• AnyTechPedia | Tech Glossary
    ​By AnyTechTrial.Com

    Browse though thousands of technology terms and famous jargons.

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0-9

Browse By Category

Ad Tech

Technology WordMeaning
Ad BlockingAd blocking or ad filtering is a type of software that can remove or alter advertising content from a webpage, website, or a mobile app. Ad blockers are available for a range of computer platforms, including desktop and laptop computers, tablet computers and smartphones.
Ad ExchangeA technology platform that facilitates the buying and selling of media advertising inventory from multiple ad networks
Ad FraudAd fraud (also referred to as Invalid Traffic) is concerned with theory and practice of fraudulently representing online advertisement impressions, clicks, conversion or data events in order to generate revenue.
Ad NetworksA company that connects advertisers to web sites that want to host advertisements.
Ad ServersThe technology and service that places advertisements on web sites.
Ad VerificationA process which attempts to verify that a campaign has executed according to the agency's or advertiser's choices and exclusions.
Addressable TV AdvertisingTechnologies that enable advertisers to selectively segment TV audiences and serve different ads or ad pods within a common program or navigation screen.
Adobe Advertising CloudAdobe Advertising Cloud, formerly Adobe Media Optimizer, is an independent, end-to-end platform for managing advertising across traditional TV and digital formats.
AdSenseGoogle AdSense is a program run by Google that allows publishers in the Google Network of content sites to serve automatic text, image, video, or interactive media advertisements, that are targeted to site content and audience.
AdWordsAn online advertising service where advertisers pay to display brief advertising copy to web users
Agency Trading DeskA massive media buyer and re-seller, which functions as an independent working unit within a large media buying concern
Amazon Marketing Services (AMS)Amazon Marketing Services (AMS) offers effective tools to help vendors stand out against their competitors and drive traffic to product detail pages and branded pages.
Audience DataAudience data is information about the people who respond to your advertisements and buy your business's products or the people that visit your site these are the audience segments you will want to target during future marketing campaigns.
Audience Management PlatformHelps you target mobile ads to specific audience segments.
Creative OptimizationA form of programmatic advertising that allows advertisers to optimize the performance of their creative using real-time technology.
Data Management Platform (DMP)A centralized data management platform that allows you to create target audiences based on a combination of in-depth first-party and third-party audience data
Demand Side Platform (DSP)Technology used to manage and optimize ad campaigns
DoubleClick Bid ManagerA next-generation demand-side-platform providing trading desks, agencies, and advertisers with great transparency and performance in global display media buying across ad exchanges.
DoubleClick Search (DS)DoubleClick Search (DS) is a search management platform that helps agencies and marketers efficiently manage some of the largest search marketing campaigns in the world, across multiple engines and media channels.
First-Party DataLoosely defined as information you yourself have collected about your audience.
Inbound Marketing SoftwareMarketing software that automates content creation, distribution, lead capture and management, and the measuring of ROI
Intent DataData collected about a web user and possibly indicating some intent or future action
Internet Marketing AutomationThe concept of automate marketing actions via the internet
Lead Generation SoftwareSoftware that automates the capture, segmentation and assignment of leads to improve targeted marketing communications and shorten sales cycles
Marketing Automation ToolsSoftware platforms and technologies designed to more effectively market on multiple channels online (such as email, social media, and websites) and automate repetitive tasks
Marketing EmailThe process of sending a commercial message, typically to a group of people, using email
Marketing Management SoftwareSoftware that supports marketing operations management. 
Marketing ReportingA market report reflects the market condition in terms of product or service.
Marketing ROIReturn on marketing investment is the contribution to profit attributable to marketing divided by the marketing 'invested' or risked.
Marketing ToolsProduct development and promotional strategies and actions that a company uses to develop and promote its products or services.
Online Lead GenerationThe initiation of consumer interest or inquiry into products or services of a business via the internet
Outbound MarketingA traditional form of marketing where a company initiates the conversation and sends its message out to an audience
PixelsA minute area of illumination on a display screen, one of many from which an image is composed.
Predictive Lead ScoringA marketing tool that uses an algorithm to predict qualified leads that should be pursued by the sales team
Pricing Best PracticesPricing best practices provides a reference against which current practices and proposals can be tested.
Pricing SoftwarePricing software delivers insight into pricing practices.
Product FeedsA product feed or product data feed is a file made up of a list of products and attributes of those products organized so that each product can be displayed, advertised or compared in a unique way.
ProgrammaticOf the nature of or according to a program, schedule, or method.
Programmatic BuyingThe use of software to purchase digital advertising, as opposed to the traditional process that involves RFPs, human negotiations and manual insertion orders
Real-Time Bidding (RTB)A means by which advertising inventory is bought and sold on a per-impression basis, via programmatic instantaneous auction, similar to financial markets
RetargetingA form of online targeted advertising by which online advertising is targeted to consumers based on their previous Internet actions.
Rich MediaAn Internet advertising term for a Web page ad that uses advanced technology such as streaming video, downloaded applet s programs that interact instantly with the user, and ads that change when the user's mouse passes over it.
RoadblockingWhen an advertising campaign creative is the only brand on a particular page or website, taking over all ad sizes at once.
Sales and Marketing AutomationRefers to the software that exists with the goal of automating marketing actions.
Second-Party DataSomebody else's first party data.
Sell Side Platform (SSP)A technology platform to enable web publishers to manage their advertising space inventory, fill it with ads, and receive revenue.
SizmekSizmek is the largest independent buy-side advertising platform that creates impressions that inspire. Sizmek provides powerful, integrated solutions that enable data, creative, and media to work together for optimal campaign performance across the entire customer journey.
Tag ManagementDesigned to help manage the lifecycle of e-marketing tags, which are used to integrate third-party software into digital properties.
Third-Party DataData that a marketer acquires from a multitude of outside sources.
Web BeaconsAn object embedded in a web page or email, which unobtrusively allows checking that a user has accessed the content
Web MarketingA form of marketing and advertising which uses the internet to deliver promotional marketing messages to consumers
Analytics & Reporting

Technology WordMeaning
Actionable InsightsActionable insight is a term in data analytics and big data for information that can be acted upon or information that gives enough insight into the future that the actions that should be taken become clear for decision makers.
Ad Hoc AnalyticsAd hoc analysis is a business intelligence process designed to answer a single, specific business question.
Advanced AnalyticsAdvanced Analytics is the autonomous or semi-autonomous examination of data or content using sophisticated techniques and tools, typically beyond those of traditional business intelligence (BI), to discover deeper insights, make predictions, or generate recommendations.
Agile Business Intelligence (BI)Agile Business Intelligence refers to the use of Agile software development for BI projects to reduce the time it takes for traditional BI to show value to the organization, and to help in quickly adapting to changing business needs.
Analytics as a service (AaaS)Analytics as a service (AaaS) refers to the provision of analytics software and operations through web-delivered technologies. These types of solutions offer businesses an alternative to developing internal hardware setups just to perform business analytics.
Analytics SoftwareRefers to analytics specific to software systems and related software development processes.
Anomaly Detectionthe identification of items, events, or observations which do not conform to an expected pattern or other items in a dataset.
Big DataExtremely large data sets that may be analyzed computationally to reveal patterns, trend, and associations, especially relating to human behavior and interactions.
Big Data AnalyticsThe process of examining large and varied data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions.
BlueKai (Oracle Data Cloud)Cloud based big data platform that enables companies to personalize online, offline, and mobile marketing campaigns with richer and more actionable information about targeted audiences.
Business IntelligenceAn umbrella term that includes the applications, infrastructure and tools, and best practices that enable access to and analysis of information to improve and optimize decisions and performance.
Business Intelligence AnalyticsAn umbrella term including data warehousing, business intelligence, enterprise information management, enterprise performance management, analytic applications, and 
Cluster AnalysisThe task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.
Cognitive AnalyticsA field of analytics that tries to mimic the human brain by draw inferences from existing data and patterns, draws conclusions based on existing knowledge bases and then inserts this back into the knowledge base for future inferences - a self learning feedback loop.
Comparative AnalysisA type of analysis used in various of sciences and in different modifications: criminology and forensics: comparative contextual analysis - criminology.
Complex Event Processing (CEP)Event processing that combines data from multiple sources to infer events or patterns that suggest more complicated circumstances.
Connection AnalyticsCreating new revenue and cost saving opportunities by modeling and analyzing connections.
Contextual AnalyticsA method to analyze the environment in which a business operates.
Correlation AnalysisA method of statistical evaluation used to study the strength of a relationship between two, numerically measured, continuous variables.
Data AnalyticsRefers to qualitative and quantitative techniques and processes used to enhance productivity
Data HubA database which is populated with data from one or more sources and from which data is taken to one or more destinations.
Data Management SoftwareA computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
Data Management SystemSoftware that handles the storage, retrieval, and updating of data in a computer system.
Data MiningThe practice of examining large databases in order to generate new information.
Data ScienceAn interdisciplinary field about scientific methods, processes, and systems to extract knowledge or insights from data in various forms, either structured or unstructured, similar to data mining.
Data VisualizationA general term that describes any effort to help people understand the significance of data by placing it in a visual context.
Descriptive AnalyticsDescriptive Analytics is analysis of data that provides information about current data.
Digital AssessmentDigitization of the assessment process, from student work to the recording of marks is occurring now but haphazardly and is often only a relocation of the paper assessment.
Embedded AnalyticsEmbedded analytics is the integration of analytic content and capabilities within business process applications. It provides relevant information and analytical tools designed for the task at hand so users can work smarter and more efficiently in the applications they use every day.
Embedded Business IntelligenceEmbedded BI (business intelligence) is the integration of self-service BI tools into commonly used business applications. BI tools support an enhanced user experience with visualization, real-time analytics and interactive reporting.
Embedded ReportingThe integration of analytic content and capabilities within business process applications.
Enterprise Data ManagementReferring to the ability of an organization to precisely define, easily integrate and effectively retrieve data for both internal applications and external communication.
Enterprise Value (EV)Enterprise value (EV), total enterprise value (TEV), or firm value (FV) is an economic measure reflecting the market value of a business. It is a sum of claims by all claimants: creditors (secured and unsecured) and shareholders (preferred and common). Enterprise value is one of the fundamental metrics used in business valuation, financial modeling, accounting, portfolio analysis, and risk analysis.
HPE VerticaAn analytic database management software company.
IBM CognosIBM Cognos Business Intelligence is a web-based integrated business intelligence suite by IBM. It provides a toolset for reporting, analytics, scorecarding, and monitoring of events and metrics.
IBM SPSSOne of the most popular statistical packages which can perform highly complex data manipulation and analysis with simple instructions.
Infrastructure Performance LayerEnables a software system to interact with external systems by receiving, storing and providing data when requested.
Instagram AnalyticsInstagram Analytics are tools used to track and monitor certain factors of an Instagram account to help individuals or businesses have an idea of how to boost the effectiveness of the account's purpose.
Interactive VisualizationInteractive visualization or interactive visualization is a branch of graphic visualization in computer science that involves studying how humans interact with computers to create graphic illustrations of information and how this process can be made more efficient.
Konstanz Information Miner (KNIME)KNIME, the Konstanz Information Miner, is a free and open-source data analytics, reporting and integration platform.KNIME integrates various components for machine learning and data mining through its modular data pipelining concept.
Location AnalyticsThe ability to gain business insight from the location component of business data.
MapDMapD is a Lightning-Fast GPU Database Platform for Interactive SQL and Real-Time Visual Analytics on Massive Datasets.
Monitor and Analyze PerformanceA special discipline involving systematic observations to enhance performance and improve decision making, primarily delivered through the provision of objective statistical and visual feedback.
Network AnalyticsProvides operators and enterprises with a deep understanding of the network, enabling smarter, data-driven decisions.
OLAPPerforms multidimensional analysis of business data and provides the capability for complex calculations, trend analysis, and sophisticated data modeling.
Operational BIThe process of reviewing and evaluating operational business processes, activities and data for the purpose of making tactical, strategic business decisions.
Operational Intelligence (OI)Operational Intelligence (OI) is a form of real-time dynamic, business analytics that delivers visibility and insight into business operations. OI solutions run query analysis against live feeds and event data to deliver real-time visibility and insight into business and IT operations.
Oracle Endeca Information DiscoveryOracle Endeca Information Discovery is a data visualization and exploration tool.
Performance IndicatorA key performance indicator is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success at reaching targets.
Power BIA free, self-service business intelligence cloud service that provides non-technical business users with tools for aggregating, analyzing, visualizing and sharing data.
Power BI for Office 365A cloud based suite of business analytics tools that enables anyone to connect to, visualize, and analyze data with greater speed, efficiency, and understanding.
Predictive AnalyticsThe practice of extracting information from existing data sets in order to determine patterns and predict future outcomes and trends.
Price OptimizationThe use of mathematical analysis by a company to determine how customers will respond to different prices for its products and services through different channels.
Pricing AnalyticsRefers to the analysis of consumer response to theoretical prices in survey research.
Profitability ManagementAn analytic application that models business processes to accurately determine process, product and customer cost and profitability.
Real-Time AnalyticsThe use of, or the capacity to use, data and related resources as soon as the data enters the system.
Reporting SoftwareUsed to generate human- readable reports from various data sources.
Salesforce EinsteinSalesforce Einstein is artificial intelligence (AI) technology that has been developed for the Salesforce Customer Success Platform.
SAS (Statistical Analysis System)A software site developed by SAS Institute for advanced analytics, multivariate analyses, business intelligence, data management, and predicative analytics.
ScalabilityScalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth.
Self-Service AnalyticsAn approach to advanced analytics that allows business users to manipulate data to spot business opportunities, without requiring them to have a background in statistics or technology.
Single Customer View (SCV)An aggregated consistent and holistic representation of the data known by an organization about its customers that can be viewed in one place, such as a single page.
Social Media Analytics (SMA)Social Media Analytics (SMA) refers to the approach of collecting data from social media sites and blogs and evaluating that data to make business decisions. This process goes beyond the usual monitoring or a basic analysis of retweets or "likes" to develop an in-depth idea of the social consumer.
Software as a Service (SaaS) AnalyticsSoftware as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company's firewall at a hosted location and accessed by an end user with a secure Internet connection.
Text AnalyticsThe process of deriving information from text sources.
Topological Data Analysis (TDA)An approach to the analysis of dataset using techniques from topology. Extraction of information from datasets that are high-dimensional, incomplete and noisy is generally challenging.
Twitter AnalyticsTwitter analytics provides a wealth of information that can help you create meaningful Tweets that will resonate with your target audience.
Visual AnalyticsAn outgrowth of the fields of information visualization and scientific visualization that focuses on analytical reasoning facilitated by interactive visual interfaces.
Warehouse Management SolutionsA software application that supports the day-t0-day operations in a warehouse.
Workforce AnalyticsCombination of software and methodology that applies statistical models to worker-related data, allowing enterprise leaders to optimize human resource management.
APIs & Services

Technology WordMeaning
Android APIAn Android API is an API that can be used for building Android applications.
AnsibleAnsible is software that automates software provisioning, configuration management, and application deployment.
API GatewayAn API gateway enables clients to retrieve data from multiple services with a single round-trip. Fewer requests also means less overhead and improves the user experience.
API ManagementThe process of publishing, documenting and overseeing application programming interfaces in a secure, scalable environment.
Application IntegrationThe process of bringing data or a function from one application program together with that of another application program.
Application PlatformApplication platforms play a fundamental role in modern computing environments. Applications and the data they use provide all of the value that information technology brings, and virtually every application depends on an application platform.
Application ServicesA business providing computer-based services to customers over a network; such as access to a particular software application using a standard protocol.
AuthenticationThe process or action of proving or showing something to be true, genuine, or valid.
AWS LambdaAn event driven computing cloud service from amazon Web Services that allows developers to provision resources for a programming function on a pay-per-use basis without having to be concerned about what amazon storage or compute resources will support it.
B2B Firmographic APIsFirmographics are used to define a target market and open APIs integrate real-time B2B data and intelligence into applications.
Batch Processing / Batch ServicesThe processing of previously collected jobs in a single batch.
Distributed ComputingA field of computer science that studies distributed systems.
Electronic Data Interchange (EDI)The electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper.
Electronic Data Transfer (EDT)An interactive document management system that both simplifies and expedites the process of registering data reports, conveniently accomplished through the Internet.
Event AutomationScripts that automate network troubleshooting and network management.
InteroperabilityThe ability of computer systems or software to exchange and make use of information.
iOS APIAn iOS API is an API that can be used for building iOS applications.
Java Message Service (JMS)The Java Message Service (JMS) API is a Java Message Oriented Middleware (MOM) API[1] for sending messages between two or more clients. It is an implementation to handle the Producer-consumer problem.
Job Scheduling / Workload AutomationThe practice of using software to schedule, initiate, run and manage tasks related to business processes and transactions.
MasheryThe leading provider of web services and API management solutions enabling software-driven companies to unlock and accelerate their web services channel.
MicroservicesMicroservices, also known as the microservice architecture, is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities.
Microsoft Technology StackLayered structure of different services that are used to develop Microsoft application solutions. 
MiddlewareSoftware that acts as a bridge between an operating system or database and applications, especially on a network.
OpenStackA set of software tools for building and managing clouds computing platforms for public and private clouds.
Platform as a Service (PaaS)A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
PlatformsA system that consists of a hardware device and an operating system that an application, program or process runs upon.
Remote AutomationSystems that control assets remotely
RESTAn approach to communications that is often used in the development of Web Services.
Restful APIA RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
RESTful API Modeling Language (RAML)RESTful API Modeling Language (RAML) is a YAML-based language for describing RESTful APIs.[2] It provides all the information necessary to describe RESTful or practically RESTful APIs.
SAP FioriSAP Fiori is a platform that provides the porting of applications on mobile devices and is based on SAP's technology platform called NetWeaver. SAP Fiori enables applications to be used on desktop computers, tablets and smartphones.
Simple Object Access Protocol (SOAP)A messaging protocol that allows programs that run on disparate operating systems to communicate using HTTP and its XML.
Systems IntegrationThe process of bringing together the component sub-systems into one system and ensuring that the subsystems function together as a system, and in information technology as the process of linking together different computing systems and software applications physically or functionally, to act as a coordinated whole.
Systems IntegratorsA company that markets commercial integrated software and hardware systems.
Vert.xVert.x is a polyglot event-driven application framework that runs on the Java Virtual Machine.
Business Solutions

Technology WordMeaning
Automated Contract ManagementManagement of contracts using automated technology
Avaya IP Office™The Avaya IP Office is Avaya's primary product line for small to medium-sized businesses. It is a hybrid PBX that is legacy digital technology at the core, but adds on VoIP and SIP support.
B2B Secure CollaborationBusinesses working with others to do a task and to achieve shared goals, such as security.
B2B TechnologyTechnology that supports services or information between businesses.
Bar CodingTo mark with a bar code.
Barcode SoftwareGenerates and reads serial bar codes with the sequence generator and data import function.
BomgarA remote support solution that allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile device.
Building Management System (BMS)A computer-based control system installed in buildings that controls and monitors the building's mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems.
Business IntegrationBusinesses depend on a very complex and heterogeneous mix of information like solving a customer problem, managing a workflow, establishing a supply chair or designing a new product that requires integrating many different sources of information from many different enterprise systems.
Cisco CollaborationCisco Collaboration solutions connect culture, process, and technology to bring the collaboration experience to life.
Cisco SparkThe Cisco Spark service encrypts messages, files, and room names on your device before sending them to the cloud.
Cloud Digital Asset ManagementConsists of management tasks and decisions surrounding the ingestion, annotation, cataloguing, storage, retrieval and distribution of digital assets.
Collaboration PortalTypically used for intranets, publishing portals contain but a subset of the lists, libraries and subsite template types you find in a collaboration portal site definition template.
Commercial Off-The-Shelf (COTS)Commercial off-the-shelf or commercially available off-the-shelf satisfy the needs of the purchasing organization, without the need to commission custom-made, or bespoke, solutions.
Contact Center OutsourcingContracting out call center services.
Contact Center SolutionsBusinesses who provide technical set up, software and customer support for call centers.
ContainerizationA lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment.
Content IntegrationA marketing buzzword for middleware software technology, often used within large organizations, that connects together various types of computer systems that manage documents and digital content.
Continuous ProcessA streamlined process that involves ongoing production of end products or services.
Corporate WebsiteCorporate or Business websites differ from e-commerce or portal sites in that they provide information to the public about the company.
CrowdsourcingThe practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.
Customer Self ServiceA process that facilitates users support via processes and methods in that don't require the assistance of a customer service representative.
Data as a Service (DaaS)A service provider that enables data access on demand to users regardless of their geographic location. Also called Data as a Service (DaaS), data services are similar to Software as a Service (SaaS) in that the information is stored in the cloud and is accessible by a wide range of systems and devices.
Deal ManagementDeal Management is for controlling all phases of a deal lifecycle from initial deal evaluation through due diligence to closing.
Device-as-a-Service (DaaS)Device as a Service (DaaS) helps organizations mitigate these costs by taking a typical hardware device (such as a laptop, desktop, tablet, or mobile phone), bundling it with a variety of services and software, and offering it to a customer for a monthly subscription fee.
End User TransformationThe push for transforming to next generation end user computing comes from changes in today's organizational behaviors and social behaviors - time is money and users want to be empowered to do more, faster, anytime, anywhere and with any device.
Enterprise Contact CenterEnterprises of every size and every industry are now reducing their dependence on premise-based contact center solutions.
eProcurementThe business to business to consumer or business to government purchase and sale of supplies, work, and services through the Internet as well as other information and networking systems, such as electronic data interchange, etc.
Executive Information SystemsA type of management information system that facilitates and supports senior executive information and decision-making needs.
Expert SystemsA piece of software programmed using artificial intelligence techniques.
Facial RecognitionFacial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person's facial contours.
Field Service AutomationThe process of streamlining all your field service processes to increase productivity and efficiency.
Help Desk / Service DeskA service providing information and support to computer users, especially within a company.
Hosted Contact CenterOffers all the utilities associated with running a customer service outfit with a pay as you go plan.
IBM SoftLayerA dedicated server, managed hosting, and cloud computing provider.
Inside SalesInside sales is the dominant sales model for reps in B2B, tech, SaaS, and a variety of B2C industries selling high-ticket items. Put simply, inside sales is sales that is handled remotely.
Intelligent AutomationIntelligent automation systems that streamline decision making typically use tools for aggregating, extracting, and analyzing information often, complex information such as human speech or unstructured text.
JIRAJira is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions.
KiosksA small structure in a public area used for providing information or displaying advertisements, often incorporating a n interactive display screen or screens.
Krow PSAKrow PSA is a resource and project management tool.
LiquidPlannerAn online project management software company based in Seattle.
Logistics and ProcurementA procurement supply chain person is directly responsible for the purchasing or procurement of any product or services. A logistics supply chain person is focused on the logistical cost and efficiencies within the supply chain of an organization,
Mechanical TurkA crowdsourcing Internet marketplace enabling individuals and businesses to coordinate the use of human intelligence to perform tasks that computers are currently unable to do.
Media Asset ManagementA business process for organizing, storing, and retrieving rich media and managing digital rights and permissions.
Microsoft PowerAppsMicrosoft PowerApps is a service that lets you build business apps that run in a browser or on a phone or tablet, and no coding experience is required.
Microsoft TeamsMicrosoft Teams is a platform that combines workplace chat, meetings, notes, and attachments. The service integrates with the company's Office 365 subscription office productivity suite, including Microsoft Office and Skype, and features extensions that can integrate with non-Microsoft products.
Mid-Market TechnologyServices that help mid-market companies leverage 'big company' solutions, such as cloud-based services and business analytics tools that can impact operational capabilities and productivity, and provide competitive insights.
Mobile Workforce AutomationMobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
Open Source AuditOpen source audits identify building blocks (files or software module or packages, or even five lines of external code) that are used in a product or exist in the code inventory of an organization.
Open Source SecurityOpen-source software security is the measure of assurance of guarantee in the freedom from danger and risk inherent to an open-source software system.
OpenShift Container PlatformOpenShift Container Platform (formerly known as OpenShiftEnterprise) is Red Hat's on-premises private platform as a service product, built around a core of application containers powered by Docker, with orchestration and management provided by Kubernetes, on a foundation of Red Hat Enterprise Linux.
Partner Management SoftwareUsed to optimize relationships with business partners like contractors, distributors, resellers and other services.
Partner Relationship Management (PRM)A system of methodologies, strategies, software, and web-based capabilities that help a vendor to manage partner relationships.
Point of Sale (POS) SystemA POS System is a computerized network operated by a main computer and linked to several checkout terminals 
Portal SolutionsDeliver agent portal capabilities such as workflow and transaction capabilities including quote, binding, and service.
Predictive AppsApps that leverage big data and predictive analytics to anticipate and provide the right functionality and content on the right device at the right time for the right person by continuously learning about them.
Process ControlAn engineering discipline that deals with architectures, mechanisms and algorithms for maintaining the output of a specific process within a desired range.
Process ImprovementThe proactive task of identifying, analyzing and improving upon existing business processes within an organization for optimization and to meet new quotas or standards of quality.
Process SimulationUsed for the design, development, analysis and optimization of technical processes such as chemical plants, chemical processes, environmental systems, power stations, complex manufacturing operations, biological processes, and similar technical functions.
Procurement SolutionsProcurement Solutions create greater efficiencies and help convert procurement data into intelligence that can be leveraged to make informed decisions faster.
Professional Services AutomationSoftware designed to assist professionals, such as lawyers, auditors, and IT consultants, with project management and resource management for client projects.
Program ManagementProgram management or programmer management is the process of managing several related projects, often with the intention of improving an organization's performance.
QuickBooksIntuit Inc's set of software solutions designed to manage payroll, inventory, sales and other needs of a small business.
Real-Time Data ProcessingReal-time data processing is the execution of data in a short time period, providing near-instantaneous output. The processing is done as the data is inputted, so it needs a continuous stream of input data in order to provide a continuous output.
Request For Proposal (RFP)A request for proposal (RFP) is a document that solicits proposal, often made through a bidding process, by an agency or company interested in procurement of a commodity, service, or valuable asset, to potential suppliers to submit business proposals.
Sales Dialing AutomationRefers to a system that is designed to improve sales productivity by automating various sales processes.
SAP LeonardoSAP Leonardo is an umbrella brand for SAP's collection of software and services that organizations can use to develop digital transformation projects.
Self Service PortalA website that enables users-whether they are customers, employees suppliers, or partners - to perform high value transactions, from simple account updates to paying bills, managing support tickets, and more.
Self-Service TechnologyTechnological interfaces allowing customers to produce services independent of involvement of direct service employee.
Services ProcurementServices Procurement as a process for buying and managing strategic outsourcing of work and consultancy through a statement of work.
Small Business PrintingPrinting as applied to small businesses.
Smart RetailSmart retail is a term used to describe a set of smart technologies that are designed to give the consumer a greater, faster, safer and smarter experience when shopping.
SmartsheetA software as a service application for collaboration and work management that is developed and marketed by Smartsheet.com, Inc.
Software as a Service (SaaS)A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
Speech RecognitionThe ability of a computer to identify and respond to the sounds produced in human speech.
SplunkAmerican multinational corporation based in San Francisco, CA, that produces software for searching, monitoring, and analyzing machine-generated big data via a web-style interface.
Stock Keeping Unit (SKU)In the field of inventory management, a stock keeping unit is a distinct type of item for sale such as a product or service, and all attributes associated with the item type that distinguish it from other item types.
System CenterA suite of individually sold systems management products.
Technical and Competitive IT (TaCIT)Opportunities to integrate cutting-edge scientific research with innovative IT.
T-SystemsGerman global IT services and consulting company headquartered in Frankfurt.
Universal Product Code (UPC)The more formal term for barcode.
Vendor Managed Inventory (VMI)Vendor-managed inventory (VMI) is a family of business models in which the buyer of a product provides certain information to a supplier (vendor) of that product and the supplier takes full responsibility for maintaining an agreed inventory of the material, usually at the buyer's consumption location (usually a store).
Vendor Management SystemA vendor management system (VMS) is an Internet-enabled, often Web-based application that acts as a mechanism for business to manage and procure staffing services temporary, and, in some cases, permanent placement services as well as outside contract or contingent labor.
Vertical ApplicationsAny software application that supports a specific business process and targets a smaller number of users with specific skill sets and job responsibilities within an organization.
Voice RecognitionThe ability of a machine or program to receive and interpret dictation, or to understand and carry out spoken commands.
Warehouse Management SystemA Warehouse Management System is a software application, designed to support and optimize warehouse functionality and distribution center management.
Watson IoT PlatformA fully managed, cloud hosted service on IBM Bluemix designed to simplify internet of Things development so you can derive more value from your IoT data.
Work ManagementWork management is a set of software products and services that apply workflow structure to the movement of information as well as to the interaction of business processes and human worker processes that generate the information.
Workflow AutomationWorkflow is the definition, execution and automation of business processes where tasks, information or documents are passed from one participate to another for action, according to a set of procedural rules.
Workflow SoftwareA workflow application is a software application which automates, to at least some degree, a process or processes.
Workplace by FacebookWorkplace by Facebook is a collaborative platform run by Facebook, Inc. started on October 10, 2016. It may be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environment.
Workplace by FacebookWorkplace is a collaborative platform run by Facebook, Inc., started on October 10, 2016. It may be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environment.
Workplace TechnologyTechnology in the workplace allows businesses to expand quickly and efficiently.
WrikeA privately held project management application service provider based in San Jose CA. Wrike's primary product is an online tool for project management and collaboration.

Technology WordMeaning
Adobe Marketing Cloud (AMC)Adobe Marketing Cloud includes a set of analytics, social, advertising, media optimization, targeting, Web experience management and content management products[2] aimed at the advertising industry and hosted on Amazon Web Services.
Amazon Elastic Compute Cloud (EC2)Amazon Elastic Compute Cloud (EC2) forms a central part of Amazon.com's cloud-computing platform, Amazon Web Services (AWS), by allowing users to rent virtual computers on which to run their own computer applications.
Amazon Virtual Private Cloud (VPC)Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides users a virtual private cloud, by "provision[ing] a logically isolated section of Amazon Web Services (AWS) Cloud".
AT&T NetbondAT&T NetBond cloud connect solutions facilitate the orchestration of public and private cloud resources in a secure networking environment.
AutoscalingAutoscaling, also spelled auto scaling or auto-scaling, and sometimes also called automatic scaling, is a method used in cloud computing, whereby the amount of computational resources in a server farm, typically measured in terms of the number of active servers, scales automatically based on the load on the farm. It is closely related to, and builds upon, the idea of load balancing.
AWS Elastic BeanstalkA cloud deployment and provisioning service that automates the process of getting applications et up on the Amazon Web Services infrastructure.
AWS OpsWorksAWS OpsWorks (Amazon Web Services OpsWorks) is a cloud computing service from Amazon Web Services (AWS) that manages infrastructure deployment for cloud administrators.
Azure Data LakeA highly scalable data storage and analytics service.
Bare-Metal CloudA descriptive term for a computer server to distinguish it from modern forms of virtualization and cloud hosting.
Big Data-as-a-Service (BDaaS)A term typically used to refer to services that offer analysis of large or complex data sets, usually over the internet , as cloud hosted services.
Cloud Access Security Broker (CASB)A cloud access security broker (CASB) (sometimes pronounced cas-bah) is on-premises or cloud based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies.
Cloud ApplicationsAn application program that functions in the cloud, with some characteristics of a pure desktop app and some characteristics of a pure Web app.
Cloud ArchitectAn IT professional who is responsible for overseeing a company's cloud computing s
Cloud as a ServiceAny service made available to users on demand via the internet from a cloud computing provider's servers as opposed to being provided from a company's own on="premises" servers.
Cloud Backup / RecoveryA type of service through which cloud computing resources and infrastructure are used to create, edit, manage and restore data, services or application backup.
Cloud CommunicationsInternet-based voice and data communications where telecommunications applications, switching and storage are hosted by a third-party outside of the organization using them, and they are accessed over the public Internet.
Cloud ComplianceCloud compliance is an issue for anyone using cloud storage or backup services. ... By moving data from your internal storage to someone else's you are forced to examine closely how that data will be kept so that you remain compliant with laws and industry regulations.
Cloud ComputingThe practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Cloud DataCloud Data can be defined as digital data stored within cloud storage.
Cloud ERPAn approach to enterprise resource planning that makes use of cloud computing platforms and services to provide a business with more flexible business process transformation.
Cloud IDEA web-based integrated development platform.
Cloud InfrastructureRefers to a virtual infrastructure that is delivered or accessed via a network or the internet.
Cloud IntegrationCloud integration is the process of configuring multiple application programs to share data in the cloud.
Cloud ManagementThe software and technologies designed for operating and monitoring applications, data and services residing in the cloud.
Cloud MigrationCloud migration is the process of moving data, applications or other business elements from an organization's onsite computers to the cloud, or moving them from one cloud environment to another.
Cloud OrchestrationConsists of these elements: comprising of architecture, tools, and processes used by humans to deliver a defined Service. Stitching of software and hardware components together to deliver a defined Service. Connecting and Automating of workflows when applicable to deliver a defined Service.
Cloud OSA marketing term used to describe a lightweight operating system intended for netbooks or tablet PCs that access Web-based applications and stored data from remote servers.
Cloud ProvidersA company that offers some component of cloud computing - typically Infrastructure as a Service, Software as a Service or Platform as a Service - to other businesses or individuals.
Cloud ProvisioningThe allocation of a cloud provider's resources to a customer.
Cloud SecurityThe set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.
Cloud ServicesAny service made available to users on demand via the Internet from a cloud computing provider's servers as opposed to being provided from a company's own on-premises servers.
Cloud Services BrokerageAn IT role and business model in which a company or other entity adds value to one or more cloud services on behalf of one or more consumers of that service via three primary roles including aggregation, integration and customization brokerage.
Cloud StorageA cloud computing model in which data is stored on remote servers accessed from the Internet, or cloud.
Cloud StrategyThe concomitant use of two or more cloud services to minimize the risk of widespread data loss or downtime due to a localized component failure in a cloud computing environment.
Cloud VCCan be used without the hardware generally required by other video conferencing systems, and can be designed for use by SMEs, or larger international companies like Facebook.
Cloud-Based AnalyticsA cloud-based analytics solution helps to glean, clean and draw insights as data is available real-time; Offers increased flexibility:
Cloud-Based Unified CommunicationsMarketing buzzword describing the integration of real-time enterprise communication services such as instant messaging, presence information, voice, mobility features, audio, web & video conferencing, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services such as a unified messaging,
Cloud-Connected AudioAn audio conferencing service from the secure WebEx Cloud, and it natively integrates into WebEx meetings.
Contact Center as a Service (CCaaS)Contact Center as a Service (CCaaS) is a cloud-based customer experience solution that allows companies to utilize a contact center provider's software.
ContainersAn OS-level virtualization method for deploying and running distributed applications without launching an entire VM for each application.
Data LakeA storage repository that holds a vast amount of raw data in its native format until it is needed.
Desktop as a Service (DaaS)A form of virtual desktop infrastructure in which the VDI is outsourced and handled by a third party.
Digital TransactionA way of payment which is made through digital modes.
Digital Transaction Management (DTM)A category of cloud services designed to digitally manage document-based transactions.
Disaster Recovery as a Service (DRaaS)A cloud computing and backup service model that uses cloud resources to protect applications and data from disruption caused by disaster.
Enterprise Mobility SuiteA set of tools that are deeply integrated to provide you with all you need to administer, provision and secure the devices that are used in your enterprise.
FIFO (First In, First Out)The oldest inventory items are recorded as sold first but do not necessarily mean that the exact oldest physical object has been tracked and sold.
Google CloudA suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search and YouTube.
Hosted ApplicationA hosted application is a software as a service (SaaS) solution that allows users to execute and operate a software application entirely from the cloud on a recurring subscription.
HP Cloud ServicesA set of cloud computing services available from Hewlett-Packard that offered public cloud, private cloud, hybrid cloud, managed private cloud, and other cloud services.
Hybrid ApplicationsAn app that combines elements of both native and Web applications.
Hybrid CloudA cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms.
IBM BluemixA cloud platform as a service developed by IBM.
IBM Cloud ServicesConsists of the infrastructure, hardware, provisioning, management, integration and security that serve as the underpinnings of a private or hybrid cloud.
iCloudA suite of free cloud-based services from Apple that helps users store and synchronize digital content across computers and numerous iOS-supported devices such as iPhones, iPads, and iPod Touches.
Identity as a Service (IDaaS)An authentication infrastructure that is built, hosted and managed by a third-party service provider.
Integrated Cloud ServicesThe process of configuring multiple application programs to share data in the cloud.
IT as a Service (ITaaS)A technology-delivery method that treats IT as a commodity, providing an enterprise with exactly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
Microsoft AzureA cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.
Native Cloud Application (NCA)Refers to a type of computer software that natively utilizes services and infrastructure provided by cloud computing providers such as amazon EC2 or Force.com.
OneDriveA file hosting service operated by Microsoft as part of its suite of online services.
Private CloudA type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
Public CloudBased on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the internet.
Reference ArchitectureA document or set of documents to which a project manager or other interested party can refer for best practices.
Remote Procedure Call (RPC)In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remote interaction.
Sales CloudSales Cloud is a fully customizable product that brings all the customer information together in an integrated platform that incorporates marketing, lead generation, sales, customer service and business analytics and provides access to thousands of applications through the AppExchange.
Salesforce Commerce CloudSalesforce Commerce Cloud is a highly scalable, cloud-based software-as-a-service (SaaS) eCommerce solution. It offers best-in-class features and functionality developed and refined over many years to provide a highly optimized eCommerce experience.
ServiceNowThe heart of the cloud service that helps track configuration item relationships, automatically define IT services and manage IT processes in one system.
SolidFireA business division of NetApp Inc specializing in the production of all-flash storage systems.
ViPRA software-defined storage offering from EMC Corporation that abstracts storage from disparate arrays into a single pool of storage capacity.
Virtual Private CloudAn on-demand configurable pool of shared computing resources allocated within a public cloud environment, providing a certain level of 
VSPEXA platform specification rom Dell EMC to guide the building of systems for converged and hyper-converged infrastructure.
Web-Scale ITUsed to reference a global-class of computing - or an architectural approach - used to deliver the capabilities of large cloud service providers within an terries IT setting.
Windows IntuneA cloud based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.
Consumer Technology

Technology WordMeaning
BluetoothWireless technology for exchanging data over a short range between devices
DongleDevice for enabling wireless access
FirewireDevice that allows high-speed data exchange between devices or peripherals
ThunderboltThe brand name of a hardware interface developed by Intel (in collaboration with Apple) that allows the connection of external peripherals to a computer.
USB (Universal Serial Bus)Technology that allows a person to connect an electronic device to a computer.
WiFiWireless technology for connecting devices to a wireless network
Acoustic CameraAn acoustic camera is an imaging device used to locate sound sources and to characterize them. It consists of a group of microphones also called microphone array that are simultaneously acquired to form a representation of the location of the sound sources.
Digital CamerasDevice for storing and recording photographic images in a digital form
Digital Photo FrameDevice for displaying digital photos on a screen
DSLR CamerasDigital camera that features a single-lens reflex design and a digital imaging sensor
Fitness and Health DeviceWearable device that tracks fitness-related metrics
Google GlassOptical head mounted display worn as glasses
Home EntertainmentAggregate of devices used for diversion at home
Oculus RiftVirtual reality headset
Radar DetectorDevice used to detect radar activity
Robotic Vacuum CleanerMachine that is programmed to function as a vacuum cleaner automatically
Smart WatchComputerized device worn as a watch
KinectMotion sensing peripheral for use with the Xbox gaming console
Microsoft XboxGaming console created by Microsoft
Nintendo WiiGaming console created by Nintendo
Sony PlaystationGaming console created by Sony
Android AppsAndroid Apps are applications that can be used on Android devices.
App StoreMarketplace used for distributing computer software
iOS AppsiOS Apps are mobile applications that can be used on iOS devices
iOS Push NotificationsAn iOS push notification is a message delivered to applications on an iOS device.
Mobile AppsSoftware application used on mobile devices
Mobile CommerceThe phrase mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean the delivery of electronic commerce capabilities directly into the consumer's hand anywhere via wireless technology.
SmartphoneCellular phone capable of accessing the internet and running downloaded applications
SMS (Short Message Service)Text messaging service component of most telephone, World Wide Web, and mobile telephony systems.
SquareMagstripe reader used for taking debit or credit card payments on a mobile device
TextingAn electronic message sent over a cellular network from one cell phone to another by typing words, often in shortened form.
Touch ScreenTouch-sensitive display screen
Windows MobileFamily of mobile operating systems developed by Microsoft
2-in-1 PCsHybrid computer having features of both a tablet and a laptop
All-in-One PCsDesktop computer that integrates all components into the same case as the display
B2C TechnologyTechnology that facilitates commerce between businesses and end user consumers
ChromebookLaptop that runs Chrome OS
Desktop ComputerPersonal computer meant to remain in a fixed location 
LaptopPortable computer
MacintoshLine of personal computers developed by Apple
Comma-Separated Values (CSV)In computing, a comma-separated values (CSV) file is a delimited text file that uses a comma to separate values (many implementations of CSV import/export tools allow other separators to be used).
File SharingPractice of distributing or providing access to digital content
GmailEmail service provided by Google
Google AppsSuite of cloud computing and collaboration software tools provided y Google
Google DriveFile storage and synchronization software provided by Google
KeynotePresentation software developed by Apple
KubernetesKubernetes (commonly stylized as K8s) is an open-source system for automating deployment, scaling and management of containerized applications that was originally designed by Google and now maintained by the Cloud Native Computing Foundation.
Microsoft AccessDatabase management system provided by Microsoft
Microsoft ExcelSpreadsheet software developed by Microsoft
Microsoft Forefront Identity ManagerState based identity management software product designed to manage users' digital identities, credentials and groups throughout the lifecycle of their membership of an enterprise computer system.
Microsoft Forefront Unified Access GatewayA computer software solution that provides secure remote access to corporate networks for remote employees and business partners.
Microsoft OfficeOffice suite of applications developed by Microsoft
Microsoft OneNoteCollaborative information management software provided by Microsoft
Microsoft OutlookPersonal information manager provided by Microsoft
Microsoft PowerPointPresentation software developed by Microsoft
Microsoft ProjectProject management software developed by Microsoft
Microsoft PublisherDesktop publishing software provided by Microsoft
Microsoft SharePointHighly configurable collaboration and content management platform provided by Microsoft
Microsoft VisioDiagramming and vector graphics application provided by Microsoft
Microsoft WordWord processing software developed by Microsoft
Office 365Productivity software suite provided by Microsoft
Office for MacVersion of Microsoft Office developed for use on Apple computers 
Office MobileMicrosoft Office companion for use on mobile devices running Android
Office OnlineOnline office suite provided by Microsoft
Presentation ApplicationsSoftware used to display information in the form of a slide show
Unified MessagingIntegration of messaging platforms into a single interface
WPS OfficeWPS Office (an acronym for Writer, Presentation and Spreadsheets,[2] previously known as Kingsoft Office) is an office suite for Microsoft Windows, Linux,[1] iOS[3] and Android OS,[4] developed by Zhuhai-based Chinese software developer Kingsoft.
BingWeb search engine operated by Microsoft
ElasticsearchElasticsearch is a search engine based on Lucene. It provides a distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents.
Google SearchWeb search engine operated by Google
Search EnginesSoftware Designed to search information on the World Wide Web
Yahoo SearchWeb search engine operated by Yahoo
Anti SpamSecurity software that blocks unsolicited electronic mail
Anti SpywareSecurity software that blocks spyware
Anti VirusSecurity software that prevents malware
Card Security Code (CSC)A card security code (CSC) is a security feature for "card not present" payment card transactions instituted to reduce the incidence of credit card fraud.
Computer VirusMalware that infects computer programs 
Data TheftTheft of digital information
Identity TheftDeliberate use of someone's else's identity
MalwarebytesMalwarebytes (formerly Malwarebytes Anti-Malware, abbreviated as MBAM) is an anti-malware software for Microsoft Windows, macOS, and Android that finds and removes malware. Made by Malwarebytes Corporation, it was first released in January 2006.
Password ManagementMethod used to organize and encrypt passwords
PGP (Pretty Good Privacy)Software that provides cryptographic privacy and authentication for data communication, developed by Symantec
PhishingActivity of obtaining sensitive information for malicious purposes
SpywareSoftware that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
WormsSelf replicating virus that does not alter files but resides in active memory and duplicates itself.
AndroidMobile operating system developed by Google
iOSMobile operating system developed by Apple
iPhoneSmartphone line designed by Apple
LG G3 C118 / C125Smartphone line designed by LG
LG MobileSmartphone line designed by LG
Samsung GalaxySmartphone line designed by Samsung
Windows PhoneSmartphone line designed by Windows
Enterprise Social NetworkingUse of online social networks between those who share business interests or activities
FlickrImage and video hosting service
FourSquareApplication that personalizes geographical recommendations for users
Google GroupsCommunication platform for users with a common interest
Google+Social networking platform developed by Google
InstagramImage and video sharing social networking service developed by Facebook
Online MeetingsA meeting during which participants in different locations are able to communicate through audio and video means
PodcastingMethod for distributing on-demand series of audio or video recordings
QzoneSocial networking service based in China
SkypeApplication that provides video and voice call services
Social Media SharingSocial Media Sharing describes when social media users broadcast web content on a social network to their connections, groups, or specific individuals.
VineSocial networking service where users post looping 6 second videos
Virtual MeetingA virtual meeting is when people around the world, regardless of their location, use video, audio, and text to link up online.
WhatsAppApplication that provides a texting service and uses an internet connection
WordPressBlog web hosting service provider
YammerEnterprise social networking service for private communication within organizations
Apple iPadLine of tablet computers developed by Apple
Google NexusLine of consumer electronics developed by Google
KindleLine of e-readers developed by Amazon
Kindle FireTablet computer developed by Amazon
Microsoft SurfaceSieries of touchscreen Windows personal computers and interactive whiteboards designed and developed by Microsoft.
NookLine of e-readers developed by Barnes & Noble
Samsung Galaxy TabLine of tablet computers produced by Samsung Electronics
TabletsMobile computer that is primarily operated by touching the screen
Ambient IntelligenceConcept of electronic environments that are sensitive and responsive to the presence of people
Cognitive IoTThe use of cognitive computing technologies in combination with data generated by connected devices and the actions those devices can perform.
Connected CarsVehicles that are able to connect to the internet
Connected WorldConcept of transforming markets due to smart devices
Digital HealthConvergence of technology and individualized health and genetic information
Internet of Things (IoT)Concept of everyday objects being connected to a network
Smart HomeHome equipped with devices able to be controlled remotely
Wearable TechnologySmart electronic devices that can be worn on the body as implant or accessories.
Amazon Fire TVAudio/video streaming smart device developed by Amazon
Amazon PrimePremium subscription offered by Amazon that includes access to a variety of services
Android TVSmart TV platform developed by Google that creates an interactive television experience through a 10 foot user interface.
Blu-rayFormat of DVD that allows recording, rewriting, and playback of high-definition content
ChromecastLine of audio/video streaming smart devices developed by Google
Digital Terrestrial Television (DTT)Digital terrestrial television (DTTV or DTT) is a technology for broadcast television in which land-based (terrestrial) television stations broadcast television content by radio waves to televisions in consumers' residences in a digital format.
Google TVSmart TV platform developed by Google and others
High Definition (HD)System with an image resolution substantially higher than standard-definition
LG TelevisionTelevision produced by LG
Organic Light-Emitting Diode (OLED)LED in which part of the diode is made of organic compounds and is responsive to electric current
PremierColorTechnology that delivers exceptional color accuracy and consistency featured on certain Dell monitors
Quad High Definition (QHD)Resolution standard for high-end monitors, televisions, and mobile devices: 2560x1440 pixels at 16x9 aspect ratio
Ultra High Definition (UHD)Resolution standard for televisions: includes 4K and 8K (3840x2160 and 7680x4320 pixels at 16:9 aspect ratio, respectively)
Ultra High Definition ContentContent that meets the UHD standard
Ultra High Definition Media PlayerSmart device that is able to stream UHD content
UltraSharpLine of high-performance monitors offered by Dell
Video-on-DemandSystem where users choose their video or audio content from a wide selection
VLC Media PlayerVLC media player (commonly known as VLC) is a free and open-source, portable and cross-platform media player and streaming media server developed by the VideoLAN project.
Windows Media PlayerMedia player software developed by Microsoft
ChromeFreeware web browser developed by Google
FirefoxFreeware web browser developed by the Mozilla Foundation
Flash PlayerFreeware software used in conjunction with a browser for consuming media and executing RIAs
Internet ExplorerFreeware web browser developed by Microsoft
OperaFreeware web browser developed by Opera Software
TorFreeware web browser developed by the Tor Project

Technology WordMeaning
Average Handle Time (AHT)Average handle time (AHT) is a call center metric for the average duration of one transaction, typically measured from the customer's initiation of the call and including any hold time, talk time and related tasks that follow the transaction. AHT is a prime factor when deciding call center staffing levels.
Buyer CentricityA way of doing business with your customer in a way that provides a positive customer experience before and after the sale in order to drive repeat business, customer loyalty and profits.
Buyer JourneyA framework that acknowledges a buyer's progression through a research and decision process ultimately culminating in a purchase.
Churn RateChurn rate (sometimes called attrition rate), in its broadest sense, is a measure of the number of individuals or items moving out of a collective group over a specific period. It is one of two primary factors that determine the steady-state level of customers a business will support.
ClearSlideA SaaS-based Sales Engagement platform that lets users share content/sales materials via email links or their viewer's link in a 'Live Pitch'.
Connected ExperienceThe ability for marketer's to connect with consumers in varied and complicated ways.
CRM Best PracticesDifferent ways to manage customer relationships effectively.
CRM ManagementA term that refers to practices, strategies, and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers.
CRM RetargetingA relatively new, highly effective marketing technique that allows you to reach your customers in online display advertising by using your offline customer database.
CRM SoftwareA category of software that covers a broad set of applications designed.
Customer AdvocacyCustomer advocacy is a specialized form of customer service in which companies focus on what is deemed to be best for the customer. It is a change in a company's culture that is supported by customer-focused customer service and marketing techniques.
Customer BehaviorThe study of individuals, groups, or organizations and the processes they use to select, secure, use and dispose of products, services, experiences, or ideas to satisfy their needs and wants.
Customer CentricityCustomer-Centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
Customer CommunicationsRefers to a convergent set of Information Technology solutions that help businesses achieve these objectives by providing a tool to advance the way they communicate with their customers.
Customer DataCustomer data is information held on file about customers by a store or other business, usually including names, contact details, and buying habits.
Customer Data IntegrationThe process of consolidating and managing customer information from all available sources, including contact details, customer valuation data, and information gathered through interactions such as direct marketing.
Customer Data ManagementThe ways in which businesses keep track of their customer information and survey their customer base in order to obtain feedback.
Customer Data PlatformCustomer Data Platform (CDP) is a marketer-based management system. It creates a persistent, unified customer database that is accessible to other systems.
Customer Experience and EngagementThe product of an interaction between an organization and a customer over the duration of their relationship.
Customer FacingCustomer facing refers to the manner in which a business service feature is experienced or seen by a customer. A key customer relationship management (CRM) component, a customer facing solution is designed to deliver satisfying user experiences via all customer touch points.
Customer InsightAn interpretation of trends in human behaviors which aims to increase effectiveness of a product or service for the consumer, as well as increased sales for mutual benefit.
Customer Intelligence (CI)Is the process of gathering and analyzing information regarding customers; their details and their activities, in order to build deeper and more effective customer relationships and improve strategic decision making.
Customer IntentCustomer intent is defined as the thoughts directing a customers' decisions or actions toward a particular purchasing event.
Customer Interaction ManagementRefers to the a type of Enterprise Software Application which is responsible for managing the interaction between an organization and its customers.
Customer JourneyThe complete sum of experiences that customers go through when interacting with your company and brand.
Customer Journey AnalyticsCustomer journey analytics is the weaving together of every touchpoint that a customer interacts with, across multiple channels and over time. It connects millions of events into journeys from your customers' point of view and is a data-driven approach to discovering, analyzing and influencing your customers' journeys.
Customer Journey MapA diagram that illustrates the steps your customers go through in engaging with your company, whether it be a product, an online experience, retail experience, or a service, or any combination.
Customer LifecycleA term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service.
Customer Lifetime Value (CLV)In marketing, customer lifetime value (CLV or often CLTV), lifetime customer value (LCV), or life-time value (LTV) is a prediction of the net profit attributed to the entire future relationship with a customer.
Customer LoyaltyCan said to have occurred if people choose to use a particular shop or buy one particular products, rather than use other shops or buy products made by other companies.
Customer ProfilingCustomer profiling is a way to create a portrait of your customers to help you make design decisions concerning your service.
Customer ReferralsCustomer referrals are one of the most powerful selling and marketing tools available. In fact, the best source of new business is a referral from a satisfied customer.
Customer Relationship Management (CRM)Customer relationship management (CRM) refers to practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer life cycle, with the goal of improving customer service relationships and assisting in customer retention and driving sales growth.
Customer RetentionRefers to the activities and actions companies and organizations take to reduce the number of customer defections.
Customer ReviewA customer review is a review of a product or service made by a customer who has purchased and used, or had experience with, the product or service. Customer reviews are a form of customer feedback on electronic commerce and online shopping sites.
Customer SatisfactionA measure of how products and services supplied by a company meet or surpass customer expectation.
Customer SegmentationCustomer segmentation is the process of dividing customers into groups based on common characteristics so companies can market to each group effectively and appropriately.
Customer Service AutomationDesignates a process of significantly reducing or entirely eliminating human labor when assisting clients.
Customer Success ManagementCustomer Success Management is an integration of functions and activities of Marketing, Sales, Professional Services, Training and Support into a new profession to meet the needs of recurring revenue model companies.
Customer Support AnalyticsCustomer Support Analytics refers to metrics related to customer service operations such as response time, satisfaction rating, etc.
Digital ExperienceAn interaction between a user and an organization that is possible only because of digital technologies.
EloquaThe category defining marketing automation leader and provider of best practices expertise for marketers around the world.
Email Management SoftwareA specific field of communications management for managing high volumes of inbound electronic mail received by organizations.
First Call Resolution (FCR)First call resolution is properly addressing the customer's need the first time they call, thereby eliminating the need for the customer to follow up with a second call.
High-Value CustomerA high-value customer is a client on whom the survival and profitability of a business depend on.
Loyalty ProgramA customer loyalty program is a rewards program offered by a company to customers who frequently make purchases. A loyalty program may give a customer free merchandise, rewards, coupons, or even advance released products.
Marketing AutomationRefers to the software that exists with the goal of automating marketing actions.
MarketoA marketing automation tool that allows you to score leads based on their activity to determine how sales ready they are.
Microsoft Dynamics CRMA line of enterprise resource planning and customer relationship management software applications.
Mobile App EngagementCampaigns that focus on finding people interested in your appcontent.
Net PromoterA management tool that can be used to gauge the loyalty of a firm's customer relationships.
OmnichannelDenoting or relating to a type of retail that integrates the different methods of shopping available to consumers.
Potential CustomerPotential customer is a person who may buy a particular thing. there is a high possibility of this person buying that thing.
Progressive ProfileProgressive Profiling allows marketers to progressively gather more information over time and build a profile of the prospect.
Relationship MarketingA facet of customer relationship management that focuses on customer loyalty and long-tern customer engagement rather than shorter-term goals like customer acquisition and individual sales.
RemarketingA marketing strategy that positions targeted ads in front of a defined audience that had previously visited a particular website - as they browse elsewhere around the internet
Reputation ManagementThe practice of attempting to shape public perception of a person or organization by influencing online information about that entity.
Reputation MonitoringKeeping track of the reputation that you have garnered.
Retail TherapyRetail therapy is shopping with the primary purpose of improving the buyer's mood or disposition. Often seen in people during periods of depression or stress, it is normally a short-lived habit.
Revenue ManagementRevenue management is the application of disciplined analytics that predict consumer behaviour at the micro-market level and optimize product availability and price to maximize revenue growth.
Sales Force Automation (SFA)An integrated application of customizable customer relationship management tool that automate and streamline sales inventory, leads forecasting, performance and analysis.
Salesforce (CRM)A global web-based software and cloud computing company best known for its customer relationship management product.
Salesforce ConsultingA consultant that sells the Salesforce software.
Salesforce DeveloperA developer of the Salesforce software.
Salesforce PartnersA partner that manages Salesforce.
Siebel SystemsWas a software company principally engaged in the design, development, marketing, and support of customer relationship management applications.
Social Relationship ManagementFocuses on strengthening customer relationships through social media.
Voice of the CustomerA term used in business and Information Technology to describe the in-depth process of capturing customer's expectations, preferences and aversions.
Data Center

Technology WordMeaning
Application InfrastructureA package that enables enterprise developers to build integrated multi-tier applications easily and rapidly.
Automated Infrastructure Management (AIM)Automated infrastructure management is a means of monitoring and managing the complex network cabling and other passive physical infrastructure within an enterprise data center.
Carbon ManagementA management process which promotes environmental effectiveness in organizations.
Cisco ACICisco ACI is a tightly coupled policy-driven solution that integrates software and hardware.
Cisco Unified Computing SystemA data center server computer product line composed of computing hardware, virtualization support, switching fabric, and management software introduced in 2009 by Cisco Systems.
ColocationA data center facility in which a business can rent space for servers and other computing hardware.
Converged InfrastructureAn approach to data center management that seeks to minimize compatibility issues between servers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space.
Cooling SystemsGenerally refers to the dissipation of large amounts of heat, which is generated inside the computer tower by various hardware such as CPU, video card or even the hard drive.
CtrlSA Tier 4 Datacenter in India, that deals with large group of networked computer servers typically used by various organizations for the remote storage, processing, or distribution of large amounts of data.
Data CenterA large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data.
Data Center AutomationThe process of managing and automating the workflow and the process of a data center facility.
Data Center ConsolidationA common consideration for organizations that plan to reduce the size of a single facility or merge one or more facilities in order to reduce overall operating costs and reduce IT footprint.
Data Center Designthe process of modeling and designing a data center's IT resources, architectural layout and entire infrastructure.
Data Center EquipmentA facility that centralizes an organization's IT operations and equipment, and where it stores, manages, and disseminates its data.
Data Center Infrastructure Management (DCIM)Refers to the management of the human resources and tools required to handle all physical assets and resources in the data center to obtain a single pane view of the entire infrastructure.
Data Center InterconnectRefers to the networking of two or more different data centers to achieve business or IT objectives.
Data Center ManagementRefers to the role of an individual within the data center who is responsible for overseeing technical and IT issues within the data center.
Data Center MigrationA data center migration is the process of deploying and transferring an existing data center environment to another data center operating environment. It is a comprehensive process that systematically plans for migrating the existing data center to a new facility or site.
Data Center PowerPower needed to keep a data center running.
Data Center SustainabilityReduce, reuse and recycle everything from energy to materials.
Disaster PlanningSystematic procedures that clearly detail what needs to be done, how, when and by whom before and after the time an anticipated disastrous event occurs.
Disaster RecoveryA documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.
Environmental ControlsA constructive generic framework for maintaining temperature, humidity, and other physical qualities of air within a specific range in order to allow the equipment housed in a data center to perform optimally throughout its lifespan.
Environmental ManagementSoftware to keep track of potentially hazardous conditions within the datacenter. Monitors temperature, humidity, and water leakage as well as smoke, fire, and unauthorized entry alarms.
Equinix Data CentersData centers that have been designed and maintained by Equinix.
InfrastructureThe basic physical and organizational structures and facilities needed for the operation of a society or enterprise.
Infrastructure as a Service (IaaS)A service model that delivers computer infrastructure on an outsourced basis to support enterprise operations.
Infrastructure ManagementThe management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts for overall effectiveness.
Micro Data CenterA smaller or containerized data center architecture that is designed to solve different sets of problems tat take different types of compute workload that does not require to traditional facilities.
Modular Data CenterA portable method of deploying data center capacity.
Multi-Tenant Data Centers (MTDCs)A Multi-Tenant Data Center is a data center where multiple communication networks are housed in a single facility.
NutanixA storage vendor that produces a hyper converged storage system called Virtual Compute Platform.
Power and CoolingCooling is the capacity of removing heat from a confined space. Power to cool comes in a variety of forms such as thermal pastes, fans, etc.
Power DistributionElectric power distribution is the final stage in the delivery of electric power; it carries electricity from the transmission system to individual consumers.
Power SupplyAn electronic device that supplies electric energy to an electrical load.
Power Usage Effectiveness (PUE)A measure of how efficiently a computer data center uses energy; specifically, how much energy is used by the computing equipment.
Row-Based CoolingA hot air capture architecture that neutralizes hot air from IT equipment before it has a chance to mix with the surrounding air in the room.
Software-Defined Data CenterThe phrase used to refer to a data center where all infrastructure is virtualized and delivered as a service.
UPS SystemsA device that provides battery backup when the electrical power fails or drops to an unacceptable voltage level.
Data Management

Technology WordMeaning
Amazon Elastic MapReduce (EMR)Processes big data across a Hadoop cluster of virtual servers on Amazon Elastic compute Cloud and Amazon Simple Storage Service.
Amazon KinesisCollecting and processing large streams of data records in real time.
AnonymizationA type of information sanitation whose intent is privacy protection.
Apache AvroA remote procedure call and data serialization framework developed within Apache's Hadoop project.
Apache DrillAn open source software framework that supports data-intensive distributed applications for interactive analysis of large-scale datasets.
Apache FlumeApache Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data. It has a simple and flexible architecture based on streaming data flows
Apache OozieA server -based workflow scheduling system to manage Hadoop jobs.
Apache SparkAn open source engine developed specifically for handling large-scale data processing and analytics.
Apache ZooKeeperA centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services. All of these kinds of services are used in some form or another by distributed applications.
B2B DataAlso known as e-biz, is the exchange of products, services or information (aka e-commerce) between businesses, rather than between businesses and consumers.
Backup and RecoveryRefers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss.
Backup SoftwareBackup software are computer programs used to perform backup; they create supplementary exact copies of files, databases or entire computers. These programs may later use the supplementary copies to restore the original contents in the event of data loss.
Behavioral DataBehavioral data refers to information produced as a result of actions, typically commercial behavior using a range of devices connected to the Internet, such as a PC, tablet, or smartphone.
Bit Error Rate Tester (BERT)A procedure or device that measures the bit error rate of a transmission to determine if errors are introduced into the system when data is transmitted.
CacheA temporary storage space or memory that allows data access to data.
CascadingDisplaying windows in a progressive order so that all the title bars appear on the screen at one time.
Commercial Internet of ThingsA term applied only to those aspects of the Internet of Things that pertain specifically to enacting business.
Data AppendData Append, or Data Appending, means adding data specifically to the end of a data set.
Data ArchitectureIn information technology, data architecture is composed of models, policies, rules or standards that govern which data is collected, and how it is stored, arranged, integrated, and put to use in data systems and in organizations. Data is usually one of several architecture domains that form the pillars of an enterprise architecture or solution architecture.
Data CatalogueA data catalog belongs to a database instance and is comprised of metadata containing database object definitions like base tables, synonyms, views or synonyms and indexes.
Data ClassificationData classification is the process of organizing data into categories for its most effective and efficient use. A well-planned data classification system makes essential data easy to find and retrieve. This can be of particular importance for risk management, legal discovery, and compliance.
Data Cleansing / Data ScrubbingThe process of detecting and correcting corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data.
Data ConvergenceA concept based on a collection of technical reports and specifications and is currently under development within the 3rd Generation Partnership Project.
Data DeduplicationA specialized data compression technique for eliminating duplicate copies of repeating data.
Data DiscoveryA business intelligence process for creating and using interactive reports and exploring data from multiple sources. The information technology market research firm Gartner promoted it in 2012.
Data DistributionThe distribution of a statistical data set is a listing or function showing all the possible values of the data and how often the occur.
Data EntryThe professional term for entering information into a computer or data-recording system using an electronic or mechanical device.
Data ExchangesThe process of sending and receiving data in such a manner that the information content or meaning assigned to the data is not altered during the transmission.
Data ExtractionData extraction is the act or process of retrieving data out of data sources for further data processing or data storage.
Data IntegrationThe combination of technical and business processes used to combine data from disparate sources into meaningful and valuable information.
Data LossAn error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing.
Data Loss PreventionA strategy for making sure that end users do not send sensitive or critical information outside the corporate network.
Data PreparationData Preparation is the process of collecting, cleaning, and consolidating data into one file or data table, primarily for use in analysis.
Data Privacy and ProtectionThe relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
Data ProfilingData profiling is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data.
Data QualityRefers to the condition of a set of values of qualitative or quantitative variables. There are many definitions of data quality but data is generally considered high quality it is 'fit for [its] intended uses in operations, decision making and planning.'.
Data ReductionThe transformation of numerical or alphabetical digital information derived empirically or experimentally into a corrected, ordered, and simplified form.
Data Replication and MirroringThe creation and maintenance of redundant copies of a database.
Data RetentionThe continued storage of an organization's data for compliance or business reasons.
Data SharingData sharing is the practice of making data used for scholarly research available to other investigators.
Data StreamsA sequence of digitally encoded coherent signals used to transmit or receive information that is in the process of being transmitted.
Data StructuresA specialized format for organizing and storing data.
Data SynchronizationData synchronization is the process of maintaining the consistency and uniformity of data instances across all consuming applications and storing devices. It ensures that the same copy or version of data is used in all devices - from source to destination.
Data ValidationIn computer science, data validation is the process of ensuring that data have undergone data cleansing to ensure they have data quality, that is, that they are both correct and useful.
Data VaultingData vault modeling is a database modeling method that is designed to provide long-term historical storage of data coming in from multiple operational systems. It is also a method of looking at historical data that deals with issues such as auditing, tracing of data, loading speed and resilience to change as well as emphasizing the need to trace where all the data in the database came from.
Digital AssetA digital asset, in essence, is anything that exists in a binary format and comes with the right to use. Data that do not possess that right are not considered assets.
Digital Asset Management (DAM) SoftwareDigital asset management software is primarily used by enterprise marketing and creative teams, so it is necessary for DAM software to accommodate a broad spectrum of creative files.
Google BigQueryA RESTful web service that enables interactive analysis of massively large datasets working in conjunction with Google Storage.
Google Cloud BigtableA compressed, high performance, and proprietary data storage system build on Google File system, Chubby Lock Service, SSTable and a few other Google technologies.
HadoopAn open source, Java-based programming framework that supports the processing and storage of extremely large data sets in a distributed computing environment.
High-Density PodsOne or more racks containing high-density equipment all clustered together with dedicated row-based cooling that is deployed as a unit.
IBM DatastageIBM InfoSphere DataStage is an ETL tool and part of the IBM Information Platforms Solutions suite and IBM InfoSphere.
IBM InfoSphere DataStageIBM InfoSphere DataStage is an ETL tool and part of the IBM Information Platforms Solutions suite and IBM InfoSphere.
Industrial Internet of ThingsThe use of Internet of Things technologies in manufacturing.
Information Architecture (IA)Information architecture (IA) is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape.
Location DataLocation Data is defined as any data processed in an electronic communications network or by an electronic communications service indicating the geographical position of the terminal equipment of a user of a public electronic communications service, including data relating to the latitude, longitude or altitude of the terminal equipment, the direction of travel of the user, or the time the location information was recorded.
Machine DataMachine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
Master DataMaster Data represents the business objects that contain the most valuable, agreed upon information shared across an organization. It can cover relatively static reference data, transactional, unstructured, analytical, hierarchical and metadata. It is the primary focus of the information technology (IT) discipline of master data management (MDM).
Object-Relational Mapping (ORM)Object-relational mapping (ORM, O/RM, and O/R mapping tool) in computer science is a programming technique for converting data between incompatible type systems using object-oriented programming languages.
Online Transaction Processing (OLTP)A class of information systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing on a database management system.
Point-In-Time RecoveryPoint-in-time recovery (PITR) in the context of computers involves systems whereby an administrator can restore or recover a set of data or a particular setting from a time in the past.
Protocol AnalyzerA tool used to capture and analyze signals and data traffic over a communication channel.
Qlik SenseQlik Sense is a self-service data visualization and discovery application designed for individuals, groups and organizations.
RapidMinerRapidMiner is a data science software platform developed by the company of the same name that provides an integrated environment for data preparation, machine learning, deep learning, text mining, and predictive analytics.
Real-Time DataReal-time data is information that is delivered immediately after collection. There is no delay in the timeliness of the information provided.
Recovery Point Objective (RPO)A recovery point objective (RPO) is defined by business continuity planning. It is the maximum targeted period in which data might be lost from an IT service due to a major incident. The RPO gives systems designers a limit to work to. For instance, if the RPO is set to four hours, then in practice, off-site mirrored backups must be continuously maintained a daily off-site backup on tape will not suffice.
Remote SensingRemote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object and thus in contrast to on-site observation.
Search and RetrievalThe activity of obtaining information resources relevant to an information need from a collection of information resources.
SharePoint MigrationNewborn screening is a public health program of screening in infants shortly after birth for a list of conditions that are treatable, but not clinically evident in the newborn period.
Single Source of Truth (SSOT)Single source of truth (SSOT), is the practice of structuring information models and associated data schema such that every data element is stored exactly once.
Spark StreamingAn extension of the core Sparks API that enables scalable, high-throughput, fault tolerant stream processing of live data streams.
Streaming DataStreaming Data is data that is continuously generated by different sources. Such data should be processed incrementally using Stream Processing techniques without having access to all of the data. In addition, it should be considered that concept drift may happen in the data which means that the properties of the stream may change over time.It is usually used in the context of big data in which it is generated by many different sources at high speed.

Technology WordMeaning
ACID (Atomicity, Consistency, Isolation, Durability)In computer science, ACID (Atomicity, Consistency, Isolation, Durability) of database transactions intended to guarantee validity even in the event of errors, power failures, etc. In the context of databases, a sequence of database operations that satisfies the ACID properties, and thus can be perceived as a single logical operation on the data, is called a transaction.
Amazon AuroraAmazon Aurora is a hosted relational database service developed and offered by Amazon since October 2014. Aurora is available as part of the Amazon Relational Database Service.
Amazon DynamoDBAmazon DynamoDB is a fully managed proprietary NoSQL database service that is offered by Amazon.com as part of the Amazon Web Services portfolio.
Amazon RedshiftAn internet hosting service and data warehouse product which forms part of the larger cloud-computing platform Amazon Web Services.
Amazon Relational Database Service (Amazon RDS)Amazon Relational Database Service (or Amazon RDS) is a distributed relational database service by Amazon Web Services.
Analytic DatabaseA read-only system that stores historical data on business metrics such as sales performance and inventory levels.
Apache CassandraA free and open-source distributed NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.
Apache CouchDBAn open source document-oriented database
Apache HBaseThe Hadoop database.
Apache HCatalogA table and storage management layer for Hadoop that enables users with different data processing tools to more easily read and write data on the grid.
Apache ImpalaOpen source massively parallel processing query engine on top of clustered systems like Apache Hadoop.
Apache SqoopSupports incremental loads of a single table or a free form SQL query as well as saved jobs which can be run multiple times to import updates made to a database since the last import.
ArangoDBArangoDB is a native multi-model database system[1] developed by triAGENS GmbH. The database system supports three important data models (key/value, documents, graphs) with one database core and a unified query language AQL (ArangoDB Query Language).
Azure Cosmos DBAzure Cosmos DB is Microsoft's proprietary globally-distributed, multi-model database service "for managing data at planet-scale" launched in May 2017.
Berkeley DB (BDB)Berkeley DB (BDB) is a software library intended to provide a high-performance embedded database for key/value data. Berkeley DB is written in C with API bindings for C++, C#, Java, Perl, PHP, Python, Ruby, Smalltalk, Tcl, and many other programming languages.
Boolean OperatorsBoolean Operators are used to connect and define the relationship between your search terms. When searching electronic databases, you can use Boolean operators to either narrow or broaden your record sets. The three Boolean operators are AND, OR and NOT.
Cloud DatabaseA type of database service that is built, deployed and delivered through a cloud platform.
Cosmos DBAzure Cosmos DB is Microsoft's proprietary globally-distributed, multi-model database service "for managing data at planet-scale" launched in May 2017.
Database AdministrationDatabase administration refers to the whole set of activities performed by a database administrator to ensure that a database is always available as needed.
Database AuditDatabase auditing involves observing a database so as to be aware of the actions of database users.
Database DevelopmentA core aspect of software engineering is the subdivision of the development process into a series of phases, or steps, each of which focuses on one aspect of the development.
Database Migration and ConversionThe transformation of data from one format to another and the process of transferring data between sios, formats, or systems.
Database SecurityRefers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks.
Database ServersA computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
Database SolutionsA computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
DatabasesA structured set of data held in a computer, especially one that is accessible in various ways.
Electronically Stored Information (ESI)Electronically stored information (ESI) is stored electronic information that is created and communicated in digital form.
Enterprise DatabaseUsed by enterprises and large organizations to manage their huge collection of data. An enterprise database is robust enough to successfully handle the queries of multiple users simultaneously, and is capable of handling a range of 100 to 10,000 users at a time.
Extract, Transform, and Load (ETL)Three database functions that are combined into one tool to pull data out of one database and place it into another database.
Graph DatabasesA database that uses graph structures for semantic queries with nodes, edges and properties to represent and store data.
HDFSA sub project of the Apache Hadoop project.
IBM CloudantAn IBM software product which is primarily delivered a cloud-based service.
IBM NetezzaDesigns and markets high-performance data warehouse appliances and advanced analytics applications for uses including enterprise data warehousing, business intelligence, predictive analytics and business continuity planning.
In-Database AnalyticsConsists of an enterprise data warehouse built on a an analytic database platform.
In-Memory TechnologyProcessing of data stored in an in-memory database.
InnoDBInnoDB is a storage engine for the database management system MySQL. MySQL 5.5 and later use it by default. It provides the standard ACID-compliant transaction features, along with foreign key support.
Interactive SQLInteractive SQL is a utility for entering SQL statements.
Key-Value StoresA key-value database, or key-value store, is a data storage paradigm designed for storing, retrieving, and managing associative arrays, a data structure more commonly known today as a dictionary or hash. Dictionaries contain a collection of objects, or records, which in turn have many different fields within them, each containing data.
LIFO (Last In, First Out)An asset management and valuation method that assumes assets produced or acquired last are the ones used, sold or disposed of first; LIFO assumes an entity sells, uses or deposes of its newest inventory first.
Managed DatabaseA collection of information that is organized so that it can be easily accessed, managed and updated.
MariaDBMariaDB is a community-developed fork of the MySQL relational database management system intended to remain free under the GNU GPL.
MarkLogicAn American software business that develops and provides an enterprise NoSQL database, also named MarkLogic.
Microsoft SQL ServerSQL Server is Microsoft's relational database management system.
MongoDBSeveral database types to arise in the mid-2000s under the NoSQL banner.
MySQLAn open source relational database management system.
NetWeaverNetWeaver is an application builder designed to integrate multiple business processes and databases. NetWeaver was created by SAP AG and it enables the integration of information and processes from many geographical locations.
NewSQLA class of modern relational database management systems that seek to provide the same scalable performance of NoSQL systems for online transaction processing read-write workloads while still maintaining the ACID guarantees of a traditional database system.
NoSQLProvides a mechanism for storage and retrieval of data which is modeled in means other than the tabular relations used in relational databases.
Open Database Connectivity (ODBC)Open Database Connectivity (ODBC) is a standard application programming interface (API) for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and server side, with few changes to the data access code.
Open Source DatabaseMySQL is an open-source relational database management system.
Operational Data Store (ODS)A database designed to integrate data from multiple sources for additional operations on the data.
Oracle DatabaseA relational database management system from the Oracle Corporation.
Oracle Database 12cA high performance, enterprise-class database.
Oracle ExadataA database machine designed by oracle that provides users with optimized functionality pertaining to enterprise class datasets and their associated workloads.
Oracle MultitenantThe architecture for the next generation database cloud.
Oracle Real Application Clusters (RAC)An option for the oracle Database software produced by Oracle Corporation and introduced in 2001 with Oracle9i - provides software for clustering and high availability in oracle database environments.
OrientDBOrientDB is an open source NoSQL database management system written in Java. It is a multi-model database, supporting graph, document, key/value, and object models,[2] but the relationships are managed as in graph databases with direct connections between records.
Pivot TableA pivot table is a table that summarizes data in another table, and is made by applying an operation such as sorting, averaging, or summing to data in the first table, typically including grouping of the data. A trivial example is a column of numbers as the first table, and the column average as a pivot table with only one row and column.
Pivotal HAWQPivotal HAWQ is a trademark and/or registered trademark of Pivotal Software, Inc.
RedisRedis is an open-source in-memory database project implementing a distributed, in-memory key-value store with optional durability. Redis supports different kinds of abstract data structures, such as strings, lists, maps, sets, sorted sets, hyperloglogs, bitmaps and spatial indexes.
Relational Database Management System (RDBMS)A database management system that is based on the relational model as invented by E.F. Codd of IBM's San Jose Research Laboratory.
RethinkDBRethinkDB is a free and open-source, distributed document-oriented database originally created by the company of the same name. The database stores JSON documents with dynamic schemas, and is designed to facilitate pushing real-time updates for query results to applications.
SAP HANAAn application that uses in-memory database technology that allows the processing of massive amounts of real-time data in a short time.
SAP IQA column-based, petabyte scale, relational database software system used for business intelligence, data warehousing, and data marts
SQLUsed to communicate with a database.
Unstructured DataInformation that either does not have a pre-defined data model or is not organized in a pre-defined manner.
VoltDBVoltDB is an in-memory database designed by Michael Stonebraker (who was involved in Ingres and PostgreSQL), Sam Madden, and Daniel Abadi. It is an ACID-compliant RDBMS which uses a shared nothing architecture.
Demand Generation & Email Marketing

Technology WordMeaning
Above the FoldAbove the fold is the upper half of the front page of a newspaper or tabloid where an important news story or photograph is often located. Papers are often displayed to customers folded so that only the top half of the front page is visible.
CMS ToolsCMS Tools can be defined as tools used to aid a content management system software.
Content AggregationAn individual or organization that gathers Web content from different online sources for reuse or resale.
Content GovernanceContent governance is the system, a set of guidelines, that determines how an organization's content gets created and published. At its most basic level, it can help you avoid getting sued or embarrassed, or both.
Content IngestionThe process of obtaining and importing data for immediate use or storage in a database.
Content ManagementThe administration of digital content throughout its lifecycle, from creation to permanent storage or deletion.
Content Management System (CMS)A computer application that supports the creation and modification of digital content. It is often used to support multiple users working in a collaborative environment.
Content MarketingA type of marketing that involves the creation and sharing of online material (such as videos, blogs, and social media posts) that does not explicitly promote a brand but is intended to stimulate interest in its products or services.
Content PersonalizationA strategy that relies on visitor data to deliver relevant content based on audience interests and motivations.
Content PlayoutA term for the transmission of radio or TV channels from the broadcaster into broadcast networks that delivers the content to the audience.
Content RecommendationThe transmission of radio or TV channels from the broadcaster into broadcast networks that delivers the content to the audience.
Content StrategyContent strategy refers to the planning, development, and management of content written or in other media. The term has been particularly common in web development since the late 1990s.
CopywritingThe act of writing text for the purpose of advertising or other forms of marketing.
Corporate CommunicationsA management function or department, like marketing, finance, or operations, dedicated to the dissemination of information to key constituencies, the execution of corporate strategy and the development of messages for a variety of purposes for inside and outside the organization.
Employee Generated Content (EGC)Material produced by the users of a website.
Enterprise Content ManagementTools and strategies used to manage an organizations content
Live Content FeedA social IT application that provides a place to post and share content in a ServiceNow instance.
Media Management SystemsAny task that relates to processing your media is considered to be media management, such as capturing, compressing, copying, moving, or deleting media files.
Press KitsA package of promotional material provided to members of the press to brief them, especially about a product, service, or candidate.
Press ReleasesAn official statement issued to newspapers giving information on a particular matter.
Print CollateralThe collection of media used to support he sales of a product or service.
Social Content ManagementSolutions to help manage outbound and incoming online interactions.
Target AudienceA target audience is the intended audience or readership of a publication, advertisement, or other message. In marketing and advertising, it is a particular group of consumers within the predetermined target market, identified as the targets or recipients for a particular advertisement or message.
Television ProductionThe system or process of producing on a distant screen a series of transient visible images, usually with an accompanying sound signal.
User Experience (UX)The overall experience of a person using a product such as a website or computer application, especially in terms of how easy or pleasing it is to use.
Video TranslationVideo translation is after your video audio files have been transcribed; having them translated into many different languages.
Visual CommunicationCommunication through a visual aid and is described as the conveyance of ideas and information in forms that can be read or looked upon.
WYSIWYGA WYSIWYG editor or program is one that allows a developer to see what the end result will look like while the interface or document is being created. WYSIWYG is an acronym for "what you see is what you get".
Adobe AcrobatA family of application software and Web services developed by Adobe systems to view, create, manipulate, print and manage files in Portable Document Format.
Adobe Creative CloudAdobe Creative Cloud is a set of applications and services from Adobe Systems that gives subscribers access to a collection of software used for graphic design, video editing, web development, photography, along with a set of mobile applications and also some optional cloud services.
Adobe Creative SuiteA software suite of graphic design, video editing, and web development applications developed by Adobe Systems.
Adobe FireworksA discontinued bitmap and vector graphics editor, which Adobe acquired in 2005.
Adobe FlashA multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications and mobile games.
Adobe ReaderUsed to open PDF documents.
Adobe StockStock images for creative projects.
Design SoftwareDesign software refers to software that is used to create graphic designs, 3D object designs, or mathematical representations of an object or design.
Graphic DesignThe art of skill of combining text and pictures in advertisements, magazines, or books.
Image Editing SoftwareImage editing software suppoers processes such as altering images, whether they are digital photographs, traditional photo-chemical photographs, or illustrations. 
Image LicensingImage Licensing is the process of granting certain rights for the use of an image through a contract to another party.
PhotoshopTo alter a photographic image digitally using Photoshop image-editing software.
ThumbnailThumbnails are reduced-size versions of pictures or videos, used to help in recognizing and organizing them, serving the same role for images as a normal text index does for words.
Video Editing SoftwareSoftware that utilizes the process of converting an analog video signal such as that produced by a video camera or DVD player to digital video.
Customer AcquisitionThe set of methodologies and systems for managing customer prospects and inquiries that are generated by a variety of marketing techniques.
Customer DelightCustomer delight is surprising a customer by exceeding his or her expectations and thus creating a positive emotional reaction. This emotional reaction leads to word of mouth.
Demand GenerationThe focus of targeted marketing programs to drive awareness and interest in a company's products and/or services.
Demand Generation ConsultingConsultants that help executives of marketing the most of the latest inbound and revenue performance techniques.
Demand PlanningDemand planning is a multi-step operational supply chain management (SCM) process used to create reliable forecasts. Effective demand planning can guide users to improve the accuracy of revenue forecasts, align inventory levels with peaks and troughs in demand, and enhance profitability for a given channel or product.
Lead GenerationThe action or process of identifying and cultivating potential customers for a business's products or services.
Lead Generation ConsultingA consultant that helps generate marketing leads.
Lead Generation ServicesServices and strategies that generate leads.
Lead ManagementA set of methodologies, systems, and practices designed to generate new potential business clientele, generally operated through a variety of marketing campaigns or programs.
Lead MatchingLead Matching technologies use AI to match leads to the proper account when they are registered in a system.
Lead NurturingThe process of developing relationships with buyers at every stage of the sales funnel, and through every step of the buyer's journey.
Lead QualityA lead that can convert into an actual sale of your product or service.
Lead RoutingLead Routing designates a process of incoming lead distribution among sales agents.
Lead ScoringA methodology used to rank prospects against a scale that represents the perceived value each lead represents to the organization.
Lead to Account MatchingLead to Account Matching is the (automated) connecting of a lead to the account that they represent.
Lead TrackingThe process of following up with prospects who have expressed interest in a product or service.
Marketing FunnelThe marketing funnel is a system that helps track the stages consumers or purchasers travel through to eventually make a buying decision.
Marketing LeadsA potential sales contact.
Price SensitivityPrice sensitivity is the degree to which the price of a product affects consumers' purchasing behaviors. In economics, price sensitivity is commonly measured using the price elasticity of demand.
CAN-SPAMThe United States' first national standard for the sending of commercial e-mail and requires the DTC to enforce its provisions.
Constant ContactAn online marketing company.
Double Opt-InDouble opt-in is a type of email subscription where a user should confirm his or her wish to be added to the mailing list twice.
Drip MarketingA communication strategy that sends or 'drips' a pre-written set of messages to customers or prospects over time.
Email CampaignEmail marketing campaigns can also be comprised of several rounds of messages meant to build familiarity and trust around a product or service.
Email CampaignsEmail marketing campaigns can also be comprised of several rounds of messages meant to build familiarity and trust around a product or service.
Email DeliverabilityMeasures the ability to deliver email messages in recipients' inboxes for email marketing campaigns and to avoid messages being lost, blocked, or driven to the spam folder.
Email HygieneThe removal of invalid email addresses from a file or database.
Email List ManagementIncludes the tasks of publishing data cards and maximizing sales through promotional efforts.
Email MarketingThe targeting of consumers through electronic mail.
Email Marketing AutomationRefers to software platforms and technologies designed for marketing departments and organizations to more effectively market on multiple channels online and automate repetitive tasks.
Email Marketing ServicesServices designed to help with email marketing campaigns.
Email Marketing SoftwareService-based software that marketers use for email marketing.
Email Marketing SystemA system based on email marketing to help marketers.
Email Marketing ToolsTools used to service email marketing.
Email Service ProvidersA company that offers email services.
Global Email MarketingGlobal email marketing allows you to take your email marketing campaign to the next step: international audiences.
MailChimpAn email service offered through the URL www.mailchimp.com that allows you to create, send, and manage email newsletters to individual recipients.
NewsletterA newsletter is a printed report containing news (information) of the activities of a business (legal name; subscription business model) or an organization (institutions, societies, associations) that is sent by mail regularly to all its members, customers, employees or people, who are interested in.
Opt-OutThe term opt-out refers to several methods by which individuals can avoid receiving unsolicited product or service information. This ability is usually associated with direct marketing campaigns such as, e-mail marketing, or direct mail.
Permission Email MarketingWhere Internet users sign up in advance for information about certain product categories.
Sender Policy Framework (SPF)Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.
SpamIrrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Document Management

Technology WordMeaning
Adobe SignAn Adobe Document Cloud solution is a cloud-based, enterprise-class, e-signature service that lets you replace paper and ink signature processes with fully automated electronic signature workflows.
Digital Signature TechnologyCreates a one-way has of the electronic data to be signed.
Document ControlProcedure that describes how documents are organized, managed, and standardized within an organization
Document ImagingThe practice of using equipment like scanners or special cameras to take a picture of information contained in another form.
Document Management Systems (DMS)A document management system is a system used to track, manage and store documents and reduce paper.
Document SecurityMeans the security agreement, the intellectual property security 
Document SharingConcept of distributing or providing access to documents over a network
Document ShreddingA mechanical device used to cut paper into either strips or fine particles.
Document StorageDocument storage, or when we discuss document management, online document storage, is the process of storing documents as electronic files.
Dynamic-Link Library (DLL)Dynamic-link library (or DLL) is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems.
Electronic DocumentAn electronic document is any electronic media content (other than computer programs or system files) that are intended to be used in either an electronic form or as printed output.
Enterprise Document ManagementEnterprise content management is a formalized means of organizing and storing an organization's documents, and other content, that relate to the organization's processes.
E-Signature SoftwareSoftware that allows you to sign, send, track and store documents.
File Transfer ManagementRefers to a software or a service that manages the secure transfer of data from one computer to another through a network.
Graphics Interchange Format (GIF)The Graphics Interchange Format, better known by its acronym GIF (/d??f/ JIF or /??f/ GHIF), is a bitmap image format that was developed by a team at the bulletin board service (BBS) provider CompuServe led by American computer scientist Steve Wilhite on June 15, 1987.
Joint Photographic Experts Group (JPEG)JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
Portable Document Format (PDF)The Portable Document Format (PDF) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
Rich Text Format (RTF)The Rich Text Format (often abbreviated RTF) is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products.
Right SignatureA high-;level concept meaning any electronic indication of intent to agree to a record.
Tagged Image File Format (TIFF)Tagged Image File Format, abbreviated TIFF or TIF, is a computer file format for storing raster graphics images, popular among graphic artists, the publishing industry,[1] and photographers.
Video FilesA type of file format for storing digital video data on a computer system.
Video HostingAllows individual end users to upload and share personal, business, or royalty-free videos and to watch them legally/
Virtual Data RoomA Virtual Data Room (sometimes called a VDR or deal room) is an online repository of information that is used for the storing and distribution of documents.
WireframingA wireframe is a layout of a web page that demonstrates what interface elements will exist on key pages. It is a critical part of the interaction design process.
e Commerce

Technology WordMeaning
Desktop AppsAn application that runs stand-alone in a desktop or laptop computer.
Desktop EnvironmentAn implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system, which share a common graphical user interface, sometime described as a graphical shell.
Desktop ManagementA comprehensive approach to managing all the computers within an organization.
End User DigitalThe take-away feeling an end user has after an experience in a digital environment.
XenDesktopXenDesktop is a desktop virtualization software platform that allows multiple users to access and run Microsoft Windows desktops that are installed at a centralized location separate from the devices from which they are being accessed.
B2C eCommerceB2C eCommerce or electronic commerce is used to describe a transaction conducted over the Internet between a business and a consumer for his/her personal use.
Checkout OptimizationCheckout Optimization is a strategy used by eCommerce sites to increase conversion for online shoppers.
Conversational CommerceConversational commerce is e-commerce via various means of conversation including live chat on e-commerce Web sites, live chat on messaging apps, chat-bots on messaging apps or Web sites, via voice assistants.
IBM BlockchainA shared, immutable ledger for recording the history of transactions.
LevelUpLevelUp is an American mobile ordering and mobile payments platform created by Boston, Massachusetts-based start-up SCVNGR.
MagentoAn open sourced e-commerce platform written in php.
Online MarketplaceAn online marketplace (or online e-commerce marketplace) is a type of e-commerce site where product or service information is provided by multiple third parties, whereas transactions are processed by the marketplace operator. Online marketplaces are the primary type of multichannel ecommerce and can be a way to streamline the production process.
Payment ProcessingA company, often a third party, appointed by a merchant to handle transactions from various channels such as credit cards and debit cards for merchant acquiring banks.
PrestaShopA free, open sour e-commerce solution.
Recommender SystemA recommender system or a recommendation system (sometimes replacing "system" with a synonym such as platform or engine) is a subclass of information filtering system that seeks to predict the "rating" or "preference" a user would give to an item.
Shopping Cart SoftwareA piece of software that acts as an online store's catalog and ordering process.
VolusionAn ecommerce solution that provides shopping cart software
WooCommerceAn open source e-commerce plugin for WordPress.

Technology WordMeaning
AutoresponderAn autoresponder is a computer program that automatically answers e-mail sent to it. They can be very simple or quite complex.
Bounced EmailA bounced email refers to any email message that is not delivered to the recipient and is returned or bounced back to the sender.
Business Email Compromise (BEC)A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner's identity to defraud the company or its employees, customers or partners of money.
Domain Keys Identified Mail (DKIM)Domain Keys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing. It allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain.
Domain-based Message Authentication, Reporting and Conformance (DMARC)Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email-validation system designed to detect and prevent email spoofing. It is intended to combat certain techniques often used in phishing and email spam, such as emails with forged sender addresses that appear to originate from legitimate organizations.
Email ArchivingThe act of preserving and making searchable all email to/from an individual.
Email SecurityRefers to the collective measures used to secure the access and content of an email account or service.
Email ServersA mail server is an applications that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery.
Email TrackingEmail tracking is a method for monitoring the email delivery to the intended recipient. Most tracking technologies use some form of digitally time-stamped record to reveal the exact time and date that an email was received or opened, as well the IP address of the recipient.
Hosted ExchangeA service in the telecommunications industry whereby a provider makes a Microsoft e-mail box and space available on a server so its clients can host their data on the server.
Lotus NotesMessaging and groupware software from INM Lotus that was introduced in 1989 for OS/2 and later expanded to Windows, Mac, Unix, NetWare, As/400 and S/390. Notes provides e-mail, document sharing, workflow, group discussions and calendaring and scheduling.
Mail ServersA mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery.
Mailing ListA mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients.
Microsoft ExchangeA mail server and calendaring server developed by Microsoft.
Outlook.comA personal information manager from Microsoft, available as a part of the Microsoft office suite.
Spam FilteringA program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
TXT RecordA TXT record (short for text record) is a type of resource record in the Domain Name System (DNS) used to provide the ability to associate arbitrary text with a host or other name, such as human readable information about a server, network, data center, or other accounting information.
Visual VoicemailVisual voicemail is direct-access voicemail with a visual interface. Such an interface presents a list of messages for playback, as opposed to the sequential listening required using traditional voicemail, and may include a transcript of each message.
Emerging Technologies

Technology WordMeaning
3D PrintingThe action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
Amplified IntelligenceRefers to the effective use of information technology in augmenting human intelligence.
Artificial IntelligenceThe theory and development of computer systems able to perform asks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Artificial Intelligence for IT Operations (AIOps)Artificial Intelligence for IT Operations (AIOps) refers to multi-layered technology platforms that automate and enhance IT operations by using analytics and machine learning to analyze big data collected from various IT operations tools and devices, in order to automatically spot and react to issues in real time.
Beacon TechnologyApple's technology standard, which allows Mobile Apps to listen for signals from beacons in the physical world and react accordingly.
Chaos Group (Vray)V-Ray is a computer-generated imagery rendering software application developed by the Bulgarian company Chaos Group
Cognitive ComputingCognitive computing is the simulation of human thought processes in a computerized model.
Computer Visiona field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that a human can do.
Decision ManagerDecision Managers are business rules management systems used in finance, operations, event processing, fraud detection and more.
Deep LearningThe application to learning tasks of artificial neural networks that contain more than one hidden layer.
Digital DisruptionThe change that occurs when new digital technologies and business models affect the value proposition of existing goods and services.
Digital TwinDigital twin refers to a digital replica of physical assets (physical twin), processes and systems that can be used for various purposes. The digital representation provides both the elements and the dynamics of how an Internet of Things device operates and lives throughout its life cycle.
Disk ImagingDisk imaging refers to copying the contents of a data storage device or medium, and transferring this to another, similar medium or device.
Disruptive TechnologiesA disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.
Edge-Computing ModelA distributed information technology architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.
Emerging TechnologiesA new technology that is currently being developed, or will be developed within the next five to ten years.
Exascale ComputingRefers to computing systems capable of a least one exaFLOPS, or a billion calculations per second.
Foundry (Modo)Modo (stylized as MODO, originally modo)[3] is a polygon and subdivision surface modeling, sculpting, 3D painting, animation and rendering package developed by Luxology, LLC, which is now merged with and known as Foundry.
High Performance ComputingThe use of parallel processing for running advanced application programs efficiently, reliably and quickly.
IBM WatsonA question answering computer system capable of answering questions posed in natural language, developed in IBM's DeepQA project by a research team led by principal investigator David Ferrucci.
Image Recognitionthe ability of software to identify objects, places, people, writing and actions in images. Computers can use machine vision technologies in combination with a camera and artificial intelligence software to achieve image recognition.
Intelligent Virtual Assistants (IVA)An Intelligent Virtual Assistant is an artificial intelligence system that emulates human interaction to perform particular tasks, like customer service. Virtual Assistants are proliferating because of deep neural networks, machine learning, and other advancements in AI technologies.
Machine LearningAn application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
Maxon (Cinema 4D)CINEMA 4D is a 3D modeling, animation, motion graphic and rendering application developed by MAXON Computer GmbH in Germany.
Mixed RealityMixed reality (MR), sometimes referred to as hybrid reality, is the merging of real and virtual worlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real time. Mixed reality takes place not only in the physical world or the virtual world, but is a mix of reality and virtual reality, encompassing both augmented reality and augmented virtuality via immersive technology.
Motion ControlA sub field of automation, encompassing the systems or sub-systems involved in moving parts of machines in a controlled manner.
Motion GraphicsMotion Graphics are pieces of digital footage or animation which create the illusion of motion or rotation, and are usually combined with audio for use in multimedia projects.
Neural NetworksA computer system modeled on the human brain and nervous system.
Optical Character Recognition (OCR)The identification of printed characters using photoelectric devices and computer software.
Projection MappingAlso known as video mapping and spatial augmented reality, is a projection technology used to turn objects, often irregularly shaped, into a display surface for video projection.
Projection TechnologyAny technology used to project passages of text, maps, diagrams, and 3/d objects as well as video.
Propulsion TechnologyA means of creating force leading to movement.
Raster GraphicsA raster graphics or bitmap image is a dot matrix data structure, representing a generally rectangular grid of pixels, or points of color, viewable via a monitor, paper, or other display medium. Raster images are stored in image files with varying formats.
Realtime 3D VisualizationRealtime processing of a variety of technologies that make images and movies appear more lifelike in print, on the computer, in the cinema or on TV.
Remote Terminal UnitA remote terminal unit (RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects.
Robotic Process Automation (RPA)An emerging form of clerical process automation technology based on the notion of software robots or artificial intelligence workers.
SideFX (Houdini)Houdini is a 3D animation application software developed by Side Effects Software based in Toronto. Side Effects adapted Houdini from the PRISMS suite of procedural generation software tools. Its exclusive attention to procedural generation distinguishes it from other 3D computer graphics software.
Smart CitiesA city can be defines as smart when investments in human and social capital and traditional and modern communication infrastructure fuel sustainable economical development and a high quality of life, with a wise management of natural resources, through participatory action.
StoryboardingA storyboard is a graphic organizer in the form of illustrations or images displayed in sequence for the purpose of pre-visualizing a motion picture, animation, motion graphic or interactive media sequence.
Virtual Reality (VR)Virtual reality (VR) is a computer-generated scenario that simulates experience through senses and perception. The immersive environment can be similar to the real world or it can be fantastical, creating an experience not possible in our physical reality.
Visual Effects (VFX)Visual Effects (abbreviated VFX) is the process by which imagery is created or manipulated outside the context of a live action shot in film making.
Enterprise Applications

Technology WordMeaning
Applications ArchitectureApplications architecture or application architecture is one of several architecture domains that form the pillars of an enterprise architecture (EA).
Demand ManagementDemand management is a planning methodology used to forecast, plan for and manage the demand for products and services. This can be at macro-levels as in economics and at micro-levels within individual organizations.
Digital Process TechnologiesA base two process. Digitized information is recorded in binary code of combinations of the digits 0 and 1, also called bits, which represent words and images. Digital technology enables immense amounts of information to be compressed on small storage devices that can be easily preserved and transported.
Enterprise Agile RequirementsHow an organization can adopt an Agile approach to developing the critical applications needed to survive.
Enterprise Application IntegrationThe use of technologies and services across an enterprise to enable the integration of software applications and hardware systems.
Enterprise Application SecurityRefers to the protection of enterprise applications from external attacks, privilege abuse and data theft.
Enterprise ApplicationsA large software system platform designed to operate in a corporate environment such as a business or government.
Enterprise ArchitectureA conceptual blueprint that defines the structure and operation of an organization.
Enterprise Asset ManagementOptimal lifecycle management of the physical assets of an organization.
Enterprise CollaborationA system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public internet.
Enterprise ComputingA buzzword that refers to business oriented information technology that is critical to a company's operations.
Enterprise Information Integration / Metadata ManagementThe ability to support a unified view of data and information for an entire organization.
Enterprise Information Management (EIM)Enterprise information management (EIM) is a field of interest within information technology. It specializes in finding solutions for optimal use of information within organizations, for instance to support decision-making processes or day-to-day operations that require the availability of knowledge.
Enterprise InfrastructureA type of enterprise software or program specifically designed to help business organizations perform basic tasks such as a workforce support, business transactions and internal services and processes.
Enterprise Labeling SoftwareSoftware used to design, print and track labels.
Enterprise MobilityThe trend toward a shift in work habits, with more employees working out of the office and using mobile devices and cloud services to perform business tasks.
Enterprise Performance Management / Balanced ScorecardA strategic planning and management system that organizations use to communicate what they a re trying to accomplish, align the day-to-day work that everyone is doing with strategy, prioritize projects, products, and services, and measure and monitor progress towards strategic targets.
Enterprise Service BusImplements a communication system between mutual interacting software applications in a service oriented architecture.
Enterprise SoftwareAlso known as enterprise application software, is computer software used to satisfy the needs of an organization rather than individual users.
Enterprise Systems ManagementRefers to enterprise-wide administration of distributed systems including computer systems.
Enterprise VoiceRefers to software that provides 'internet telephone capabilities specifically designed to fit the needs of large organizations.
Enterprise WearablesElectronics that can be worn on the body, either as an accessory or as part of material used in clothing.
G SuiteG Suite is a brand of cloud computing, productivity and collaboration tools, software and products developed by Google.
Google For WorkGoogle for Work (also referred to as Google Apps for Work) was a service from Google that provides customizable enterprise versions of several Google products using a domain name provided by the customer.
Host AnalyticsA vendor that sells cloud-based corporate performance management software.
Hybrid ITAn approach to enterprise computing in which an organization provides and manages some information technology resources in-house but uses cloud-based services for others.
IBM Websphere CommerceA suite of software products used to create and integrate appliations
Industrial High-Performance ComputingOften refers to the application of HPC to engineering problems and includes computational fluid dynamics, simulation, modeling, and seismic tomography.
IT Project Portfolio ManagementThe centralized management of the processes, methods, and technologies used by it project managers and project management offices to analyze and collectively manage current or proposed projects based on numerous key characteristics.
LiferayA free and open source enterprise portal software product primarily used to power corporate intranets and extranets
Oracle Commerce PlatformAn omnichannel ecommerce platform that includes B2B and B2C modules
Oracle E-Business SuiteA group of integrated Internet-based applications from Oracle.
Oracle HCM CloudSoftware for HR functions that balance people, process and technology to improve workforce.
Oracle HyperionA comprehensive, Web-based application that delivers global financial consolidation, reporting and analysis in a single, highly scalable software solution.
Oracle WebCenterA web platform for creating intranets, extranets, composite applications, and self-service portals
Seamless IntegrationSeamless integration is the process where a new module or feature of an application or hardware is added or integrated without resulting in any discernable errors or complications.
Service CatalogThe only part of the iTIL Service portfolio published to Customers, and is used to support the sale and delivery of IT Services.
TurboTaxTurboTax is an American tax preparation software package developed by Michael A. Chipman of Chipsoft in the mid-1980s.
Unified OperationsEnd of sale and end of life products offered by Cisco.
WordPress VIPAn enterprise content management system
Events / Web Conference

Technology WordMeaning
Audience EngagementAudience Engagement during an event or conference refers to the extent to which an audience is engaged via certain methods such as interactive elements, gamifications, etc.
Event AppsEvent Apps is an app for an event intended for use by attendees.
Event Audio/VisualEvent Audio/Visual refers to the audio and visual equipment used for large ballrooms, breakout sessions, or other meetings held during an event or conference.
Event CateringBusiness of providing food service at a remote site or a site such as a hotel, public house, or other location.
Event NegotiationsEvent Negotiations refers to strategies used for negotiations items related to events and conferences.
Event PlanningIncludes budgeting, scheduling, site selection, acquiring necessary permits, coordinating transportation and parking, arranging for speakers or entertainers, etc.
Event Site SelectionEvent Site Selection is the process an organization goes through to select a destination (most often a city), and often also a venue (typically a convention center, hotel, or other meeting place) for a conference, tradeshow, or meeting.
Adobe SummitAnnual digital marketing summit hosted by Adobe
Ad-Tech ConferencesConferences focused advertising technology
Autodesk University (AU)Autodesk University (AU) includes conferences for those who design, create, and make the world around us and online learning for Autodesk users to learn about our latest innovations and industry trends.
B2B Marketing ExchangeA B2B marketing conference where over 900 marketers that consists of awards ceremonies, educational panels, and sessions all about marketing and sales
Ban-The-BoxBan the Box is the name of an international campaign by civil rights groups and advocates for ex-offenders, aimed at persuading employers to remove from their hiring applications the check box that asks if applicants have a criminal record.
Bike to Work DayBike to Work Day is an annual event held on various days in the Spring across the United States and Canada that promotes the bicycle as an option for commuting to work.
CFO SummitMonthly teleconference attended by finance executives
Consumer Electronics Show (CES)Annual trade show organized by the Consumer Technology Association
Corporate Counsel & Compliance ExchangeAllows corporate counsel and senior compliance executives with the unique opportunity to be updated on important legal and regulatory developments while networking.
CRM EvolutionA conference of the brightest and most influential people in the CRM industry involving key note speakers, workshops, and other activites to generate and expand CRM knowledge and skills
DreamforceConference put on by Salesforce, a cloud-based customer service software provider.
Enterprise Risk Management ConferenceConference focused on Enterprise Risk Management
ERE Recruiting ConferenceAnnual conference for talent acquisition leaders, organized by ERE Media
Forbes Womens SummitConference featuring women and exploring the intersection of power and passion.
Forrester EventsMeetings organized by Forrester
Gartner EventsOrganizer of tech and IT conferences for executives.
Global Finance and Credit ConferenceAnnual conference organized by Global New Beginnings
GMA Legal ConferenceAnnual Conference for consumer packaged goods professionals, organized by he Grocery Manufacturers Association (GMA)
HRO ConferenceAnnual conference for human resources professionals, organized by Human Resources Outsourcing Today Services and Technology Association
HRO ForumConference for HR executives to define the future of HR services and technology.
HubSpot INBOUNDINBOUND is a community of people who are passionate about marketing, selling, and delighting customers in an inbound way. Our annual event and year-round media platform inspire and educate hundreds of thousands of people so that they and their businesses can grow better.
i4CP ConferenceAnnual conference for human resources professionals, organized by the Institute for Corporate Productivity
IBM InterConnectAnnual conference of cloud, devops, iot, security, and other related technical professionals.
Intellectual Property Law ConferenceAnnual conference focused on intellectual property law, organized by the American Bar Association
International Association for Contract and Commercial Management (IACCM)Professional non-profit organization that aims to promote international standards for trade relationships
IQPC Telecom B2B ConferencesConference for B2B practitioners.
LegalTech ShowAnnual conference for law professionals focused on legal technology
LinkedIn Talent ConnectAnnual conference for talent professionals
Marketo Marketing Nation SummitThe Marketing Nation Summit brings together the best and brightest in digital transformation of marketing, advertising, IT, services, and beyond.
Microsoft IgniteAn annual conference for developers and IT professionals
Microsoft InspireAn annual conference held by Microsoft Corporation for its partner community
Microsoft Worldwide Partner Conference (WPC)Annual conference to connect with partners, Microsoft employees and industry experts.
MIT Sustainability SummitAnnual summit concerning sustainability challenges, organized by Massachusetts Institute of Technology students
Mobile World CongressAnnual conference focused on the mobile industry, organized by the Groupe Special Mobile Association
NASCC: The Steel ConferenceNASCC: The Steel Conference is the premier educational and networking event for the structural steel industry, bringing together structural engineers, structural steel fabricators, erectors and detailers.
Oracle Open WorldAnnual conference for business professionals, organized by Oracle
Print + ePublishing Conference (PePcon)Annual conference focusing on the digital publishing.
RSA ConferenceAnnual series of IT security conferences.
SaasStr AnnualA massive SaaS event involving workshops, CEO interviews and more.
Shop.orgShop.org is the annual e-commerce event that focuses on practical and usable insights for retail thinkers and doers.
ShoptalkShoptalk is the world's largest retail and ecommerce conference that covers the ongoing transformation of retail and the evolution of how consumers discover, shop and buy in a digital age from new technologies and business models to the latest trends in consumer behaviors, preferences and expectations.
SiriusDecisions SummitAn annual sales and marketing conference and seminar hosted by global B2B research and advisory firm SiriusDecisions since 2006 that brings together marketing, sales and product professionals and executives to discuss how alignment between their disciplines can solve business problems.
Small Business ExpoAnnual B2B conference for small business owners and entrepreneurs
Social Media Strategies SummitAnnual social media conference for digital marketing and communications professionals
Society for Human Resource Management (SHRM)Professional organization for HR professionals
South By Southwest (SXSW)Annual event where film, music, and interactive media festivals take place
SymposiumA symposium is generally defined as a meeting organized so that experts in a given field can meet, present papers, and discuss issues and trends or make recommendations for a certain course of action.
TechCrunch DisruptAnnual conference for investors and entrepreneurs, where startups launch their products
TED (Technology, Entertainment, Design)TED (Technology, Entertainment, Design) is a media organization which posts talks online for free distribution, under the slogan "ideas worth spreading".
The Crunchies AwardAward granted by technology blogs to Silicon Valley companies and associated venture capitalists
Women in Law ConferencesConferences held for female law professionals
Workforce Planning & Analytics ConferenceStrategic HR conference focusing on workforce planning, talent shortages, head count strategy and analytics.
World Business ForumAnnual international conference held for business professionals, organized by World of Business Ideas (WOBI)

Technology WordMeaning
Call Of Duty (COD)A legal term describing the necessity to carry out a job or duty, such as a police case, military assault/wartime actions, or other military or highly important jobs.
Cloud GamingCloud gaming, sometimes called gaming on demand, is a type of online gaming. Currently there are two main types of cloud gaming: cloud gaming based on video streaming and cloud gaming based on file streaming.
Computer-Aided Design (CAD)Software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
Console GamesAny game played with a console, either via TV or computer.
Game MakersGame Makers was a TV show that aired on G4 from September 4, 2003,[1] to 2006. The series followed the process of video game development, as a company attempts to finish a new video game in time for shipment.
Gaming DesignGame design is the art of applying design and aesthetics to create a game for entertainment or for educational, exercise, or experimental purposes.
Gaming SolutionsGaming Solutions are products or software used by game developers and companies to help build and design their game.
Gran TurismoA sim racing video game.
Independent GamesA video game that is created without the financial support of a publisher.
Massively Multiplayer Online GameA massively multiplayer online game (MMOG, or more commonly, MMO) is an online game with large numbers of players, typically from hundreds to thousands, on the same server.
Mobile GamingMobile Gaming is gaming on a mobile device such as a smartphone or tablet.
Online GamingAn online game is a video game that is either partially or primarily played through the Internet or any other computer network available .
PC GamesVideo games played on a personal computer rather than a dedicated video game console or arcade machine.
PlayStation VRA virtual reality headset developed by Sony Interactive Entertainment.
PlayStation VueAmerican over-the-top (OTT) Internet television service that is owned by Sony.
Smartphone and Tablet GamesA video game played on a feature phone, smartphone, smartwatch, PDA, tablet computer, portable media player or calculator.
Social and Online GamesPlaying online games that allow or require social interaction between players, as opposed to playing games in solitude.
Virtual WorldsA virtual world is a computer-based simulated environment which may be populated by many users who can create a personal avatar, and simultaneously and independently explore the virtual world, participate in its activities and communicate with others.
Hardware / Peripherals

Technology WordMeaning
4K (Display)One of the two resolutions of ultra high definition television targeted towards consumer television.
4k Media TransferTransfer of film elements that were scanned at a 4k resolution.
4K2KUltra high definition.
5K (Display)A computer monitor with 2,800 lines of resolution.
Adapter CardsAny internal expansion card that allows the computer to communicate with another peripheral such as a monitor.
AR HardwareHardware components for Augmented Reality, which includes a processor, display, sensors and input devices.
Automatic Identification and Capture (AIDC)Refers to the methods of automatically identifying objects, collecting data about them, and entering them directly into computer systems, without human involvement.
Backward CompatibleBackward compatible refers to a hardware or software system that can use the interface of an older version of the same product.
BridgeA bridge is a device that connects two local-area networks (LANs), or two segments of the same LAN.
Cable AssembliesA cable assembly is a group of cables or wires that are arranged into a single unit. Cable assemblies are often used for transmitting power or informational signals and provide the power of several individual cables and organize them in an easier to install package that is also easier to replace and maintain.
Circuit DesignCan cover systems ranging from complex electronic systems all the way down to the individual transistors within an integrated circuit.
Compute ModuleA computer module is a selection of independent electronic circuits packaged onto a circuit board to provide a basic function within a computer. An example might be an inverter or flip-flop, which would require two or more transistors and a small number of additional supporting devices.
Conference PhonesA Conference Phone is a telephone device used in conference calls.
CoprocessorA coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). Operations performed by the coprocessor may be floating point arithmetic, graphics, signal processing, string processing, encryption or I/O Interfacing with peripheral devices.
Curved MonitorA model of display technology that features three-dimensional screens instead of two-dimensional screens.
Cyclic Redundancy Check (CRC)A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
Desk PhoneA desk phone is a phone located on desk and used by employees in organization.
Digital Versatile Disc (DVD)DVD (an abbreviation of "digital video disc" or "digital versatile disc") is a digital optical disc storage format invented and developed by Philips and Sony in 1995. The medium can store any kind of digital data and is widely used for software and other computer files as well as video programs watched using DVD players.
DisplayPortDisplayPort is a digital display interface developed by a consortium of PC and chip manufacturers and standardized by the Video Electronics Standards Association.
Double Data Rate (DDR)DDR refers refers to a data transfer method where the data transfers on both the rising and falling edges of the clock signal (double data rate)
Dual MonitorsTwo monitors on the same computer.
eCardE-card is similar to a postcard or greeting card, with the primary difference being that it is created using digital media instead of paper or other traditional materials.
Eco-Friendly PrintersInvolves the use of low-VCO inks, recycled paper, energy-efficient computers and equipment, remanufactured laser toner cartridges and ink cartridges for printers, paperless information dissemination, attempts to educate the public on green printing.
Electronic Benefits Transfer (EBT)Electronic benefit transfer (EBT) is an electronic system that allows state welfare departments to issue benefits via a magnetically encoded payment card, used in the United States.
Electronic ComponentAn electronic component is any basic discrete device or physical entity in an electronic system used to affect electrons or their associated fields.
Electronic Logging Device (ELD)Electronic Logging Device (ELD or E-Log) is electronic hardware that is attached to a commercial motor vehicle engine to record driving hours. The driving hours of commercial drivers (truck and bus drivers) are regulated by a set of rules known as the hours of service (HOS).
Electronic Numerical Integrator and Calculator (ENIAC)ENIAC (Electronic Numerical Integrator and Computer) was amongst the earliest electronic general-purpose computers made. It was Turing-complete, digital and able to solve "a large class of numerical problems" through reprogramming.
EreaderEreader is a handheld device on which electronic versions of books, newspapers, magazines, etc., can be read.
GPU ClustersA computer cluster in which each node is equipped with a Graphics Processing Unit.
Graphics Processing Unit (GPU)A graphics processing unit (GPU) is a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.
Hard DrivesA high capacity, self constrained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit/
HardwareThe machines, wiring, and other physical components of a computer or other electronic system.
Hardware EngineeringA person involved with the design, implementation and testing of hardware.
Hardware FailuresA malfunction within the electronic circuits or electomechanical components of a computer system.
Hardware InfrastructureRefers to an enterprise's entire collection of hardware, software, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services.
Hardware InnovationHardware Innovation can be defined as any new idea or development concept related to hardware that advances or improves on existing hardware.
Hardware ResourcesThe assignable, addressable bus paths that allow peripheral devices and system processors to communicate with each other.
Hardware/PeripheralsA peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way.
HDMI (High-Definition Multimedia Interface)HDMI (High-Definition Multimedia Interface) is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
HubA hub is the most basic networking device that connects multiple-computers or other network devices together. Unlike a network switch or router, a network hub has no routing tables or intelligence on where to send information and broadcasts all network data across each connection.
Hybrid ComputerComputers that exhibit features of analog computers and digital computers.
InductorAn Inductor, also called a coil, choke or reactor, is a passive two-terminal electrical component that stores energy in a magnetic field when electric current flows through it.
Industrial ComputerAn industrial PC is an x86 PC-based computing platform for industrial applications.
In-Plane Switching (IPS)A screen technology for liquid crystal displays (LCDs).
Intel JouleIntel Joule is a high performance system-on-module (SOM) in a tiny, low-power package thus making it ideal for computer vision, robotics, drones, industrial IoT, VR, AR, micro-servers and other applications that require high-end edge computing.
Interactive ProjectorA large interactive display in the form factor of a whiteboard.
Interactive WhiteboardsA computer driven device, allowing users to access and manipulate electronic files by means of a projector
Large-Format DisplayMost are either LED, LCD or Plasma and can be used to display television through the HDMI cable, digital signage, welcome boards and messages.
LED DisplaysA flat panel display, which uses an array of light-emitting diodes as pixels for a video display.
Limit SwitchA limit switch is an electromechanical device that consists of an actuator mechanically linked to a set of contacts. When an object comes into contact with the actuator, the device operates the contacts to make or break an electrical connection.
Load BalancerA load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of. servers.
MainframesA large high-speed computer, especially one supporting numerous workstations or peripherals.
Mobile ProjectorA handheld projector is technology that applies the use of an image projector in a handheld device.
MonitorsComputer screen or display.
MotherboardThe motherboard is a computer's central communications backbone connectivity point, through which all components and external peripherals connect.
Multi-Function PrintingAn office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting.
Multimedia MonitorA monitor that contains built-in speakers and a camera.
Multi-Touch DisplaysA method of input on a touchscreen that allows two or more fingers to be used on the screen at one time.
Office PrintersA device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper.
OLED DisplayA display technology that offers bright, colorful images with a wide viewing angle, low power, high contrast ratio and fast response time for sports and action movies.
Optical DrivesUses laser light to read data from or write data to an optical disc.
Passive ComponentsPassive Components are electronic components that do not require a source of energy to perform their intended functions.
Peripheral Component Interconnect (PCI) ExpressA serial expansion bus standard for connecting a computer to one or more peripheral devices.
Position SensorsA Position Sensor is any device that permits position measurement.
Power CableA power cable is an electrical cable, an assembly of one or more electrical conductors, usually held together with an overall sheath. The assembly is used for transmission of electrical power.
Power ConnectorsPower Connectors have been engineered to connect power in applications that include home appliances, satellites, and even equipment that sits on the ocean floor.
Pressure SensorsA Pressure Sensor is a device for pressure measurement of gases or liquids.
PrintersA machine for printing text or pictures onto paper, especially one linked to a computer.
Printing SolutionsSoftware used to maximize and optimize printing efficiency in large or complex organizations.
Processing EquipmentEquipment required when using physical or chemical methods for mechanical and/or thermal treatment or processing of a raw material or product.
ProcessorsAnother term for central processing unit.
ProjectorAn object that is used to project rays of light, especially an apparatus with a system of lenses for projecting slides or film onto a screen.
Public Address System (PA system)A sound amplification system used to allow a person or persons to address an audience at a greater volume than would be possible or practicable without such a system.
Quantum ComputingIs an area of study focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum level.
Raspberry PiThe Raspberry Pi is a series of small single-board computers developed in the United Kingdom by the Raspberry Pi Foundation to promote the teaching of basic computer science in schools and in developing countries.
Reduced Instruction Set Computer (RISC)The clock rate of a CPU is limited by the time it takes to execute the slowest sub-operation of any instruction; decreasing that cycle-time often accelerates the execution of other instructions. The focus on "reduced instructions" led to the resulting machine being called a "reduced instruction set computer" (RISC).
RelaysRelays are switches that open and close circuits electromechanically or electronically. Relays control one electrical circuit by opening and closing contacts in another circuit.
ResistorsA Resistor is a passive two-terminal electrical component that implements electrical resistance as a circuit element.
RFIDA technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person.
Rotary EncodersA Rotary Encoder, also called a shaft encoder, is an electro-mechanical device that converts the angular position or motion of a shaft or axle to analog or digital output signals.
ScannerA scanner is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.Scanners come in hand-held, feed-in, and flatbed types and for scanning black-and-white only, or color.
Serial ATA (SATA)Serial ATA (SATA) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
Set-Top Box (STB)A set-top box is a hardware device that allows a digital signal to be received, decoded and displayed on a television.
Single-Board Computer (SBC)A single-board computer (SBC) is a complete computer built on a single circuit board, with microprocessor(s), memory, input/output (I/O) and other features required of a functional computer.
Smart BoardAn interactive whiteboard that uses touch detection for user input (for example scrolling and right mouse-click) in the same way as normal PC input devices.
Smart CardsA plastic card with a built-in microprocessor, used typically for electronic processes such as financial transactions and person identification.
SupercomputingA particularly powerful mainframe computer.
Switched-Mode Power Supply (SMPS)A switched-mode power supply (SMPS) is an electronic circuit that converts power using switching devices that are turned on and off at high frequencies, and storage components such as inductors or capacitors to supply power when the switching device is in its non-conduction state.
System On a Chip (SoC)A system on a chip or system on chip (SoC or SOC) is an integrated circuit (also known as an "IC" or "chip") that integrates all components of a computer or other electronic systems.
System-on-Module (SoM)A system on a module (SOM) is a board-level circuit that integrates a system function in a single module.'
Torque SensorsA Torque Sensor is a transducer that converts a torsional mechanical input into an electrical output signal.
Touch MonitorA computer display screen that is also an input device.
Touch OverlayA clear touch panel that allows the user to command the computer by touching displayed buttons on screen.
Touch Screen MonitorAn input and output device normally layered on the top of an electronic visual display of an information processing system.
TransformersA Transformer is a static electrical device that transfers electrical energy between two or more circuits through electromagnetic induction.
Transparent DisplaysTransparent OLED is a breakthrough transparent display technology that displays dynamic or interactive information on a transparent surface glass.
Transparent LCDA flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals.
TricorderA tricorder is a multifunction hand-held device used for sensor (environment) scanning, data analysis, and recording data.
Ultrasonic SensorsUltrasonic transducers or ultrasonic sensors are a type of acoustic sensor divided into three broad categories: transmitters, receivers and transceivers.
Used HardwareHardware piece or complete setups that have preciously been used.
Vibration SensorsVibration Sensors are sensors for measuring, displaying, and analyzing linear velocity, displacement and proximity, or acceleration.
vPro ChipvPro hardware is found in a device's CPU or chipset as well as in its wireless connectivity chips.
WebcamA webcam is a video camera that feeds or streams its image in real time to or through a computer to a computer network.
Wire HarnessingWire Harnessing also known as cable harnessing is basically an assembly of wires which transmit electric signals. These wires are clipped together by ties, laces, tape or a conduit strung together or in a combination thereof.
WorkstationsA desktop computer terminal, typically networked and more powerful than a personal computer.
Health Tech

Technology WordMeaning
Advanced VisualizationGeneral term that describes any effort to help people understand the significance of data by placing it in a visual context.
Appointment ManagementA software system that helps keep track of and make appointments.
Bedside TechnologyLaboratory and other services provided to patients at the bedside including diagnostic and laboratory testing using automated information entry systems.
Clinical Decision Support (CDS)Provides clinicians, staff, patients, or other individuals with knowledge and person-specific information, intelligently filtered or presented at appropriate times, to enhance health and health care.
Clinical Trial Management System (CTMS)A Clinical Trial Management System (CTMS) is a software system used by biotechnology and pharmaceutical industries to manage clinical trials in clinical research. The system maintains and manages planning, performing and reporting functions, along with participant contact information, tracking deadlines and milestones.
Computer-Assisted Coding (CAC)Software that analyzes healthcare documents and produces appropriate medical codes for specific phrases and terms within the document.
Computerized Physician Order Entry (CPOE)The process of a medical professional entering medication orders or other physician instructions electronically instead of on paper charts.
Contract Research Organization (CRO)A contract research organization (CRO) is an organization that provides support to the pharmaceutical, biotechnology, and medical device industries in the form of research services outsourced on a contract basis.
DatamonitorIndependent group of experts who monitor patient safety and treatment efficacy data while a clinical trial is ongoing.
Decision Support SystemsA set of related computer programs and the data require to assist with analysis and decision-making within an organization.
e-FormsA computer program version of a paper form.
e-HealthHealthcare practice supported by electronic processes and communication.
ElastographyMedical imaging modality that maps the elastic properties of soft tissue.
Electrocardiography (EKG)A test that checks for problems with the electrical activity of a heart.
Electroencephalography (EEG)A test that detects electrical activity in your brain using small flat metal discs attached to your scalp.
Electronic Common Technical Document (eCTD)The electronic common technical document (eCTD) is an interface and international specification for the pharmaceutical industry to agency transfer of regulatory information.
Electronic Data Capture (EDC)An electronic data capture (EDC) system is a computerized system designed for the collection of clinical data in electronic format for use mainly in human clinical trials. EDC replaces the traditional paper-based data collection methodology to streamline data collection and expedite the time to market for drugs and medical devices.
Electronic Health Record (EHR)Electronic version of a patients medical history, that is maintained by the provider over time, and may include all of the key administrative clinical data relevant to that persons care under a particular provider, including demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports.
Electronic Health Record (EHR) ReplacementThe electronic replacement of paper charts, is the record of patient health information generated by encounters at one particular provider.
Electronic Medical Records (EMR)A digital version of the traditional paper-based medical record for an individual.
Electronic Prescriptions for Controlled Substances (EPCS)Electronic prescriptions for controlled substances, also known as EPCS is a technology solution to help address the problem of prescription drug abuse in the United States. The rule Electronic Prescriptions for Controlled Substances, provides practitioners with the option of writing and transmitting prescriptions for controlled substances electronically. The regulations also permit pharmacies to receive, dispense, and archive these electronic prescriptions.
Electronic Trial Master File (eTMF)An electronic trial master file (eTMF) is a trial master file in electronic (digital content) format. It is a type of content management system for the pharmaceutical industry, providing a formalized means of organizing and storing documents, images, and other digital content for pharmaceutical clinical trials that may be required for compliance with government regulatory agencies.
EndoscopyA procedure in which an instrument is introduced into the body to give a view of its internal parts.
Enterprise Master Patient Index (EMPI)An Enterprise Master Patient Index is a database that is used across a healthcare organization to maintain consistent, accurate and current demographic and essential medical data on the patients seen and managed within its various departments.
e-PrescribingA technology framework that allows physicians and other medical practitioners to write and send prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
FluoroscopyAn imaging technique that uses x-rays to obtain real-time moving images of the interior of an object.
Good Clinical Practice (GCP)Good clinical practice (GCP) is an international quality standard that is provided by ICH, an international body that defines a set of standards, which governments can then transpose into regulations for clinical trials involving human subjects.
Health Information Exchange (HIE)The mobilization of health care information electorically across organizations within a region, community or hospital system.
Health IT ConsultingManagement analysts employed by the healthcare industry.
Healthcare Big DataRefers to electronic health data sets so large and complex that they are difficult or impossible to manage with traditional software and/or hardware; nor can they be easily managed with traditional or common data management tools and methods.
Healthcare InteroperabilityThe ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.
Healthcare PagersA Healthcare pager is used by either medical patients or staff members to page medical staff members.
HL 7 InterfaceRefers to a set of international standards for transfer of clinical and administrative data between software applications used by various healthcare providers.
ICD-10The 10th revision of the International Statistical Classification of Diseases and Related Health Problems, a medical classification list by the World Health Organization.
ICD-10 ConversionThe ICD-9 to ICD-10 conversion is mandated by the US government's Department of Health and Human Services.
In Vitro Diagnostics (IVD)In vitro diagnostic products are those reagents, instruments, and systems intended for use in diagnosis of disease or other conditions, including a determination of the state of health, in order to cure, mitigate, treat, or prevent disease or its sequelae.
MagnetoencephalographyA functional neuroimaging technique for mapping brain activity by recording magnetic fields produced by electrical currents occurring naturally in the brain, using very sensitive magnetometers.
Medical DevicesMedical machine, contrivance, implant, in vitro reagent, or other similar or related article, including a component part, or accessory tat is: Recognized in the official National Formulary, or the US Pharmacopoeia, or any supplement to them.
Medical EquipmentMedical equipment (also known as armamentarium) is designed to aid in the diagnosis, monitoring or treatment of medical conditions.
Medical Image Sharing / ExchangeA term for the electronic exchange of medical images between hospitals, physicians and patients.
Medical ImagingThe technique and process of creating visual representations of the interior of a body for clinical analysis and medical intervention, as well as visual representation of the function of some organs or tissues.
Medical TechnologyEncompasses a wide range of healthcare products and is used to diagnose, monitor or treat diseases or medical conditions affecting humans.
Mobile Health (mHealth)A general term for the use of mobile phones and other wireless technology in medical care.
MRI (Magnetic Resonance Imaging)A technique that uses a magnetic field and radio waves to create detailed images of the organs and tissues within your body.
Nuclear MedicineThe branch of medicine that deals with the use of radioactive substances in research, diagnosis, and treatment.
Oracle Health LifesciencesTechnology that optimizes clinical R&D, mitigates risk, advances healthcare, and improves patient outcomes.
PACS / Radiology / Enterprise ImageA computer network for digitized radiologic images and reports.
Patient AdministrationDeveloped out of the automation of administrative paperwork in healthcare organizations, particularly hospitals, and are one of the core components of a hospital's IT infrastructure.
Patient DataData relating to a single patient, such as his/her diagnosis, name, age, earlier medical history etc.
Patient PortalsA secure online website that gives patients convenient 24-hour access to personal health information from anywhere with an Internet connection.
PET (Positron Emission Tomography)An imaging test that helps reveal how your tissues and organs are functioning.
Pharmacy Management SystemsDelivers care to patients, manages operations, and creates insight into your data.
Picture Archiving Communication Systems (PACS)A medical imaging technology which provides economical storage and convenient access to images from multiple modalities.
Quality Management System (QMS)A quality management system (QMS) is a collection of business processes focused on consistently meeting customer requirements and enhancing their satisfaction. It is aligned with an organization's purpose and strategic direction (ISO9001:2015).
Radiological Information System (RIS)A networked software system for managing medical imagery and associated data.
Revenue Cycle AnalyticsSoftware that gives hospitals strategic and analytical insights to improve business performance.
Risk-based MonitoringRisk-based monitoring is the process of ensuring the quality of clinical trials by identifying, assessing, monitoring and mitigating the risks that could affect the quality or safety of a study.
SPECT (Single-Photon Emission Computed Tomography)A nuclear medicine tomographic imaging technique using gamma rays. 
Standard Operating Procedure (SOP)A standard operating procedure, or SOP, is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations.
TeledermatologyTeledermatology is a subspecialty of dermatology and probably among the most popular applications of e-health and telemedicine. In this field, telecommuncation technologies are being used to transfer medical information over varying distances through audio, visual and data communication.
TelehealthThe provision of healthcare remotely by means of telecommunications technology.
TelemedicineThe remote diagnosis and treatment of patients by means of telecommunications technology.
TelepsychiatryTelepsychiatry is the application of telemedicine to the specialty field of psychiatry. The term typically describes the delivery of psychiatric assessment and care through telecommunications technology, usually videoconferencing.
TeleradiologyThe transmission of radiological patient images, such as x-rays
TelestrokeTelestroke, also called telestroke services, is an approach to treating vascular strokes that allows a neurologist to provide remote treatment for a stroke victim.
UltrasonographyA technique using echoes of ultrasound pulses to delineate objects or areas of different density in the body.
Vendor Neutral Archive (VNA)A medical imaging technology in which images and documents are stored in a standard format with a standard interface, such that they can be accessed in a vendor-neutral manner by other systems.
Virtual HospitalsVirtual Hospitals are telehealth centers for delivering digital provider consultations and remote patient monitoring
Wireless HealthThe integration of wireless technology into traditional medicine, such as diagnosis, monitoring and treatment of illness, as well as other tools that can help individuals improve their personal health and wellbeing.
X-Ray CT (X-Ray Computed Tomography)Uses x-rays to create cross-sections of a physical object that can be used to recreate a virtual model without destroying the original object.
IT Application Development / Management

Technology WordMeaning
Application AccelerationUses a number of technologies to improve application performance and response time over network connections.
Application ManagementA combination of the provision of services for application and support for the application systems throughout their entire lifecycle.
Application OffboardingApplication Offboarding is the process of revoking application access to users, most commonly former employees or contractors.
Application OnboardingApplication Onboarding is the process of granting application access to new users.
Application Performance Monitoring (APM)The monitoring and management of performance and availability of software applications.
Atos (ATOS)A European IT services corporation with its headquarters in Bezons, France and offices worldwide.
Bi-Modal ITThe practice of managing two separate, coherent modes of IT delivery, one focused on stability and the other on agility.
Business ContinuityDefined as the capability of the organization to continue delivery of products or services at acceptable predefined levels following a disruptive incident.
Business Relationship Management (BRM)Business relationship management (BRM) is a formal approach to understanding, defining, and supporting inter-business activities related to business networking.
Change and Release ManagementThe process of managing, planning, scheduling and controlling a software build through different stages and environments; including testing and deploying software 
Charge BackAn act of policy of allocating the cost of an organization's centrally located resources
Choice ArchitectureChoice architecture is the design of different ways in which choices can be presented to consumers, and the impact of that presentation on consumer decision-making.
Cognizant (CTSH)An accounting strategy that applies the costs of IT services, hardware or software to the business unit in which they are used.
ComputacenterEurope's leading independent provider of IT infrastructure services, enabling users and their business.
Continuous AvailabilityAn approach to computer system and application design that protects users against downtime, whatever the cause and ensures that users remain connected to their documents, data files and business applications.
Database as a Service (DBaaS)A cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance.
Deployment OptionsThe general deployment process consists of several interrelated activities with possible transitions between them.
Disparate SystemsA disparate system or a disparate data system is a computer data processing system that was designed to operate as a fundamentally distinct data processing system without exchanging data or interacting with other computer data processing systems.
Domain ExpertiseA domain expert is a person with special knowledge or skills in a particular area of endeavor. An accountant is an expert in the domain of accountancy, for example. The development of accounting software requires knowledge in two different domains, namely accounting and software.
DowntimeThe total period that a service or component is not operational within an agreed service time.
ELK StackAn end-to-end stack that delivers actionable insights in real time from almost any type of structured and unstructured data source.
Email ManagementA specific field of communications management for managing high volumes of inbound electronic mail received by organizations.
Event ManagementEvent Management is the process that monitors all events that occur through the IT infrastructure.
Global Website PerformanceA tool that allows you to optimize website performance.
Hybrid IT EnvironmentsAn environment the has an approach to enterprise computing in which an organization provides and manages some information technology resources in-house but uses cloud-based services for others.
Incident and Problem ManagementThe primary objectives of problem management are to prevent problems and resulting incidents from happening, to eliminate recurring incidents, and to minimize the impact of incidents that cannot be prevented.
Infrastructure MonitoringComposed of physical and virtual resources that support the flow, storage, processing and analysis of data.
Infrastructure ProvisioningThe enterprise-wide configuration, deployment and management of multiple types of IT system resources.
InnovationA combination of the management of innovation processes, and change management.
Integration Platform as a Service (iPaaS)Integration Platform as a Service (iPaaS) is a suite of cloud services enabling development, execution and governance of integration flows connecting any combination of on premises and cloud-based processes, services, applications and data within individual or across multiple organizations.
International Data CorporationA Chinese owned provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets.
IT Asset ManagementThe set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment.
IT CareersThe study, design, development, application, implementation, support or management of computer-based information systems.
IT ConsultingA field of activity focused on advising organizations on how best to use information technology in achieving their goals.
IT Cost ManagementThe process of planning and controlling the budget of the information technology department of a business.
IT EfficiencyAllows for faster processing of data, easier retrieval of information, and in some cases- automation can reduce or replace physical employees.
IT IndustryThe application of computers to store, study, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.
IT InfrastructureRefers to an enterprise's entire collection of hardware, software, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services.
IT LeadershipThe group of senior executives in an organization responsible for the information technology infrastructure and applications that enable and drive the overarching business strategy and goals.
IT ManagementThe process whereby all resources related to information technology are managed according to an organization's priorities and needs.
IT OperationsThe set of all processes and services that are both provisioned by an it staff to their internal or external clients and used by themselves, to run themselves as a business.
IT Operations ManagementResponsible for smooth functioning of the infrastructure and operational environments that support application deployment to internal and external customers, including the network infrastructure; server and device management; computer operations; IT infrastructure and library management.
IT OptimizationAn enterprise software product category focused on helping businesses ensure that every dollar invested in information technology, every resource allocated, and every application in development or production meets business goals.
IT OutsourcingA company's outsourcing of computer or internet related work.
IT Portfolio ManagementThe application of systematic management to the investments, projects and activities of enterprise Information Technology departments.
IT process automation (ITPA)IT process automation (ITPA), also known as run book automation (RBA), is the automation of an IT task through the orchestration and integration of tools, people and process through a single workflow.
IT Service ManagementRefers to the entirety of activities directed by policies, organized and structured in processes and supporting procedures that are performed by an organization to plan, design, deliver, operate and control information technology services offered to customers.
IT Service Optimization (ITSO)A creation of IBM and its Lotus and Tivoli subsidiaries, provides information technology professionals and customers with technical information, assistance, guidance, and training.
IT SpendingThe amount of money spent on an organization's information technology systems and services, including compensation for IT professionals and expenses related to the construction and maintenance of enterprise-wide systems and services.
IT StrategyTypically a long-term action plan for achieving a goal, set in the context of a rapidly changing technology environment.
IT TransformationA complete overhaul of an organization's information technology systems.
ITILA set of detailed practices for IT service management that focuses on aligning IT services with the needs of business.
Load TestingThe process of putting demand on a software system or computing device and measuring its response.
Log ManagementThe collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
Managed ServicesThe practice of outsourcing on a proactive basis management responsibilities and functions and a strategic method for improving operations and cutting expenses.
Microsoft TechNetAn online resource site and web portal that includes free training resources and troubleshooting help for IT professionals.
Mobile Application ManagementDescribes software and services responsible for provisioning and controlling access to internally developed and commercially available mobile apps used in business settings on both company-provided and bring your own smartphones and tablet computers.
Offshore Software R&DOffshore Software R&D is the provision of software development services by a supplier (whether external or internal) located in a different country from the one where the software will be used.
On-Premise ApplicationsIs installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud.
RabbitMQA message-queueing software called a message broker or queue manager.
Recovery Time Objective (RTO)The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.
Routing and SwitchingA device that combines the functions of a switch, which forwards data by looking at a physical device address, and a router, which forwards packets by locating a next hop address.
SaaS Operations ManagementSaaS Operations Management is automating the operational administration and security tasks that an IT department needs to do to keep their SaaS applications running effectively and securely
Service DeliveryA set of principles, standards, policies and constraints to be used to guide the designs, development, deployment, operation and retirement of services delivered by a service provider with a view to offering a consistent service experience to a specific user community in a specific context.
Smarter ComputingInnovation resources from IBM.
Software ComplianceAn important sub-set of software asset management and component of corporate risk management.
Software Development OutsourcingOutsourcing is a practice in which an individual or company performs tasks, provides services or manufactures products for another company -- functions that could have been or is usually done in-house.
Software LicensingA legal instrument governing the use or redistribution of software.
Software Version ManagementA component of software configuration management, version control, also known as revision control or source control, is the management of changes to documents, computer programs, large web sites, and other collections of information.
SustainabilityThe ability to be maintained at a certain rate or level.
Sustainability ReportingA sustainability report is an organizational report that gives information about economic, environmental, social and governance performance.
Sustainable ITA principle that embraces a range of policies, procedures, programs, and attitudes that run the length and breadth of any use of information technologies.
System ArchitectureA system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviors of the system.
System Management SoftwareSoftware that manages computer systems in an enterprise, which may include any and all of the following functions: software distribution and upgrading, user profile management, version control, backup and recovery, printer spooling, job scheduling, virus protection and performance and capacity planning.
Systems ManagementRefers to enterprise-wide administration of distributed systems including computer systems.
Technical Support (Tech Support)Technical Support (Tech Support) refers to a plethora of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other informatic, electronic or mechanical goods.
Technology Design & ArchitectureTechnology Design and Architecture is the process of development of IT specifications, models, and guidelines within a coherent IT architecture framework, following both formal and informal IT solution, enterprise, and infrastructure architecture processes.
Technology StackA technology stack is a combination of software products and programming languages used to create a web or mobile application. Applications have two software components: client-side and server-side, also known as front-end and back-end.
User ManagementUser management describes the ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks, SaaS services, and more. User management is a core part to any directory service and is a basic security essential for any organization.
Virtual CollaborationVirtual collaboration is the method of collaboration between virtual team members that is carried out via technology-mediated communication. Virtual collaboration follows the same process as collaboration, but the parties involved in virtual collaboration do not physically interact and communicate exclusively through technological channels.
Virtualization ManagementThe process of overseeing and administering the operations and process of a virtualization environment.
Visual SolutionsSoftware that used a project file to display the project contents and settings.
Website PerformanceRefers to the speed in which web pages are downloaded and displayed on the user's web browser.
Windows Deployment ServicesA server technology from Microsoft for network-based installation of Windows operating systems. It is the successor to Remote Installation Services.
Windows Management Instrumentation (WMI)Consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.
Messaging / Communications

Technology WordMeaning
Amazon ChimeAmazon Chime is a secure, real-time, unified communications service that runs on AWS cloud.
Amazon Simple Notification Service (SNS)Amazon Simple Notification Service (SNS) is a notification service provided as part of Amazon Web Services. It provides a low-cost infrastructure for the mass delivery of messages, predominantly to mobile users.
Apache ActiveMQApache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server.
Audio ConferencingAn audio communications session among three or more people who are geographically dispersed.
ChatbotA chatbot is an artificial intelligence (AI) program that simulates interactive human conversation by using key pre-calculated user phrases and auditory or text-based signals.
Content SharingRefers to the strategic distribution of webpage and blog content across relevant social media such as Facebook, Twitter, LinkedIN and Google +.
Effective CommunicationAn Effective Communication is a communication between two or more persons wherein the intended message is successfully delivered, received and understood.
Instant MessagingAn electronic message sent in real time via the Internet and therefore immediately available for display on the recipient's screen.
Instant Payment Notification (IPN)Instant payment notification (IPN) is a method for online retailers to automatically track purchases and other server-to-server communication in real time.
Integrated MessagingA business term describing the integration of different electronic messaging and communications media technologies into a single interface, accessible from a variety of different devices.
Join.meA web based collaboration software application for screen-sharing and online meetings.
MangoAppsA service that provides real-time messaging.
Messaging SolutionsSofware or products that provide email, voicemail, instant messaging and other communication needs.
Microsoft LyncMicrosoft's system for unified communications in the enterprise.
PowWowNowPowwownow is an international conference call and web conferencing service.
Presentation SharingCloud-based platform where you can login and create presentations in the cloud and present and share.
Rich Communication Services (RCS)Rich Communication Services (RCS) is a communication protocol between mobile-telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling (for service discovery), and transmit in-call multimedia.
Salesforce ChatterAn enterprise collaboration platform from Salesforce, a cloud-based customer relationship management vendor.
Secure Instant MessagingAn informal means for computer users to exchange messages commonly referred to as chats.
Skype for BusinessA unified communications platform that integrates common channels of business communication and online meetings, including instant messaging, presence, voice over IP, voicemail, file transfers, video conferencing, and web conferencing.
SlackReal time messaging, file sharing and search.
Video ConferencingTelecommunication in the form of a videoconference.
Web ConferencingAn online service by which you can hold live meetings, conferencing, presentations and training via the internet particularly on TCP/IP connections.
WebcastingTo broadcast an event on the Internet.
WebExAy that provides on-demand collaboration, online meeting, web conferencing and videoconferencing applications.
WebinarsA seminar conducted over the Internet.
Mobile / Smartphones

Technology WordMeaning
Android Push NotificationsAn Android push notification is a message delivered to applications on an Android device.
App Analytics CompaniesApp Analytics Companies are organizations that offer products or services for evaluating mobile app performance or engagement.
App DevelopmentA term used to denote the act or process by which application software is developed for mobile devices, such as a personal digital assistant, enterprise digital assistant, or mobile phone.
App OptimizationApp Optimization focuses on improving the mobile performance of an app by reducing power consumption or disabling the app when not in use.
Bring Your Own Device (BYOD)Refers to the policy of permitting employees to bring personally owned devices to their workplace, and to use those devices to access privileged company information and applications.
Call AnalyticsCall Analytics is used to refer to the measurement, collection, analysis and reporting of phone call data.
Constant Bit Rate Service (CBR)The rate at which a codec's output data should be consumed is constant.
GeofencingThe use of GPS or RFID technology to create a virtual geographic boundary, enabling software to trigger a response when a mobile device enters or leaves a particular area
Google Cloud Messaging (GCM)Google Cloud Messaging (commonly referred to as GCM) is a mobile notification service developed by Google that enables third-party application developers to send notification data or information from developer-run servers to applications that target the Google Android Operating System, as well as applications or extensions developed for the Google Chrome internet browser.
Huawei PhonesHuawei Phones are mobile phones created by Chinese brand Huawei.
Mobile / WirelessTransmission over the air from a base station to a moving cellphone, tablet or laptop.
Mobile 2.0Mobile 2.0,refers to a perceived next generation of mobile internet services that leverage the social web, or what some call Web 2.0.
Mobile ComputingA technology that allows transmission of data, voice, and video via a computer
Mobile Device ManagementAn industry term for the administration of mobile devices, such as a smartphones, tablet computers, laptops and desktop computers.
Mobile Field Sales / Wireless ConnectivitySelling activities that take place over mobile devices or wireless devices.
Mobile IntegrationA form of fixed-mobile convergence that provides integration between communications carriers and enterprise networks.
Mobile OptimizationMobile optimization is the process of ensuring that visitors accessing your website from mobile devices have an engaging and user-friendly experience that's been optimized for that specific device.
Mobile PaymentsGenerally refers to payment services operated under financial regulation and performed from or via a mobile device.
Mobile PushThe delivery of information from a software application to a computing device without a specific request from the client.
Mobile SecurityThe protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
Mobile Security ManagementThe protection of smartphones, tablets, laptops, and their portable computing devices, and the networks they connect to, from threat and vulnerabilities associated with wireless computing.
Mobile TechnologyThe technology used for cellular communication.
Mobile WalletA Mobile Wallet is a virtual wallet that stores payment card information on a mobile device. Mobile wallets are a convenient way for a user to make in-store payments and can be used at merchants listed with the mobile wallet service provider.
Mobile WorkersRequire a responsive support staff at the central office.
Mobility ManagementMobility management is one of the major functions of a GSM or a UMTS network that allows mobile phones to work. The aim of mobility management is to track where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them.
Rich Push NotificationsRich Push Notifications are push notifications with rich media such as images or videos.
SafaricomA leading network operator in Kenya.
Smart DevicesAn electronic device, generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously.
Mobile Marketing

Technology WordMeaning
App Store Optimization (ASO)The process of improving the visibility of a mobile app (such as an iPhone, iPad, Android, BlackBerry or Windows Phoneapp) in an app store (such as iTunes for iOS, Google Play for Android, Windows Store for Windows Phone or BlackBerry World for BlackBerry).
Cost Per Install (CPI)Cost per install, or CPI, is a pricing model used in mobile user acquisition campaigns in which app advertisers pay each time a user installs their app from their ad.
Facebook Mobile AdsFacebook Mobile Ads are advertisements that appear within the Facebook Mobile App.
In-App AdvertisingIn-App Advertising refers to the display off ads within a mobile app.
In-App MessagingMessages delivered to a user while they are actively using a mobile app
iOS App MarketingiOS App Marketing refers to the strategies used to promot an app that can be used on an iOS device.
Mobile AdvertisingMobile advertising is a form of advertising via mobile phones or other mobile devices. It is a subset of mobile marketing.
Mobile App Advertising PerformanceMobile App Advertising Performance refers to measuring the performance of an advertising campaign that was deployed to mobile devices.
Mobile App AnalyticsMobile App Analytics are measurements such as user engagement or app downloads.
Mobile App AutomationMobile App Automation refers to the process and tools used for automating testing on mobile apps.
Mobile App ConversionMobile App Conversion is the rate at which users visiting a site via a mobile device become paying customers.
Mobile App InboxA Mobile App Inbox is a repository in a mobile app that accepts incoming messages.
Mobile App RetargetingMobile App Retargeting is a form of advertising that lets mobile app marketers send relevant messages to their customers while they are using other mobile apps or mobile websites.
Mobile App User ExperienceMobile App UX is the experience a user has while interacting with a mobile app.
Mobile App User InterfaceA Mobile App UI is a tool used to interact with applications on a mobile device.
Mobile Application PerformanceMobile Application Performance is measuring various metrics of an app such as start up time, responsiveness, and memory management.
Mobile Audience TargetingMobile Audience Targeting is targeting a specific audience on their mobile device.
Mobile CRMA Mobile CRM enables the access of customer accounts and information via a mobile device.
Mobile InteractionsMobile interaction is the study of interaction between mobile users and computers.
Mobile Predictive AnalyticsMobile Predictive Analytics refers to using 
Mobile Web DevelopmentMobile Web Development refers to the development of web applications for use on a mobile device.
Monthly Active Users (MAU)Monthly active users (MAU) is one of the ways to measure the success rate of online social games, social networking services and, increasingly mobile apps. Typically, metrics are measured by counting the number of unique users during a specific measurement period, such as within the previous 30 days.
Uninstall TrackingMonitoring user behavior by keeping track of the uninstallation of applications
Monitoring Sensors

Technology WordMeaning
Continuous Controls MonitoringRefers to the use of automated tools and various technologies to ensure the continuous monitoring of financial transactions and other types of transactional applications to reduce the costs involved for audits.
File Integrity Monitoring (FIM)File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
MonitoringTo maintain regular surveillance over.
mPulseMPulse CMMS software provides integrated tracking, scheduling, and reporting tools for equipment and facilities maintenance organizations.
NagiosA free and open source computer-software application that monitors systems, networks and infrastructure.
Operational Technology (OT)Operational technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise.
Proactive MonitoringProactive monitoring used in information technology allows teams to understand how services are performing, along with identifying potential areas of risk 7 days a week, 24 hours a day. Monitoring can apply to applications, networks, security, computers and data centers.
Proximity SensorA proximity sensor is a sensor able to detect the presence of nearby objects without any physical contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return signal.
Real User Monitoring (RUM)Real user monitoring (RUM) is a passive monitoring technology that records all user interaction with a website or client interacting with a server or cloud-based application.
Reliability-Centered Maintenance (RCM)Reliability-centered maintenance (RCM) is a process to ensure that systems continue to do what their user require in their present operating context.[1] It is generally used to achieve improvements in fields such as the establishment of safe minimum levels of maintenance.
Security MonitoringThe collection, analysis, and escalation of indications and warning to detect and respond to intrusions.
Sensors, Test & MeasurementElectronic test equipment is used to create signals and capture responses from electronic devices under test (DUT). 
Smart SensorA smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on.
System MonitorsA hardware or software component used to monitor resources and performance in a computer system.
Temperature SensorA temperature sensor is a device, typically, a thermocouple or RTD, that provides for temperature measurement through an electrical signal. A thermocouple (T/C) is made from two dissimilar metals that generate electrical voltage in direct proportion to changes in temperature.
TroubleshootingTroubleshooting is a systematic approach to problem solving that is often used to find and correct issues with complex machines, electronics, computers and software systems.
Virtual Machine MonitorComputer software, firmware or hardware that creates and runs virtual machines.

Technology WordMeaning
3G3G, short for third generation, is the third generation of wireless mobile telecommunications technology. It is the upgrade for 2G and 2.5G GPRS networks, for faster internet speed.
4G4G is the fourth generation of broadband cellular network technology, succeeding 3G. A 4G system must provide capabilities defined by ITU in IMT Advanced. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, and 3D television.
5G5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.[
All-IPAll-IP is the concept that all fixed network communciations will communicate end to end using the Internet Protocol.
Application Aware NetworkThe capacity of an intelligent network to maintain current information about applications that connect to I and, as a result, optimize their functioning as well as that of other applications or systems that they control.
Application LayerAn application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.
Authoring SystemAn authoring system is a program that has pre-programmed elements for the development of interactive multimedia software titles. Authoring systems can be defined as software that allows its user to create multimedia applications for manipulating multimedia objects.
BackhaulThe backhaul portion of the network comprises the intermediate links between the core network, or backbone network and the small subnetworks at the 'edge' of the entire hierarchical network.
BandwidthThe range of frequencies within a given band, in particular that used for transmitting a signal.
Bandwidth as a ServiceNetwork connectivity service that allows users to request bandwidth at desired levels when and where they need it.
BroadbandA high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
Business Ethernet NetworkThe use of high-bandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks.
Coaxial CablesCoaxial cable is a cable used in the transmission of video, communications, and audio. This cable has high bandwidths and greater transmission capacity.
Communications SatelliteA communications satellite is a type of artificial satellite that is placed in Earth's orbit for the purpose of sending and receiving communication data between a source and destination.
Content CachingThe temporary storage of files on servers that are physically closer to end users.
Content Delivery Network (CDN)A system of distributed servers that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the webpage and the content delivery server. CDns also provide protection from large surges in traffic.
Content FilteringThe use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
Customer-Premises Equipment (CPE)Customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc").
Dark FiberRefers to unused fiber-optic cable.
Data NetworksA digital telecommunications network which allows nodes to share resources.
Data TransmissionData transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices.
Dedicated Gig InternetGigabit internet is the next-generation of broadband Internet service, with true gigabit internet connections offering speeds that are over 50 times faster than today's average broadband connection.
Deep Fiber DeploymentThe trend of deploying infrastructure that will support fiber optic connections
Desktop SharingA common name for technologies and products that allow remote access and remote collaboration on a person's computer desktop through a graphical Terminal emulator.
Digital Subscriber Line (DSL)A family of technologies that are used to transmit digital data over telephone lines.
EthernetA system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Ethernet NetworkUsed to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
Ethernet Network PortAn opening on computer network equipment that Ethernet cables plug into.
Ethernet Network ProviderA company that provides ethernet services.
Ethernet Network ServicesEthernet services to customers who utilize Ethernet technology in their networks.
Ethernet NetworkingEthernet is the most widely installed local area network technology. 
Ethernet Networking SolutionsProviders such as AT&T, Spectrum, Industrial Networking Solutions and aviso combine programmability with physical hardware to create carrier class virtual services and functions.
Ethernet Over Copper (EoC)Ethernet over copper (also known as EoC) is a form of Ethernet in the first mile connection that uses twisted pair copper telephone wire.
EtherNet/IP NetworkProvides plant-wide network systems using open, industry-standard networking technologies.
ExtranetsAn intranet that can be partially accessed by authorized outside users, enabling business to exchange information over the Internet securely.
Fault ToleranceFault tolerance is the property that enables a system to continue operating properly in the event of the failure of (or one or more faults within) some of its components.
Fiber Connected BuildingsCommercial buildings with capabilities for a fiber connection.
Fiber OpticsA technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics has several advantages over traditional metal communications lines. Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data. Fiber optic cables are less susceptible than metal cables to interference. Fiber optic cables are much thinner and lighter than metal wires. Data can be transmitted digitally (the natural form for computer data) rather than analogically. The main disadvantage of fiber optics is that the cables 
Fiber RacewayAn Optical Fiber Raceway is a raceway designed for enclosing and routing listed optical fiber cables. 
Fibre ChannelA high-speed network technology primarily used to connect computer data storage to servers.
File Transfer Protocol (FTP)The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
GeolocationGeolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal.
Gigabit InternetA term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE 802.3-2008 standard.
Gigabit NetworkingA network that uses gigabit technology.
Gigabit ServicesThe next generation of broadband internet service which is typically delivered over fiber optic lines and provides speeds of 1000Mps, which is also referred to as 1Gbps or Gigabit internet.
Gigabits Per SecondGigabits per second (GBPS) is equal to 1,000 Megabits per second (Mbps), or 1,000,000,000 bits per second. GBPS is commonly used to measure data transfer speeds between hardware devices.
Global Distribution System (GDS)A global distribution system is a computerised network system owned or operated by a company that enables transactions between travel industry service providers, mainly airlines, hotels, car rental companies, and travel agencies.
Global Wide Area NetworkRefers to a network composed of different interconnected networks that cover an unlimited geographical area.
Grid ComputingThe collection of computer resources from multiple locations to reach a common goal.
HacktivismHacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist.
High AvailabilityRefers to systems that are durable and likely to operate continuously without failure for a long time.
High Speed NetworksInternet access provided by a network of servers that transfers data via high-speed cable, satellite and wireless connections.
Highway Addressable Remote Transducer (HART)ProtocolHART (Highway Addressable Remote Transducer) Protocol is an open standard used globally to send and receive digital information using analog wiring between smart devices and control systems.
Hybrid Fiber Coaxial (HFC)Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable. It has been commonly employed globally by cable television operators since the early 1990s. In a hybrid fiber-coaxial cable system, the television channels are sent from the cable system's distribution facility, the headend, to local communities through optical fiber subscriber lines. At the local community, a box called an optical node translates the signal from a light beam to electrical signal, and sends it over coaxial cable lines for distribution to subscriber residences. The fiberoptic trunk lines provide adequate bandwidth to allow future expansion an
Hybrid Wide Area Networking (WAN)A method to connect a geographically dispersed wide area network by sending traffic over two or more connection types.
HyperconnectivityA state of unified communications in which the traffic-handling capacity and bandwidth of a network always exceed the demand.
In-Building ConnectivityIn-Building Connectivity refers to the ability of devices to sufficiently send and receive data from within a building and be connected to their respective networks
Indicators of Compromise (IOC)Indicators of Compromise (IOC) are pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.
Infiniband (IB)A computer networking communications standard used in high-performance computing that features very high throughput and very low latency.
Integrated Services Digital Network (ISDN)Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
Intelligent RoutingA method of determining the best path to send your traffic over based on real-world performance or cost of the path, as opposed to the traditional routing methods, which only select paths based on configured in policy and network topology information.
Internet Exchange PointsAn Internet exchange point (IX or IXP) is the physical infrastructure through which Internet service providers (ISPs) and content delivery networks (CDNs) exchange Internet traffic between their networks (autonomous systems).
Internet infrastructureInternet infrastructure is made up of hardware and software that transmits and receives information from a variety of different systems and networks.
Internet Protocol Private Branch Exchange (IP PBX)A private branch exchange that switches calls between VoIP users on local lines while allowing all users to share a certain number of external phone lines.
Internet Protocol Television (IPTV)Internet Protocol television (IPTV) is the delivery of television content over Internet Protocol (IP) networks. This is in contrast to delivery through traditional terrestrial, satellite, and cable television formats. Unlike downloaded media, IPTV offers the ability to stream the source media continuously.
Internet Protocol Version 4 (IPv4)Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet, and was the first version deployed for production in the ARPANET in 1983.
Internet Relay Chat (IRC)Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model.
Internet Speed TestA website or web application that measures a user's internet connection speed.
Internet TransitThe service of allowing traffic from another network to cross or transit the provider's network, usually used to connect a smaller Internet service provider to the rest of the Internet.
IntranetsA local or restricted communications network, especially a private network created using World Wide Web software.
IP NetworksA communication network that uses Internet Protocol to send and receive messages between one or more computers.
IP StorageA general term for several approaches to using the Internet protocol in a storage area network usually over Gigabit Ethernet.
IP VPNUses Internet Protocol for transmission in a VPN.
iSCSIWorks on top of the Transport Control Protocol and allows the SCSi command to be sent end-to-end over local-area networks or the Internet.
Java Management Extensions (JMX)Java Management Extensions (JMX) is a Java technology that supplies tools for managing and monitoring applications, system objects, devices (such as printers) and service-oriented networks.
Juniper NetworksAn American multinational corporation headquartered n Sunnyvale, CA that develops and markets networking products.
Last MileThe last mile or last kilometer is a colloquial phrase widely used in the telecommunications, cable television and internet industries to refer to the final leg of the telecommunications networks that deliver telecommunication services to retail end-users (customers).
Lightweight Directory Access ProtocolThe Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.
Local Area Networking (LAN)A network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings.
Long Term Evolution (LTE)Is a 4G wireless broadband technology developed by the Third Generation Partnership Project, an industry trade group.
Low Latency EthernetRefers to the network connections used by financial institutions to connect to stock exchanges and Electronic communication networks (ECNs) to execute financial transactions.
Managed Hosting ServicesAn IT provisioning model in which a service provider leases dedicated servers and associated hardware to a single client.
Managed Service ProviderA company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
Mesh NetworkingA mesh network is a local network topology in which the infrastructure nodes (i.e. bridges, switches and other infrastructure devices) connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data from/to clients.
Message Queuing Telemetry Transport (MQTT)MQTT[1] (Message Queuing Telemetry Transport) is an ISO standard (ISO/IEC PRF 20922)[2] publish-subscribe-based messaging protocol.
Microwave BackhaulMicrowave backhaul refers to the transportation of traffic (voice, video and data) between distributed sites and a more centralised point of presence via a radio link.
MOST (Media Oriented Systems Transport)MOST (Media Oriented Systems Transport) is a high-speed multimedia network technology optimized by the automotive industry.
Multimedia over Cable Alliance (MoCA)The Multimedia over Coax Alliance (MoCA) is an international standards consortium publishing specifications for networking over coaxial cable.
NarrowbandNarrowband describes a channel in which the bandwidth of the message does not significantly exceed the channel's coherence bandwidth.
Network Access Control (NAC)Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
Network Address Translation (NAT)Network address translation (NAT) is a router function that enables public and private network connections and allows single IP address communication.
Network ArchitectureThe design of a communication network.
Network as a ServiceIs sometimes listed as a separate Cloud provider along with Infrastructure as a Service, Platform as a Service, and Software as a Service.
Network Attached StorageA file level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.
Network Best PracticesAn industry-wide agreement that standardizes the most efficient and effective way to accomplish a desired outcome.
Network BottleneckA network bottleneck refers to a discrete condition in which data flow is limited by computer or network resources. The flow of data is controlled according to the bandwidth of various system resources.
Network CongestionNetwork congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections.
Network ConvergenceNetwork convergence is the efficient coexistence of telephone, video and data communication within a single network.
Network DensificationNetwork densification refers to increasing the amount of available resources on a network within the same space.
Network EncryptionNetwork encryption is the process of encrypting or encoding data and messages transmitted or communicated over a computer network.
Network ForensicsNetwork forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.
Network Functions Virtualization (NFV)A network architecture concept that uses the technologies of IT virtualization to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create communication services.
Network HardwarePhysical devices which are require for communication and interaction between devices on a computer network.
Network InfrastructureThe hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network.
Network LatencyThe amount of time a message takes to traverse a system.
Network Load Balancing (NLB)Network load balancing (commonly referred to as dual-WAN routing or multihoming) is the ability to balance traffic across two WAN links without using complex routing protocols like BGP.
Network ManagementManaging computer networks.
Network NeutralityNet neutrality is the principle that Internet service providers treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication.
Network Operations Center (NOC)A network operations center (NOC) is a central location from which network administrators manage, control and monitor one or more networks. The overall function is to maintain optimal network operations across a variety of platforms, mediums and communications channels.
Network OptimizationNetwork optimization is technology used for improving network performance for a given environment. It is considered an important component of effective information systems management.
Network Packet Brokers (NPBs)A network packet broker (NPB) is a device that provides a collection of monitoring tools with access to traffic from across the network.
Network PerformanceMeasures of service quality of a network as seen by the customer.
Network PrintingA printer connected to a wired or wireless network.
Network ProtocolsFormal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network.
Network RedundancyNetwork redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure.
Network SecurityProtection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.
Network Security ApplianceAny form of server appliance that is designed to protect computer networks from unwanted traffic.
Network Time ProtocolNetwork Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
Network TopologyNetwork topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology is the topological structure of a network and may be depicted physically or logically.
Network Traffic AnalysisNetwork traffic analysis is the process of recording, reviewing and analyzing network traffic for the purpose of performance, security and/or general network operations and management.
Networking / TelecommunicationsA collection of terminal nodes, links are connected so as to enable telecommunication between the terminals.
Networking ApplicationsA suite of technologies that, when deployed together, provide application availability, security, visibility, and acceleration.
Networking SolutionsA company that deals in technology, with its primary division being domain name registration that started as a technology consulting firm.
Optical NetworkingA type of data communication network built with optical fiber technology.
Outdoor Cell SiteAn Outdoor Cell Site is a wireless system fixed to a pole or building that is used to provide internet access to an outdoor area.
Packet SwitchingPacket switching is a method of grouping data which is transmitted over a digital network into packets which are made of a header and a payload.
PAM 4Doubles the number of bits in serial data transmission by increasing the number of levels of pulse-amplitude modulation.
Peer to PeerDenoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server.
Perfect Forward Secrecy (PFS)In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a property of secure communication protocols in which compromises of long-term keys do not compromise past session keys. Forward secrecy protects past sessions against future compromises of secret keys or passwords.
PetabyteThe petabyte is a multiple of the unit byte for digital information. The prefix peta indicates the fifth power of 1000 and means 1015 in the International System of Units (SI), and therefore 1 petabyte is one quadrillion (short scale) bytes, or 1 billiard (long scale) bytes. The unit symbol for the petabyte is PB.
Point-to-Point Tunneling Protocol (PPTP)The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.
Primary Rate Interface (PRI)The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user.
Public-Key Infrastructure (PKI)A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
RDMA over Converged Ethernet (RoCE)A network protocol that allows remote direct memory access over an ethernet network.
Remote AccessThe ability to get access to a computer or a network from a remote distance.
Remote Desktop Protocol (RDP)Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
Remote MonitoringRemote Monitoring (RMON) is a standard specification that facilitates the monitoring of network operational activities through the use of remote devices known as monitors or probes.
Remote Network ManagementA feature of Windows Vista that allows administrators to remotely run management scripts.
Remote NetworkingThe ability to get access to a computer or a network from a remote distance.
RoutersA device, or, in some cases, software on a computer, that determines the best way for a packet to be forwarded to its destination.
Routing ProtocolsSpecifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.
Satellite BroadbandSatellite broadband is exactly what it sounds like - broadband that you connect to via a satellite.
Secure Shell (SSH)Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users.
Serializer/Deserializer (SerDes)A serializer/deserializer (SerDes) is an integrated circuit or device used in high-speed communications for converting between serial data and parallel interfaces in both directions.
Server Message Block (SMB)In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS, /s?fs/), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.
Session Initiation Protocol (SIP)The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks.
Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with Extended SMTP additions by RFC 5321, which is the protocol in widespread use today.
Simple Network Management Protocol (SNMP)Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more.
Small CellsA small cell is an individual cell site that is smaller in size, power, and coverage radius. Small cells are typically deployed to densify or increase the capacity of the overall network. Small Cells are typically installed on a very smal area such as a cabinet.
Software-Defined Networking (SDN)An approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality.
Software-Defined Wide Area Network (SD-WAN)A specific application of software-defined networking technology applied to WAN connections, which are used to connect enterprise networks - including branch offices and data centers - over large geographic distances.
SwitchingThe practice of directing a signal or data element toward a particular hardware destination.
TCP/IP ProtocolThe basic communication language or protocol of the Internet.
Terminal / Network ComputersA computer terminal is an electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer. In networking, a terminal is a personal computer or workstation connected to a mainframe.
Terminal EmulatorsThe ability to make one computer terminal, typically a PC appear to look like another, usually older type of terminal so that a user can access programs originally written to communicate with the other terminal type.
TetherTo use an electronic device in order to connect a computer or other device to the Internet.
TimestampA timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.
TunnelingA protocol that allows for the secure movement of data from one network to another.
Universal Plug and Play (UPnP)Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.
User Datagram Protocol (UDP)In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network.
Very Small Aperture Terminal (VSAT)A very small aperture terminal (VSAT) is a small telecommunication earth station that receives and transmits real-time data via satellite.
Very-high-bit-rate Digital Subscriber Line (VDSL)Very-high-bit-rate digital subscriber line (VDSL)[1] and very-high-bit-rate digital subscriber line 2 (VDSL2)[2] are digital subscriber line (DSL) technologies providing data transmission faster than asymmetric digital subscriber line (ADSL).
Virtual PrototypingVirtual prototyping is a method in the process of product development. It involves using computer-aided design (CAD), computer-automated design (CAutoD) and computer-aided engineering (CAE) software to validate a design before committing to making a physical prototype.
Voice RevenueMobile phone companies' revenues.
VPNA network that is constructed using public wires - usually the Internet - to connect to a private network, such as a company's internal network.
vRouterA vRouter is a software function that replicates in software the functionality of a hardware-based Layer 3 Internet Protocol routing, which has traditionally used a dedicated hardware device.
WAN AccelerationThe category of technologies and techniques used to maximize the efficiency of data flow across a wide area network.
Wavelength Division Multiplexing (WDM)Wavelength division multiplexing (WDM) is a technology or technique modulating numerous data streams, i.e. optical carrier signals of varying wavelengths (colors) of laser light, onto a single optical fiber.
Wide Area Networking (WAN)Consists of two or more local-area networks.
WinSCPWinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows. Its main function is secure file transfer between a local and a remote computer.
WiresharkWireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.
Zero Touch Provisioning (ZTP)A switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.
Operating System OS

Technology WordMeaning
Active DirectoryA window's OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner.
Application ModernizationApplication modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs.
CentOSCentOS ( from Community Enterprise Operating System) is a Linux distribution that provides a free, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL).
Cisco IOSCisco IOS (Internetwork Operating System) is a software made by Cisco for use on various hardware devices such as networking routers and switches. A command-line interface governs a series of trains defined as tools for delivering Cisco software to specific platforms.
Inter-Process Communication (IPC)Inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
LinkedIn PulseLinkedIn Pulse was a news aggregation app for Android, iOS and HTML5 browsers, originally released in 2010. The app, in its original incarnation, was deprecated in 2015 and integrated into LinkedIn.
LinuxAn open-source operating system modelled on UNIX.
Mac OS XA development platform that supports multiple development technologies including UNIX, Java, the proprietary Cocoa and Carbon runtime environments, and a host of open source, Web, scripting, database and development technologies.
Microsoft WindowsMicrosoft Windows is a group of opperating systems manufactured by Microsoft which offers a graphical user interface (GUI), multitasking functionalities, virtual memory management capabilities, and support for several peripheral devices.
Operating SystemThe software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Privilege EscalationPrivilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
Real Time Operating Systems (RTOS)A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays.
Repair and RecoveryThe process of salvaging inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.
SolarisThe computer operating system that Sun Microsystems provides for its family of Scalable Processor Architecture-based processors as well as for Intel-based processors.
Surface HubThe Surface Hub is a brand of interactive whiteboard developed and marketed by Microsoft, as part of the Microsoft Surface family. The Surface Hub is a wall-mounted or roller-stand-mounted device with either a 55-inch (140 cm) 1080p or an 84-inch (210 cm) 4K 120 Hz touchscreen with multi-touch and multi-pen capabilities, running the Windows 10 operating system.
tvOStvOS is an operating system developed by Apple Inc. for the fourth-generation and later Apple TV digital media player. tvOS was announced on September 9, 2015 at the Apple September 2015 event, alongside the 4th generation Apple TV.
UnixA widely used multiuser operating system.
Windows 10The latest release of Microsoft's Windows operating system and the successor to the underwhelming Windows 8.
Windows 7A personal computer operating system developed by Microsoft.
Windows 8A personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems.
Windows Operating SystemPrimarily runs on x86-based computers, although versions have run on Intel's Itanium CPUs.
Windows VistaOffers and advancement in reliability, security, ease of deployment, performance and manageability over Windows XP.
Windows XPAn operating system introduced in 2001 from Microsoft's Windows family of operating systems, the previous of Windows being Windows Me.
Other / Miscellaneous

Technology WordMeaning
2D AnimationCreates movement in a two-dimensional artistic space
3D AnimationGraphics that use a three-dimensional representation of geometric data that is stored in the computer for the purposes of performing calculations and rendering 2D images. 
Adaptive E-TextbooksArtificially intelligent software that is replacing paper textbooks.
Application Service ProviderDefined as an enterprise that delivers application functionality and associated services across a network to multiple customers using a rental or usage-base transaction-pricing model.
Application SoftwareCan be divided into two general classes: systems software and applications software.
ArcGISArcGIS is a geographic information system (GIS) for working with maps and geographic information. It is used for creating and using maps, compiling geographic data, analyzing mapped information, sharing and discovering geographic information, using maps and geographic information in a range of applications, and managing geographic information in a database.
Audio Editing SoftwareAudio editing software is software which allowsediting and generating of audio data. Audio editing software can be implemented completely or partly as library, as computer application, as Web application or as a loadable kernel module.
Big BlueA slang term sometimes used to refer to International Business Machines Corporation (IBM).
BiometricsRefers to technologies used to detect and recognize human physical characteristics.
BlueprintA blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process on light-sensitive sheets.
Business Card ScanningWith a business card scanner, you can scan a large numbers of business cards using specially designed software.
Computer Aided EngineeringThe broad usage of computer software to aid in engineering analysis tasks.
Consumerization of ITA phrase used to describe the cycle of information technology emerging in the consumer market, then spreading to business and government organizations, largely because employees are using the popular consumer market technologies and devices at home and then introducing them in the workplace.
Data Privacy DayData Privacy Day (known in Europe as Data Protection Day) is an international holiday that occurs every 28 January. The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, India and 47 European countries.
Digital ConvergenceRefers to the convergence of four industries into one conglomerate, ITTCE.
Directory ServicesA customizable information store that functions as a single point from which users can locate resources and services distributed throughout the network.
Distributed Control SystemA distributed control system (DCS) is a computerised control system for a process or plant usually with a large number of control loops, in which autonomous controllers are distributed throughout the system, but there is central operator supervisory control.
Drag and DropIn computer graphical user interfaces, drag and drop is a pointing device gesture in which the user selects a virtual object by grabbing it and dragging it to a different location or onto another virtual object.
eDiscovery SoftwareRefers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
Electronic Warfare (EW)Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack of an enemy, or impede enemy assaults via the spectrum.
Engineer to Order / Make to OrderA manufacturing process in which manufacturing starts only after a customer's order is received.
Exponential GrowthExponential growth is exhibited when the rate of change the change per instant or unit of time of the value of a mathematical function is proportional to the function's current value, resulting in its value at any time being an exponential function of time, i.e., a function in which the time value is the exponent.
Geographic Information SystemsA system designed to capture, store, manipulate, analyze, manage, and present spatial or geographical data.
GPSA radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world.
High Dynamic Range (HDR)High dynamic range (HDR) is a dynamic range higher than what is considered to be standard dynamic range. The term is often used in discussing display devices, photography, 3D rendering, and sound recording including digital imaging and digital audio production.
Human-Machine Interface (HMI)Human-machine interface (HMI) is a component of certain devices that are capable of handling human-machine interactions. The interface consists of hardware and software that allow user inputs to be translated as signals for machines that, in turn, provide the required result to the user.
Immersive ExperienceAn Immersive Experience, often relating to virtual reality, is something that stimulates the senses to draw one in, transport them to another place, and enhance an everyday experience to make it more realistic, engaging, and satifying.
Information AssuranceThe practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.
Information Lifecycle ManagementA comprehensive approach to managing the flow of an information system's data and associated metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
Information TechnologyThe study of use of systems for storing, retrieving, and sending information.
Intelligent Personal AssistantSoftware that has been designed to assist people with basic tasks, usually providing information using natural language.
Intelligent VehiclesComprise electronic, electromechanical, and electromagnetic devices.
Interactive ContentInteractive content is a better way to educate, entertain, and engage your audience. Interactive content is content that requires the participants' active engagement more than simply reading or watching. In return for that engagement, participants receive real-time, hyper-relevant results they care about.
Interactive Vending MachineAn automated machine that provides items such as snacks, beverages, alcohol, cigarettes and lottery tickets to consumers after money or a credit card is inserted into the machine.
Interactive Voice Response (IVR)A technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad.
IT EcosystemsProduct platforms defined by core components made by the platform owner and complemented by applications made by autonomous companies in the periphery.
IT Governance, Risk and ComplianceRefers to a company's coordinated strategy for managing the broad issues of corporate governance, enterprise rick management and corporate compliance with regard to regulatory requirements.
Legal Hold SoftwareA process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated.
Linus TorvaldsThe creator of the Linux kernel.
Location-Based ServicesServices offered through a mobile phone and take into account the device's geographical location.
Machine ControlMachine control is used to accurately position earthwork machinery based on 3D design models and GPS systems, and thus aid machine operators to e.g. control the position of a road grader's blade
Machine-to-Machine (M2M)An important aspect of warehouse management, remote control, robotics, traffic control, logistic services, supply chain management, fleet management and telemedicine.
Mineral ProcessingIn the field of extractive metallurgy, mineral processing, also known as ore dressing, is the process of separating commercially valuable minerals from their ores.
Mobile Industry Processor Interface (MIPI) AllianceMIPI Alliance is a global, open membership organization that develops interface specifications for the mobile ecosystem including mobile-influenced industries. It was founded in 2003 by ARM, Intel, Nokia, Samsung, STMicroelectronics and Texas Instruments.
Open DataData that can be freely used, re-used and redistributed by anyone - subject only, at most, to the requirement to attribute and share alike.
Open Invention NetworkOpen Invention Network (OIN) is a patent non-aggression community that supports freedom of action in Linux as a key element of open source software. OIN acquires patents and licenses them royalty-free to its community members who, in turn, agree not to assert their own patents against Linux and Linux-related systems and applications
Open MicrocredentialsThe process of earning a micro-credential, which are like mini-degrees or certifications in a specific topic area.
Panic DevicesA door-locking assembly that can be released quickly by pressure on a horizontal bar.
Preview PaneYou can preview items in your inbox without opening them by using the reading or preview pane.
Salesforce AppexchangeThe Salesforce AppExchange is a complete marketplace offering cloud-computing applications and consulting services. Before you can make your own app or service publicly available to potential customers, you must be a Salesforce partner.
Simulation SoftwareBased on the process of modeling a real phenomenon with a set of mathematical formulas.
Smart Connected ProductsProducts, assets and other things embedded with processors, sensors, software and connectivity that allow data to be exchanged between the product and it environment, manufacturer, operator/user, and other products and systems.
System AdministrationSystem administration is a job done by IT experts for an organization. The job is to ensure that computer systems and all related services are working well.
Ultra High Definition BroadcastTelevision that includes 4K UHD and 8K UHD, which are two digital video formats that were first proposed by NHK Science and Technology Research Laboratories.
Utility ComputingA service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate.

Technology WordMeaning
Commercial PrintingCommercial Printing is the process of taking artwork and transferring it onto something tangible for your business. This could mean everything from your business cards or the flyers at your local gym to the magazine you read during the evening.
Custom PrintingCustom Printing means that you can get any image you want, in any size and on a multitude of substrates.
Enterprise PrintingSecurity printing solutions developed by HP.
Envelope PrintingEnvelope Printing is simply the process of printing on an envelope.
High Volume PrintingCombine productivity, reliability, and finishing capabilities with monthly print volumes up to 50,000 for large workgroups.
High Yield TonerThe number of pages a user can print with a given printer and cartridge.
HP ePrintA feature of most HP printers and MFPs that enables printing documents attached to email messages sent to the device.
HP Jet IntelligenceA program introduced by HP that features new toner technology, delivering more pages, performance, and productivity.
HP JetAdvantageEnables mobile devices to print to printers on the corporate network with a simple, Pc-like print experience, without extra steps like opening a print app or sending an email to the print queue.
HP LaserJetThe line of dry electrophotographic laser printers marketed by HP.
HP OfficeJetSmall printers offered by HP for small businesses.
HP PageWidePrinter offered by HP that achieves breakthrough speed.
HP SureSupplyA free software tool for printers.
Ink CartridgeA replaceable unit that holds ink and the print nozzles for inkjet printers.
In-Vehicle Infotainment (IVI)In-Vehicle Infotainment (IVI) is an auto industry term that refers to vehicle systems that combine entertainment and information delivery to drivers and passengers.
Laser PrintersA printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attracts toner.
Mobile PrintingThe process of sending data to a printer wirelessly from a smartphone or tablet.
PhotocopierA machine for making photocopies.
Print On Demand (POD)Print-on-demand (POD) is a printing technology and business process in which book copies (or other documents) are not printed until the company receives an order, allowing prints of singular or small quantities.
Print QualityThe quality of the hard copy or printout produced by a printer.
Printer Cost Per PageThe price of a page of paper, which is calculated by dividing the price of ink or toner by the number of pages the manufacturer says is should cover.
Printer Fleet ManagementSolutions to help with time and money saving, in regards to printing for businesses.
Printer SecurityA term for printing tasks that meet a standard for privacy to prevent the unauthorized use of printed information.
Printing SuppliesItems such as paper, ink, toner and devices used for printing.
Refilled CartridgesAn OEM cartridge that has been used, but are manufactured and refilled with ink.
Remanufactured CartridgesAn OEM cartridge that has been used, but are manufactured and refilled with ink.
Satellite ConstellationA satellite constellation is a group of artificial satellites working in concert. Such a constellation can be considered to be a number of satellites with coordinated ground coverage, operating together under shared control, synchronized so that they overlap well in coverage, the period in which a satellite or other spacecraft is visible above the local horizon.
Toner CartidgeThe consumable component of a laser printer.
Product Dev Ops & Quality Analysis

Technology WordMeaning
Agile AnalyticsAgile Analytics consists of a set of highly disciplined practices and techniques, some of which may be tailored to fit the unique data warehouse/business intelligence (DW/BI) project demands found in your organization.
Agile Software DevelopmentA lightweight software engineering framework that promotes iterative development throughout the life-cycle of the project, close collaboration between the development team and business side, constant communication, and tightly-knit teams.
Agile ToolsAny tool that supports any agile methodology, be it scrum, Kanban, where you can plan, track, and manage all your agile software development projects from a single tool.
Agile TrainingGenerally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability.
Application Lifecycle ManagementThe supervision of a software application from its initial planning through retirement.
Defect TrackingThe process of tracking the logged defects in a product from beginning to closure, and making new versions of the product that fix the defects.
Functional TestingA software testing process used within software development in which software is tested to ensure that it conforms with all requirements.
Human-Machine Interface (HMI) DesignHMI design is the processes of designing the interaction between the human and the machine to allow effective operation and control of the machine from the human end, whilst the machine simultaneously feeds back information that aids the operators' decision-making process.
Iterative PrototypingA design methodology based on cyclic process of prototyping, testing, analyzing, 
Iterative Software DevelopmentIterative development is a way of breaking down the software development of a large application into smaller chunks.
KanbanKanban is a Japanese manufacturing system in which the supply of components is regulated through the use of an instruction card sent along the production line.
Microsoft Most Valuable Professional (MVP)Microsoft Most Valuable Professional (MVP) award is given to "technology experts who passionately share their knowledge with the community.
Minimum Viable Product (MVP)A Minimum viable Product is that version of a new product which allows a team to collect the maximum amount of validated learning about customers with the least effort.
Nonprofit SoftwareNonprofit Software is software designed for use by nonprofit organizations.
Planning and DesignDesign is the creation of a plan or convention for the construction of an object, system or measurable human interaction (as in architectural blueprints, engineering drawings, business processes, circuit diagrams, and sewing patterns).
PRINCE2PRINCE2 (PRojects IN Controlled Environments) is a structured project management method and practitioner certification programme. PRINCE2 emphasises dividing projects into manageable and controllable stages.
Product ConfiguratorsKnowledge-based configuration, or also referred to as product configuration or product customization, is an activity of customizing a product to meet the needs of a particular customer.
Product Development and DesignProduct design as a verb is to create a new product to be sold by a business to its customers. A very broad concept, it is essentially the efficient and effective generation and development of ideas through a process that leads to new products.
Product Information ManagementProduct information management means managing the information required to market and sell products through distribution channels.
Product Lifecycle ManagementProduct lifecycle management is the process of managing the entire lifecycle of a product from inception, through engineering design and manufacture, to service and disposal of manufactured products.
Product ManagementProduct management is an organizational lifecycle function within a company dealing with the planning, forecasting, and production, or marketing of a product or products at all stages of the product lifecycle.
Project CollaborationProject collaboration is a method by which teams and team leaders plan, coordinate, control and monitor the project they are working on. This collaborative process works across departmental, corporate and national boundaries and helps especially with projects as they grow in complexity.
Project ManagementProject management is the discipline of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria.
Project SchedulingThe project schedule is the tool that communicates what work needs to be performed, which resources of the organization will perform the work and the timeframes in which that work needs to be performed.
Proof of Concept (PoC)Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential.
Quality AssuranceQuality assurance is the maintenance of a desired level of quality in a service or product, especially by means of attention to every stage of the process of delivery or production.
Rapid Application Development (RAD)Rapid application development is a suite of software development methodology techniques used to expedite software application development.
Rapid PrototypingRapid prototyping is a group of techniques used to quickly fabricate a scale model of a physical part or assembly using three-dimensional computer aided design data.
Rational Unified Process (RUP)Rational Unified process is a software development methodology from Rational.
Requirements ManagementRequirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders.
Research and Development / TestResearch and development are activities in connection with corporate or government innovation.
RetrospectivesRetrospective is a meeting at the end of the project during which participants of the projects evaluate the project and obtained experience, which can be used in the next project.
Scaled Agile Framework (SAFe)Scaled Agile Framework is an agile software development framework=" consistin"g of a knowledge-base of integrated patterns intended for enterprise-scale Lean-Agile development.
Scrum TrainingScrum training is an iterative and incremental agile software training development framework for managing product development.
Software RequirementsA software requirements specification is a description of a software system to be developed.
Software TestingSoftware testing is a process of executing a program or application with the intent of finding the software bugs.
Technology ResearchApplied research oriented toward engineering disciplines (but not to a specific product or process) and aimed at developing tools and test equipment and procedures, and at providing solutions to specific technical problems.
Testing and AnalysisTest analysis is the process of looking at something that can be used to derive test information.
UsabilityUsability is the measure of a product's potential to accomplish the goals of the user.
Usability TestingUsability testing is a technique used in user-centered interaction design to evaluate a product by testing it on users. This can be seen as an irreplaceable usability practice, since it gives direct input on how real users use the system.
WaterfallWaterfall is relating to or denoting a method of project management that is characterized by sequential stages and a fixed plan of work.
White Box TestingWhite-box testing is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality.
Programming Language & Coding

Technology WordMeaning
.NETProgrammers produce software by combining their source code with .NET Framework and other libraries. The framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio.
AngularJSA JavaScript-based open-source front-end web application framework
ASP.NETASP.NET is an open-source server-side web application framework designed for web development to produce dynamic web pages.
Aspect-Oriented Programming (AOP)Aspect-oriented programming (AOP) is a programming paradigm that aims to increase modularity by allowing the separation of cross-cutting concerns.
BashBash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell.
C#C# is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is based on C++ and contains features similar to those of Java.
C++C++ is a general-purpose object-oriented programming language, and is an extension of the C language.
Cascading Style Sheets(CSS)Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML.
COBOLCOBOL is a computer programming language designed for use in commerce.
DjangoDjango is a free and open-source web framework written in Python, which follows the model-view-template architectural pattern.
Email TemplateEmail templates allow you to customize the formatting and text of emails sent by users who share your content.
EncodersAn encoder is a device, circuit, transducer, software program, algorithm or person that converts information from on format or code to another, for the purposes of standardization, speed or compressions.
FortranFortran is a high-level computer programming language used especially for scientific computation.
HiveQLHive provides an SQL dialect, called Hive Query Language for querying data stored in a Hadoop cluster.
HTML 5Hypertext markup Language revision 5 is markup language for the structure and presentation of World Wide Web contents.
JavaJava is a general purpose computer programming language designed to produce programs that will run on any computer system.
Java Database Connectivity (JDBC)Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database.
JavaScriptJava Script is an object-oriented computer programming language commonly used to create interactive effects within web browsers.
Keyhole Markup Language (KML)Keyhole Markup Language (KML) is an XML notation for expressing geographic annotation and visualization within Internet-based, two-dimensional maps and three-dimensional Earth browsers.
Node.jsAn open-source, cross-platform JavaScript run-time environmentfor executing JavaScript code server-side
Object-Oriented Programming (OOP)Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which may contain data in the form of fields.
PerlPerl is a high-level general-purpose programming language used especially for developing Web applications.
PHPPHP or hypertext preprocessor is defined as an HTML-embedded scripting language that is used to write web pages.
PigApache pig is a high-level platform for creating programs that run on Apache Hadoop. Pig Latin abstracts the programming from the Java MapReduce idiom into a notation which makes MapReduce programming high level, similar to that of SQL for relational database management systems.
PostgresPostgreSQL is an open source relational database management system developed by a worldwide team of volunteers. 
PowerShellPowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language.
Programming LanguagesProgramming languages are in computer technology, a set of conventions in which instructions for the machine are written.
PythonPython is a high-level general-purpose programming language.
Query languageQuery languages or data query languages (DQLs) are computer languages used to make queries in databases and information systems.
RR is an open source programming language and software environment for statistical computing and graphics that is supported by the R Foundation for Statistical Computing.
Regular ExpressionA regular expression, regex or regexp (sometimes called a rational expression) is, in theoretical computer science and formal language theory, a sequence of characters that define a search pattern.
RubyRuby is a dynamic, reflective, object-oriented, general-purpose programming language.
Ruby on RailsRuby on Rails is a server-side web application framework written in Ruby under the MIT License.
ScratchScratch is a visual programming language and online community targeted primarily at children.
ScriptingA scripting or script language is a programming language that supports scripts; programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.
Security Assertion Markup Language (SAML)Security Assertion Markup Language (SAML, pronounced sam-el) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
SPARQLSPARQL (for SPARQL Protocol and RDF Query Language) is an RDF query language, that is, a semantic query language for databases, able to retrieve and manipulate data stored in Resource Description Framework (RDF) format.
Swift (Apple OS)Swift is a general-purpose, multi-paradigm, compiled programing language developed by Apple Inc. for iOS, macOS, watchOS, tvOS, and Linux.
VBScriptVBScript is an Active Scripting language developed by Microsoft that is modeled on Visual Basic.
XMLXML is a metalanguage which allows users to define their own customized markup languages, especially in order to display documents on the internet.
XQueryXQuery (XML Query) is a query and functional programming language that queries and transforms collections of structured and unstructured data, usually in the form of XML, text and with vendor-specific extensions for other data formats (JSON, binary, etc.).

Technology WordMeaning
ActuatorsAn actuator is a component of a machine that is responsible for moving or controlling a mechanism or system, for example by actuating (opening or closing) a valve; in simple terms, it is a mover.
Autonomous Driving SolutionsAutonomous Driving Solutions refers to an autonomous driving service or product that may be offered by a company as a potential solution for a business need or problem.
Cognitive Roboticsconcerned with endowing a robot with intelligent behavior by providing it with a processing architecture that will allow it to learn and reason about how to behave in response to complex goals in a complex world. Cognitive robotics may be considered the engineering branch of embodied cognitive science and embodied embedded cognition.
DronesAn unmanned aerial vehicle, commonly known as a drone, is an aircraft without a human pilot aboard. UAVs are a component of an unmanned aircraft system; which include a UAV, a ground-based controller, and a system of communications between the two
Industrial AutomationIndustrial automation is the use of control systems, such as computers or robots, and information technologies for handling different processes and machineries in an industry to replace a human being.
Industrial RobotsAn industrial robot is a robot system used for manufacturing. Industrial robots are automated, programmable and capable of movement on two or more axes.Typical applications of robots include welding, painting, assembly, pick and place for printed circuit boards, packaging and labeling, palletizing, product inspection, and testing; all accomplished with high endurance, speed, and precision. They can help in material handling and provide interfaces,
NanoroboticsAn emerging technology field creating machines or robots whose components are at or near the scale of a nanometre (10?9 meters). More specifically, nanorobotics (as opposed to microrobotics) refers to the nanotechnology engineering discipline of designing and building nanorobots, with devices ranging in size from 0.1 10 micrometres and constructed of nanoscale or molecular components
Robot LocomotionRobot locomotion is the collective name for the various methods that robots use to transport themselves from place to place.
Robotic SensingRobotic sensing is a subarea of robotics science intended to give robots sensing capabilities, so that robots are more human-like. Robotic sensing mainly gives robots the ability to see, touch, hear and move and uses algorithms that require environmental feedback.
RobotsA robot is a machine especially one programmable by a computer capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed to take on human form but most robots are machines designed to perform a task with no regard to how they look.
Swarm RoboticsSwarm robotics is an approach to the coordination of multirobot systems which consist of large numbers of mostly simple physical robots. It is supposed that a desired collective behavior emerges from the interactions between the robots and interactions of robots with the environment
Zero Moment PointZero moment point is a concept related with dynamics and control of legged locomotion, e.g., for humanoid robots. It specifies the point with respect to which dynamic reaction force at the contact of the foot with the ground does not produce any moment in the horizontal direction, i.e. the point where the total of horizontal inertia and gravity forces equals 0 (zero).
Search / Social / Website Marketing

Technology WordMeaning
Ad CopyThe main text of a clickable advertisement, whether it is a contextual or a pay per click ad.
Advertising CampaignAn advertising campaign is a series of advertisement messages that share a single idea and theme which make up an integrated marketing communication (IMC).
BrandingThe process involved in creating a unique name and image for a product in the consumers' mind, mainly through advertising campaigns with a consistent theme.
Campaign ManagementImplements public relations, product development, and sales to create, execute, monitor, and measure marketing programs directed at specifically target audiences.
Conversion MarketingThe act of converting site visitors into paying customers
Creative ServicesA department within a company that does creative work such as writing, designing, and production.
Daily DealsAn ecommerce business model in which a website offers a single product for sale for a period of 24 to 36 hours.
DemographicsStatistical data relating to the population and particular groups within it.
Direct Response (DR)A type of marketing that elicits a specific, measured response resulting from a consumer's direct response to a marketer.
Dynamic CreativePersonalized content.
Marketing CampaignMarketing campaigns promote a product through different media, including television, radio, print and online platforms.
National Cyber Security Awareness Month (NCSAM)National Cyber Security Awareness Month (NCSAM) is observed each October since its inception in 2004 in the United States of America.
Online Video MarketingUsing video to promote or market your brand, product, or service.
Pay Per Click (PPC)A business model whereby a company that has placed an advertisement on a website pays a sum of money to the host website when a use clicks on to the advertisement.
QR CodeA machine readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone.
SponsorshipA person who vouches or is responsible for a person or thing.
Enterprise SearchThe practice of making content from multiple enterprise-type sources, such as databases and intranets, searchable to a defined audience.
International Search Engine Optimization (SEO)International SEO is the process of optimizing your website so that search engines can easily identify which countries you want to target and which languages you use for business.
Internet SearchWeb sites or software that search the internet for documents that contain a key word, phrase, or subject that is specified by the user to the search engine.
KeywordsAn informative word used in an information retrieval system to indicate the content of a document.
Multilingual SEO ServicesMultilingual SEO is the backbone of any global search marketing campaign, and often referred to as natural or organic search, SEO is the process used to improve website rankings in the Search Engine Results Pages.
Search Engine Marketing (SEM)A form of Internet marketing that involves the promotion of websites by increasing their visibility in search engine results pages primarily through paid advertising.
Search Engine Optimization (SEO)The process of maximizing the number of visitors to a particular website by ensuring that the site appears high on the list of results returned by a search engine.
Search RetargetingA form of retargeting employed by online marketers that target an audience based on the previous searches they conduct on other websites.
Digital EngagementAny use of social media by a corporate organization, right through to more specific definitions around how public sector organizations promote participation in policymaking.
Global Social Media MarketingGlobal social media marketing allows you to organize your channels for an audience that speaks different languages.
HashtagA hashtag is a type of metadata tag used on social networks such as Twitter and other microblogging services, allowing users to apply dynamic, user-generated tagging which makes it possible for others to easily find messages with a specific theme or content; it allows easy, informal markup of folk taxonomy without need of any formal taxonomy or markup language.
Integrated Social MarketingAn approach to creating a unified and seamless experience for consumers to interact with the brand/enterprise; it attempt to meld all aspects of marketing communication such as advertising, sales promotion, public relations, direct marketing, and social media.
SEO/SEM RetargetingClosely related to site retargeting and has to do with the search terms used prior to clicking to or arriving on your site.
Social ActivationThe act of transforming your social media followers from voyeurs, into participants, into ultimately, evangelists.
Social AnalyticsRefers to the collection and analysis of statistical, digital data on how users interface with an organization, particularly online.
Social BusinessA business created and designed to address a social problem.
Social Content and AppsShorthand for the terms social media and content marketing. It represents content and link sharing on various social media platforms.
Social EngagementRefers to one's degree of participation in a community or society.
Social GraphThe social graph in the Internet context is a graph that depicts personal relations of internet users. In short, it is a model or representation of a social network, where the word graph has been taken from graph theory.
Social ListeningThe process of monitoring digital conversations to understand what customers are saying about a brand and industry online.
Social MediaWebsites and applications that enable users to create and share content or to participate in social networking.
Social Media IntelligenceSocial media intelligence (SMI or SOCMINT) refers to the collective tools and solutions that allow organizations to monitor social channels and conversations, respond to social signals and synthesize social data points into meaningful trends and analysis based on the user's needs.
Social Media MarketingSocial media marketing is the use of social media platforms and websites to promote a product or service.
Social Media MonitoringThe active monitoring of social media channels for information about a company or organization.
Social NetworkingThe use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
Social PublishingDefined as any form, new or emerging, of online content creation.
Social RetargetingAlso known as remarketing, is a form of online advertising that can help you keep your brand in front of bounced traffic after they leave your website.
Social VerificationA social psychological theory that asserts people want to be known and understood by others according to their firmly held beliefs and feelings about themselves, that is self-views.
SocialFlowSocialFlow uses real-time data and business rules to determine what and when to publish to your social media properties for both owned & paid social posts.
SprinklrSprinklr is a complete social media management system for the enterprise. Helping the world's largest brands do marketing, advertising, care, sales, research, and commerce on Facebook, Twitter, LinkedIn, and 21 other channels globally all on one integrated platform.
Acquisition StrategyThe acquisition strategy is a comprehensive, integrated plan developed as part of acquisition planning activities. It describes the business, technical, and support strategies to manage program risks and meet program objectives.
Ad ViewabilityThe online advertising metric which keeps the track of those impressions which are actually viewed by the customers.
Advocacy MarketingAdvocacy Marketing is a form of marketing that emphasizes getting existing customers to talk about the company and its products.
Alliance MarketingJoining two or more organizations on the purpose of sharing marketing strategy, promoting concepts, services or products.
Analyst RelationsAnalyst relations is a corporate strategy, corporate communications and marketing activity in which corporations communicate with ICT industry analysts (also known as research analysts) who work for independent research and consulting firms such as the leading four.
Attention/Engagement AnalyticsAttention/Engagement metrics measure the extent to which a user is engaged when they visit a website
Attribution ModelsAn attribution model is the rule, or set of rules, that determines how credit for sales and conversions is assigned to touchpoints in conversion paths.
Audience MeasurementAudience measurement measures how many people are in an audience, usually in relation to radio listenership and television viewership, but also in relation to newspaper and magazine readership and, increasingly, web traffic on websites.
Audience SegmentationAudience segmentation is a process of dividing people into homogeneous subgroups based upon defined criterion such as product usage, demographics, psychographics, communication behaviors and media use.
BenchmarkingEvaluate or check something by comparison with a standard.
Clickstream AnalyticsThe process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits and in what order.
Click-Through Rate (CTR)Click-through rate (CTR) is the ratio of users who click on a specific link to the number of total users who view a page, email, or advertisement.
Communications StrategyA communications strategy, or plan, is a document that expresses the goals and methods of an organization's outreach activities, including what an organization wishes to share with the public and whom the organization is trying to reach.
Concept TestingConcept testing is the process of using surveys to evaluate consumer acceptance of a new product idea prior to the introduction of a product to the market.
Conversion Rate Optimization (CRO)Conversion Rate Optimization is a system for increasing the percentage of visitors to a website that convert into customers, or more generally, take any desired action on a webpage.
Cross-Cultural MarketingCross-cultural marketing is the strategic process of marketing to consumers whose culture is different from that of the marketer's own culture.
Customer Acquisition Cost (CAC)Customer Acquisition Cost is the cost associated in convincing a customer to buy a product/service.[1] This cost is incurred by the organization to convince a potential customer. This is an important business metric.
Customer Advisory Board (CAB)A Customer Advisory Council (also referred to as a Customer Advisory Board or CAB)is a form of market research whereby a group of existing customers is convened on a regular basis to advise company management on industry trends, business priorities, and strategic direction.
Digital StrategyA digital strategy is a form of strategic management and a business answer or response to a digital question, often best addressed as part of an overall business strategy.
Display Advertising MetricsDisplay Advertising Metrics gauge quantites such as conversions, conversion rate, cost per conversion, click through rate, and clicks.
E-Business StrategyAn E-Business Strategy defines short-term and long-term e-business goals and involves careful and skilled planning.
Economic GrowthThe increase in the inflation-adjusted market value of the goods and services produced by an economy over time, measured as real GDP
Enterprise Feedback Management (EFM)Enterprise feedback management (EFM) is a system of processes and software that enables organizations to centrally manage deployment of surveys while dispersing authoring and analysis throughout an organization.
Global MarketingGlobal marketing is marketing on a worldwide scale reconciling or taking commercial advantage of global operational differences, similarities and opportunities in order to meet global objectives.
Global ProcurementGlobal procurement became a way for organisations to meet the challenges of new markets and global competitors.
Go to MarketGo-to-market or go-to-market strategy is the plan of an organization, utilizing their inside and outside resources (e.g. sales force and distributors), to deliver their unique value proposition to customers and achieve competitive advantage.
In-Store AnalyticsIn-store analytics is basically the process of finding meaningful insights from customers' behavioral data.
Intent MarketingIs about marketing a product or a service based on consumers' intent to adopt, purchase or consume that particular service which may have been either explicitly or implicitly conveyed by the subscriber.
Key Opinion Leader (KOL)Key Opinion Leader (KOL) is a person or organization who has expert product knowledge and influence in a respective field.
Magic Quadrant (MQ)Magic Quadrant (MQ) refers to a series published by IT consulting firm Gartner of market research reports that rely on proprietary qualitative data analysis methods to demonstrate market trends, such as direction, maturity and participants.
Market DevelopmentA growth strategy that identifies and develops new market segments for current products
Market Entry StrategyA Market Entry Strategy is the planned method of delivering goods or services to a new target market and distributing them there.
Market ExpansionThe process of offering a product or service to a wider section of an existing market or into a new demographic, psychographic or geographic market.
Market PenetrationThe successful selling of a product or service in a specific market, and it is measured by the amount of sales volume of an existing good or service compared to the total target market for that product or service
Market ResearchThe action or activity of gathering information about consumers' needs and preferences.
Marketing AnalyticsThe practice of measuring, managing and analyzing marketing performance
Marketing AttributionThe identification of a set of user actions that contribute in some manner to a desired outcome, and then the assignment of a value to each of these events.
Marketing BudgetsA marketing plan in terms of costs; an estimated amount of cost that will be required to promoted products or services.
Marketing ChallengesA current non-market leader actively trying to move up within their industry.
Marketing DashboardsA central meeting place for all these data sources so that digital markets can get a full understanding of SEO performance from a number of perspectives through metrics.
Marketing EcosystemThe specific strategies and individual tools included in a marketing ecosystem and used to execute digital marketing campaigns are dependent on many factors including the goals for the campaign as well as the company's industry and their customer's buying habits.
Marketing InitiativesA marketing initiative is essentially anything that is clearly defined as a marketing effort.
Marketing KPIKey performance indicators, specifically within the marketing division. Key Performance Indicators (KPIs) are one of the most over-used and little understood terms in business development and management. They are too often taken to mean any metric or data used to measure business performance.
Marketing ManagementThe process of overseeing and planning new product development, advertising, promotions and sales.
Marketing MessagingA promotional message can come in many forms, such as television or magazine advertisement, or a slogan on a product package.
Marketing MixThe marketing mix (also known as the 4 Ps) is a foundation model in marketing. The marketing mix has been defined as the "set of marketing tools that the firm uses to pursue its marketing objectives in the target".
Marketing OperationsThe function has emerged due to the need for a more transparent, efficient, and accountable view of marketing.
Marketing OptimizationMarketing Optimization is the process of improving the marketing efforts of an organization in an effort to maximize the desired business outcomes.
Marketing Performance MeasurementMarketing performance measurement (MPM), or marketing performance management, is the systematic management of marketing resources and processes to achieve measurable gain in return on investment and efficiency, while maintaining quality in customer experience.
Marketing PlansA comprehensive document or blueprint that outlines a company's advertising and marketing efforts for the coming year.
Marketing ResearchThe action of activity of gathering information about consumer's needs and preferences.
Marketing Resource ManagementA systematic method of managing marketing resources such as digital assets, collateral, schedules, forecasts and budgets.
Marketing StrategyA process or model to allow a company or organization to focus limited resources on the best opportunities to increase sales and thereby achieve a sustainable competitive advantage.
Marketing TipsThe strategic functions involved in identifying and appealing to particular groups of consumers, often including activities such as advertising, branding, pricing, and sales.
Marketing WorkflowA sequence of processes that govern the tactical elements of your campaigns.
Measure ImpactImpact measurement is the process of trying to find out what effect an intervention (such as a funding programme) is having on people, organisations or their external physical, economic, political or social environment.
Media PlanningTo determine the best combination of media to achieve the marketing campaign objectives.
Multicultural MarketingMulticultural marketing (also known as ethnic marketing) is the practice of marketing to one or more audiences of a specific ethnicity typically an ethnicity outside of a country's majority culture, which is sometimes called the "general market."
Multi-level MarketingMulti-level marketing (MLM) also called pyramid selling, network marketing, and referral marketing, is a marketing strategy for the sale of products or services where the revenue of the MLM company is derived from a non-salaried workforce selling the company's products/services, while the earnings of the participants are derived from a pyramid-shaped commission system.
Operational ExcellenceOperational Excellence is the execution of the business strategy more consistently and reliably than the competition.
Precision MarketingPrecision marketing is a marketing technique that suggests successful marketing is to retain, cross-sell and upsell existing customers.
Pricing StrategyA pricing strategy takes into account segments, ability to pay, market conditions, competitor actions, trade margins and input costs, amongst others.
Procure-to-PayProcure-to-pay is a term used in the software industry to designate a specific subdivision of the procurement process.
Product StrategyProduct strategy is defined as the road map of a product. This road map outlines the end-to-end vision of the product, particulars on achieving the product strategy and the big picture context in terms of what the product will become. Companies utilise the product strategy in strategic planning and marketing to identify the direction of the company's activities.
Product/Market Fit (PMF)Product/market fit is the degree to which a product satisfies a strong market demand.Product/market fit has been identified as a first step to building a successful venture in which the company meets early adopters, gathers feedback and gauges interest in its product(s).
Proof of PlayA new concept in cryptocurrency that rewards gamers an opportunity to earn in-game cryptocurrency coins.
Real Time PersonalizationData-driven personalization completed in less than 1 second.
Real-Time ReportingReal-time reporting is a business intelligence practice that consists of gathering up-to-the-minute data and relaying it to users as it happens.
ROI AnalysisTo calculate ROI, the benefit or return of an investments is divided by the cost f the investment, and the result is expressed as a percentage or a ratio.
Sales DashboardsSales dashboard is an easy-to-read graphical representation of sales data that's intended to enable sales managers to make better decisions.
Sentiment AnalysisThe process of computationally identifying and categorizing opinions expressed in a piece of text, especially in order to determine whether the writer's attitude towards a particular topic, product, etc., is positive, negative, or neutral.
Site-Side OptimizationThe procedures used to optimize or to design from scratch a website to rank well in search engines.
Spend ManagementSpend management is managing how to spend money to best effect in order to build products and services.
Survey DataAny number of ways in which data can be collected for a statistical survey.
Thought LeadershipCan refer to an individual or firm that is recognized as an authority in a specialized field and whose expertise is sought and often rewarded.
Time To Market (TTM)In commerce, time to market (TTM) is the length of time it takes from a product being conceived until its being available for sale. TTM is important in industries where products are outmoded quickly.
Uplift ModelingA predictive modelling technique that directly models the incremental impact of a treatment on an individual's behavior.
Vision StatementsA company's road map, indicating both what the company wants to become and guiding transformational initiatives by setting a defined direction for the company's growth.
Visual MarketingVisual marketing is the discipline studying the relationship between an object, the context it is placed in and its relevant image. Representing a disciplinary link between economy, visual perception laws and cognitive psychology,[1] the subject mainly applies to businesses such as fashion and design.
Win / Loss AnalysisWin / loss analysis is a forensic market research exercise that focuses on de-constructing how companies market and sell their products and services from the prospect's perspective. The process typically entails conducting extensive telephone interviews with new clients or lost prospects.
Accelerated Mobile Pages (AMP)The Accelerated Mobile Pages Project (AMP) is an open-source website publishing technology designed to improve the performance of web content and advertisements. The AMP Project led by Google is a competitor to Facebook's Instant Articles,[1] and includes several other large search, social and web publishing platforms around the world.
Adobe Experience Manager (AEM)An enterprise content management solution that helps simplify the management and delivery of your content and assets.
Blog CommentsA space within a blog that the reader can share their ideas or thoughts on a specific blog post page.
BloggingAn approach to the analysis of datasets using techniques from topology.
Conversion FunnelConversion funnel is a phrase used in e-commerce to describe the journey a consumer takes through an Internet advertising or search system, navigating an e-commerce website and finally converting to a sale. The metaphor of a funnel is used to describe the way users are guided to the goal with fewer navigation options at each step.
Corporate BloggingA blog that is published and used by an organization, corporation, etc.to reach its organizational goals.
Facebook PixelA Facebook pixel is code that you place on your website. It helps you track conversions from Facebook ads, optimize ads based on collected data, build targeted audiences for future ads, and remarket to qualified leads people who have already taken some kind of action on your website.
Google AnalyticsA freemium web analytics service offered by Google that tracks and reports website traffic.
Landing PagesThe section of a website accessed by clicking a hyperlink on another web page, typically the website's home page.
Multilingual WebsiteA multilingual website is a website that provides content in more than one language, for example, English, French, and German.
Responsive AnimationsResponsive Animations are animations that feature a responsive design that will render and scale appropriately on a variety of devices.
Site ManagementThe administration and control of the hardware and software used in a web site.
Site PersonalizationConsists of tailoring a service or a product to accommodate specific individuals, sometimes tied to groups or segments of individuals.
Style GuideA style guide (or manual of style) is a set of standards for the writing and design of documents, either for general use or for a specific publication, organization, or field.
User-Generated ContentTerm used to describe any form of content such as video, blogs, discussion form posts, digital images, audio files, and other forms of media that was created by consumers or end-users of an online system or service and is pubic ally available to others consumers and end-users.
Video BlogsA form of blog for which the medium is video, and is a form of web television. Vlog entries often combine embedded video with supporting text, images, and other metadata.
Web AnalyticsThe measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage.
Web ContentThe textual, visual, or aural content that is encountered as part of the user experience on websites. It may include - among other things - text, images, sounds, videos and animations.
Web CopyVerbiage written specifically for use on the web.
Web Site HostingThe activity or business of providing storage space and access for websites.
Website BuildersWebsite builders are tools that typically allow the construction of websites without manual code editing.
Website DesignThe process of creating websites.
Security: Digital & Cyber

Technology WordMeaning
Access and Information ProtectionInformation protection policy is a document which provides guidelines to users on the processing, storage and transmission of sensitive information.
Address Space Layout Randomization (ASLR)Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.
Advanced Persistent Threat (APT)An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either private organizations, states or both for business or political motives.
Advanced Threat Protection (ATP)Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data.
Apache SPOTApache Spot overcomes the challenge of how to enhance data collection from different sources when most of the time our collectors are sending thousands of events per second overflowing available server resources.
Apache TomcatApache Tomcat, often referred to as Tomcat Server, is an open-source Java Servlet Container developed by the Apache Software Foundation (ASF).
Application SecurityApplication security is the use of software, hardware, and procedural methods to protect applications from external threats.
AppLockerAppLocker is an application whitelisting technology introduced with Microsoft's Windows 7 operating system. AppLocker allows restricting which programs users can execute based on the program's path, publisher, or hash.[1] AppLocker can be configured for an enterprise via Group Policy.
BackdoorA backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device
BotnetBotnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
Card Verification Value (CVV)A card verification value (CVV) is a security feature present in credit, debit and ATM cards to facilitate "card not present" transactions.
Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².
Check Point Software TechnologiesCheck Point Software Technologies, Ltd. Is the corporate name of a security vendor that offers security for networks, data and endpoints, unified under a single management framework.
ClickjackingClickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
Common Access Card (CAC)A Common Access Card (CAC) is a smart card that serves as a standard identification for United States Active Duty Uniform Defense Personnel, including the National Guard and Selected Reserve, civilian employees of the United States Coast Guard (USCG), civilian employees of the Department of Defense (DoD) and other DoD and USCG contractor personnel.
Common Criteria (CC)Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements (SFRs and SARs respectively) in a Security Target (ST), and may be taken from Protection Profiles (PPs).
Computer HackingComputer hacking refers to the practice of modifying or altering computer software and hardware to accomplish goal that is considered to be outside of the creator's original objective.
ConfickerConficker is a worm that infects computers running the Windows operating system by using known flaws in Windows.
Credential StuffingCredential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts.
CrimewareCrimeware (as distinct from spyware and adware) is designed to perpetrate identity theft through social engineering or technical stealth in order to access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the cyberthief.
Cross-Site ScriptingCross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
CryptojackingCryptojacking is the unauthorized use of computing resources to mine cryptocurrencies. The idea is that a smart system can utilize the resources of visiting devices or end users to contribute to bitcoin mining or other similar mining efforts.
Cyber & IntelligenceWhile cyber security comprises the recruitment of IT security experts, and the deployment of technical means, to protect an organization's critical infrastructure, or intellectual property, CTI is based on the collection of intelligence using open source intelligence, social media intelligence, human intelligence, or intelligence from the deep and dark web.
Cyber Risk ManagementRisk management is the process of identifying, assessing, and controlling threats to an organization's capital and earnings.
Cyber SecurityCyber security is the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Cyber Security FrameworkThe cyber security framework provides a policy framework of computer security guidance for how private sector organizations can asses and improve their ability to prevent, detect, and respond to cyber attacks.
Cyber ThreatsA cyber threat is the possibility of a malicious attempt to damage or disrupt a computer network or system.
CyberattackA cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.
CybercrimeCybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
CyberstalkingCyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. This crime can be perpetrated through email, social media, chat rooms, instant messaging clients and any other online medium.
CyberwarfareCyberwarefare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Data BreachA data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Data EncryptionData encryption is the translation of data into a secret code.
Data Execution Prevention (DEP)Data execution prevention (DEP) is a security feature within operating system that prevents applications from executing code from a non-executable memory location.
Data ExfiltrationData exfiltration is the unauthorized transfer of sensitive information from a target's network to a location which a threat actor controls
Data Protection Officer (DPO)A data protection officer (DPO) is an enterprise security leadership role required by the General Data Protection Regulation (GDPR). Data protection officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
Data SecurityData security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites.
Defense In DepthDefense in depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system.
Device SecurityDevice security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. 
Distributed Denial-of-Service (DDoS)A distributed denial-of-service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
DridexDridex malware is a type of malware that uses Microsoft Office macros. It can help hackers to steal financial information and other identifiers for users.
Electronic Identity Verification (eIDV)Electronic Identity Verification is the use of information in public and private databases to quickly confirm whether an individual is who they claim to be based on personal information such as their name, date of birth, Social Security number, and address.
EncryptionEncryption is the process of converting information or data into a code, especially to prevent unauthorized access.
Encryption Key ManagementEncryption key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys.
End User SecurityEnd user security is the subject of security risks, compromises, and options available to the average computer user.
Endpoint ManagementEndpoint management is the ability to centrally discover, provision, deploy, update, and troubleshoot endpoint devices within an organization
Endpoint SecurityIn network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices.
Enterprise FirewallAn Enterprise firewall is a system designed to protect the network of an organization.
Entitlement ManagementEntitlement management is technology that grants, resolves, enforces, revokes and administers fine-grained access entitlements.
ERP SecurityERP is the integrated management of core business process, often in real-time and mediated by software and technology.
Exploit KitExploit kits or exploit packs refer to a type of hacking toolkit that cybercriminals use to take advantage of vulnerabilities in systems/devices so they can distribute malware or do other malicious activities.
FirewallFirewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
FortinetFortinet is an American multinational corporation headquartered n Sunnyvale, CA.
Fraud Detection and PreventionThe adoption of Fraud Detection and prevention services helps create a strong defense against such breach of law, thereby helping in the prevention and mitigation of fraud-related activities.
Fraud ProtectionOnline fraud protection is the process of protecting oneself from being lured into scams over the Internet.
Google AuthenticatorGoogle Authenticator is a software token that implements two-step verification services using the Time-based One-time Password Algorithm and HMAC-based One-time Password Algorithm, for authenticating users of mobile applications by Google.
Hardware Security Module (HSM)A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.
HijackingHijacking is to illegally seize something in transit and force it to go to a different designation or use it for one's own purposes.
Identity Access Management (IAM)Identity management is, in computer security, the security and business discipline that 'enables the right individuals to access the right resources at the right times and for the right reasons'.
Identity ManagementIdentity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.
Identity ProofingIdentity proofing is the process by which an organization collects and verifies information about a person for the purpose of account opening or issuing credentials to that person.
Identity Providers (IdP)An identity provider (abbreviated IdP) is a system entity that creates, maintains, and manages identity information for principals while providing authentication services to relying party applications within a federation or distributed network.
Information SecurityInformation security is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
Internet SecurityInternet security is defined as a process to create rules and actions to take to protect against attacks over the Internet.
Intrusion DetectionAn intrusion detection system is a device of software application that monitors a network or systems for malicious activity or policy violations.
Intrusion PreventionIntrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.
IPSecInternet Protocol Security is a set of protocols that provides security for Internet Protocol.
KerberosKerbeos is a network protocol that uses secret-key cryptography to authenticate client-server applications.
Keystroke LoggingKeystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Knowledge-Based Authentication (KBA)Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a financial institution or website.
Malicious DomainsMalicious domains usually refer to a series of illegal activities, posing threats to people's privacy and property through a hosting websites.
Malware AnalysisMalware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor.
Malware and VulnerabilitiesMaleware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
Malware AttacksA malware attack is a piece of malicious software which takes over a person's computer in order to spread the bug onto other people's devices and profiles.
Malware DetectionMaleware detection is the detection of a variety of forms of hostile or intrusive software.
Malware ThreatsMalware threats are the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems.
Man in the Middle AttackA man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
Managed Detection and Response (MDR)Managed Detection and Response (MDR) is an all-encompassing cybersecurity service used to detect and respond to cyber-attacks.
Managed Security ServicesA managed security service provider is an Internet service provider that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network management.
MandiantMandiant is an American cybersecurity firm.
MicrosegmentationMicrosegmentation refers to the process of segmenting a collision domain into various segments. Microsegmentation is mainly used to enhance the efficiency or security of the network.
Multifactor AuthenticationMulti-factor authentication is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism - typically at least two of the following categories: knowledge, possession, and inherence.
Next-Generation Firewall (NGFW)A Next-Generation Firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS).
One Time PasswordA one-time password or pin (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device.
Out-of-Band AuthenticationOut of band authentication is a term for a process where authentication requires two different signals from two different networks or channels.
Password ProtectionPassword protection is a security process that protects information accessible via computers that needs to be protected from certain users.
PCI CompliancePCI compliance is not a single event, but an ongoing process. The Payment Card Industry Data Security Standard was established by the major card brands. All businesses that process, store, or transmit payment card data are required to implement the standard to prevent cardholder data theft.
Penetration TestingPenetration testing is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Point-to-Point Encryption (P2PE)Point-to-point encryption (P2PE) is a standard established by the PCI Security Standards Council. Payment solutions that offer similar encryption but do not meet the P2Pe standard are referred to as end-to-end encryption (E2Ee) solutions.
Positive PayPositive Pay is an automated fraud detection tool offered by the Cash Management Department of most banks. In its simplest form, it is a service that matches the account number, check number and dollar amount of each check presented for payment against a list of checks previously authorized and issued by the company.
Potentially Unwanted Program (PUP)A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted. It is used as a subjective tagging criterion by security and parental control products.
Private KeysPrivate keys are a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular recipient, such that the encrypted messages can be deciphered only by using a second key that is known only to the recipient.
Privileged Access Management (PAM)Privileged Access Management (PAM) is a solution that helps organizations restrict privileged access within an existing Active Directory environment.
Quantum CryptographyQuantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.
RansomwareRansomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.
Rapid7Rapid7 delivers the visibility, analytics, and automation needed to monitor, investigate, and resolve the vulnerabilities, threats, and performance issues that put organizations at risk.
Remote Access Trojan (RAT)A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.
Retina Network Security ScannerRetina Network Security Scanner is the security industry's most respected and validated vulnerability assessment tool.
Role-Based Access Control (RBAC)In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
SandboxingSandboxing is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not spread to other areas on the computer.
SAP VulnerabilitiesAn SAP vulnerability is a security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered.
ScarewareScareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software.
SecOpsSecOps is the seamless collaboration between IT Security and IT Operations to effectively mitigate risk.
Secure Sockets Layer (SSL)SSL is the standard security technology for establishing an encrypted link between a web server and a browser.
Secure Supervisory Control and Data Acquisition (SCADA)Supervisory control and data acquisition is a control system architecture that uses computers, networked data communications and graphical user interfaces for high-level process supervisory management, but uses other peripheral devices such as programmable logic controllers and discrete PID controllers to interface to the process plant or machinery.
Secure VoiceSecure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP.
Secure Web Gateway (SWG)A secure Web gateway is a type of security solution that prevents unsecured traffic from entering an internal network of an organization.
Security AnalyticsSecurity analytics is simply a collection of security data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional security data processing applications.
Security ArchitectureSecurity architecture is unified security design that addresses the necessities and potential risks involved in a certain scenario or environment.
Security as a ServiceSecurity as service is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own, when total cost of ownership is considered.
Security AutomationSecurity Automation is the automatic handling of security operations-related tasks. It is the process of executing these tasks, such as scanning for vulnerabilities, without human intervention.
Security BenchmarkingA benchmark is a standard against which the performance of a security, mutual fund or investment manager can be measured.
Security BreachesA security breach is any incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms.
Security ComplianceThe term security compliance of a computer system against a particular security baseline is used in the field of information security to denote the fact that after performing a qualified analysis of necessary features of the system, the system in question has been recognized to be configured in a way that is in line with all of the requirements as demanded by the particular security policy.
Security ConfigurationSecurity configuration management is the process, in which the security configuration baseline of It components is formalized and subsequently verified against the actual state of security configurations.
Security ConsultingA security consultant is an advisor, guide, and all around security guru.
Security EventA security event is a change in the everyday operations of a network or information technology service indicating that a security policy may have been violated or a security safeguard may have failed.
Security ForensicsComputer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
Security HygieneCyber hygiene is the establishment and maintenance of an individual's online safety.
Security Information and Event Management (SIEM)In the field of computer security, security information and event management software products and services combine security information management and security event management.
Security IntelligenceSecurity intelligence is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
Security ManagementSecurity management is the identification of an organization's assets, followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Security OperationsA Security Operations, analytics and reporting platform utilizes machine-readable and stateful security data to provide reporting, analysis and management capabilities to support operational security teams.
Security Operations Center (SOC)A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology.
Security OrchestrationSecurity Orchestration is a method of connecting security tools and integrating disparate security systems. It is the connected layer that streamlines security processes and powers security automation.
Security PatchesA security patch is a software or operating-system patch that is intended to correct a vulnerability to hacking or viral infection.
Security PoliciesA security policy is a definition of what It means to be secure for a system, organization or other entity.
Security SolutionsSecurity solutions are precautions taken to ensure protection of data.
Security Standards CouncilThe security standards council was originally formed with the goal of managing the ongoing evolution of the payment card industry data security standard.
Security StorageStorage security is a specialty area of a security that is concerned with securing data storage systems and ecosystems and the data that resides on these systems.
Security ThreatsA threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.
Security ToolsSecurity tools refers to security software, which is a general phrase used to describe any software that provides security for a computer or network.
Sensitive DataSensitive data is defined as information that is protected against unwarranted disclosure. Access to sensitive data should be safeguarded. Protection of sensitive data may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations.
Server FarmsA server farm is another term for a data center.
Shadow ITShadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval.
Single Sign On (SSO)Single sign-on is an authentication process that allows a user to access multiple applications with one set of login credentials.
Software Defined Perimeter (SDP)Software Defined Perimeter (SDP) is an approach to computer security which evolved from the work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative around 2007.
Space Traffic Management (STM)Space traffic management is the cyber security of the space world. It is a hugely important public policy issue that underpins the successful future expansion of space activities, yet there is no agreement on its definition.
SSL VPNAn SSL VPN is a form of VPN that can be used with a standard Web browser.
Strong AuthenticationStrong authentication blends a minimum of two different authentication factors of different types to improve the safety of identity verification.
Strong EncryptionA strong encryption is an encryption method that uses a very large number as its cryptographic key.
SYN FloodA SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
Technology SecurityTechnology security is the process of implementing measures and systems designed to securely protect and safeguard information.
Threat IntelligenceThreat intelligence is the analysis of internal and external threats to an organization in a systematic way. The treats that threat intelligence attempts to defend against include zero-day threats, exploits and advanced persistent threats (APTs).
Threat PreventionThreat prevention is measures against or software designed to protect a network from attack.
Transport Layer Security (TLS)Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), which is now prohibited from use by the Internet Engineering Task Force (IETF) are cryptographic protocols that provide communications security over a computer network.
Two-Factor AuthenticationTwo factor authentication is an extra layer of security that is known as 'multifactor authentication' that requires not only a password and username but also something that only, and only, that user has on them.
Unified endpoint management (UEM)Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
Unified Threat ManagementUnified threat management is a term first used by IDC to describe a category of security appliances which integrates a range of security features into a single appliance.
VMware NSXVmware NSX is a virtual networking and security software product family created from Vmware's vCloud Networking and Security and Nicira Network Virtualization Platform intellectual property.
Vulnerability AssessmentVulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure.
Vulnerability ManagementVulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities, particularly in software.
Vulnerability ScanningVulnerability scanning is a security technique used to identify security weaknesses in a computer system. Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers attempting to gain unauthorized access to computer systems.
Web Application Firewall (WAF)A web application firewall (or WAF) filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers.
Web Application SecurityWeb application security is the process of securing confidential data stored online from unauthorized access and modification.
Web FilterA Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user.
Website DefacementWebsite defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of defacers, who break into a web server and replace the hosted website with one of their own.
WhitelistingWhitelisting is a IT security process used to identify safe email senders, domain and/or IP addresses.
Zero-Day AttackA zero-day attack is also sometimes defined as an attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
Zero-Day ThreatA zero-day threat is a threat that exploits an unknown computer security vulnerability.
ZoneAlarmZoneAlarm is an internet security software company that provides consumer antivirus and firewall products. ZoneAlarm was developed by Zone Labs, which was acquired in March 2004 by Check Point.
Servers & Racks

Technology WordMeaning
Apache HTTP ServerAn open source Web server creation, deployment and management software.
Apache SolrApache Solr is an open source enterprise search platform, written in Java, from the Apache Lucene project. Its major features include full-text search, hit highlighting, faceted search, real-time indexing, dynamic clustering, database integration, NoSQL features and rich document handling. 
Application ServerA component-based product that resides in the middle-tier of a server centric architecture.
Blade ServersA server architecture that houses multiple server models blades in a single chassis.
Capacity Requirement Planning (CRP)Capacity Requirements Planning is an accounting method used to determine the available production capacity of a company.
Capacity UtilizationCapacity utilization is a measure of the extent to which the productive capacity of a business is being used.
ClusteringClustering, in the connect or databases, refers to the ability of several servers or instances to connect to a single database.
Communication ServerA communication server is a dedicated system that provides communication services for users on a network who need to transfer files or access information on systems or networks at remote locations over telecommunication links.
CPU UsageCPU Usage refers to the computer's processor and how much work it's doing.
Directory ServersA directory server is a network server that provides a database of mostly unchanging data.
Entry-Level ServersEntry level servers offer power, choice, and ease-of-use to take on the most challenging workloads simply and cost-effectively.
Exchange ServerAn exchange server is a mail server and calendaring server developed by Microsoft.
File ServersA file server is a device that controls access to separately stored files, as part of a multiuser system.
FileZillaFileZilla is a free software, cross-platform FTP application, consisting of FileZilla Client and FileZilla Server. Client binaries are available for Windows, Linux, and macOS, server binaries are available for Windows only. Both server and client support FTP and FTPS (FTP over SSL/TLS), while the client in addition also can connect to SFTP servers.
GunicornThe Gunicorn is a Python Web Server Gateway Interface (WSGI) HTTP server. It is a pre-fork worker model ported from Ruby's Unicorn project. The Gunicorn server is broadly compatible with a number of web frameworks simply implemented
HAProxyHAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers.
HPE 3PAR StoreServHPE 3PAR StoreServ is a tier 1 all-flash data storage array that can scale from midsize to the largest enterprises and service providers, for instant application provisioning and high levels of service.
Index ServersIndexing Service was a Windows service that maintained an index of most of the files on a computer to improve searching performance on PCs and corporate computer networks.
Intel XeonXeon is a 400 MHz pentium microprocessor from Intel for use in 'mid-range' enterprise servers and workstations.
Internet Information Services (IIS)Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family.
JenkinsJenkins is an open source automation server written in Java. Jenkins helps to automate the non-human part of software development process, with continuous integration and facilitating technical aspects of continuous delivery.
Load BalancingA load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase capacity and reliability of applications.
Microsoft BizTalkMicrosoft BizTalk is an inter-Organizational Middleware System that enables companies to automate business processes, through the use of adapters which are tailored to communicate with different software systems used in an enterprise.
Microsoft Team Foundation Server (TFS)Team foundation Server is a Microsoft product that provides source code management, reporting, requirements management, project management, automated builds, lab management, testing and release management capabilities.
NginxNginx is a web server which can also be used as a reverse proxy, load balancer and HTTP cache.
Rack ServersA rack server, also called a rack-mounted server, is a computer dedicated to use as a server and designed to be installed in a framework called a rack.
Reverse ProxyA reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers.
Search ServersMicrosoft Search Server is an enterprise search platform from Microsoft, based on the search capabilities of Microsoft Office SharePoint Server.
Server AutomationServer Automation is an integrated solution that automates provisioning, patching, and configuration of operating systems, storage resources and application components across physical, virtual and public cloud systems.
Server EnvironmentsA server environment is a networking environment that is made up of clients and servers running applications designed for client/server architecture.
Server FailureA variety of events can lead to the failure of a server like loss of power, hardware malfunction, operating system crashes, network partitions, and unexpected application behavior can all contribute to the failure of a server instance.
Server HardwareDesignating a computer as 'server class hardware' implies that is socialized for running servers on it.
Server InfrastructureServer infrastructure certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking.
Server ManagementServer management is a set of tools from Microsoft that assists in managing PCs connected to a local-area network.
Server MigrationServer migration is simply the act of moving your server data and configuration from one server to another.
Server PerformanceServer performance is the speed at which a computer operates.
Server PowerServer power is any power source that operates a server.
Server ProvisioningServer provisioning is setting up a server for use in the network.
Server ResourcesServer resources include the number and identity of individual physical servers, processors, and operating systems.
Server SecurityA secure server is a Web server that guarantees secure online transactions.
Server SoftwareServer software is a type of software that is designed to be used, operated and managed on a computing server.
ServersA server is a computer or computer program that manages access to a centralized resource or service in a network.
System Center Configuration Manager (SCCM)System Center Configuration Manager (SCCM, also known as ConfigMgr),[1] formerly Systems Management Server (SMS)[2] is a systems management software product developed by Microsoft for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems.
Tower ServersA tower server is a computer intended for use as a server and built in an upright cabinet that stands alone.
VMware ESXVMware ESXi (formerly ESX) is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers.
Windows MigrationWindows migration is the process of transferring the entire user environment between two computer systems.
Windows ServerWindows servers are more powerful versions of their desktop operating system counterparts and are designed to more efficiently handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions.
Windows Server 2003 EOSWindows Server 2003 is a server operating system produced by Microsoft.
WowzaWowza Streaming Engine (known as Wowza Media Server prior to version 4) is a unified streaming media server software developed by Wowza Media Systems.
XenServerCitirix XenServer is a hypervisor platform that enables the creation and management of virtualized server infrastructure.
Software Coding & Engineering

Technology WordMeaning
2D Animation SoftwareTwo-dimensional images are rapidly sequenced to create the illusion of lifelike motion using software
3D Animation SoftwareDeveloping a mathematical representation of any surface of an object in three dimensions via specialized software. 
3DS Max3DS Max is a 3D modeling, animation, and rendering software for games and design visualization made by Autodesk.
Access ControlIn the fields of physical security and information security, access control is the selective restriction of access to a place or other resource.
Agile ManagementAgile project management focuses on continuous improvement, scope flexibility, team input, and delivering essential quality products.
Apache KafkaApache Kafka is an open-source stream-processing software platform developed by the Apache Software Foundation written in Scala and Java. The project aims to provide a unified, high-throughput, low-latency platform for handling real-time data feeds.
Apache LuceneApache Lucene is a freely available information retrieval software library that works with fields of text within document files.
Apache MahoutApache Mahout is a project of the Apache Software Foundation to produce free implementations of distributed or otherwise scalable matching learning algorithms focused primarily in the areas of collaborative filtering, clustering and classification.
Application DeliveryAn application delivery network is a suit of technologies that, when deployed together, provide application availability, security, visibility, and acceleration.
Application DevelopmentApplication development is a term used to denote the act or process by which application software is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones.
Application MigrationApplication migration is the process of moving an application program from one environment to another.
Application PerformanceApplication performance is the monitoring and management of performance and availability of software applications.
Application Release AutomationApplication release automation refers to the process of packaging and deploying an application or update of an application from development, across various environments, and ultimately to production.
AssemblerAn assembler is a program for converting instructions written in low-level symbolic code into machine code.
Attribute-Based Access Control (ABAC)Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, object, environment attributes etc.).
AutoCADAutoCAD is a commercial computer-aided design and drafting software application designed by Autodesk.
Automation TestingAutomated software testing is a process in which software tools execute pre-scripted tests on a software application before it is released into production
Backend as a Service (BaaS)Mobile backend as a service (MBaaS) is a model for providing web app and mobile app developers with a way to link their applications to backend cloud storage and APIs exposed by back end applications while also providing features such as user management push notifications
BIM 360BIM 360 improves construction project delivery by supporting informed decision-making throughout the project lifecycle and is made by Autodesk.
Build ManagementThe term build management may refer to the process by which source code is converted into a stand-alone form that can be run on a computer or to the form itself.
Civil 3DCivil 3D software is a civil engineering design and documentation solution that supports Building Information Modeling workflows made by Autodesk
Collaboration SoftwareCollaborative software or groupware is application software designed to help people involved in a common task to achieve their goals.
Command Line InterfaceA CLI is a user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line, receives a response back from the system, and then enters another command, and so forth.
Computer ScienceComputer science is the study of the principles and use of computers.
Configuration FilesA configuration file is a file that contains data about a specific user, program, computer or file.
Configuration ManagementConfiguration management is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
Configuration OptionsConfigurations options are used to specify recording options, execution options, and external command processing options.
Contact Management SoftwareA contact manager is a software program that enables users to easily store and find contact information , such as names, addresses and telephone numbers.
Continuous DeliveryContinuous delivery is a software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software faster and more frequently.
Continuous IntegrationIn software engineering, continuous integration is the practice of merging all developer working copies to a shared mainline several times a day.
Dassault Systems (DSY)Dassault Systems is a world leader in 3D design software.
DebuggingDebugging is to identify and remove errors from computer hardware or software.
Debugging toolsA debugger or debugging tool is a computer program that is used to test and debug other programs (the "target" program).
Development Operations (Devops)DevOps is a software development and delivery process that emphasizes communication and collaboration between product management, software development, and operations professionals.
Eclipse IDEEclipse is an integrated development environment used in computer programming, and is the most widely used Java IDE.
Embedded SoftwareEmbedded software is computer software, written to control machines or devices that are not typically thought of as computers. It is typically specialized for the particular hardware that it runs on and has time and memory constraints.
Error HandlingError handling refers to the response and recovery procedures from error conditions present in a software application. In other words, it is the process comprised of anticipation, detection and resolution of application errors, programming errors or communication errors.
Event-Driven Architecture (EDA)Event-driven architecture is a software architecture pattern promoting the production, detection, consumption of, and reaction to events.
FrameworkA framework is a real or conceptual structure intended or serve as a support or guide for the building of something that expands the structure into something useful.
Fusion 360Fusion 360 is a 3D CAD, CAM, and CAE tool that connects your entire product development process in a single cloud-based platform that works on both Mac and PC.
Game DevelopmentGame development is the process of creating a video game.
GitHubGithub is a web-based Git or version control repository and Internet hosting service.
GitHub EnterpriseGitHub Enterprise is the on-premises version of GitHub.com
GNU General Public LicenseThe GNU General Public License is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.
Graphical User Interface (GUI)The graphical user interface (GUI /?u?i?/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs),[1][2][3] which require commands to be typed on a computer keyboard.
HackathonA hackathon is an event, typically lasting several days, in which a large number of people meet to engage in collaborative computer programming.
InfraworksInfraWorks is a planning and design platform that enables engineers to quickly and easily convey preliminary design intent in a real-world, contextual environment, increasing stakeholder buy-in and team decision-making made by Autodesk.
In-Memory Data Grid (IMDG)An in memory data grid is a data structure that resides entirely in RAM, and is distributed among multiple servers.
Integrated Development EnvironmentsAn integrated development environment is a software application that provides comprehensive facilities to computer programmers for software development.
InventorInventor is a mechanical design and 3D CAD software made by Autodesk.
Knowledge Base SoftwareKnowledge base software is software that enables creating, publishing and maintaining a database used for knowledge sharing, known as a knowledge base.
Knowledge Management SoftwareKnowledge management software is a subset of Enterprise content management software, which contains a range of software that specializes in the way information is collected, stored and/or accessed.
Log FilesIn computing, a logfile is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software.
MayaMaya is a 3D animation, modeling, simulation, and rendering software for film, games, and TV.
Microsoft Visual StudioMicrosoft Visual Studio is an integrated development environment from Microsoft.
MigrationMigration is the process of transferring data between data storage systems, data formats or computer systems.
Mobile Development ToolsMobile developments tools are frameworks or apps that allow you to develop and build mobile apps.
Model–View–Controller (MVC)Model view controller (MVC) is an architectural pattern commonly used for developing user interfaces that divides an application into three interconnected parts.
MultitenancyThe term "software multitenancy" refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants. A tenant is a group of users who share a common access with specific privileges to the software instance.
Natural Language ProcessingNatural language processing is the ability of a computer program to understand human speech as it is spoken.
Open JDKOpenJDK is a free and open source implementation of the Java Platform, Standard Edition. It is the result of an effort Sun Microsystems began in 2006
Open SourceOpen source denotes software for which the original source code is made freely available and may be redistributed and modified.
OpenLDAPOpenLDAP is a free, open source implementation of the Lightweight Directory Access Protocol (LDAP) developed by the OpenLDAP Project. It is released under its own BSD-style license called the OpenLDAP Public License.
Patch ManagementPatch management is a strategy for managing patches or upgrades for software applications and technologies.
Pattern RecognitionPattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data, although it is in some cases considered to be nearly synonymous with machine learning.
Portal SoftwarePortal software is a type of development tool used to create a portal on a company's intranet so that employees can find a centralized starting place for access to consolidated enterprise-related functions, such as e-mail, customer relationship management tools, company information, workgroup systems, and other applications.
PuppetIn computing, Puppet is an open-source software configuration management tool. It runs on many Unix-like systems as well as on Microsoft Windows, and includes its own declarative language to describe system configuration.
Quote And Proposal SoftwareQuote and proposal software is a computer program designed to help users develop proposals, presentations, and responses to RFPs.
Quote SoftwareQuote software is a industry term for products that help companies to adopt more data-aware systems.
Robot SoftwareRobot software is the set of coded commands or instructions that tell a mechanical device and electronic system, known together as a robot, what tasks to perform.
Root Cause Analysis (RCA)Root cause analysis (RCA) is a method of problem solving used for identifying the root causes of faults or problems.
SerializationSerialization is the process of translating data structures or objects state into a format that can be stored or transmitted and reconstructed later.
Service Oriented Architecture (SOA)A service oriented architecture is a style of software design where services are provided to the other components by applications components, through a communication protocol over a network.
SHA-256 (Secure Hash Algorithm)SHA-2 is a set of cryptographic hash functions designed by the United States National Security Agency.
ShotgunShotgun is a review and production tracking toolset for VFX, games, and animation teams made by Autodesk.
Software ComponentsA software component is a unit of composition with contractually specified interfaces and explicit context dependencies only.
Software Configuration ManagementSoftware configuration management is the task of tracking and controlling changes in the software, part of the larger cross-disciplinary field of configuration management.
Software DeploymentSoftware deployment is all of the activities that make a software system available for use. The general deployment process consists of several interrelated activities with possible transitions between them.
Software DesignSoftware design is the process by which an agent creates a specification of a software artifact, intended to accomplish goals, using a set of primitive components and subject to constraints.
Software DevelopersA software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software.
Software DevelopmentSoftware development is the process of computer programming, documenting, testing, and bug fixing involved in creating and maintaining applications and frameworks resulting in a software product.
Software Development KitA software development kit (SDK or devkit) is typically a set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.
Software Development LifecycleThe software development life cycle is a framework defining tasks performed at each step in the software development process.
Software MigrationSoftware migration involves moving a set of instructions or programs from one platform to another, minimizing reengineering.
Software QualitySoftware Quality refers to the overall quality of of a software based on how quality is defined in a business context. This involves both the functional quality and the structural quality of the software.
Software-Defined InfrastructureSoftware defined infrastructure is the definition of technical computing infrastructure entirely under the control of software with no operator or human intervention.
SolrSolr is an open source enterprise search platform, written in Java, from the apache Lucene project.
Source Code AnalysisSource code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.
Source Code ControlSource code control is a specific kind of revision control resource that's aimed at changing source code in manageable ways.
Storm SpoutA storm spout represents the source of data in Storm.
System Configuration (SC)A system configuration (SC) in systems engineering defines the computers, processes, and devices that compose the system and its boundary. More generally, the system configuration is the specific definition of the elements that define and/or prescribe what a system is composed of.
Systems Development Life Cycle (SDLC)The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
Talent Management SoftwareTalent management software is technology that human resource management professionals use to manage employees as a competitive advantage.
Task ManagementTask management is the process of managing a task through its life cycle. It involves planning, testing, tracking, and reporting.
Unified Modeling Language (UML)The Unified Modeling Language (UML) is a general-purpose, developmental, modeling language in the field of software engineering, that is intended to provide a standard way to visualize the design of a system.
Version ControlVersion control is the task of keeping a software system consisting of many versions and configurations well organized.
VersionOneVersion One is the author of electronic document management and imaging software.
Visual BasicVisual Basic is a programming environment from Microsoft in which a programmer uses a graphical user interface to choose and modify preselected sections of code written in the BASIC programming language.

Technology WordMeaning
All Flash ArrayAn all-flash array is a solid state storage disk system that contains multiple flash memory drives instead of spinning hard disk drives.
Amazon Elastic Block Storage (EBS)Amazon Elastic Block Store (EBS) provides raw block-level storage that can be attached to Amazon EC2 instances. These block devices can then be used like any raw block device.
Amazon S3Amazon S3 is a web service offered by Amazon Web Services.
Apple File System (APFS)Apple File System is a proprietary file system for macOS High Sierra and later, iOS 10.3 and later, tvOS 10.2 and later, and watchOS 3.2 and later, developed and deployed by Apple Inc.
ArchivingArchiving is the transfer of data to a less frequently used storage medium such as magnetic tape, typically external to the computer system and having a greater storage capacity.
Capacity ManagementCapacity management is a process used to manage information technology.
ClassificationClassification is the process of organizing data into categories for its most effective and efficient use.
CompressorsCompression is a reduction in the number of bits needed to represent data.
Content / Document ManagementGeneral management of content or documents
Data StorageData storage is a general term for archiving data in electromagnetic or other forms for use by a computer or device.
Data WarehouseA data warehouse is a large store of data accumulated from a wide range of sources within a company and used to guide management decisions.
Direct Attached Storage (DAS)Direct-attached storage is digital storage directly attached to the computer accessing it, as opposed to storage accessed over a computer network.
Disk StorageDisk storage is a general category of storage mechanisms where data are recorded by various electronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks.
Disk-Based Backup and Storage / RAIDRAID is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both.
Distribution and StorageDistributed storage is storing data in multiple computers or in computers that are geographically dispersed.
Enterprise Storage SolutionsEnterprise storage refers to a centralized data depository that is designed for the needs of a large organization.
External Hard DriveAn external hard drive is a portable storage device that can be attached to a computer through a USB or Firewire connection, or wirelessly.
File ClassificationDeveloping a File Classification Scheme is the process of identifying the category or categories of business activities and the records they generate and grouping them, if applicable, into files to facilitate retrieval, description, control, links and determine their disposition and access status.
Flash DriveA flash drive is a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc.
Flash StorageFlash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.
Full Disk EncryptionFull disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
Hadoop Distributed File System (HDFS)The Hadoop Distributed File System (HDFS) is the primary data storage system used by Hadoop applications. It employs a NameNode and DataNode architecture to implement a distributed file system that provides high-performance access to data across highly scalable Hadoop clusters.
HazelcastIn computing, Hazelcast is an open source in-memory data grid based on Java. It is also the name of the company developing the product. The Hazelcast company is funded by venture capital.
Inline DeduplicationInline deduplication is the removal of redundancies from data before or as it is being written to a backup device.
Input/Output Operations Per Second (IOPS)Input/output operations per second (IOPS, pronounced eye-ops) is an input/output performance measurement used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area networks (SAN).
Master Boot Record (MBR)A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The concept of MBRs was publicly introduced in 1983 with PC DOS 2.0.
Memory CardA memory card is a small, flat flash drive used especially in digital cameras and mobile phones.
NAND Flash MemoryNAND flash memory is a type of nonvolatile storage technology that does not require power to retain data. An important goal of NAND flash development has been to reduce the cost per bit and to increase maximum chip capacity so that flash memory can compete with magnetic storage devices, such as hard disks.
Optical Storage MediaOptical storage is the storage of data on an optically readable medium.
Pivotal GreenplumPivotal Greenplum is a commercial fully featured data warehouse powered by the open source Greenplum Database.
Random Access Memory (RAM)Random-access memory (RAM) is a form of computer data storage that stores data and machine code currently being used. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.
Sample LibrariesA sample library is a collection of digital sound recordings, known as samples, for use by composers, arrangers, performers, and producers of music.
Scale-Out StorageScale-Out storage is a network-attached storage (NAS) architecture in which the total amount of disk space can be expanded through the addition of devices in connected arrays with their own resources.
Solid State Drive (SSD)Solid state drives are faster than hard disks because there is zero latency, and is an all-electronic storage device that is an alternative to a hard disk.
Storage Area Networks (SAN)A storage area network is a network which provides access to consolidated, block level data storage.
Storage as a ServiceStorage as a service is a business model in which a company leases or rents its storage infrastructure to another company or individuals to store data.
Storage CapacityStorage capacity is the amount of data a storage device such as a disk or tape can hold.
Storage Capacity ManagementStorage capacity management is a process used to manage information technology.
Storage ConsolidationStorage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
Storage DevicesA storage device is a piece of computer equipment on which information can be stored.
Storage HardwareStorage hardware is the collection of storage device of a computer.
Storage ManagementStorage management is the administration of any or all of backup, archival, disaster recovery and hierarchical storage management procedures within an organization.
Storage PerformanceStorage performance is the measure of how well storage devices perform, especially hard drives.
Storage ResourcesStorage resource management refers to software that manages storage from a capacity, utilization, policy and event-management perspective.
Storage SecurityStorage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities.
Storage SoftwareSoftware-defined storage is a marketing term for a computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware.
Storage SolutionsStorage solutions are software designed to help with data storage.
Storage VirtualizationStorage virtualization is the pulling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.
Tape Drives and LibrariesIn computer storage, a tape library, sometimes called a tap silo, tape robot or tape jukebox, is a storage device which contains one or more tape drives, a number of slots to hold tape cartridges, a barcode reader to identify tape cartridges and an automated method for loading tapes (a robot).
Team DrivesTeam Drives is a shared space where teams can easily store, search, and access their files anywhere, from any device. Unlike files in My Drive, files in a Team Drive belong to the team instead of an individual.
Tiered StorageTiered storage is an underlying principle of information lifecycle management.
XtremeIOXtremIO is EMC's foray into the all flash array market.
Telecommunications & IP Communication

Technology WordMeaning
AlcatelAlcatel is a rand of mobile handsets used under license by Chinese electronics company TCL Corporation.
Automated AttendantIn telephony, an automated attendant (also auto attendant, auto-attendant, autoattendant or AA, or virtual receptionist) allows callers to be automatically transferred to an extension without the intervention of an operator/receptionist.
Automatic Call Distribution (ACD)An automated call distribution system, commonly known as automatic call distributor, is a telephony device that answers and distributes incoming calls to a specific group of terminals or agents within an organization.
Average Revenue Per User (ARPU)Average revenue per user (sometimes known as average revenue per unit), usually abbreviated to ARPU, is a measure used primarily by consumer communications, digital media, and networking companies, defined as the total revenue divided by the number of subscribers.
BT Global ServicesGlobal Services is a division of United Kingdom telecommunications operator BT Group.
Call Center ManagementCall center management refers to silent monitoring whereby you listen to the interaction between an incoming caller and an agent.
Call Center SoftwareCall center software are software solutions that help call center agents access the right information and knowledge about a customer's history to improve the overall customer experience.
Call RecordingsThe term call recording means to record a telephone call or other audio source.
Call TrackingCall tracking is a technology which can enable the pay per call, pay per minute or pay per lead business model, allowing the tracking of phone calls to be associated with performance-based advertising.
CDMACode-division multiple access is a channel access method used by various radio communication technologies.
Cloud VoIPCloud telephony refers specifically to voice services and more specifically the replacement of conventional business telephone equipment, such as Private branch exchange, with third-party VoIP service.
Communications SystemsIn telecommunication, a communications system is a collection of individual communications networks, transmission systems, relay stations, tributary stations, and data terminal equipment usually capable of interconnection and interoperation to form an integrated whole.
Computer Telephony Integration (CTI)Computer telephony integration, also called computer telephone integration or CTI, is a common name for any technology that allows interactions on a telephone and a computer to be integrated or coordinated.
C-RAN (Cloud-RAN) C-RAN is a centralized, cloud computing-based architecture for radio access networks that supports 2G, 3G, 4G and future wireless communication standards.
Customer Proprietary Network Information (CPNI)Customer Proprietary Network Information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill.
Data Over Cable Service Interface Specification (DOCSIS)An international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV system. It is employed by many cable television operators to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure.
Distributed Antenna Systems (DAS)A network of spatially separated antenna nodes connected to a common source via a transport medium that provides wireless service within a geographic area or structure. DAS antenna elevations are generally at or below the clutter level and node installations are compact. A distributed antenna system may be deployed indoors (an iDAS) or outdoors (an oDAS).
End-to-End Encryption (E2EE)End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers including telecom providers, Internet providers, and even the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation.
Enhanced 9-1-1(E911)Enhanced 911, E-911 or E911 is a system used in North America to automatically provide to dispatchers the location of callers to 911, the universal emergency telephone number in the region.
Fax ManagementFax management is any management in relations to facsimiles.
Fixed Mobile Convergence (FMC)Fixed-mobile convergence is the trend towards seamless connectivity between fixed and wireless telecommunications networks.
FTTA (Fiber to the Antenna)FTTA (Fiber to the Antenna) is a broadband network architecture in which optical fiber is used to connect the remote radio head (RRH) to the base station in new antennas, or retrofitted in existing ones, to replace all or part of the coax local loop.
FTTH (Fiber to the Home)Fiber to the Home (FTTH) the delivery of a communications signal over optical fiber from the operator's switching equipment all the way to a home or business, thereby replacing existing copper infrastructure such as telephone wires and coaxial cable.
FTTN (Fiber to the Node)Fiber to the Node (FTTN) A fiber that is terminated in a street cabinet, possibly miles away from the customer premises, with the final connections being copper. FTTN is often an interim step toward full FTTH and is typically used to deliver advanced triple-play telecommunications services.
FTTx (Fiber to the X)Fiber to the X (FTTX) is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications.
GSMGSM is a digital mobile telephony system that is widely used in Europe and other parts of the world.
Headend FacilityA headend is a master facility for receiving television signals for processing and distribution over a cable television system. The headend facility is normally unstaffed and surrounded by some type of security fencing and is typically a building or large shed housing electronic equipment used to receive and re-transmit video over the local cable infrastructure. One can also find head ends in power line communication (PLC) substations and Internet communications networks
Hosted Private Branch Exchange (Hosted PBX)Hosted private branch exchange (hosted PBX) is a telephone exchange system built, delivered and managed by a third-party service provider.
Hosted VoIPHosted VoIP is another term for Hosted PBX.
Indoor Cell SiteAn Indoor Cell Site is an in-building wireless system used to provide internet to large residential or commercial buildings.
Information and Communication Technology (ICT)Information and communication technology (ICT) is another/extensional term for information technology (IT) which stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information.
IP FaxingIP faxing uses the internet Protocol to send a fax, rather than using only phone networks with a fax machine.
IP Multimedia Subsystem (IMS)The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering IP multimedia services. Historically, mobile phones have provided voice call services over a circuit-switched-style network, rather than strictly over an IP packet-switched network.
IP TelephonyIP telephony is a general term for the technologies that use the Internet Protocol's packet -switched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone.
Jitter MeasurementJitter Measurement produces a quantity for the deviation from true periodicity of a presumably periodic signal, often in relation to a reference clock signal.
Leased LineA leased line is a private bidirectional or symmetric telecommunications line between two or more locations provide in exchange for a monthly rent.
Low Earth Orbit (LEO)Low earth orbits (LEO) are satellite systems used in telecommunication, which orbit between 400 and 1,000 miles above the earth's surface.
Managed IP TelephonyManaged Ip Telephony services: the managed service provider is responsible for ensuring that VoIP calls are properly terminated to the PSTN.
Mobile High-Definition Link (MHL)Mobile High-Definition Link (MHL) is an industry standard for a mobile audio/video interface that allows the connection of smartphones, tablets, and other portable consumer electronics devices to high-definition televisions (HDTVs) and audio receivers.
MobilyMobily is the trade name launched in May 2005 by Saudi Arbia's second telecommunications company, Etihad-Estisalat consortium.
Multimedia MessagingMultimedia Messaging Service is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.
Multiprotocol Label Switching (MPLS)Multiprotocol Label Switching is a type of data-carrying technique for high-performance telecommunications networks.
Multiprotocol Label Switching (MPLS) AlternativeMultiprotocol Label Switching (MPLS) Alternative is any alternative to MPLS.
Near Field Communication (NFC)Near Field Communications is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
Optical Distribution Frames (ODF)An optical distribution frame (ODF) is a frame used to provide cable interconnections between communication facilities, which can integrate fiber splicing, fiber termination, fiber optic adapters & connectors and cable connections together in a single unit.
Passive Optical Network (PON)A passive optical network (PON) is a telecommunications technology used to provide fiber to the end consumer, both domestic and commercial. A PON's distinguishing feature is that it implements a point-to-multipoint architecture, in which unpowered fiber optic splitters are used to enable a single optical fiber to serve multiple end-points.
Phone Call ProcessingPhone call processing is the sequence of operations performed by a switching system from the acceptance of an incoming call through the final disposition of the call.
Phone SystemA phone system can range from just a few telephones in a small business up to a complex private branch exchange system utilized by large businesses.
Power Controlpower control refers to the process of controlling the power of a transmitter to achieve better communication signal or overall quality of service. It is mainly used to control the transmitting power of a communication device to achieve better performance.
Predictive DialingA predictive dialer is an outbound calling system that automatically dials from a list of telephone numbers.
Private Branch Exchange (PBX)A PBX is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.
Private Label VoIPPrivate Label Voice over Internet Protocol is when a SMB provides phone services using hardware it pays a service fee for.
ProvisioningIn telecommunications, Provisioning involves the process of preparing and equipping a network to allow it to provide (new) services to its users.
Public Switched Telephone Network (PSTN)The public switched telephone network is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication.
Radio Frequency ConnectorA coaxial RF connector is an electrical connector designed to work at radio frequencies in the multi-megahertz range. RF connectors are typically used with coaxial cables and are designed to maintain the shielding that the coaxial design offers.
Real-Time Communications (RTC)Real-time communications (RTC) is a term used to refer to any live telecommunications that occur without transmission delays. RTC is nearly instant with minimal latency.
Remote PHYRemote PHY refers to the technique of moving the PHY circuit out of a device such as a CCAP and putting the PHY circuit at the end of a network.
Remote Radio Units (RRUs)A remote radio transceiver that connects to an operator radio control panel via electrical or wireless interface. The RRH contains the base station's RF circuitry plus analog-to-digital/digital-to-analog converters and up/down converters. RRHs also have operation and management processing capabilities and a standardized optical interface to connect to the rest of the base station.
Session Border ControllerA session border controller (SBC) is a device regularly deployed in Voice over Internet Protocol (VoIP) networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down telephone calls or other interactive media communications.
Signal IntegrityA set of measures of the quality of an electrical signal.
Sip TrunkingSIP trunking is Voice over Internet Protocol and streaming media service based on the Session initiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equipped with Sip-based private ranch exchange and Unified Communications facilities.
Soft PhoneA soft phone is a piece of software that allows the user to make telephone calls over the Internet via a computer.
Structured CablingIn telecommunications, structured cabling is building or campus cabling infrastructure that consists of a number of standardized smaller elements (hence structured) called subsystems.
TelecomTelecom is a shortened version of telecommunications.
Telecommunications EquipmentTelecommunications equipment refers to hardware used mainly for telecommunications such as transmission lines, multiplexers and base transceiver stations.
Telephony / CTI / VOIP Refers to any technology that allows interactions on a telephone and a computer to be integrated or coordinated.
Ultra WidebandUltra-wideband (also known as UWB, ultra-wide band and ultraband) is a radio technology that can use a very low energy level for short-range, high-bandwidth communications over a large portion of the radio spectrum.
Unified CommunicationsUnified communications is a business term describing the integration of enterprise communication services such as instant messaging, presence information, voice, mobility features, audio, web and video conferencing, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging.
Unified Communications as a Service (UCaaS)Unified Communications as a Service (UCaaS) is a category of 'as a service' or 'Cloud delivery mechanisms for Enterprise Communications.
Virtual Network Operator (VNO)A virtual network operator (VNO) is a management services provider and a network services reseller of other telecommunication service providers.
Voice OutsourcingVoice outsourcing is transfer of the management and/r day to day execution in a call center setting.
Voice Over IPVoice over Internet protocol is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.
Wholesale VoIPWholesale VoIP is a service, which is provided by wholesale carriers to other service providers and deals with start ups and extensions to their networks.
Translation: Language Services

Technology WordMeaning
Document TranslationThe process of translating a document from one language to another
Internationalization (i18n)The process of designing a software application so that it can potentially be adapted to various languages and regions without engineering changes
Language Service Provider (LSP)A company or partner that provides a broad range of translation or linguistic services
Linguistic ValidationLinguistic validation is the process of investigating the reliability, conceptual equivalence, and content validity of translations of patient-reported outcome (PRO) measures.
LocalizationThe process of making something local in character or restricting it to a particular place.
Machine Translation (Automated Translation)Machine translation, sometimes referred to by the abbreviation MT (not to be confused with computer-aided translation, machine-aided human translation (MAHT) or interactive translation) is a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another.
Multilingual Desktop Publishing (DTP)Translating digital or print media into a foreign language.
Professional TranslationProfessional Translation is simple a translation done by a professional translator who practices translation as a professional service.
RedactionRedaction is a form of editing in which multiple source texts are combined (redacted) and altered slightly to make a single document. Often this is a method of collecting a series of writings on a similar theme and creating a definitive and coherent work.
Software TranslationIn general, software translation refers to the translation of all graphical user interface (GUI) components of a software application, such as dialog boxes, menus, and error or status messages displayed on screen. 
Terminology ManagementTerminology Management is an integral component of the translation/localization process. It uses glossaries to keep multilingual texts consistent and accurate.
TranscreationTranscreation is the process of adapting a message from one language to another, while maintaining its intent, style, tone and context.
Translation Management SoftwareSoftware that enables automation of the translation process, eliminating repetitive and laborious manual tasks while enabling control, increasing collaboration and delivering greater efficiency
Translation MemoryTranslation memory (TM) technology allows translation teams to store and reuse both source and target language content for any translation project
TransliterationA type of conversion of a text from one script to another[1] that involves swapping letters
Video LocalizationVideo localization is the preparation of video game software and hardware for sale in a new region or country.
Website Localization ServicesWebsite localization is the process of adapting an existing website to local language and culture in the target market.
Website TranslationWebsite translation is the process of changing an original (source) language version of web content such as text, multimedia, ebooks, or apps into a different (target) language by simply substituting words from one language to another - in context.

Technology WordMeaning
Live Video EncodingLive video encoding takes analog source content and converts it to a digital format, live.
Managed Video DeliveryManaged video delivery provides an opportunity for agencies to take the worry out of purchasing and managing expensive video conferencing systems, providing immersive telepresence opportunities for agencies on a pay-as-you-go basis.
Online VideoOnline Video is the general field that deals with the transmission of video over the internet. It consists of video clips, tb shows, and movies streamed on the internet.
Online Video PlatformAn online video platform (OVP), provided by a video hosting service, enables users to upload, convert, store and play back video content on the Internet, often via a structured, large-scale system that can generate revenue. Users generally will upload video content via the hosting service's website, mobile or desktop application, or other interface (API). The type of video content uploaded might be anything from short video clips to full-length TV shows and movies.
Video as a Service (VaaS)Video as a Service (VaaS) is the delivery of multiparty or point-to-point video conferencing capabilities over an IP network by a managed service provider.
Video Management Software (VMS)A video management system, also known as video management software or a video management server, is a component of a security camera system that in general: Collects video from cameras and other sources; Records / stores that video to a storage device.
Video MonetizationVideo monetization is a marketing method that allows advertisement in videos, advertising to subscriptions or pay-per-view.
Video OptimizationVideo optimization refers to a set of technologies used by mobile service providers to improve consumer viewing experience by reducing video start times or rebuffering events.
Video PlayerA video player is a kind of media player for playing back digital video data from media such as optical discs, as well as from files of appropriate formats such as MPEG, AVI, RealVideo, and QuickTime.
Video TranscodingVideo transcoding is the process of converting video from on format into another.
Video TransmissionVideo transmission is the transfer of data over a point-to-point or point-to-multipoint communication channel.
Video-on-Demand DeliveryVideo on demand is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later.

Technology WordMeaning
Bare-Metal Hypervisor (Native Hypervisor)Bare metal hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems.
Data OrchestrationData orchestration is the process of integrating two or more applications and/or services together to automate a process, or synchronize data in real-time.
DockerDocker is a computer program that performs operating-system-level virtualization also known as containerization.
EVO:RAILEVO:RAIL is a hyper-converged infrastructure offering by Vmware and qualified EVO:RAIL partners.
HCIA (Hyper-Converged Infrastructure Appliance)A typical hyper-converged infrastructure appliance brings compute, storage, hypervisors and occasionally networking together into a single modular system.
Hyper-Converged InfrastructureHyper-Converged Infrastructure is a system with a software-centric architecture that tightly integrates compute, storage, networking and virtualization resources and other technologies from scratch in a commodity hardware box supported by a single vendor.
Kernel-based Virtual Machine (KVM)Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel that turns it into a hypervisor. It was merged into the Linux kernel mainline in kernel version 2.6.20, which was released on February 5, 2007.
Microsoft Hyper-VMicrosoft Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualization, is a native hypervisor, it can create virtual machines on x86-64 systems running Windows.
Microsoft Virtual Machine ManagerVirtual machine manager is a management solution for the virtualized datacenter, enabling you to o configure and manage your virtualization host, networking, and storage resources to create and deploy virtual machines and services to private clouds that you have created.
Network VirtualizationNetwork virtualization is the process of combining hardware and software network resources and network functionality into a single, software-base administrative entity, a virtual network.
Roaming ProfilesRoaming Profiles is a concept in the Windows NT family of operating systems that allows users with a computer joined to a Windows Server domain to log on to any computer on the same network and access their documents and have a consistent desktop experience, such as applications remembering toolbar positions and preferences, or the desktop appearance staying the same.
Server VirtualizationServer virtualization can be defined as the conversion of one physical server into several individual and isolated virtual spaces that can be taken up by multiple users as per their respective requirements.
Virtual ApplianceA virtual appliance is a pre-configured virtual machine image, ready to run on a hypervisor; virtual appliances are a subset of the broader class of software appliances.
Virtual Data CenterA virtual Datacenter is a pool of cloud infrastructure resources designed specifically for enterprise business needs.
Virtual Design and ConstructionVirtual Design and Construction (VDC) is the management of integrated multi-disciplinary performance models of design-construction projects, including the product (i.e., facilities), work processes and organization of the design - construction - operation team in order to support explicit and public business objectives.
Virtual Desktop Infrastructure (VDI)Virtual desktop infrastructure is virtualization technology that hosts a desktop operating system on a centralized server in a data center.
Virtual DesktopsVirtual Desktop means that a user's desktop environment is stored remotely on a server, rather than on a local PC or other client computing device.
Virtual FirewallA virtual firewall is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall.
Virtual InfrastructureA virtual infrastructure is a software-based IT infrastructure being hosted on another physical infrastructure and mean to be distributed as a service as in cloud computing's Infrastructure as a Service delivery model.
Virtual MachinesA virtual machine is a software computer that, like a physical computer, runs an operating system and applications.
Virtual Managed ServicesVirtual managed services is a platform offered by Cisco that deliver a turn-key solution network operators to rapidly and cost effectively deliver new services.
Virtual OfficeA virtual office is the operational domain of any business or organization whose workforce includes a significant proportion of workers using technology to perform their work at home.
Virtual ServersA virtual server is a server that shares hardware and software resources with other operating systems, versus dedicated servers.
Virtual Systems Administrator (VSA)Virtual Systems Administrator is a program offered by Kaseya.
Virtual WalletThe virtual wallet is a PNC bank concept meant to appeal to generation Y and other tech-savvy customers.
VirtualizationVirtualization is the creation of a virtual - rather than actual - version of something, such as an operating system, a server, a storage device or network resources.
Web Technologies

Technology WordMeaning
A/B TestingA/B testing (sometimes called split testing) is comparing two versions of a web page to see which one performs better
Ajax (Asynchronous JavaScript and XML)Ajax is a set of Web development techniques using many Web technologies on the client side to create asynchronous Web applications.
Akamai TechnologiesAkamai Technologies Inc. is an American content delivery network and cloud services provider headquartered in the US.
Application Security Testing (AST)Application Security Testing (AST) is the process of testing, analyzing and reporting on the security level and/or posture of a Web application.
Bandwidth/DIABandwidth is the range of frequencies within a given band, in particular that used for transmitting a signal.
CNAME RecordA Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) used to specify that a domain name is an alias for another domain (the 'canonical' domain).
Content SyndicationContent syndication is when web-based content is re-published by a third-party website. Read our full guide to content syndication and get started.
cURLcURL is a computer software project providing a library and command-line tool for transferring data using various protocols.
Dedicated Internet AccessDedicated internet access is a continuous high bandwidth method for enterprises to connect their local area networks with the public internet and streamline the performance of their wide area network.
Designated Internet AccessDesignated internet access is a private network that is reserved for you.
Digital MagazinesA digital magazine is a digital, online edition of a printed magazine.
Digital PublishingDigital Publishing, or electronic publishing, includes the digital publication of e-books, digital magazines, and the development of digital libraries and catalogs.
Do Not Track (DNT)The Do Not Track (DNT) header is the proposed HTTP header field DNT that requests that a web application disable either its tracking or cross-site user tracking (the ambiguity remains unresolved) of an individual user.
Domain Name System (DNS)The Internet's system for converting alphabetic names into numeric IP addresses.
dotCMSAn open source content management system (CMS) written in Java for managing content and content driven sites and application
DrupalDrupal is free, open source software that can be used by individuals or groups of users to easily create and manage many types of Web sites.
Dynamic Application Security Testing (DAST)Dynamic application security testing (DAST) is a process of testing an application or software product in an operating state. This kind of testing is helpful for industry-standard compliance and general security protections for evolving projects.
eCommerce Site SearcheCommerce Site Search relates to a tool site visitors can use to naviage an eCommerce website via a search box.
Edge HostingEdge offers secure managed hosting services to customers around the globe, including managed cloud hosting, compliance and dedicated hosting.
Email Translation ServiceSoftware that detecs if an email is in a foreign language and offers to translate it
EnsightenEnsighten is a global customer data platform and tag management technology vendor.
Enterprise Tag ManagementA tag management system is designed to help manage the lifecycle of e-marketing tags, which are used to integrate third-party software into digital properties.
Exit IntentExit intent is the technology that detects visitors' intent to leave a web or mobile site. Exit intent technology is used to prevent visitors from leaving the website or abandoning a cart and re-engage them just before they are about to end their current session.
Gmail For BusinessGmail is a free Web-based e-mail service currently being tested at Google that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages.
Google CalendarGoogle Calendar is a time-management and scheduling calendar service developed by Google.
Google DocsGoogle Docs is a free web-based application in which documents and spreadsheets can be created, edited and stored online.
Google FormsGoogle Form is one of the tools available from google Docs collection.
Google HangoutsGoogle Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chas, either one-on-one or in a group.
Google MapsGoogle Maps is a Web-based service that provides detailed information about geographical regions and sites around the world.
Google SheetsGoogle Spreadsheets is a Web-based application that allows users to create, update and modify spreadsheets and share the data live online.
Google SitesGoogle Sites is a structured wiki-and Web page-creation tool offered by Google as part of the G Suite productivity suite.
Google SlidesGoogle Slides are a presentation program that is part of a free web-based software office suite offered by Google within its Google Drive service.
Heat MapsHeatmaps can be used to show where users have clicked on a page, how far they have scrolled down a page, or used to display the results of eye-tracking tests.
High-Throughput Satellite (HTS)High-throughput satellite (HTS) is a classification for communications satellites that provide at least twice, though usually by a factor of 20 or more,[1] the total throughput of a classic FSS satellite for the same amount of allocated orbital spectrum thus significantly reducing cost-per-bit.
HipChatHipChat is a web service for internal private online chat and instant messaging. As well as one-on-one and group/topic chat, it also features cloud-based file storage, video calling, searchable message-history and inline-image viewing.
HTML Code EditorAn HTML Code Editor is a allows HTML code to be created and modified.
iAPPSA Web Engagement Management (WEM) platform that integrates Web Content Management, e-commerce, e-marketing, Social Media management and Web Analytics
IBM Websphere Portal ServerA set of software tools that enables companies to build and manage web portals; it provides a single access point to web content and applicationn
iBooksiBooks is an e-book application by Apple Inc. for its iOS and macOS operating systems and devices. It was announced in conjunction with the iPad on January 27, 2010, and was released for the iPhone and iPod Touch in mid-2010, as part of the iOS 4 update.
Internet AccessInternet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, mobile devices; and to access services such as email and the World Wide Web.
Internet BundlesInternet Bundles are combine internet, phone, TV and tech support in one package usually at a discounted rate for the consumer.
Internet ServiceAn internet service provider is an organization that provides services accessing and using the internet.
IP Addressa unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
JoomlaJoomla is a free and open-source content management system.
jQueryInternet Explorer as the default web browser on all device classes.
JSONAn open-standard file format that uses human-readable text to transmit data objects consisting of attribute value pairs and array data types (or any other serializable value)
KenticoA web content management system (WCMS) for building websites, online stores, intranets, and Web 2.0 community sites
Man In The Browser (MITB)Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse[1] that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application.
Meta TagsMeta tags are snippets of text that describe a page's content; the meta tags don't appear on the page itself, but only in the page's code. We all know tags from blog culture, and meta tags are more or less the same thing, little content descriptors that help tell search engines what a web page is about.
Microsoft Edge (Spartan)Microsoft Edge is a web browser developed by Microsoft and included in Windows 10, windows 10 Mobile and Xbox One, replacing Internet Explorer as the default web browser on all device classes.
Microsoft SilverlightMicrosoft Silverlight (or simply Silverlight) is a deprecated application framework for writing and running rich Internet applications, similar to Adobe Flash.
Mobile InternetMobile Internet is defined as the Internet as accessed by means of a smartphone or other mobile device.
OAuth 2OAuth is an open standard for token-based authentication and authorization on the Internet.
Open Web Application Security Project (OWASP)The Open Web Application Security Project (OWASP), an online community, produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
Over-the-Top PlatformOver-the-top content is a term used in broadcasting and technology business reporting to refer to audio, video, and other media transmitted via the Internet as a standalone product.
PercussionA CMS that supports content-rich, SEO friendly websites
Portfolio WebsiteA Portfolio Website is an essential tool to getting more business and building your professional brand. The purpose of an online portfolio is to give a prospective client, like an art director, a sense of who you are, what you can do and whether you are the person they should hire to execute their project.
POST (HTTP)A request method supported by the HTTP protocol used by the World Wide Web
Really Simple Syndication (RSS)Real Simple Syndication is the term used to refer the collection of Web feed formats that provide updated or shared information in a standardized way.
Relational SearchRelational searches are tricky to specify because even the simplest of questions may require data from two or more tables.
Session ReplaySession replay is the ability to replay a visitor's journey on a web site or within a web application. Replay can include the user's view (browser or screen output), user input (keyboard and mouse inputs), and logs of network events or console logs.
Spring BootSpring Boot is a brand new framework from the team at Pivotal, designed to simplify the bootstrapping and development of a new Spring application. The framework takes an opinionated approach to configuration, freeing developers from the need to define boilerplate configuration.
Static Application Security Testing (SAST)Static application security testing (SAST) is a set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities. SAST solutions analyze an application from the inside out in a nonrunning state.
Top Level DomainA top-level domain is one of the domains at the highest level in the hierarchical Domain Name System of the Internet
Uniform Resource LocatorA Uniform Resource Locator (URL), colloquially termed a web address,[1] is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
Web ApplicationsIn computing, a web application or web app is a client-server software application in which the client runs in a web browser.
Web BrowsersA web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.
Web Content Accessibility Guidelines (WCAG)The Web Content Accessibility Guidelines (WCAG) are part of a series of web accessibility guidelines published by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C), the main international standards organization for the Internet.
Web DevelopmentWeb development broadly refers to the tasks associated with developing websites for hosting via intranet or internet.
Web FormsA webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing. Forms can resemble paper or database forms because web users fill out the forms using checkboxes, radio buttons, or text fields.
Web ServersWeb servers are computers that deliver Web pages.
Web Service ManagementWeb services management is a DMF open standard defining a SOAP-based protocol for the management of servers, devices, applications and various Web services.
Web Service SecurityWeb services security is an extension to SOAP to apply security to Web services.
Web SphereWebSphere is a set of Java-based tools from IBM that allows customers to create and manage sophisticated business Web sites.
Web TrafficWeb traffic is the amount of data sent and received by visitors to a website. This necessarily does not include the traffic generated by bots. Since the mid-1990s, web traffic has been the largest portion of Internet traffic.
WebhookA webhook in web development is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks. These callbacks may be maintained, modified, and managed by third-party users and developers who may not necessarily be affiliated with the originating website or application.
WebRTCWEbRTC is a collection of communications protocols and application programming interfaces that enable real-time communication over peer-to-peer connections.