The identification of a set of user actions that contribute in some manner to a desired outcome, and then the assignment of a value to each of these events. |
Marketing Budgets | A marketing plan in terms of costs; an estimated amount of cost that will be required to promoted products or services. |
Marketing Challenges | A current non-market leader actively trying to move up within their industry. |
Marketing Dashboards | A central meeting place for all these data sources so that digital markets can get a full understanding of SEO performance from a number of perspectives through metrics. |
Marketing Ecosystem | The specific strategies and individual tools included in a marketing ecosystem and used to execute digital marketing campaigns are dependent on many factors including the goals for the campaign as well as the company's industry and their customer's buying habits. |
Marketing Initiatives | A marketing initiative is essentially anything that is clearly defined as a marketing effort. |
Marketing KPI | Key performance indicators, specifically within the marketing division. Key Performance Indicators (KPIs) are one of the most over-used and little understood terms in business development and management. They are too often taken to mean any metric or data used to measure business performance. |
Marketing Management | The process of overseeing and planning new product development, advertising, promotions and sales. |
Marketing Messaging | A promotional message can come in many forms, such as television or magazine advertisement, or a slogan on a product package. |
Marketing Mix | The marketing mix (also known as the 4 Ps) is a foundation model in marketing. The marketing mix has been defined as the "set of marketing tools that the firm uses to pursue its marketing objectives in the target". |
Marketing Operations | The function has emerged due to the need for a more transparent, efficient, and accountable view of marketing. |
Marketing Optimization | Marketing Optimization is the process of improving the marketing efforts of an organization in an effort to maximize the desired business outcomes. |
Marketing Performance Measurement | Marketing performance measurement (MPM), or marketing performance management, is the systematic management of marketing resources and processes to achieve measurable gain in return on investment and efficiency, while maintaining quality in customer experience. |
Marketing Plans | A comprehensive document or blueprint that outlines a company's advertising and marketing efforts for the coming year. |
Marketing Research | The action of activity of gathering information about consumer's needs and preferences. |
Marketing Resource Management | A systematic method of managing marketing resources such as digital assets, collateral, schedules, forecasts and budgets. |
Marketing Strategy | A process or model to allow a company or organization to focus limited resources on the best opportunities to increase sales and thereby achieve a sustainable competitive advantage. |
Marketing Tips | The strategic functions involved in identifying and appealing to particular groups of consumers, often including activities such as advertising, branding, pricing, and sales. |
Marketing Workflow | A sequence of processes that govern the tactical elements of your campaigns. |
Measure Impact | Impact measurement is the process of trying to find out what effect an intervention (such as a funding programme) is having on people, organisations or their external physical, economic, political or social environment. |
Media Planning | To determine the best combination of media to achieve the marketing campaign objectives. |
Multicultural Marketing | Multicultural marketing (also known as ethnic marketing) is the practice of marketing to one or more audiences of a specific ethnicity typically an ethnicity outside of a country's majority culture, which is sometimes called the "general market." |
Multi-level Marketing | Multi-level marketing (MLM) also called pyramid selling, network marketing, and referral marketing, is a marketing strategy for the sale of products or services where the revenue of the MLM company is derived from a non-salaried workforce selling the company's products/services, while the earnings of the participants are derived from a pyramid-shaped commission system. |
Operational Excellence | Operational Excellence is the execution of the business strategy more consistently and reliably than the competition. |
Precision Marketing | Precision marketing is a marketing technique that suggests successful marketing is to retain, cross-sell and upsell existing customers. |
Pricing Strategy | A pricing strategy takes into account segments, ability to pay, market conditions, competitor actions, trade margins and input costs, amongst others. |
Procure-to-Pay | Procure-to-pay is a term used in the software industry to designate a specific subdivision of the procurement process. |
Product Strategy | Product strategy is defined as the road map of a product. This road map outlines the end-to-end vision of the product, particulars on achieving the product strategy and the big picture context in terms of what the product will become. Companies utilise the product strategy in strategic planning and marketing to identify the direction of the company's activities. |
Product/Market Fit (PMF) | Product/market fit is the degree to which a product satisfies a strong market demand.Product/market fit has been identified as a first step to building a successful venture in which the company meets early adopters, gathers feedback and gauges interest in its product(s). |
Proof of Play | A new concept in cryptocurrency that rewards gamers an opportunity to earn in-game cryptocurrency coins. |
Real Time Personalization | Data-driven personalization completed in less than 1 second. |
Real-Time Reporting | Real-time reporting is a business intelligence practice that consists of gathering up-to-the-minute data and relaying it to users as it happens. |
ROI Analysis | To calculate ROI, the benefit or return of an investments is divided by the cost f the investment, and the result is expressed as a percentage or a ratio. |
Sales Dashboards | Sales dashboard is an easy-to-read graphical representation of sales data that's intended to enable sales managers to make better decisions. |
Sentiment Analysis | The process of computationally identifying and categorizing opinions expressed in a piece of text, especially in order to determine whether the writer's attitude towards a particular topic, product, etc., is positive, negative, or neutral. |
Site-Side Optimization | The procedures used to optimize or to design from scratch a website to rank well in search engines. |
Spend Management | Spend management is managing how to spend money to best effect in order to build products and services. |
Survey Data | Any number of ways in which data can be collected for a statistical survey. |
Thought Leadership | Can refer to an individual or firm that is recognized as an authority in a specialized field and whose expertise is sought and often rewarded. |
Time To Market (TTM) | In commerce, time to market (TTM) is the length of time it takes from a product being conceived until its being available for sale. TTM is important in industries where products are outmoded quickly. |
Uplift Modeling | A predictive modelling technique that directly models the incremental impact of a treatment on an individual's behavior. |
Vision Statements | A company's road map, indicating both what the company wants to become and guiding transformational initiatives by setting a defined direction for the company's growth. |
Visual Marketing | Visual marketing is the discipline studying the relationship between an object, the context it is placed in and its relevant image. Representing a disciplinary link between economy, visual perception laws and cognitive psychology,[1] the subject mainly applies to businesses such as fashion and design. |
Win / Loss Analysis | Win / loss analysis is a forensic market research exercise that focuses on de-constructing how companies market and sell their products and services from the prospect's perspective. The process typically entails conducting extensive telephone interviews with new clients or lost prospects. |
Accelerated Mobile Pages (AMP) | The Accelerated Mobile Pages Project (AMP) is an open-source website publishing technology designed to improve the performance of web content and advertisements. The AMP Project led by Google is a competitor to Facebook's Instant Articles,[1] and includes several other large search, social and web publishing platforms around the world. |
Adobe Experience Manager (AEM) | An enterprise content management solution that helps simplify the management and delivery of your content and assets. |
Blog Comments | A space within a blog that the reader can share their ideas or thoughts on a specific blog post page. |
Blogging | An approach to the analysis of datasets using techniques from topology. |
Conversion Funnel | Conversion funnel is a phrase used in e-commerce to describe the journey a consumer takes through an Internet advertising or search system, navigating an e-commerce website and finally converting to a sale. The metaphor of a funnel is used to describe the way users are guided to the goal with fewer navigation options at each step. |
Corporate Blogging | A blog that is published and used by an organization, corporation, etc.to reach its organizational goals. |
Facebook Pixel | A Facebook pixel is code that you place on your website. It helps you track conversions from Facebook ads, optimize ads based on collected data, build targeted audiences for future ads, and remarket to qualified leads people who have already taken some kind of action on your website. |
Google Analytics | A freemium web analytics service offered by Google that tracks and reports website traffic. |
Landing Pages | The section of a website accessed by clicking a hyperlink on another web page, typically the website's home page. |
Multilingual Website | A multilingual website is a website that provides content in more than one language, for example, English, French, and German. |
Responsive Animations | Responsive Animations are animations that feature a responsive design that will render and scale appropriately on a variety of devices. |
Site Management | The administration and control of the hardware and software used in a web site. |
Site Personalization | Consists of tailoring a service or a product to accommodate specific individuals, sometimes tied to groups or segments of individuals. |
Style Guide | A style guide (or manual of style) is a set of standards for the writing and design of documents, either for general use or for a specific publication, organization, or field. |
User-Generated Content | Term used to describe any form of content such as video, blogs, discussion form posts, digital images, audio files, and other forms of media that was created by consumers or end-users of an online system or service and is pubic ally available to others consumers and end-users. |
Video Blogs | A form of blog for which the medium is video, and is a form of web television. Vlog entries often combine embedded video with supporting text, images, and other metadata. |
Web Analytics | The measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. |
Web Content | The textual, visual, or aural content that is encountered as part of the user experience on websites. It may include - among other things - text, images, sounds, videos and animations. |
Web Copy | Verbiage written specifically for use on the web. |
Web Site Hosting | The activity or business of providing storage space and access for websites. |
Website Builders | Website builders are tools that typically allow the construction of websites without manual code editing. |
Website Design | The process of creating websites. |
Security: Digital & Cyber
Technology Word | Meaning |
Access and Information Protection | Information protection policy is a document which provides guidelines to users on the processing, storage and transmission of sensitive information. |
Address Space Layout Randomization (ASLR) | Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. |
Advanced Persistent Threat (APT) | An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either private organizations, states or both for business or political motives. |
Advanced Threat Protection (ATP) | Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. |
Apache SPOT | Apache Spot overcomes the challenge of how to enhance data collection from different sources when most of the time our collectors are sending thousands of events per second overflowing available server resources. |
Apache Tomcat | Apache Tomcat, often referred to as Tomcat Server, is an open-source Java Servlet Container developed by the Apache Software Foundation (ASF). |
Application Security | Application security is the use of software, hardware, and procedural methods to protect applications from external threats. |
AppLocker | AppLocker is an application whitelisting technology introduced with Microsoft's Windows 7 operating system. AppLocker allows restricting which programs users can execute based on the program's path, publisher, or hash.[1] AppLocker can be configured for an enterprise via Group Policy. |
Backdoor | A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device |
Botnet | Botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. |
Card Verification Value (CVV) | A card verification value (CVV) is a security feature present in credit, debit and ATM cards to facilitate "card not present" transactions. |
Certified Information Systems Security Professional (CISSP) | Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². |
Check Point Software Technologies | Check Point Software Technologies, Ltd. Is the corporate name of a security vendor that offers security for networks, data and endpoints, unified under a single management framework. |
Clickjacking | Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. |
Common Access Card (CAC) | A Common Access Card (CAC) is a smart card that serves as a standard identification for United States Active Duty Uniform Defense Personnel, including the National Guard and Selected Reserve, civilian employees of the United States Coast Guard (USCG), civilian employees of the Department of Defense (DoD) and other DoD and USCG contractor personnel. |
Common Criteria (CC) | Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements (SFRs and SARs respectively) in a Security Target (ST), and may be taken from Protection Profiles (PPs). |
Computer Hacking | Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish goal that is considered to be outside of the creator's original objective. |
Conficker | Conficker is a worm that infects computers running the Windows operating system by using known flaws in Windows. |
Credential Stuffing | Credential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. |
Crimeware | Crimeware (as distinct from spyware and adware) is designed to perpetrate identity theft through social engineering or technical stealth in order to access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the cyberthief. |
Cross-Site Scripting | Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. |
Cryptojacking | Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies. The idea is that a smart system can utilize the resources of visiting devices or end users to contribute to bitcoin mining or other similar mining efforts. |
Cyber & Intelligence | While cyber security comprises the recruitment of IT security experts, and the deployment of technical means, to protect an organization's critical infrastructure, or intellectual property, CTI is based on the collection of intelligence using open source intelligence, social media intelligence, human intelligence, or intelligence from the deep and dark web. |
Cyber Risk Management | Risk management is the process of identifying, assessing, and controlling threats to an organization's capital and earnings. |
Cyber Security | Cyber security is the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. |
Cyber Security Framework | The cyber security framework provides a policy framework of computer security guidance for how private sector organizations can asses and improve their ability to prevent, detect, and respond to cyber attacks. |
Cyber Threats | A cyber threat is the possibility of a malicious attempt to damage or disrupt a computer network or system. |
Cyberattack | A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. |
Cybercrime | Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). |
Cyberstalking | Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. This crime can be perpetrated through email, social media, chat rooms, instant messaging clients and any other online medium. |
Cyberwarfare | Cyberwarefare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. |
Data Breach | A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. |
Data Encryption | Data encryption is the translation of data into a secret code. |
Data Execution Prevention (DEP) | Data execution prevention (DEP) is a security feature within operating system that prevents applications from executing code from a non-executable memory location. |
Data Exfiltration | Data exfiltration is the unauthorized transfer of sensitive information from a target's network to a location which a threat actor controls |
Data Protection Officer (DPO) | A data protection officer (DPO) is an enterprise security leadership role required by the General Data Protection Regulation (GDPR). Data protection officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements. |
Data Security | Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. |
Defense In Depth | Defense in depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. |
Device Security | Device security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. |
Distributed Denial-of-Service (DDoS) | A distributed denial-of-service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. |
Dridex | Dridex malware is a type of malware that uses Microsoft Office macros. It can help hackers to steal financial information and other identifiers for users. |
Electronic Identity Verification (eIDV) | Electronic Identity Verification is the use of information in public and private databases to quickly confirm whether an individual is who they claim to be based on personal information such as their name, date of birth, Social Security number, and address. |
Encryption | Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. |
Encryption Key Management | Encryption key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. |
End User Security | End user security is the subject of security risks, compromises, and options available to the average computer user. |
Endpoint Management | Endpoint management is the ability to centrally discover, provision, deploy, update, and troubleshoot endpoint devices within an organization |
Endpoint Security | In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. |
Enterprise Firewall | An Enterprise firewall is a system designed to protect the network of an organization. |
Entitlement Management | Entitlement management is technology that grants, resolves, enforces, revokes and administers fine-grained access entitlements. |
ERP Security | ERP is the integrated management of core business process, often in real-time and mediated by software and technology. |
Exploit Kit | Exploit kits or exploit packs refer to a type of hacking toolkit that cybercriminals use to take advantage of vulnerabilities in systems/devices so they can distribute malware or do other malicious activities. |
Firewall | Firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. |
Fortinet | Fortinet is an American multinational corporation headquartered n Sunnyvale, CA. |
Fraud Detection and Prevention | The adoption of Fraud Detection and prevention services helps create a strong defense against such breach of law, thereby helping in the prevention and mitigation of fraud-related activities. |
Fraud Protection | Online fraud protection is the process of protecting oneself from being lured into scams over the Internet. |
Google Authenticator | Google Authenticator is a software token that implements two-step verification services using the Time-based One-time Password Algorithm and HMAC-based One-time Password Algorithm, for authenticating users of mobile applications by Google. |
Hardware Security Module (HSM) | A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. |
Hijacking | Hijacking is to illegally seize something in transit and force it to go to a different designation or use it for one's own purposes. |
Identity Access Management (IAM) | Identity management is, in computer security, the security and business discipline that 'enables the right individuals to access the right resources at the right times and for the right reasons'. |
Identity Management | Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. |
Identity Proofing | Identity proofing is the process by which an organization collects and verifies information about a person for the purpose of account opening or issuing credentials to that person. |
Identity Providers (IdP) | An identity provider (abbreviated IdP) is a system entity that creates, maintains, and manages identity information for principals while providing authentication services to relying party applications within a federation or distributed network. |
Information Security | Information security is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this. |
Internet Security | Internet security is defined as a process to create rules and actions to take to protect against attacks over the Internet. |
Intrusion Detection | An intrusion detection system is a device of software application that monitors a network or systems for malicious activity or policy violations. |
Intrusion Prevention | Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly. |
IPSec | Internet Protocol Security is a set of protocols that provides security for Internet Protocol. |
Kerberos | Kerbeos is a network protocol that uses secret-key cryptography to authenticate client-server applications. |
Keystroke Logging | Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. |
Knowledge-Based Authentication (KBA) | Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a financial institution or website. |
Malicious Domains | Malicious domains usually refer to a series of illegal activities, posing threats to people's privacy and property through a hosting websites. |
Malware Analysis | Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor. |
Malware and Vulnerabilities | Maleware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. |
Malware Attacks | A malware attack is a piece of malicious software which takes over a person's computer in order to spread the bug onto other people's devices and profiles. |
Malware Detection | Maleware detection is the detection of a variety of forms of hostile or intrusive software. |
Malware Threats | Malware threats are the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems. |
Man in the Middle Attack | A man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. |
Managed Detection and Response (MDR) | Managed Detection and Response (MDR) is an all-encompassing cybersecurity service used to detect and respond to cyber-attacks. |
Managed Security Services | A managed security service provider is an Internet service provider that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network management. |
Mandiant | Mandiant is an American cybersecurity firm. |
Microsegmentation | Microsegmentation refers to the process of segmenting a collision domain into various segments. Microsegmentation is mainly used to enhance the efficiency or security of the network. |
Multifactor Authentication | Multi-factor authentication is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism - typically at least two of the following categories: knowledge, possession, and inherence. |
Next-Generation Firewall (NGFW) | A Next-Generation Firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). |
One Time Password | A one-time password or pin (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device. |
Out-of-Band Authentication | Out of band authentication is a term for a process where authentication requires two different signals from two different networks or channels. |
Password Protection | Password protection is a security process that protects information accessible via computers that needs to be protected from certain users. |
PCI Compliance | PCI compliance is not a single event, but an ongoing process. The Payment Card Industry Data Security Standard was established by the major card brands. All businesses that process, store, or transmit payment card data are required to implement the standard to prevent cardholder data theft. |
Penetration Testing | Penetration testing is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. |
Point-to-Point Encryption (P2PE) | Point-to-point encryption (P2PE) is a standard established by the PCI Security Standards Council. Payment solutions that offer similar encryption but do not meet the P2Pe standard are referred to as end-to-end encryption (E2Ee) solutions. |
Positive Pay | Positive Pay is an automated fraud detection tool offered by the Cash Management Department of most banks. In its simplest form, it is a service that matches the account number, check number and dollar amount of each check presented for payment against a list of checks previously authorized and issued by the company. |
Potentially Unwanted Program (PUP) | A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted. It is used as a subjective tagging criterion by security and parental control products. |
Private Keys | Private keys are a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular recipient, such that the encrypted messages can be deciphered only by using a second key that is known only to the recipient. |
Privileged Access Management (PAM) | Privileged Access Management (PAM) is a solution that helps organizations restrict privileged access within an existing Active Directory environment. |
Quantum Cryptography | Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. |
Ransomware | Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. |
Rapid7 | Rapid7 delivers the visibility, analytics, and automation needed to monitor, investigate, and resolve the vulnerabilities, threats, and performance issues that put organizations at risk. |
Remote Access Trojan (RAT) | A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. |
Retina Network Security Scanner | Retina Network Security Scanner is the security industry's most respected and validated vulnerability assessment tool. |
Role-Based Access Control (RBAC) | In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security. |
Sandboxing | Sandboxing is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not spread to other areas on the computer. |
SAP Vulnerabilities | An SAP vulnerability is a security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered. |
Scareware | Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. |
SecOps | SecOps is the seamless collaboration between IT Security and IT Operations to effectively mitigate risk. |
Secure Sockets Layer (SSL) | SSL is the standard security technology for establishing an encrypted link between a web server and a browser. |
Secure Supervisory Control and Data Acquisition (SCADA) | Supervisory control and data acquisition is a control system architecture that uses computers, networked data communications and graphical user interfaces for high-level process supervisory management, but uses other peripheral devices such as programmable logic controllers and discrete PID controllers to interface to the process plant or machinery. |
Secure Voice | Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. |
Secure Web Gateway (SWG) | A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization. |
Security Analytics | Security analytics is simply a collection of security data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional security data processing applications. |
Security Architecture | Security architecture is unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. |
Security as a Service | Security as service is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own, when total cost of ownership is considered. |
Security Automation | Security Automation is the automatic handling of security operations-related tasks. It is the process of executing these tasks, such as scanning for vulnerabilities, without human intervention. |
Security Benchmarking | A benchmark is a standard against which the performance of a security, mutual fund or investment manager can be measured. |
Security Breaches | A security breach is any incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. |
Security Compliance | The term security compliance of a computer system against a particular security baseline is used in the field of information security to denote the fact that after performing a qualified analysis of necessary features of the system, the system in question has been recognized to be configured in a way that is in line with all of the requirements as demanded by the particular security policy. |
Security Configuration | Security configuration management is the process, in which the security configuration baseline of It components is formalized and subsequently verified against the actual state of security configurations. |
Security Consulting | A security consultant is an advisor, guide, and all around security guru. |
Security Event | A security event is a change in the everyday operations of a network or information technology service indicating that a security policy may have been violated or a security safeguard may have failed. |
Security Forensics | Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. |
Security Hygiene | Cyber hygiene is the establishment and maintenance of an individual's online safety. |
Security Information and Event Management (SIEM) | In the field of computer security, security information and event management software products and services combine security information management and security event management. |
Security Intelligence | Security intelligence is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information. |
Security Management | Security management is the identification of an organization's assets, followed by the development, documentation, and implementation of policies and procedures for protecting these assets. |
Security Operations | A Security Operations, analytics and reporting platform utilizes machine-readable and stateful security data to provide reporting, analysis and management capabilities to support operational security teams. |
Security Operations Center (SOC) | A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology. |
Security Orchestration | Security Orchestration is a method of connecting security tools and integrating disparate security systems. It is the connected layer that streamlines security processes and powers security automation. |
Security Patches | A security patch is a software or operating-system patch that is intended to correct a vulnerability to hacking or viral infection. |
Security Policies | A security policy is a definition of what It means to be secure for a system, organization or other entity. |
Security Solutions | Security solutions are precautions taken to ensure protection of data. |
Security Standards Council | The security standards council was originally formed with the goal of managing the ongoing evolution of the payment card industry data security standard. |
Security Storage | Storage security is a specialty area of a security that is concerned with securing data storage systems and ecosystems and the data that resides on these systems. |
Security Threats | A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. |
Security Tools | Security tools refers to security software, which is a general phrase used to describe any software that provides security for a computer or network. |
Sensitive Data | Sensitive data is defined as information that is protected against unwarranted disclosure. Access to sensitive data should be safeguarded. Protection of sensitive data may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. |
Server Farms | A server farm is another term for a data center. |
Shadow IT | Shadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval. |
Single Sign On (SSO) | Single sign-on is an authentication process that allows a user to access multiple applications with one set of login credentials. |
Software Defined Perimeter (SDP) | Software Defined Perimeter (SDP) is an approach to computer security which evolved from the work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative around 2007. |
Space Traffic Management (STM) | Space traffic management is the cyber security of the space world. It is a hugely important public policy issue that underpins the successful future expansion of space activities, yet there is no agreement on its definition. |
SSL VPN | An SSL VPN is a form of VPN that can be used with a standard Web browser. |
Strong Authentication | Strong authentication blends a minimum of two different authentication factors of different types to improve the safety of identity verification. |
Strong Encryption | A strong encryption is an encryption method that uses a very large number as its cryptographic key. |
SYN Flood | A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |
Technology Security | Technology security is the process of implementing measures and systems designed to securely protect and safeguard information. |
Threat Intelligence | Threat intelligence is the analysis of internal and external threats to an organization in a systematic way. The treats that threat intelligence attempts to defend against include zero-day threats, exploits and advanced persistent threats (APTs). |
Threat Prevention | Threat prevention is measures against or software designed to protect a network from attack. |
Transport Layer Security (TLS) | Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), which is now prohibited from use by the Internet Engineering Task Force (IETF) are cryptographic protocols that provide communications security over a computer network. |
Two-Factor Authentication | Two factor authentication is an extra layer of security that is known as 'multifactor authentication' that requires not only a password and username but also something that only, and only, that user has on them. |
Unified endpoint management (UEM) | Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console. |
Unified Threat Management | Unified threat management is a term first used by IDC to describe a category of security appliances which integrates a range of security features into a single appliance. |
VMware NSX | Vmware NSX is a virtual networking and security software product family created from Vmware's vCloud Networking and Security and Nicira Network Virtualization Platform intellectual property. |
Vulnerability Assessment | Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. |
Vulnerability Management | Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities, particularly in software. |
Vulnerability Scanning | Vulnerability scanning is a security technique used to identify security weaknesses in a computer system. Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers attempting to gain unauthorized access to computer systems. |
Web Application Firewall (WAF) | A web application firewall (or WAF) filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers. |
Web Application Security | Web application security is the process of securing confidential data stored online from unauthorized access and modification. |
Web Filter | A Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user. |
Website Defacement | Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of defacers, who break into a web server and replace the hosted website with one of their own. |
Whitelisting | Whitelisting is a IT security process used to identify safe email senders, domain and/or IP addresses. |
Zero-Day Attack | A zero-day attack is also sometimes defined as an attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known. |
Zero-Day Threat | A zero-day threat is a threat that exploits an unknown computer security vulnerability. |
ZoneAlarm | ZoneAlarm is an internet security software company that provides consumer antivirus and firewall products. ZoneAlarm was developed by Zone Labs, which was acquired in March 2004 by Check Point. |
Servers & Racks
Technology Word | Meaning |
Apache HTTP Server | An open source Web server creation, deployment and management software. |
Apache Solr | Apache Solr is an open source enterprise search platform, written in Java, from the Apache Lucene project. Its major features include full-text search, hit highlighting, faceted search, real-time indexing, dynamic clustering, database integration, NoSQL features and rich document handling. |
Application Server | A component-based product that resides in the middle-tier of a server centric architecture. |
Blade Servers | A server architecture that houses multiple server models blades in a single chassis. |
Capacity Requirement Planning (CRP) | Capacity Requirements Planning is an accounting method used to determine the available production capacity of a company. |
Capacity Utilization | Capacity utilization is a measure of the extent to which the productive capacity of a business is being used. |
Clustering | Clustering, in the connect or databases, refers to the ability of several servers or instances to connect to a single database. |
Communication Server | A communication server is a dedicated system that provides communication services for users on a network who need to transfer files or access information on systems or networks at remote locations over telecommunication links. |
CPU Usage | CPU Usage refers to the computer's processor and how much work it's doing. |
Directory Servers | A directory server is a network server that provides a database of mostly unchanging data. |
Entry-Level Servers | Entry level servers offer power, choice, and ease-of-use to take on the most challenging workloads simply and cost-effectively. |
Exchange Server | An exchange server is a mail server and calendaring server developed by Microsoft. |
File Servers | A file server is a device that controls access to separately stored files, as part of a multiuser system. |
FileZilla | FileZilla is a free software, cross-platform FTP application, consisting of FileZilla Client and FileZilla Server. Client binaries are available for Windows, Linux, and macOS, server binaries are available for Windows only. Both server and client support FTP and FTPS (FTP over SSL/TLS), while the client in addition also can connect to SFTP servers. |
Gunicorn | The Gunicorn is a Python Web Server Gateway Interface (WSGI) HTTP server. It is a pre-fork worker model ported from Ruby's Unicorn project. The Gunicorn server is broadly compatible with a number of web frameworks simply implemented |
HAProxy | HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers. |
HPE 3PAR StoreServ | HPE 3PAR StoreServ is a tier 1 all-flash data storage array that can scale from midsize to the largest enterprises and service providers, for instant application provisioning and high levels of service. |
Index Servers | Indexing Service was a Windows service that maintained an index of most of the files on a computer to improve searching performance on PCs and corporate computer networks. |
Intel Xeon | Xeon is a 400 MHz pentium microprocessor from Intel for use in 'mid-range' enterprise servers and workstations. |
Internet Information Services (IIS) | Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family. |
Jenkins | Jenkins is an open source automation server written in Java. Jenkins helps to automate the non-human part of software development process, with continuous integration and facilitating technical aspects of continuous delivery. |
Load Balancing | A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase capacity and reliability of applications. |
Microsoft BizTalk | Microsoft BizTalk is an inter-Organizational Middleware System that enables companies to automate business processes, through the use of adapters which are tailored to communicate with different software systems used in an enterprise. |
Microsoft Team Foundation Server (TFS) | Team foundation Server is a Microsoft product that provides source code management, reporting, requirements management, project management, automated builds, lab management, testing and release management capabilities. |
Nginx | Nginx is a web server which can also be used as a reverse proxy, load balancer and HTTP cache. |
Rack Servers | A rack server, also called a rack-mounted server, is a computer dedicated to use as a server and designed to be installed in a framework called a rack. |
Reverse Proxy | A reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. |
Search Servers | Microsoft Search Server is an enterprise search platform from Microsoft, based on the search capabilities of Microsoft Office SharePoint Server. |
Server Automation | Server Automation is an integrated solution that automates provisioning, patching, and configuration of operating systems, storage resources and application components across physical, virtual and public cloud systems. |
Server Environments | A server environment is a networking environment that is made up of clients and servers running applications designed for client/server architecture. |
Server Failure | A variety of events can lead to the failure of a server like loss of power, hardware malfunction, operating system crashes, network partitions, and unexpected application behavior can all contribute to the failure of a server instance. |
Server Hardware | Designating a computer as 'server class hardware' implies that is socialized for running servers on it. |
Server Infrastructure | Server infrastructure certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking. |
Server Management | Server management is a set of tools from Microsoft that assists in managing PCs connected to a local-area network. |
Server Migration | Server migration is simply the act of moving your server data and configuration from one server to another. |
Server Performance | Server performance is the speed at which a computer operates. |
Server Power | Server power is any power source that operates a server. |
Server Provisioning | Server provisioning is setting up a server for use in the network. |
Server Resources | Server resources include the number and identity of individual physical servers, processors, and operating systems. |
Server Security | A secure server is a Web server that guarantees secure online transactions. |
Server Software | Server software is a type of software that is designed to be used, operated and managed on a computing server. |
Servers | A server is a computer or computer program that manages access to a centralized resource or service in a network. |
System Center Configuration Manager (SCCM) | System Center Configuration Manager (SCCM, also known as ConfigMgr),[1] formerly Systems Management Server (SMS)[2] is a systems management software product developed by Microsoft for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems. |
Tower Servers | A tower server is a computer intended for use as a server and built in an upright cabinet that stands alone. |
VMware ESX | VMware ESXi (formerly ESX) is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. |
Windows Migration | Windows migration is the process of transferring the entire user environment between two computer systems. |
Windows Server | Windows servers are more powerful versions of their desktop operating system counterparts and are designed to more efficiently handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions. |
Windows Server 2003 EOS | Windows Server 2003 is a server operating system produced by Microsoft. |
Wowza | Wowza Streaming Engine (known as Wowza Media Server prior to version 4) is a unified streaming media server software developed by Wowza Media Systems. |
XenServer | Citirix XenServer is a hypervisor platform that enables the creation and management of virtualized server infrastructure. |
Software Coding & Engineering
Technology Word | Meaning |
2D Animation Software | Two-dimensional images are rapidly sequenced to create the illusion of lifelike motion using software |
3D Animation Software | Developing a mathematical representation of any surface of an object in three dimensions via specialized software. |
3DS Max | 3DS Max is a 3D modeling, animation, and rendering software for games and design visualization made by Autodesk. |
Access Control | In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. |
Agile Management | Agile project management focuses on continuous improvement, scope flexibility, team input, and delivering essential quality products. |
Apache Kafka | Apache Kafka is an open-source stream-processing software platform developed by the Apache Software Foundation written in Scala and Java. The project aims to provide a unified, high-throughput, low-latency platform for handling real-time data feeds. |
Apache Lucene | Apache Lucene is a freely available information retrieval software library that works with fields of text within document files. |
Apache Mahout | Apache Mahout is a project of the Apache Software Foundation to produce free implementations of distributed or otherwise scalable matching learning algorithms focused primarily in the areas of collaborative filtering, clustering and classification. |
Application Delivery | An application delivery network is a suit of technologies that, when deployed together, provide application availability, security, visibility, and acceleration. |
Application Development | Application development is a term used to denote the act or process by which application software is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones. |
Application Migration | Application migration is the process of moving an application program from one environment to another. |
Application Performance | Application performance is the monitoring and management of performance and availability of software applications. |
Application Release Automation | Application release automation refers to the process of packaging and deploying an application or update of an application from development, across various environments, and ultimately to production. |
Assembler | An assembler is a program for converting instructions written in low-level symbolic code into machine code. |
Attribute-Based Access Control (ABAC) | Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, object, environment attributes etc.). |
AutoCAD | AutoCAD is a commercial computer-aided design and drafting software application designed by Autodesk. |
Automation Testing | Automated software testing is a process in which software tools execute pre-scripted tests on a software application before it is released into production |
Backend as a Service (BaaS) | Mobile backend as a service (MBaaS) is a model for providing web app and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management push notifications |
BIM 360 | BIM 360 improves construction project delivery by supporting informed decision-making throughout the project lifecycle and is made by Autodesk. |
Build Management | The term build management may refer to the process by which source code is converted into a stand-alone form that can be run on a computer or to the form itself. |
Civil 3D | Civil 3D software is a civil engineering design and documentation solution that supports Building Information Modeling workflows made by Autodesk |
Collaboration Software | Collaborative software or groupware is application software designed to help people involved in a common task to achieve their goals. |
Command Line Interface | A CLI is a user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line, receives a response back from the system, and then enters another command, and so forth. |
Computer Science | Computer science is the study of the principles and use of computers. |
Configuration Files | A configuration file is a file that contains data about a specific user, program, computer or file. |
Configuration Management | Configuration management is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. |
Configuration Options | Configurations options are used to specify recording options, execution options, and external command processing options. |
Contact Management Software | A contact manager is a software program that enables users to easily store and find contact information , such as names, addresses and telephone numbers. |
Continuous Delivery | Continuous delivery is a software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software faster and more frequently. |
Continuous Integration | In software engineering, continuous integration is the practice of merging all developer working copies to a shared mainline several times a day. |
Dassault Systems (DSY) | Dassault Systems is a world leader in 3D design software. |
Debugging | Debugging is to identify and remove errors from computer hardware or software. |
Debugging tools | A debugger or debugging tool is a computer program that is used to test and debug other programs (the "target" program). |
Development Operations (Devops) | DevOps is a software development and delivery process that emphasizes communication and collaboration between product management, software development, and operations professionals. |
Eclipse IDE | Eclipse is an integrated development environment used in computer programming, and is the most widely used Java IDE. |
Embedded Software | Embedded software is computer software, written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints. |
Error Handling | Error handling refers to the response and recovery procedures from error conditions present in a software application. In other words, it is the process comprised of anticipation, detection and resolution of application errors, programming errors or communication errors. |
Event-Driven Architecture (EDA) | Event-driven architecture is a software architecture pattern promoting the production, detection, consumption of, and reaction to events. |
Framework | A framework is a real or conceptual structure intended or serve as a support or guide for the building of something that expands the structure into something useful. |
Fusion 360 | Fusion 360 is a 3D CAD, CAM, and CAE tool that connects your entire product development process in a single cloud-based platform that works on both Mac and PC. |
Game Development | Game development is the process of creating a video game. |
GitHub | Github is a web-based Git or version control repository and Internet hosting service. |
GitHub Enterprise | GitHub Enterprise is the on-premises version of GitHub.com |
GNU General Public License | The GNU General Public License is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software. |
Graphical User Interface (GUI) | The graphical user interface (GUI /?u?i?/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs),[1][2][3] which require commands to be typed on a computer keyboard. |
Hackathon | A hackathon is an event, typically lasting several days, in which a large number of people meet to engage in collaborative computer programming. |
Infraworks | InfraWorks is a planning and design platform that enables engineers to quickly and easily convey preliminary design intent in a real-world, contextual environment, increasing stakeholder buy-in and team decision-making made by Autodesk. |
In-Memory Data Grid (IMDG) | An in memory data grid is a data structure that resides entirely in RAM, and is distributed among multiple servers. |
Integrated Development Environments | An integrated development environment is a software application that provides comprehensive facilities to computer programmers for software development. |
Inventor | Inventor is a mechanical design and 3D CAD software made by Autodesk. |
Knowledge Base Software | Knowledge base software is software that enables creating, publishing and maintaining a database used for knowledge sharing, known as a knowledge base. |
Knowledge Management Software | Knowledge management software is a subset of Enterprise content management software, which contains a range of software that specializes in the way information is collected, stored and/or accessed. |
Log Files | In computing, a logfile is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software. |
Maya | Maya is a 3D animation, modeling, simulation, and rendering software for film, games, and TV. |
Microsoft Visual Studio | Microsoft Visual Studio is an integrated development environment from Microsoft. |
Migration | Migration is the process of transferring data between data storage systems, data formats or computer systems. |
Mobile Development Tools | Mobile developments tools are frameworks or apps that allow you to develop and build mobile apps. |
Model–View–Controller (MVC) | Model view controller (MVC) is an architectural pattern commonly used for developing user interfaces that divides an application into three interconnected parts. |
Multitenancy | The term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance. |
Natural Language Processing | Natural language processing is the ability of a computer program to understand human speech as it is spoken. |
Open JDK | OpenJDK is a free and open source implementation of the Java Platform, Standard Edition. It is the result of an effort Sun Microsystems began in 2006 |
Open Source | Open source denotes software for which the original source code is made freely available and may be redistributed and modified. |
OpenLDAP | OpenLDAP is a free, open source implementation of the Lightweight Directory Access Protocol (LDAP) developed by the OpenLDAP Project. It is released under its own BSD-style license called the OpenLDAP Public License. |
Patch Management | Patch management is a strategy for managing patches or upgrades for software applications and technologies. |
Pattern Recognition | Pattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data, although it is in some cases considered to be nearly synonymous with machine learning. |
Portal Software | Portal software is a type of development tool used to create a portal on a company's intranet so that employees can find a centralized starting place for access to consolidated enterprise-related functions, such as e-mail, customer relationship management tools, company information, workgroup systems, and other applications. |
Puppet | In computing, Puppet is an open-source software configuration management tool. It runs on many Unix-like systems as well as on Microsoft Windows, and includes its own declarative language to describe system configuration. |
Quote And Proposal Software | Quote and proposal software is a computer program designed to help users develop proposals, presentations, and responses to RFPs. |
Quote Software | Quote software is a industry term for products that help companies to adopt more data-aware systems. |
Robot Software | Robot software is the set of coded commands or instructions that tell a mechanical device and electronic system, known together as a robot, what tasks to perform. |
Root Cause Analysis (RCA) | Root cause analysis (RCA) is a method of problem solving used for identifying the root causes of faults or problems. |
Serialization | Serialization is the process of translating data structures or objects state into a format that can be stored or transmitted and reconstructed later. |
Service Oriented Architecture (SOA) | A service oriented architecture is a style of software design where services are provided to the other components by applications components, through a communication protocol over a network. |
SHA-256 (Secure Hash Algorithm) | SHA-2 is a set of cryptographic hash functions designed by the United States National Security Agency. |
Shotgun | Shotgun is a review and production tracking toolset for VFX, games, and animation teams made by Autodesk. |
Software Components | A software component is a unit of composition with contractually specified interfaces and explicit context dependencies only. |
Software Configuration Management | Software configuration management is the task of tracking and controlling changes in the software, part of the larger cross-disciplinary field of configuration management. |
Software Deployment | Software deployment is all of the activities that make a software system available for use. The general deployment process consists of several interrelated activities with possible transitions between them. |
Software Design | Software design is the process by which an agent creates a specification of a software artifact, intended to accomplish goals, using a set of primitive components and subject to constraints. |
Software Developers | A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software. |
Software Development | Software development is the process of computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks resulting in a software product. |
Software Development Kit | A software development kit (SDK or devkit) is typically a set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform. |
Software Development Lifecycle | The software development life cycle is a framework defining tasks performed at each step in the software development process. |
Software Migration | Software migration involves moving a set of instructions or programs from one platform to another, minimizing reengineering. |
Software Quality | Software Quality refers to the overall quality of of a software based on how quality is defined in a business context. This involves both the functional quality and the structural quality of the software. |
Software-Defined Infrastructure | Software defined infrastructure is the definition of technical computing infrastructure entirely under the control of software with no operator or human intervention. |
Solr | Solr is an open source enterprise search platform, written in Java, from the apache Lucene project. |
Source Code Analysis | Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. |
Source Code Control | Source code control is a specific kind of revision control resource that's aimed at changing source code in manageable ways. |
Storm Spout | A storm spout represents the source of data in Storm. |
System Configuration (SC) | A system configuration (SC) in systems engineering defines the computers, processes, and devices that compose the system and its boundary. More generally, the system configuration is the specific definition of the elements that define and/or prescribe what a system is composed of. |
Systems Development Life Cycle (SDLC) | The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system. |
Talent Management Software | Talent management software is technology that human resource management professionals use to manage employees as a competitive advantage. |
Task Management | Task management is the process of managing a task through its life cycle. It involves planning, testing, tracking, and reporting. |
Unified Modeling Language (UML) | The Unified Modeling Language (UML) is a general-purpose, developmental, modeling language in the field of software engineering, that is intended to provide a standard way to visualize the design of a system. |
Version Control | Version control is the task of keeping a software system consisting of many versions and configurations well organized. |
VersionOne | Version One is the author of electronic document management and imaging software. |
Visual Basic | Visual Basic is a programming environment from Microsoft in which a programmer uses a graphical user interface to choose and modify preselected sections of code written in the BASIC programming language. |
Storage
Technology Word | Meaning |
All Flash Array | An all-flash array is a solid state storage disk system that contains multiple flash memory drives instead of spinning hard disk drives. |
Amazon Elastic Block Storage (EBS) | Amazon Elastic Block Store (EBS) provides raw block-level storage that can be attached to Amazon EC2 instances. These block devices can then be used like any raw block device. |
Amazon S3 | Amazon S3 is a web service offered by Amazon Web Services. |
Apple File System (APFS) | Apple File System is a proprietary file system for macOS High Sierra and later, iOS 10.3 and later, tvOS 10.2 and later, and watchOS 3.2 and later, developed and deployed by Apple Inc. |
Archiving | Archiving is the transfer of data to a less frequently used storage medium such as magnetic tape, typically external to the computer system and having a greater storage capacity. |
Capacity Management | Capacity management is a process used to manage information technology. |
Classification | Classification is the process of organizing data into categories for its most effective and efficient use. |
Compressors | Compression is a reduction in the number of bits needed to represent data. |
Content / Document Management | General management of content or documents |
Data Storage | Data storage is a general term for archiving data in electromagnetic or other forms for use by a computer or device. |
Data Warehouse | A data warehouse is a large store of data accumulated from a wide range of sources within a company and used to guide management decisions. |
Direct Attached Storage (DAS) | Direct-attached storage is digital storage directly attached to the computer accessing it, as opposed to storage accessed over a computer network. |
Disk Storage | Disk storage is a general category of storage mechanisms where data are recorded by various electronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks. |
Disk-Based Backup and Storage / RAID | RAID is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. |
Distribution and Storage | Distributed storage is storing data in multiple computers or in computers that are geographically dispersed. |
Enterprise Storage Solutions | Enterprise storage refers to a centralized data depository that is designed for the needs of a large organization. |
External Hard Drive | An external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly. |
File Classification | Developing a File Classification Scheme is the process of identifying the category or categories of business activities and the records they generate and grouping them, if applicable, into files to facilitate retrieval, description, control, links and determine their disposition and access status. |
Flash Drive | A flash drive is a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc. |
Flash Storage | Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time. |
Full Disk Encryption | Full disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. |
Hadoop Distributed File System (HDFS) | The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications. It employs a NameNode and DataNode architecture to implement a distributed file system that provides high-performance access to data across highly scalable Hadoop clusters. |
Hazelcast | In computing, Hazelcast is an open source in-memory data grid based on Java. It is also the name of the company developing the product. The Hazelcast company is funded by venture capital. |
Inline Deduplication | Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device. |
Input/Output Operations Per Second (IOPS) | Input/output operations per second (IOPS, pronounced eye-ops) is an input/output performance measurement used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN). |
Master Boot Record (MBR) | A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MBRs was publicly introduced in 1983 with PC DOS 2.0. |
Memory Card | A memory card is a small, flat flash drive used especially in digital cameras and mobile phones. |
NAND Flash Memory | NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data. An important goal of NAND flash development has been to reduce the cost per bit and to increase maximum chip capacity so that flash memory can compete with magnetic storage devices, such as hard disks. |
Optical Storage Media | Optical storage is the storage of data on an optically readable medium. |
Pivotal Greenplum | Pivotal Greenplum is a commercial fully featured data warehouse powered by the open source Greenplum Database. |
Random Access Memory (RAM) | Random-access memory (RAM) is a form of computer data storage that stores data and machine code currently being used. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory. |
Sample Libraries | A sample library is a collection of digital sound recordings, known as samples, for use by composers, arrangers, performers, and producers of music. |
Scale-Out Storage | Scale-Out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded through the addition of devices in connected arrays with their own resources. |
Solid State Drive (SSD) | Solid state drives are faster than hard disks because there is zero latency, and is an all-electronic storage device that is an alternative to a hard disk. |
Storage Area Networks (SAN) | A storage area network is a network which provides access to consolidated, block level data storage. |
Storage as a Service | Storage as a service is a business model in which a company leases or rents its storage infrastructure to another company or individuals to store data. |
Storage Capacity | Storage capacity is the amount of data a storage device such as a disk or tape can hold. |
Storage Capacity Management | Storage capacity management is a process used to manage information technology. |
Storage Consolidation | Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers. |
Storage Devices | A storage device is a piece of computer equipment on which information can be stored. |
Storage Hardware | Storage hardware is the collection of storage device of a computer. |
Storage Management | Storage management is the administration of any or all of backup, archival, disaster recovery and hierarchical storage management procedures within an organization. |
Storage Performance | Storage performance is the measure of how well storage devices perform, especially hard drives. |
Storage Resources | Storage resource management refers to software that manages storage from a capacity, utilization, policy and event-management perspective. |
Storage Security | Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities. |
Storage Software | Software-defined storage is a marketing term for a computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware. |
Storage Solutions | Storage solutions are software designed to help with data storage. |
Storage Virtualization | Storage virtualization is the pulling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console. |
Tape Drives and Libraries | In computer storage, a tape library, sometimes called a tap silo, tape robot or tape jukebox, is a storage device which contains one or more tape drives, a number of slots to hold tape cartridges, a barcode reader to identify tape cartridges and an automated method for loading tapes (a robot). |
Team Drives | Team Drives is a shared space where teams can easily store, search, and access their files anywhere, from any device. Unlike files in My Drive, files in a Team Drive belong to the team instead of an individual. |
Tiered Storage | Tiered storage is an underlying principle of information lifecycle management. |
XtremeIO | XtremIO is EMC's foray into the all flash array market. |
Telecommunications & IP Communication
Technology Word | Meaning |
Alcatel | Alcatel is a rand of mobile handsets used under license by Chinese electronics company TCL Corporation. |
Automated Attendant | In telephony, an automated attendant (also auto attendant, auto-attendant, autoattendant or AA, or virtual receptionist) allows callers to be automatically transferred to an extension without the intervention of an operator/receptionist. |
Automatic Call Distribution (ACD) | An automated call distribution system, commonly known as automatic call distributor, is a telephony device that answers and distributes incoming calls to a specific group of terminals or agents within an organization. |
Average Revenue Per User (ARPU) | Average revenue per user (sometimes known as average revenue per unit), usually abbreviated to ARPU, is a measure used primarily by consumer communications, digital media, and networking companies, defined as the total revenue divided by the number of subscribers. |
BT Global Services | Global Services is a division of United Kingdom telecommunications operator BT Group. |
Call Center Management | Call center management refers to silent monitoring whereby you listen to the interaction between an incoming caller and an agent. |
Call Center Software | Call center software are software solutions that help call center agents access the right information and knowledge about a customer's history to improve the overall customer experience. |
Call Recordings | The term call recording means to record a telephone call or other audio source. |
Call Tracking | Call tracking is a technology which can enable the pay per call, pay per minute or pay per lead business model, allowing the tracking of phone calls to be associated with performance-based advertising. |
CDMA | Code-division multiple access is a channel access method used by various radio communication technologies. |
Cloud VoIP | Cloud telephony refers specifically to voice services and more specifically the replacement of conventional business telephone equipment, such as Private branch exchange, with third-party VoIP service. |
Communications Systems | In telecommunication, a communications system is a collection of individual communications networks, transmission systems, relay stations, tributary stations, and data terminal equipment usually capable of interconnection and interoperation to form an integrated whole. |
Computer Telephony Integration (CTI) | Computer telephony integration, also called computer telephone integration or CTI, is a common name for any technology that allows interactions on a telephone and a computer to be integrated or coordinated. |
C-RAN (Cloud-RAN) | C-RAN is a centralized, cloud computing-based architecture for radio access networks that supports 2G, 3G, 4G and future wireless communication standards. |
Customer Proprietary Network Information (CPNI) | Customer Proprietary Network Information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill. |
Data Over Cable Service Interface Specification (DOCSIS) | An international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV system. It is employed by many cable television operators to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure. |
Distributed Antenna Systems (DAS) | A network of spatially separated antenna nodes connected to a common source via a transport medium that provides wireless service within a geographic area or structure. DAS antenna elevations are generally at or below the clutter level and node installations are compact. A distributed antenna system may be deployed indoors (an iDAS) or outdoors (an oDAS). |
End-to-End Encryption (E2EE) | End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers including telecom providers, Internet providers, and even the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation. |
Enhanced 9-1-1(E911) | Enhanced 911, E-911 or E911 is a system used in North America to automatically provide to dispatchers the location of callers to 911, the universal emergency telephone number in the region. |
Fax Management | Fax management is any management in relations to facsimiles. |
Fixed Mobile Convergence (FMC) | Fixed-mobile convergence is the trend towards seamless connectivity between fixed and wireless telecommunications networks. |
FTTA (Fiber to the Antenna) | FTTA (Fiber to the Antenna) is a broadband network architecture in which optical fiber is used to connect the remote radio head (RRH) to the base station in new antennas, or retrofitted in existing ones, to replace all or part of the coax local loop. |
FTTH (Fiber to the Home) | Fiber to the Home (FTTH) the delivery of a communications signal over optical fiber from the operator's switching equipment all the way to a home or business, thereby replacing existing copper infrastructure such as telephone wires and coaxial cable. |
FTTN (Fiber to the Node) | Fiber to the Node (FTTN) A fiber that is terminated in a street cabinet, possibly miles away from the customer premises, with the final connections being copper. FTTN is often an interim step toward full FTTH and is typically used to deliver advanced triple-play telecommunications services. |
FTTx (Fiber to the X) | Fiber to the X (FTTX) is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. |
GSM | GSM is a digital mobile telephony system that is widely used in Europe and other parts of the world. |
Headend Facility | A headend is a master facility for receiving television signals for processing and distribution over a cable television system. The headend facility is normally unstaffed and surrounded by some type of security fencing and is typically a building or large shed housing electronic equipment used to receive and re-transmit video over the local cable infrastructure. One can also find head ends in power line communication (PLC) substations and Internet communications networks |
Hosted Private Branch Exchange (Hosted PBX) | Hosted private branch exchange (hosted PBX) is a telephone exchange system built, delivered and managed by a third-party service provider. |
Hosted VoIP | Hosted VoIP is another term for Hosted PBX. |
Indoor Cell Site | An Indoor Cell Site is an in-building wireless system used to provide internet to large residential or commercial buildings. |
Information and Communication Technology (ICT) | Information and communication technology (ICT) is another/extensional term for information technology (IT) which stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. |
IP Faxing | IP faxing uses the internet Protocol to send a fax, rather than using only phone networks with a fax machine. |
IP Multimedia Subsystem (IMS) | The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering IP multimedia services. Historically, mobile phones have provided voice call services over a circuit-switched-style network, rather than strictly over an IP packet-switched network. |
IP Telephony | IP telephony is a general term for the technologies that use the Internet Protocol's packet -switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone. |
Jitter Measurement | Jitter Measurement produces a quantity for the deviation from true periodicity of a presumably periodic signal, often in relation to a reference clock signal. |
Leased Line | A leased line is a private bidirectional or symmetric telecommunications line between two or more locations provide in exchange for a monthly rent. |
Low Earth Orbit (LEO) | Low earth orbits (LEO) are satellite systems used in telecommunication, which orbit between 400 and 1,000 miles above the earth's surface. |
Managed IP Telephony | Managed Ip Telephony services: the managed service provider is responsible for ensuring that VoIP calls are properly terminated to the PSTN. |
Mobile High-Definition Link (MHL) | Mobile High-Definition Link (MHL) is an industry standard for a mobile audio/video interface that allows the connection of smartphones, tablets, and other portable consumer electronics devices to high-definition televisions (HDTVs) and audio receivers. |
Mobily | Mobily is the trade name launched in May 2005 by Saudi Arbia's second telecommunications company, Etihad-Estisalat consortium. |
Multimedia Messaging | Multimedia Messaging Service is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network. |
Multiprotocol Label Switching (MPLS) | Multiprotocol Label Switching is a type of data-carrying technique for high-performance telecommunications networks. |
Multiprotocol Label Switching (MPLS) Alternative | Multiprotocol Label Switching (MPLS) Alternative is any alternative to MPLS. |
Near Field Communication (NFC) | Near Field Communications is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other. |
Optical Distribution Frames (ODF) | An optical distribution frame (ODF) is a frame used to provide cable interconnections between communication facilities, which can integrate fiber splicing, fiber termination, fiber optic adapters & connectors and cable connections together in a single unit. |
Passive Optical Network (PON) | A passive optical network (PON) is a telecommunications technology used to provide fiber to the end consumer, both domestic and commercial. A PON's distinguishing feature is that it implements a point-to-multipoint architecture, in which unpowered fiber optic splitters are used to enable a single optical fiber to serve multiple end-points. |
Phone Call Processing | Phone call processing is the sequence of operations performed by a switching system from the acceptance of an incoming call through the final disposition of the call. |
Phone System | A phone system can range from just a few telephones in a small business up to a complex private branch exchange system utilized by large businesses. |
Power Control | power control refers to the process of controlling the power of a transmitter to achieve better communication signal or overall quality of service. It is mainly used to control the transmitting power of a communication device to achieve better performance. |
Predictive Dialing | A predictive dialer is an outbound calling system that automatically dials from a list of telephone numbers. |
Private Branch Exchange (PBX) | A PBX is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. |
Private Label VoIP | Private Label Voice over Internet Protocol is when a SMB provides phone services using hardware it pays a service fee for. |
Provisioning | In telecommunications, Provisioning involves the process of preparing and equipping a network to allow it to provide (new) services to its users. |
Public Switched Telephone Network (PSTN) | The public switched telephone network is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication. |
Radio Frequency Connector | A coaxial RF connector is an electrical connector designed to work at radio frequencies in the multi-megahertz range. RF connectors are typically used with coaxial cables and are designed to maintain the shielding that the coaxial design offers. |
Real-Time Communications (RTC) | Real-time communications (RTC) is a term used to refer to any live telecommunications that occur without transmission delays. RTC is nearly instant with minimal latency. |
Remote PHY | Remote PHY refers to the technique of moving the PHY circuit out of a device such as a CCAP and putting the PHY circuit at the end of a network. |
Remote Radio Units (RRUs) | A remote radio transceiver that connects to an operator radio control panel via electrical or wireless interface. The RRH contains the base station's RF circuitry plus analog-to-digital/digital-to-analog converters and up/down converters. RRHs also have operation and management processing capabilities and a standardized optical interface to connect to the rest of the base station. |
Session Border Controller | A session border controller (SBC) is a device regularly deployed in Voice over Internet Protocol (VoIP) networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down telephone calls or other interactive media communications. |
Signal Integrity | A set of measures of the quality of an electrical signal. |
Sip Trunking | SIP trunking is Voice over Internet Protocol and streaming media service based on the Session initiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equipped with Sip-based private ranch exchange and Unified Communications facilities. |
Soft Phone | A soft phone is a piece of software that allows the user to make telephone calls over the Internet via a computer. |
Structured Cabling | In telecommunications, structured cabling is building or campus cabling infrastructure that consists of a number of standardized smaller elements (hence structured) called subsystems. |
Telecom | Telecom is a shortened version of telecommunications. |
Telecommunications Equipment | Telecommunications equipment refers to hardware used mainly for telecommunications such as transmission lines, multiplexers and base transceiver stations. |
Telephony / CTI / VOIP | Refers to any technology that allows interactions on a telephone and a computer to be integrated or coordinated. |
Ultra Wideband | Ultra-wideband (also known as UWB, ultra-wide band and ultraband) is a radio technology that can use a very low energy level for short-range, high-bandwidth communications over a large portion of the radio spectrum. |
Unified Communications | Unified communications is a business term describing the integration of enterprise communication services such as instant messaging, presence information, voice, mobility features, audio, web and video conferencing, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging. |
Unified Communications as a Service (UCaaS) | Unified Communications as a Service (UCaaS) is a category of 'as a service' or 'Cloud delivery mechanisms for Enterprise Communications. |
Virtual Network Operator (VNO) | A virtual network operator (VNO) is a management services provider and a network services reseller of other telecommunication service providers. |
Voice Outsourcing | Voice outsourcing is transfer of the management and/r day to day execution in a call center setting. |
Voice Over IP | Voice over Internet protocol is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet. |
Wholesale VoIP | Wholesale VoIP is a service, which is provided by wholesale carriers to other service providers and deals with start ups and extensions to their networks. |
Translation: Language Services
Technology Word | Meaning |
Document Translation | The process of translating a document from one language to another |
Internationalization (i18n) | The process of designing a software application so that it can potentially be adapted to various languages and regions without engineering changes |
Language Service Provider (LSP) | A company or partner that provides a broad range of translation or linguistic services |
Linguistic Validation | Linguistic validation is the process of investigating the reliability, conceptual equivalence, and content validity of translations of patient-reported outcome (PRO) measures. |
Localization | The process of making something local in character or restricting it to a particular place. |
Machine Translation (Automated Translation) | Machine translation, sometimes referred to by the abbreviation MT (not to be confused with computer-aided translation, machine-aided human translation (MAHT) or interactive translation) is a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another. |
Multilingual Desktop Publishing (DTP) | Translating digital or print media into a foreign language. |
Professional Translation | Professional Translation is simple a translation done by a professional translator who practices translation as a professional service. |
Redaction | Redaction is a form of editing in which multiple source texts are combined (redacted) and altered slightly to make a single document. Often this is a method of collecting a series of writings on a similar theme and creating a definitive and coherent work. |
Software Translation | In general, software translation refers to the translation of all graphical user interface (GUI) components of a software application, such as dialog boxes, menus, and error or status messages displayed on screen. |
Terminology Management | Terminology Management is an integral component of the translation/localization process. It uses glossaries to keep multilingual texts consistent and accurate. |
Transcreation | Transcreation is the process of adapting a message from one language to another, while maintaining its intent, style, tone and context. |
Translation Management Software | Software that enables automation of the translation process, eliminating repetitive and laborious manual tasks while enabling control, increasing collaboration and delivering greater efficiency |
Translation Memory | Translation memory (TM) technology allows translation teams to store and reuse both source and target language content for any translation project |
Transliteration | A type of conversion of a text from one script to another[1] that involves swapping letters |
Video Localization | Video localization is the preparation of video game software and hardware for sale in a new region or country. |
Website Localization Services | Website localization is the process of adapting an existing website to local language and culture in the target market. |
Website Translation | Website translation is the process of changing an original (source) language version of web content such as text, multimedia, ebooks, or apps into a different (target) language by simply substituting words from one language to another - in context. |
Video
Technology Word | Meaning |
Live Video Encoding | Live video encoding takes analog source content and converts it to a digital format, live. |
Managed Video Delivery | Managed video delivery provides an opportunity for agencies to take the worry out of purchasing and managing expensive video conferencing systems, providing immersive telepresence opportunities for agencies on a pay-as-you-go basis. |
Online Video | Online Video is the general field that deals with the transmission of video over the internet. It consists of video clips, tb shows, and movies streamed on the internet. |
Online Video Platform | An online video platform (OVP), provided by a video hosting service, enables users to upload, convert, store and play back video content on the Internet, often via a structured, large-scale system that can generate revenue. Users generally will upload video content via the hosting service's website, mobile or desktop application, or other interface (API). The type of video content uploaded might be anything from short video clips to full-length TV shows and movies. |
Video as a Service (VaaS) | Video as a Service (VaaS) is the delivery of multiparty or point-to-point video conferencing capabilities over an IP network by a managed service provider. |
Video Management Software (VMS) | A video management system, also known as video management software or a video management server, is a component of a security camera system that in general: Collects video from cameras and other sources; Records / stores that video to a storage device. |
Video Monetization | Video monetization is a marketing method that allows advertisement in videos, advertising to subscriptions or pay-per-view. |
Video Optimization | Video optimization refers to a set of technologies used by mobile service providers to improve consumer viewing experience by reducing video start times or rebuffering events. |
Video Player | A video player is a kind of media player for playing back digital video data from media such as optical discs, as well as from files of appropriate formats such as MPEG, AVI, RealVideo, and QuickTime. |
Video Transcoding | Video transcoding is the process of converting video from on format into another. |
Video Transmission | Video transmission is the transfer of data over a point-to-point or point-to-multipoint communication channel. |
Video-on-Demand Delivery | Video on demand is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later. |
Virtualisation
Technology Word | Meaning |
Bare-Metal Hypervisor (Native Hypervisor) | Bare metal hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. |
Data Orchestration | Data orchestration is the process of integrating two or more applications and/or services together to automate a process, or synchronize data in real-time. |
Docker | Docker is a computer program that performs operating-system-level virtualization also known as containerization. |
EVO:RAIL | EVO:RAIL is a hyper-converged infrastructure offering by Vmware and qualified EVO:RAIL partners. |
HCIA (Hyper-Converged Infrastructure Appliance) | A typical hyper-converged infrastructure appliance brings compute, storage, hypervisors and occasionally networking together into a single modular system. |
Hyper-Converged Infrastructure | Hyper-Converged Infrastructure is a system with a software-centric architecture that tightly integrates compute, storage, networking and virtualization resources and other technologies from scratch in a commodity hardware box supported by a single vendor. |
Kernel-based Virtual Machine (KVM) | Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel that turns it into a hypervisor. It was merged into the Linux kernel mainline in kernel version 2.6.20, which was released on February 5, 2007. |
Microsoft Hyper-V | Microsoft Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualization, is a native hypervisor, it can create virtual machines on x86-64 systems running Windows. |
Microsoft Virtual Machine Manager | Virtual machine manager is a management solution for the virtualized datacenter, enabling you to o configure and manage your virtualization host, networking, and storage resources to create and deploy virtual machines and services to private clouds that you have created. |
Network Virtualization | Network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-base administrative entity, a virtual network. |
Roaming Profiles | Roaming Profiles is a concept in the Windows NT family of operating systems that allows users with a computer joined to a Windows Server domain to log on to any computer on the same network and access their documents and have a consistent desktop experience, such as applications remembering toolbar positions and preferences, or the desktop appearance staying the same. |
Server Virtualization | Server virtualization can be defined as the conversion of one physical server into several individual and isolated virtual spaces that can be taken up by multiple users as per their respective requirements. |
Virtual Appliance | A virtual appliance is a pre-configured virtual machine image, ready to run on a hypervisor; virtual appliances are a subset of the broader class of software appliances. |
Virtual Data Center | A virtual Datacenter is a pool of cloud infrastructure resources designed specifically for enterprise business needs. |
Virtual Design and Construction | Virtual Design and Construction (VDC) is the management of integrated multi-disciplinary performance models of design-construction projects, including the product (i.e., facilities), work processes and organization of the design - construction - operation team in order to support explicit and public business objectives. |
Virtual Desktop Infrastructure (VDI) | Virtual desktop infrastructure is virtualization technology that hosts a desktop operating system on a centralized server in a data center. |
Virtual Desktops | Virtual Desktop means that a user's desktop environment is stored remotely on a server, rather than on a local PC or other client computing device. |
Virtual Firewall | A virtual firewall is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall. |
Virtual Infrastructure | A virtual infrastructure is a software-based IT infrastructure being hosted on another physical infrastructure and mean to be distributed as a service as in cloud computing's Infrastructure as a Service delivery model. |
Virtual Machines | A virtual machine is a software computer that, like a physical computer, runs an operating system and applications. |
Virtual Managed Services | Virtual managed services is a platform offered by Cisco that deliver a turn-key solution network operators to rapidly and cost effectively deliver new services. |
Virtual Office | A virtual office is the operational domain of any business or organization whose workforce includes a significant proportion of workers using technology to perform their work at home. |
Virtual Servers | A virtual server is a server that shares hardware and software resources with other operating systems, versus dedicated servers. |
Virtual Systems Administrator (VSA) | Virtual Systems Administrator is a program offered by Kaseya. |
Virtual Wallet | The virtual wallet is a PNC bank concept meant to appeal to generation Y and other tech-savvy customers. |
Virtualization | Virtualization is the creation of a virtual - rather than actual - version of something, such as an operating system, a server, a storage device or network resources. |
Web Technologies
Technology Word | Meaning |
A/B Testing | A/B testing (sometimes called split testing) is comparing two versions of a web page to see which one performs better |
Ajax (Asynchronous JavaScript and XML) | Ajax is a set of Web development techniques using many Web technologies on the client side to create asynchronous Web applications. |
Akamai Technologies | Akamai Technologies Inc. is an American content delivery network and cloud services provider headquartered in the US. |
Application Security Testing (AST) | Application Security Testing (AST) is the process of testing, analyzing and reporting on the security level and/or posture of a Web application. |
Bandwidth/DIA | Bandwidth is the range of frequencies within a given band, in particular that used for transmitting a signal. |
CNAME Record | A Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) used to specify that a domain name is an alias for another domain (the 'canonical' domain). |
Content Syndication | Content syndication is when web-based content is re-published by a third-party website. Read our full guide to content syndication and get started. |
cURL | cURL is a computer software project providing a library and command-line tool for transferring data using various protocols. |
Dedicated Internet Access | Dedicated internet access is a continuous high bandwidth method for enterprises to connect their local area networks with the public internet and streamline the performance of their wide area network. |
Designated Internet Access | Designated internet access is a private network that is reserved for you. |
Digital Magazines | A digital magazine is a digital, online edition of a printed magazine. |
Digital Publishing | Digital Publishing, or electronic publishing, includes the digital publication of e-books, digital magazines, and the development of digital libraries and catalogs. |
Do Not Track (DNT) | The Do Not Track (DNT) header is the proposed HTTP header field DNT that requests that a web application disable either its tracking or cross-site user tracking (the ambiguity remains unresolved) of an individual user. |
Domain Name System (DNS) | The Internet's system for converting alphabetic names into numeric IP addresses. |
dotCMS | An open source content management system (CMS) written in Java for managing content and content driven sites and application |
Drupal | Drupal is free, open source software that can be used by individuals or groups of users to easily create and manage many types of Web sites. |
Dynamic Application Security Testing (DAST) | Dynamic application security testing (DAST) is a process of testing an application or software product in an operating state. This kind of testing is helpful for industry-standard compliance and general security protections for evolving projects. |
eCommerce Site Search | eCommerce Site Search relates to a tool site visitors can use to naviage an eCommerce website via a search box. |
Edge Hosting | Edge offers secure managed hosting services to customers around the globe, including managed cloud hosting, compliance and dedicated hosting. |
Email Translation Service | Software that detecs if an email is in a foreign language and offers to translate it |
Ensighten | Ensighten is a global customer data platform and tag management technology vendor. |
Enterprise Tag Management | A tag management system is designed to help manage the lifecycle of e-marketing tags, which are used to integrate third-party software into digital properties. |
Exit Intent | Exit intent is the technology that detects visitors' intent to leave a web or mobile site. Exit intent technology is used to prevent visitors from leaving the website or abandoning a cart and re-engage them just before they are about to end their current session. |
Gmail For Business | Gmail is a free Web-based e-mail service currently being tested at Google that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages. |
Google Calendar | Google Calendar is a time-management and scheduling calendar service developed by Google. |
Google Docs | Google Docs is a free web-based application in which documents and spreadsheets can be created, edited and stored online. |
Google Forms | Google Form is one of the tools available from google Docs collection. |
Google Hangouts | Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chas, either one-on-one or in a group. |
Google Maps | Google Maps is a Web-based service that provides detailed information about geographical regions and sites around the world. |
Google Sheets | Google Spreadsheets is a Web-based application that allows users to create, update and modify spreadsheets and share the data live online. |
Google Sites | Google Sites is a structured wiki-and Web page-creation tool offered by Google as part of the G Suite productivity suite. |
Google Slides | Google Slides are a presentation program that is part of a free web-based software office suite offered by Google within its Google Drive service. |
Heat Maps | Heatmaps can be used to show where users have clicked on a page, how far they have scrolled down a page, or used to display the results of eye-tracking tests. |
High-Throughput Satellite (HTS) | High-throughput satellite (HTS) is a classification for communications satellites that provide at least twice, though usually by a factor of 20 or more,[1] the total throughput of a classic FSS satellite for the same amount of allocated orbital spectrum thus significantly reducing cost-per-bit. |
HipChat | HipChat is a web service for internal private online chat and instant messaging. As well as one-on-one and group/topic chat, it also features cloud-based file storage, video calling, searchable message-history and inline-image viewing. |
HTML Code Editor | An HTML Code Editor is a allows HTML code to be created and modified. |
iAPPS | A Web Engagement Management (WEM) platform that integrates Web Content Management, e-commerce, e-marketing, Social Media management and Web Analytics |
IBM Websphere Portal Server | A set of software tools that enables companies to build and manage web portals; it provides a single access point to web content and applicationn |
iBooks | iBooks is an e-book application by Apple Inc. for its iOS and macOS operating systems and devices. It was announced in conjunction with the iPad on January 27, 2010, and was released for the iPhone and iPod Touch in mid-2010, as part of the iOS 4 update. |
Internet Access | Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, mobile devices; and to access services such as email and the World Wide Web. |
Internet Bundles | Internet Bundles are combine internet, phone, TV and tech support in one package usually at a discounted rate for the consumer. |
Internet Service | An internet service provider is an organization that provides services accessing and using the internet. |
IP Address | a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. |
Joomla | Joomla is a free and open-source content management system. |
jQuery | Internet Explorer as the default web browser on all device classes. |
JSON | An open-standard file format that uses human-readable text to transmit data objects consisting of attribute value pairs and array data types (or any other serializable value) |
Kentico | A web content management system (WCMS) for building websites, online stores, intranets, and Web 2.0 community sites |
Man In The Browser (MITB) | Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse[1] that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application. |
Meta Tags | Meta tags are snippets of text that describe a page's content; the meta tags don't appear on the page itself, but only in the page's code. We all know tags from blog culture, and meta tags are more or less the same thing, little content descriptors that help tell search engines what a web page is about. |
Microsoft Edge (Spartan) | Microsoft Edge is a web browser developed by Microsoft and included in Windows 10, windows 10 Mobile and Xbox One, replacing Internet Explorer as the default web browser on all device classes. |
Microsoft Silverlight | Microsoft Silverlight (or simply Silverlight) is a deprecated application framework for writing and running rich Internet applications, similar to Adobe Flash. |
Mobile Internet | Mobile Internet is defined as the Internet as accessed by means of a smartphone or other mobile device. |
OAuth 2 | OAuth is an open standard for token-based authentication and authorization on the Internet. |
Open Web Application Security Project (OWASP) | The Open Web Application Security Project (OWASP), an online community, produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. |
Over-the-Top Platform | Over-the-top content is a term used in broadcasting and technology business reporting to refer to audio, video, and other media transmitted via the Internet as a standalone product. |
Percussion | A CMS that supports content-rich, SEO friendly websites |
Portfolio Website | A Portfolio Website is an essential tool to getting more business and building your professional brand. The purpose of an online portfolio is to give a prospective client, like an art director, a sense of who you are, what you can do and whether you are the person they should hire to execute their project. |
POST (HTTP) | A request method supported by the HTTP protocol used by the World Wide Web |
Really Simple Syndication (RSS) | Real Simple Syndication is the term used to refer the collection of Web feed formats that provide updated or shared information in a standardized way. |
Relational Search | Relational searches are tricky to specify because even the simplest of questions may require data from two or more tables. |
Session Replay | Session replay is the ability to replay a visitor's journey on a web site or within a web application. Replay can include the user's view (browser or screen output), user input (keyboard and mouse inputs), and logs of network events or console logs. |
Spring Boot | Spring Boot is a brand new framework from the team at Pivotal, designed to simplify the bootstrapping and development of a new Spring application. The framework takes an opinionated approach to configuration, freeing developers from the need to define boilerplate configuration. |
Static Application Security Testing (SAST) | Static application security testing (SAST) is a set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities. SAST solutions analyze an application from the inside out in a nonrunning state. |
Top Level Domain | A top-level domain is one of the domains at the highest level in the hierarchical Domain Name System of the Internet |
Uniform Resource Locator | A Uniform Resource Locator (URL), colloquially termed a web address,[1] is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. |
Web Applications | In computing, a web application or web app is a client-server software application in which the client runs in a web browser. |
Web Browsers | A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. |
Web Content Accessibility Guidelines (WCAG) | The Web Content Accessibility Guidelines (WCAG) are part of a series of web accessibility guidelines published by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C), the main international standards organization for the Internet. |
Web Development | Web development broadly refers to the tasks associated with developing websites for hosting via intranet or internet. |
Web Forms | A webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing. Forms can resemble paper or database forms because web users fill out the forms using checkboxes, radio buttons, or text fields. |
Web Servers | Web servers are computers that deliver Web pages. |
Web Service Management | Web services management is a DMF open standard defining a SOAP-based protocol for the management of servers, devices, applications and various Web services. |
Web Service Security | Web services security is an extension to SOAP to apply security to Web services. |
Web Sphere | WebSphere is a set of Java-based tools from IBM that allows customers to create and manage sophisticated business Web sites. |
Web Traffic | Web traffic is the amount of data sent and received by visitors to a website. This necessarily does not include the traffic generated by bots. Since the mid-1990s, web traffic has been the largest portion of Internet traffic. |
Webhook | A webhook in web development is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks. These callbacks may be maintained, modified, and managed by third-party users and developers who may not necessarily be affiliated with the originating website or application. |
WebRTC | WEbRTC is a collection of communications protocols and application programming interfaces that enable real-time communication over peer-to-peer connections. |