IT Glossary - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Application Programming Interface (API) Design

The process of planning and creating the endpoints, data structures, and protocols for APIs, focusing on making them efficient, easy to use, and secure, while ensuring they meet the needs of both the developers who will use them and the applications they will serve.

You will find this term commonly used in Software Development, Web Services

Application Programming Interface (API) Economy

The economic value and business models that emerge from the use and exchange of APIs, enabling companies to extend services, reach new customers, and innovate by leveraging external and internal APIs.

You will find this term commonly used in Business Strategy, Digital Transformation

Application Programming Interface (API) Key

An API Key is a unique identifier used to authenticate a user, developer, or calling program to an API, often part of the API security mechanisms to control access and track API usage.

You will find this term commonly used in Software Development, Security

Application Programming Interface (API) Management

The process of creating, publishing, maintaining, and securing APIs in a scalable environment, often involving the use of API gateways, documentation tools, and analytics to manage the lifecycle of APIs.

You will find this term commonly used in Web Development, API Strategy

Application Programming Model

An Application Programming Model defines the methods and data structures that developers should use to build applications on a specific platform or system, guiding the creation of consistent and efficient software.

You will find this term commonly used in Software Development

Application Release Automation

The use of tools and processes to automate the deployment of applications across various stages of the development lifecycle, ensuring consistent and reliable releases.

You will find this term commonly used in DevOps, Continuous Delivery

Application Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments, including testing and deploying software releases.

You will find this term commonly used in DevOps, Software Deployment

Application Scalability

The ability of an application to handle increased loads by adapting its resource usage without compromising performance, typically through scaling out (adding more resources) or scaling up (upgrading existing resources).

You will find this term commonly used in Cloud Computing, Software Development

Application Security

Application Security encompasses measures taken to improve the security of an application often by finding, fixing, and preventing security vulnerabilities.

You will find this term commonly used in Security, Cybersecurity

Application Security Framework

A structured set of guidelines and best practices designed to help developers build more secure software applications, addressing common security threats and vulnerabilities from the outset of the development process.

You will find this term commonly used in Cybersecurity, Software Development

Application Security Testing (AST)

AST involves methods and tools used to find security vulnerabilities in applications, either in the development phase or after deployment, to ensure the application's resistance to attacks.

You will find this term commonly used in Security, Software Development

Application Segmentation

The practice of dividing application components into separate segments or microservices, often to improve scalability, manageability, and security by isolating critical functions and reducing the attack surface.

You will find this term commonly used in Microservices, Application Design

Application Service Agreement (ASA)

A contract or agreement between a service provider and a customer that specifies the services to be provided, service level targets, and responsibilities of both parties, particularly for software applications and cloud services.

You will find this term commonly used in IT Service Management, Contracts

Application Service Architecture (ASA)

A framework for designing software applications with a focus on separating functions into individual services that can be independently developed, deployed, and managed.

You will find this term commonly used in Software Architecture, Cloud Computing

Application Service Environment (ASE)

ASE is a hosting environment within a cloud service that provides a fully isolated and dedicated environment for securely running applications at scale, often including features for load balancing, auto-scaling, and integrated security.

You will find this term commonly used in Cloud Computing, IT Infrastructure

Application Service Management

The practice of managing and optimizing the delivery of software applications and services to ensure performance, availability, and user satisfaction.

You will find this term commonly used in IT Service Management, Operations

Application Service Mapping

The process of creating a visual representation of the relationships and dependencies between applications, services, and underlying infrastructure components, facilitating understanding, and management of IT services.

You will find this term commonly used in IT Service Management, Operations

Application Service Provider (ASP)

An ASP is a business providing computer-based services to customers over a network, such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

You will find this term commonly used in Cloud Computing, Services

Application Service Provider (ASP) Model

A business model that delivers software applications and related services over the internet, allowing customers to access and use software without installing it locally, typically on a subscription basis.

You will find this term commonly used in Cloud Computing, Software as a Service

Application Stack

An Application Stack refers to a set of software subsystems or components needed to create a complete platform such that no additional software is needed to support applications.

You will find this term commonly used in Software Development, IT Infrastructure

Application Stack Decomposition

The process of breaking down a monolithic application stack into its component parts, often as part of a strategy to adopt microservices or to improve system modularity and scalability.

You will find this term commonly used in Software Architecture, Microservices

Application Threat Modeling

A methodology used to identify, assess, and mitigate security threats and vulnerabilities in application design and architecture, typically during the early stages of development.

You will find this term commonly used in Security, Software Development

Application Virtualization

Application Virtualization allows applications to run in environments that do not suit the native app by abstracting the underlying hardware or software. This enables compatibility and mobility.

You will find this term commonly used in General IT, Cloud Computing

Application Vulnerability Assessment

The systematic examination of applications for vulnerabilities, including security flaws, weaknesses, and potential threats, to identify and mitigate risks before they can be exploited by attackers.

You will find this term commonly used in Cybersecurity, Application Security

Application-Specific Standard Product (ASSP)

A semiconductor device used for a specific application that is produced for multiple users and sold to more than one company.

You will find this term commonly used in Electronics, Hardware

Architectural Pattern

A general, reusable solution to a commonly occurring problem within a given context in software architecture, providing a template for how to solve a problem that can be used in many different situations.

You will find this term commonly used in Software Architecture, Design

Architecture Description

Architecture Description refers to the process and documentation of the fundamental structures and behaviors of a system or ecosystem, enabling understanding and analysis of its system architecture.

You will find this term commonly used in General IT, Development

ARKit

ARKit is a development framework by Apple that allows developers to create augmented reality (AR) experiences for iPhone and iPad, providing tools for visual inertial odometry, environmental understanding, and 3D asset rendering.

You will find this term commonly used in AI, Mobile Development

ARP (Address Resolution Protocol)

ARP is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address, used in IPv4 networks.

You will find this term commonly used in Networking

ARP Spoofing

ARP Spoofing, or ARP Poisoning, is a technique used in cyber attacks to send fake ARP messages over a local area network, enabling attackers to intercept, modify, or stop data in transit by linking their MAC address with the IP address of another host.

You will find this term commonly used in Security, Cybersecurity

ARPA (Advanced Research Projects Agency)

ARPA, now DARPA (Defense Advanced Research Projects Agency), is a research and development agency of the U.S. Department of Defense responsible for the development of emerging technologies for use by the military.

You will find this term commonly used in General IT

Array Programming

Array Programming involves programming languages and techniques optimized for the manipulation of arrays or matrices, simplifying tasks in scientific computing, data analysis, and machine learning.

You will find this term commonly used in Software Development, Data Science

Artificial General Intelligence (AGI)

The hypothetical intelligence of a machine that has the capacity to understand or learn any intellectual task that a human being can, often considered the holy grail of artificial intelligence research.

You will find this term commonly used in AI, Machine Learning

Artificial Neural Network (ANN)

A computing system inspired by the biological neural networks that constitute animal brains, capable of learning tasks by considering examples without being programmed with task-specific rules.

You will find this term commonly used in AI, Machine Learning

Artificial Reality

A term often used interchangeably with virtual reality or augmented reality, referring to technologies that create immersive, computer-generated environments or enhance real-world environments with digital overlays.

You will find this term commonly used in Virtual Reality, Augmented Reality

As-a-Service (XaaS)

As-a-Service, or XaaS, refers to the delivery of anything as a service, encompassing SaaS (Software as a Service), IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and other cloud-based services.

You will find this term commonly used in Cloud Computing

ASIC (Application-Specific Integrated Circuit)

An ASIC is a microchip designed for a specific application, ranging from audio processing to managing a cellphone call, offering higher performance and lower power consumption than general-purpose processors.

You will find this term commonly used in Hardware, Networking

ASIC Design

ASIC Design involves creating a custom integrated circuit for a specific use rather than for general-purpose use, optimizing performance and reducing power consumption.

You will find this term commonly used in Hardware

Asset Discovery

Asset Discovery is the process of identifying the assets within an organization's network, including hardware and software components, to manage, secure, and optimize the assets effectively.

You will find this term commonly used in IT Management, Security

Asset Intelligence

The collection, processing, and analysis of data related to IT assets to provide insights into usage, performance, and lifecycle management, supporting strategic decision-making and operational efficiency.

You will find this term commonly used in IT Asset Management, Business Intelligence

Asset Lifecycle Management

The process of optimizing the life cycle of physical assets from acquisition to disposal, aiming to maximize value while minimizing costs and risks associated with asset ownership and operation.

You will find this term commonly used in IT Asset Management, Operations

Asset Management Platform

Software solutions designed to manage and optimize the lifecycle of IT assets, from procurement to disposal, including tracking, maintenance, and financial management of hardware and software assets.

You will find this term commonly used in IT Asset Management, Software

Asset Management Software

Asset Management Software is a tool that helps organizations track, manage, and optimize their assets, including hardware, software, and intellectual property, throughout the asset lifecycle.

You will find this term commonly used in IT Management

Asset Performance Management

The practice of using data analysis, monitoring, and optimization techniques to improve the reliability and availability of physical assets, reducing operational costs and extending asset lifespans.

You will find this term commonly used in IT Management, Operations

Asset Tagging

The practice of attaching identification tags or labels to assets, including hardware and software, to facilitate tracking, management, and accountability within an organization.

You will find this term commonly used in IT Asset Management, Security

Asset Tracking Solutions

Systems and technologies used for monitoring and managing the location, status, and condition of assets over time, often involving RFID, GPS, or barcode technology, to optimize asset utilization and prevent loss.

You will find this term commonly used in IT Asset Management, Operations

Asymmetric Digital Subscriber Line (ADSL)

ADSL is a type of DSL broadband communications technology used for connecting to the internet, allowing more data to be sent over existing copper telephone lines compared to traditional modem lines.

You will find this term commonly used in Telecommunications, Networking

Asymmetric Encryption

Asymmetric Encryption, or public key cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner, for secure communication.

You will find this term commonly used in Security, Cybersecurity

Asymmetric Encryption Algorithms

Cryptographic algorithms that use two different keys for encryption and decryption, one public key for encrypting messages and one private key for decrypting them, facilitating secure communication over insecure channels.

You will find this term commonly used in Cryptography, Security

Asymmetric Key Algorithm

Asymmetric Key Algorithms use a pair of distinct yet related cryptographic keys for encryption and decryption; one key encrypts the data, and the other key decrypts it, facilitating secure communication over insecure channels.

You will find this term commonly used in Security, Cryptography

What's Your
Career Path?
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Training Hours
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Training Hours
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Training Hours
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Web Designer Career Path

Web Designer Career Path

Explore the theoretical foundations and practical applications of web design to craft engaging and functional websites.
Total Hours
33 Training Hours
icons8-video-camera-58
171 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Training Hours
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Kubernetes Certification

Kubernetes Certification: The Ultimate Certification and Career Advancement Series

Enroll now to elevate your cloud skills and earn your Kubernetes certifications.
Total Hours
11 Training Hours
icons8-video-camera-58
207 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Training Hours
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Training Hours
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Training Hours
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Training Hours
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Training Hours
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Training Hours
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart