IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Agile Project Portfolio Management

The application of agile principles and practices to manage a portfolio of projects, ensuring flexibility, quick adaptation to change, and alignment with strategic business goals.

You will find this term commonly used in Project Management, Agile Methodology

Agile Release Management

Agile Release Management is the process of managing the release of software in an agile development environment, focusing on the delivery of new features and updates with high frequency and flexibility, aligning development with customer needs and feedback.

You will find this term commonly used in Software Development, IT Management

Agile Requirements Engineering

The process of continuously gathering, developing, and managing requirements for software projects in an agile context, emphasizing collaboration, customer feedback, and the ability to adapt to change.

You will find this term commonly used in Agile Methodology, Software Development

Agile Retrospectives

Meetings held at the end of a development iteration in agile methodologies, where team members discuss what went well, what could be improved, and plan actions for improvement, fostering continuous process enhancement.

You will find this term commonly used in Agile Methodology, Team Collaboration

Agile Software Craftsmanship

A commitment to creating high-quality software in an agile environment, emphasizing technical excellence, good design, and sustainable development practices.

You will find this term commonly used in Software Development, Agile Methodologies

Agile Software Development

Agile Software Development is an approach to software development under which requirements and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customer/end user.

You will find this term commonly used in General IT, Development

Agile Software Engineering

Agile Software Engineering is an approach to software development that emphasizes flexibility, customer involvement, and the frequent delivery of working software, using methodologies like Scrum and Kanban.

You will find this term commonly used in Software Development

Agile Software Testing

A software testing approach that follows the principles of agile software development, emphasizing early and continuous testing, flexibility, and collaboration between developers and testers.

You will find this term commonly used in Agile Methodology, Quality Assurance

Agile Test Automation

The practice of using software to perform test cases automatically, managing test data, and utilizing results to improve software quality, integrated within an agile development process for continuous testing and feedback.

You will find this term commonly used in Software Testing, Agile Development

Agile Test Data Management

The practice of managing and provisioning data in a flexible and efficient manner for testing purposes within agile software development environments, aiming to ensure that high-quality, relevant test data is available on demand.

You will find this term commonly used in Agile Methodology, Software Testing

Agile Testing

Agile Testing is a software testing process that follows the principles of agile software development, involving continuous feedback, short, fast cycles, and adaptability to changes, aligning closely with the development process.

You will find this term commonly used in Software Development, Quality Assurance

Agile Value Stream Mapping

A lean-management method for analyzing the current state and designing a future state for the series of events that take an idea to a delivered product or service, emphasizing the identification and elimination of waste within an agile context.

You will find this term commonly used in Agile Methodology, Process Improvement

AI (Artificial Intelligence)

AI involves creating computer systems that can perform tasks typically requiring human intelligence, such as visual perception, speech recognition, decision-making, and language translation.

You will find this term commonly used in AI, General IT

AI Accelerators

AI Accelerators are specialized hardware designed to speed up AI applications, particularly in the fields of deep learning and machine learning, by providing faster processing for tasks like neural network computations.

You will find this term commonly used in AI, Hardware

AI Active Learning

Active Learning in AI is a technique where the learning algorithm selectively queries the user or a data source to label new data points with the aim of improving the learning accuracy with fewer training labels.

You will find this term commonly used in AI, Machine Learning

AI Ethics

AI Ethics refers to the moral principles and techniques to ensure artificial intelligence systems work for the benefit of society, addressing issues like bias, fairness, transparency, and accountability.

You will find this term commonly used in AI, Ethics

AI Governance

AI Governance involves frameworks and guidelines to ensure responsible use and development of AI technologies, focusing on ethics, fairness, transparency, and accountability to mitigate risks associated with AI systems.

You will find this term commonly used in AI, Ethics

Air Interface

The Air Interface is the radio frequency portion of the circuit between the mobile device and the active base station, crucial in cellular networks to define the transmission and reception of signals over the air.

You will find this term commonly used in Telecommunications, Networking

Air-Gap Security

Air-Gap Security refers to the practice of isolating a computer or network and ensuring it is not connected to the internet or any other unsecured network, significantly reducing the risk of cyber attacks.

You will find this term commonly used in Security, Cybersecurity

AJAX (Asynchronous JavaScript and XML)

AJAX is a set of web development techniques enabling web applications to send and retrieve data from a server asynchronously, without interfering with the display and behavior of the existing page.

You will find this term commonly used in Web Development

Algorithm

An algorithm is a step-by-step procedural instruction set used for calculations, data processing, and automated reasoning tasks, serving as the foundation for programming logic and problem-solving.

You will find this term commonly used in AI, General IT

Algorithm Analysis

Algorithm Analysis is the process of determining the computational complexity of algorithms, their efficiency in terms of time and space, ensuring the selection of the most appropriate algorithm for data processing.

You will find this term commonly used in Software Development, AI

Algorithm Optimization

The process of making an algorithm more efficient by improving its execution time, reducing memory usage, or enhancing other aspects of its performance.

You will find this term commonly used in Software Development, Computer Science

Algorithm Visualization

The use of graphical representations to illustrate the steps and processes involved in an algorithm, aiding in teaching, understanding, and debugging complex algorithms.

You will find this term commonly used in Computer Science Education, Development

Algorithmic Bias

Algorithmic Bias refers to unintended and systematic errors in the operation and outcomes of algorithms, often reflecting biases in data collection, algorithm design, or interpretation, leading to unfair results.

You will find this term commonly used in AI, Ethics

Algorithmic Complexity

Algorithmic Complexity, or Computational Complexity, refers to the study of the amount of computational resources (time and space) required for the execution of algorithms, aiming to understand the efficiency and scalability of algorithms.

You will find this term commonly used in Computer Science, Software Engineering

Algorithmic Complexity Theory

A branch of computer science that studies the intrinsic complexity of computational problems and algorithms, including the resources required (such as time and space) for solving problems.

You will find this term commonly used in Computer Science, Theory

Algorithmic Efficiency

Algorithmic Efficiency refers to the optimization of algorithm performance, considering factors like time complexity and space complexity, aiming to reduce resource consumption and improve execution speed for software applications.

You will find this term commonly used in Software Engineering, Computer Science

Algorithmic Game Theory

The study of mathematical models of strategic interaction among rational decision-makers, using algorithms and computational techniques, often applied in economics, computer science, and social sciences.

You will find this term commonly used in Computer Science, Economics

Algorithmic Trading

Algorithmic Trading involves using computer algorithms to execute trading strategies at high speed and volume, analyzing market data to make financial trading decisions automatically.

You will find this term commonly used in AI, Finance

Algorithmic Trading System

A system that uses advanced mathematical models for making transaction decisions in the financial markets, capable of executing trades at high speeds and volumes.

You will find this term commonly used in Finance, AI

Alias Analysis

Alias Analysis in programming languages is the process of determining whether two variables refer to the same location in memory, impacting optimizations and correctness in compiler design and static analysis tools.

You will find this term commonly used in Software Development, Programming

Amazon Web Services (AWS)

Provides certifications that validate expertise in cloud architecture, operations, and security on AWS platforms, suitable for cloud practitioners, architects, developers, and operations roles.

You will find this term commonly used in Cloud Computing

Ambient Computing

Ambient Computing refers to the integration of digital technology into the environment in a way that is unobtrusive and anticipatory, providing seamless interaction and services based on the context and user needs.

You will find this term commonly used in Smart Environments, AI

Ambient Intelligence

Ambient Intelligence (AmI) refers to electronic environments that are sensitive and responsive to the presence of people, integrating embedded devices, sensors, and AI to respond intelligently to human presence.

You will find this term commonly used in AI, Smart Environments

Ambient User Experience

The creation of seamless and continuous user experiences that flow across and between devices, locations, and contexts, often leveraging data, sensors, and AI to anticipate user needs and actions.

You will find this term commonly used in Human-Computer Interaction, Design

AMI (Amazon Machine Image)

An AMI is a template that provides the information required to launch an instance in AWS, including the operating system, application server, and applications.

You will find this term commonly used in Cloud Computing

Analog-to-Digital Converter (ADC)

An ADC is a device that converts analog signals, such as sound or light, into a digital format that computers and electronic devices can understand, enabling the processing, storage, and transmission of analog information in digital form.

You will find this term commonly used in Hardware, Electronics

Anomaly Detection

Anomaly Detection is the identification of unusual patterns or outliers in datasets that do not conform to expected behavior, widely used in fraud detection, network security, and system health monitoring.

You will find this term commonly used in AI, Security

Anomaly-Based Intrusion Detection System

A security system that identifies potential threats by monitoring network traffic and comparing it against an established baseline of normal activity, looking for anomalies.

You will find this term commonly used in Security, Cybersecurity

Anonymization

Anonymization is the process of removing or modifying personal information from data sets, so that individuals cannot be readily identified, ensuring privacy and compliance with data protection regulations.

You will find this term commonly used in Data Privacy, Security

Anonymizing Proxy

An Anonymizing Proxy is a proxy server that anonymizes users' web browsing activities by hiding their IP address from the websites and services they access, enhancing privacy and security online.

You will find this term commonly used in Networking, Security

Ansible

Ansible is an open-source automation tool for software provisioning, configuration management, and application deployment, simplifying complex IT tasks and making them more reproducible.

You will find this term commonly used in DevOps, IT Management

Ansible Tower

Ansible Tower is an enterprise framework for controlling, securing, managing, and extending your Ansible automation tasks to your team, providing a web-based console and REST API for Ansible.

You will find this term commonly used in DevOps, IT Management

Antivirus Software

Antivirus software is a program designed to detect, prevent, and remove malware, including viruses, worms, and Trojan horses, enhancing computer security.

You will find this term commonly used in Security, Cybersecurity

Anycast Routing

Anycast Routing is a network addressing and routing method in which a single destination address has multiple routing paths, allowing data packets to be routed to the nearest or best destination.

You will find this term commonly used in Networking

Apache

Apache is a widely used open-source web server software system that plays a pivotal role in the hosting and delivery of web content, supporting various features like SSL, proxying, and virtual hosting.

You will find this term commonly used in Web Development

Apache Hadoop

Apache Hadoop is an open-source software framework used for distributed storage and processing of big data sets using the MapReduce programming model, across clusters of computers.

You will find this term commonly used in Data Management, Cloud Computing

Apache Kafka

Apache Kafka is a distributed event streaming platform used for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications.

You will find this term commonly used in Data Management

Apache Spark

A unified analytics engine for large-scale data processing, with built-in modules for streaming, SQL, machine learning, and graph processing.

You will find this term commonly used in Data Processing, Big Data

What's Your
Career Path?
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Training Hours
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Training Hours
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Training Hours
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Training Hours
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Training Hours
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart