Browse Definitions :

Browse Definitions by Alphabet

A-W - AI

  • A-weighted decibel (dBA or dB(A)) - A-weighted decibel (dBA or dB(A)) is an expression of the relative loudness of sounds as perceived by the human ear.
  • A/B testing (split testing) - A/B testing, sometimes called split testing, is an assessment tool for identifying which version of something helps an individual or organization meet a business goal more effectively.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • AAA server (authentication, authorization and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization and accounting (AAA) services.
  • AARRR metrics - AARRR metrics are a measured performance analysis of a startup businesses statistics centered around the response of customers.
  • abacus - An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame.
  • abandoned call - An abandoned call is a call or other type of contact initiated to a call center that is ended before any conversation occurs.
  • ABAP (Advanced Business Application Programming) - ABAP (Advanced Business Application Programming) is the primary programming language supported on the SAP NetWeaver ABAP application server platform and applications that run on it, such as SAP ERP (formerly R/3), S/4HANA and CRM.
  • ABC analysis (Pareto analysis) - ABC analysis, also known as Pareto analysis, is a method used to categorize something according to its importance or value in a given context.
  • ABC classification - ABC classification is a ranking system for identifying and grouping items in terms of how useful they are for achieving business goals.
  • abend (abnormal end) - An abend (abnormal end) is an unexpected or abnormal termination of an application or operating system that results from a problem with the software.
  • absolute link - An absolute link is a hyperlink containing a full URL, which includes all the information needed to find a particular site, page or document or other addressable item on the Internet.
  • absolute truth - In general, absolute truth is whatever is always valid, regardless of parameters or context.
  • absolute value - Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system.
  • abstract class - An abstract class is a template definition of methods and variables in a specific class, or category of objects.
  • abstraction - Abstraction (from the Latin abs, meaning away from and trahere, meaning to draw) is the process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
  • AC-3 (Dolby Digital) - AC-3, also known as Dolby Digital, is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound.
  • Accelerated Mobile Pages (AMP) - Accelerated Mobile Pages (AMP) is an open source project created to improve the performance of web pages for mobile delivery.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • acceptance testing - Acceptance testing is a quality assurance (QA) process that determines to what degree an application meets end users' approval.
  • acceptance test–driven development (ATDD) - Acceptance test–driven development (ATDD) is a collaborative process where developers, testers and business representatives come together to work out requirements, perceive potential pitfalls and reduce the chance of errors before coding begins.
  • access control - Access control is a security technique that regulates who or what can view or use resources in a computing environment.
  • access control list (ACL) - An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.
  • access log - An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website.
  • access network - Access networks are the communication networks that connect end-user devices, such as computers, smartphones and tablets, to a wide area network (WAN), such as the internet.
  • access recertification - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations.
  • account mapping - Account mapping is a strategic process that involves researching and visually organizing the key stakeholders, decision-makers and influencers within a target customer's organization.
  • account-based experience (ABX) - Account-based experience (ABX) is a business-to-business (B2B) strategy in which the sales, marketing and customer success departments work together to provide accounts with a unified, personalized experience throughout the buyer journey.
  • account-based marketing (ABM) - Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on target accounts within a specific market.
  • account-based selling - Account-based selling (ABS) is a strategic sales approach in business-to-business sales and marketing that centers around building highly personalized and targeted relationships with specific high-value accounts.
  • accountability - Accountability is an assurance that an individual or an organization is evaluated on its performance or behavior related to something for which it is responsible.
  • accountable care organization (ACO) - An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties voluntarily assume financial and medical responsibility for Medicare patients.
  • accounts receivable (AR) - Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.
  • accumulator - An accumulator is a type of register for short-term, intermediate storage of arithmetic and logic data in a computer's central processing unit (CPU).
  • ACID (atomicity, consistency, isolation, and durability) - In transaction processing, ACID (atomicity, consistency, isolation, and durability) is an acronym and mnemonic device used to refer to the four essential properties a transaction should possess to ensure the integrity and reliability of the data involved in the transaction.
  • ACK (acknowledgement) - In some digital communication protocols, ACK -- short for 'acknowledgement' -- refers to a signal that a device sends to indicate that data has been received successfully.
  • ACM (Association for Computing Machinery) - The ACM (Association for Computing Machinery), founded in 1947, is the largest and oldest international scientific and industrial computer society.
  • acquisition plan - An acquisition plan, in the context of procurement, is a business document specifying all relevant considerations for the processes involved with acquiring goods, services or other organizations.
  • Acronis - Acronis is a data protection software vendor that spun off as a separate company from Parallels in Singapore and became an independent company in 2003.
  • acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • action plan - An action plan is a document that lists what steps must be taken to achieve a specific goal.
  • actionable insights - Actionable insights are conclusions drawn from data that can be turned directly into an action or a response.
  • actionable intelligence - Actionable intelligence is information that can be immediately used or acted upon -- either tactically in direct response to an evolving situation, or strategically as the result of an analysis or assessment.
  • active attack - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.
  • active defense - An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult and to carry out.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Active Directory domain (AD domain) - An Active Directory domain (AD domain) is a collection of objects within a Microsoft Active Directory network.
  • Active Directory Federation Services (AD FS) - Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.
  • Active Directory forest (AD forest) - An Active Directory forest is the highest level of organization within Active Directory.
  • Active Directory functional levels - Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.
  • Active Directory tree - An Active Directory (AD) tree is a collection of domains within a Microsoft Active Directory network.
  • active RFID (active radio frequency identification) - Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
  • active sensor - An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection.
  • ActiveX - ActiveX is a set of object-oriented programming technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback.
  • ActiveX controls - ActiveX controls are component program objects that Microsoft developed to enable applications to perform specific functions, such as displaying a calendar or playing a video.
  • actuator - An actuator is a mechanism that turns energy into a controlled motion.
  • ad hoc analysis - Ad hoc analysis is a business intelligence (BI) process designed to answer specific business questions by using company data from various sources.
  • ad inventory (advertising inventory) - Ad inventory is the total amount of space that a publisher has available for advertisements at any given time.
  • adaptive cruise control - Adaptive cruise control (ACC) is a driver assistance technology that sets a maximum speed for vehicles and automatically slows the speed of the car when traffic is sensed in front of the vehicle.
  • Adaptive Insights (formerly called Adaptive Planning) - Adaptive Insights (formerly called Adaptive Planning) is a cloud-based corporate performance management software (CPM) vendor headquartered in Mountain View, California.
  • adaptive multifactor authentication (adaptive MFA) - Adaptive multifactor authentication (MFA) is a security mechanism intended to authenticate and authorize users through a variety of contextual authentication factors.
  • address bar - The address bar is the familiar text field at the top of a web browser’s graphical user interface (GUI) that displays the name or the URL (uniform resource locator) of the current web page.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local area network (LAN).
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity -- for example, a device, a file, a server or a networked computer.
  • address space layout randomization (ASLR) - Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.
  • adiabatic cooling - Adiabatic cooling is the process of reducing heat through a change in air pressure caused by volume expansion.
  • admittance (Y) - Admittance (symbolized Y) is an expression of the ease with which alternating current (AC) flows through a complex circuit or system.
  • Adobe Experience Platform - Adobe Experience Platform is a suite of customer experience management (CXM) solutions from Adobe.
  • Adobe Flash - Adobe Flash is a software platform used to create rich digital content containing animation, graphic effects, streaming video and other interactive elements to deliver engaging user experiences over many platforms, including desktops and mobile devices.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.
  • Adobe Sign - Adobe Sign is a cloud-based service that lets an individual or organization send, secure, track and manage e-signature processes.
  • ADP Mobile Solutions - ADP Mobile Solutions allows employees to use their mobile devices to access records such as their pay, schedules, time cards, retirement funds, benefits, contacts and calendar.
  • ADSL (Asymmetric Digital Subscriber Line) - ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data transmission at a high bandwidth on existing copper wire telephone lines to homes and businesses.
  • adulting - Adulting is the assumption of tasks and behaviors associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult.
  • advanced analytics - Advanced analytics is a broad category of inquiry that can be used to help drive changes and improvements in business practices.
  • Advanced Encryption Standard (AES) - The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.
  • Advanced Message Queuing Protocol (AMQP) - Advanced Message Queuing Protocol (AMQP) is an open source published standard for asynchronous messaging by wire.
  • advanced persistent threat (APT) - An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period.
  • advanced planning and scheduling (APS) - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • advanced shipping notice (ASN) - An advanced shipping notice (ASN) is a document that provides detailed information about a pending delivery.
  • adversarial machine learning - Adversarial machine learning is a technique used in machine learning (ML) to fool or misguide a model with malicious input.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • AF (audio frequency or a.f.) - AF is a frequency such that, if applied to a transducer such as a loudspeaker or headset, will produce acoustic waves within the range of human hearing.
  • affinity marketing - Affinity marketing is a type of direct marketing in which a business forms a partnership with an organization to provide goods or services in exchange for access to a new market.
  • agentless - Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.
  • Agile Manifesto - The Agile Manifesto is a document that identifies four key values and 12 principles that its authors believe software developers should use to guide their work.
  • Agile operations (AgileOps) - Agile operations, or AgileOps, is a digital business operating model that builds on Agile methodologies and DevOps techniques to help organizations adapt to change quickly and efficiently.
  • Agile project management (APM) - Agile project management (APM) is an iterative approach to planning and guiding project processes.
  • Agile retrospective - An Agile retrospective is a meeting that's held at the end of an iteration in Agile software development.
  • Agile software development - Agile is a type of software development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • agile test automation pyramid - The agile test automation pyramid is a graphical strategy guide for implementing automated software testing.
  • agnostic - Agnostic, in an information technology (IT) context, refers to something that is generalized so that it is interoperable among various systems.
  • agreed-upon procedures (AUP) - Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results.
  • agri-tech - Agri-tech, sometimes ag-tech, agtech or digital agriculture, is the application of technology and digital tools to farming.
  • AHCI (Advanced Host Controller Interface) - Advanced Host Controller Interface, or AHCI, is a technical standard for an interface that enables software to communicate with Serial ATA (SATA) devices.
  • AI alignment - AI alignment is a field of AI safety research that aims to ensure artificial intelligence systems achieve desired outcomes.
  • AI art (artificial intelligence art) - AI art (artificial intelligence art) is any form of digital art created or enhanced with AI tools.
  • AI democratization - AI democratization is the spread of artificial intelligence development to a wider user base that includes those without specialized knowledge of AI.
  • AI ethics (AI code of ethics) - AI ethics is a system of moral principles and techniques intended to inform the development and responsible use of artificial intelligence technology.
  • AI hallucination - An AI hallucination is when a large language model (LLM) generates false information.
Networking
  • top-of-rack switching

    Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other ...

  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

Security
  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an unwanted and uninvited user or group of such users interrupts online ...

  • CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • globalization

    Globalization is the process by which ideas, knowledge, information, goods and services spread around the world.

  • business process outsourcing (BPO)

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

  • localization

    Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its ...

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close