A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A technology used to capture image data at specific frequencies across the electromagnetic spectrum. Used in satellite imaging, medical imaging, and quality control in various industries.
You will find this term commonly used in AI, General IT
Devices that capture image data within specific wavelength ranges across the electromagnetic spectrum. Used in various applications, including remote sensing and environmental monitoring.
You will find this term commonly used in AI, General IT
The ability of an operating system to execute multiple tasks simultaneously on a single processor.
You will find this term commonly used in General IT
A programming approach that allows multiple threads to exist within the context of a single process, enabling parallel execution of tasks.
You will find this term commonly used in Software Development
Multithreading is a programming technique that allows multiple threads of execution to run concurrently within a single process, enabling efficient utilization of CPU resources and improved performance.
You will find this term commonly used in Software Development
The ability of a database management system to execute multiple threads concurrently, improving performance and efficiency in handling database operations.
You will find this term commonly used in Databases, Software Development
A process in programming that ensures that two or more concurrent threads do not simultaneously execute some particular program segment known as critical section.
You will find this term commonly used in Software Development
Also known as n-tier architecture, a client-server architecture in which presentation, application processing, and data management functions are physically separated.
You will find this term commonly used in Software Development, Web Development
A technique for testing a hypothesis in which multiple variables are modified. The goal is to determine which combination of variations performs the best out of all possible combinations.
You will find this term commonly used in Web Development, Marketing
The process of combining hardware or software products from multiple vendors into a single system to achieve a specific functionality or workflow.
You will find this term commonly used in General IT, Networking
A method of software testing which involves modifying software's source code in small ways to test whether the existing test cases can detect these modifications.
You will find this term commonly used in Software Testing
A security process in which both the client and the server verify each other's identity.
You will find this term commonly used in Security, Cybersecurity
A property of concurrency control, which is instituted for the purpose of preventing race conditions; it is the requirement that one thread of execution never enter its critical section at the same time that another concurrent thread of execution enters its own critical section.
You will find this term commonly used in Software Development, Operating Systems
An algorithm used in computer science to avoid race conditions by ensuring that multiple program threads do not simultaneously execute some particular program segment known as critical sections.
You will find this term commonly used in Software Development, Security
A phenomenon where a change in the electric current in one conductor induces a voltage in another conductor through electromagnetic induction. Relevant in wireless charging and power transfer.
You will find this term commonly used in Electronics
An agreement between two webmasters to provide a hyperlink within their own website to each other's web site. Generally done to provide readers with quick access to related sites, and to increase search engine rankings through reciprocal links.
You will find this term commonly used in Web Development, SEO
A mode of Secure Sockets Layer/Transport Layer Security where both the client and the server authenticate each other using digital certificates to ensure both parties are trusted entities in a secure communication.
You will find this term commonly used in Security, Networking
A security protocol that requires both the client and server in a communication to authenticate each other's identities via TLS/SSL certificates, ensuring a secure connection.
You will find this term commonly used in Cybersecurity, Networking
A concurrency control method commonly used in database management systems to provide concurrent access to the database and in programming languages to implement transactional memory.
You will find this term commonly used in Databases, Software Development
A development technique in which a new product is developed with sufficient features to satisfy early adopters.
You will find this term commonly used in Software Development, Business Strategy
A software architectural pattern that facilitates the separation of the development of the graphical user interface (the view) from the development of the business logic or back-end logic (the model) so that the view is not dependent on any specific model platform.
You will find this term commonly used in Software Development
In the context of neural networks and artificial intelligence, myelin is often used metaphorically to describe the insulation or enhancement of neural connections. The term originates from the biological myelin sheath that insulates nerve fibers and increases signal transmission speed.
You will find this term commonly used in AI, Neural Networks
A storage engine for MySQL. MyISAM was the default storage engine for the MySQL relational database management system versions prior to 5.5.
You will find this term commonly used in Databases
Often referred to in the context of Mylar diagrams used in software architecture to represent relationships between different components or systems.
You will find this term commonly used in Software Development
Pertaining to electric phenomena produced by muscle action or to the electric potentials associated with muscles. Relevant in the development of prosthetic devices and medical research.
You will find this term commonly used in Health IT, General IT
An early social networking website launched in 2003 that allows users to create personal profiles, share photos, music, and videos, and interact with friends.
You will find this term commonly used in Social Media
An open-source relational database management system.
You will find this term commonly used in General IT, Database
An integrated development environment for MySQL, providing data modeling, SQL development, and comprehensive administration tools for server configuration, user administration, and much more.
You will find this term commonly used in Databases, Software Development
A method used externally by market research companies, watchdog organizations, or internally by companies themselves to measure quality of service, compliance with regulation, or to gather specific information about products and services. While not an IT term per se, it's increasingly used in evaluating IT retail and service sectors.
You will find this term commonly used in Business Intelligence, Customer Service
A multi-tier architecture that separates the presentation, application, and data management functions for better scalability and management.
You will find this term commonly used in Software Development, Architecture
A powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes.
You will find this term commonly used in Networking, Monitoring
A means to improve the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network.
You will find this term commonly used in Networking, Algorithms
A container that holds a set of identifiers, symbols, or names, allowing for the organization and control of these elements within various parts of a program or system.
You will find this term commonly used in General IT, Programming
A technology used in virtualization and containerization to isolate system resources between different processes or containers.
You will find this term commonly used in Virtualization, Security
A value or symbol that represents an undefined or unrepresentable value, especially in floating-point calculations.
You will find this term commonly used in Programming, Data Science
Non-volatile storage technology used in solid-state drives (SSDs) and USB flash drives.
You will find this term commonly used in General IT, Storage
A basic logic gate in digital electronics that produces an output only when all its inputs are off. It is the combination of a NOT gate followed by an AND gate.
You will find this term commonly used in General IT
The manipulation of matter on an atomic or molecular scale, often used in IT for developing smaller and more powerful electronic components.
You will find this term commonly used in General IT
A Microsoft technology for controlling network access of a computer, based on its health compliance with the defined policy.
You will find this term commonly used in Networking, Security
A type of data transmission over a network where the bandwidth range is narrow. Often used in telecommunications to refer to channels that are narrower than a voice channel.
You will find this term commonly used in Networking, Telecommunications
A file-level storage architecture that makes stored data more accessible to networked devices.
You will find this term commonly used in Networking, Data Storage
A technique used to modify network address information in packet headers while in transit, often used to conserve IP addresses or enhance security.
You will find this term commonly used in Networking, Security
Techniques that establish and maintain Internet protocol connections traversing NAT gateways, used in applications like VoIP.
You will find this term commonly used in Networking, Cybersecurity
A mechanism for translating IPv6 addresses to IPv4 addresses and vice versa, facilitating communication between IPv4 and IPv6 networks.
You will find this term commonly used in Networking, IPv6/IPv4 Integration
Natural language generation (NLG) is a branch of artificial intelligence that generates human-like text or speech based on structured data or predefined rules, enabling automated content creation, summarization, or report generation.
You will find this term commonly used in AI, Natural Language Processing, Content Generation
Natural language processing (NLP) is a branch of artificial intelligence that focuses on the interaction between computers and humans through natural language, enabling computers to understand, interpret, and generate human language.
You will find this term commonly used in AI, Data Processing, Linguistics
A branch of artificial intelligence that enables computers to understand, interpret, and generate human language.
You will find this term commonly used in AI
NFC is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other.
You will find this term commonly used in General IT
A signal used in communications to indicate that data has been received incorrectly or that an error has occurred during transmission.
You will find this term commonly used in Networking, Data Communication
The principle that all Internet traffic should be treated equally by Internet Service Providers, without discrimination.
You will find this term commonly used in Networking, Policy
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.