A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A vehicle's self-diagnostic and reporting capability, which gives access to the status of various vehicle subsystems and can be used for a wide range of applications from vehicle repair to telematics.
You will find this term commonly used in Automotive IT
Software designed to facilitate and streamline the process of integrating new employees into an organization, including the provisioning of user accounts, access to corporate systems, and training resources.
You will find this term commonly used in Human Resources, IT Management
The use of dedicated debugging circuitry that is integrated into microprocessors to facilitate debugging.
You will find this term commonly used in Hardware Development, Embedded Systems
Memory that is physically integrated on the microprocessor chip. This includes caches (L1, L2, or L3) and sometimes small amounts of RAM. It provides faster access to data compared to off-chip memory.
You will find this term commonly used in Hardware, Computer Architecture
The provisioning of computing resources and services on an as-needed basis, often via cloud computing platforms.
You will find this term commonly used in Cloud Computing, Scalability, General IT
Delivery services that provide goods or services to customers immediately upon request, often facilitated by technology platforms.
You will find this term commonly used in Logistics, E-Commerce, General IT
An economic model where goods and services are provided to consumers immediately upon request, often facilitated by digital platforms.
You will find this term commonly used in E-Commerce, Service Industry, General IT
Services that are provided to users or customers immediately upon request, typically facilitated by technology platforms.
You will find this term commonly used in Service Delivery, Cloud Computing, General IT
Running machine learning models directly on a device (such as a smartphone or IoT device), enabling data processing and inference on the device itself, rather than relying on cloud-based services.
You will find this term commonly used in AI, Mobile Development
Software or systems that are installed and run locally on an organization's own hardware infrastructure, rather than on cloud servers.
You will find this term commonly used in Infrastructure, Systems Administration, General IT
Software or systems that are installed and run locally on an organization's own hardware infrastructure, rather than on cloud servers.
You will find this term commonly used in Infrastructure, Systems Administration, General IT
The process of integrating a new employee with a company and its culture, as well as getting a new hire the tools and information needed to become a productive member of the team. In IT, it often involves granting new users access to company systems and software.
You will find this term commonly used in Human Resources, General IT
A password that is valid for only one login session or transaction, typically generated dynamically and sent to the user's device.
You will find this term commonly used in Security, Authentication, General IT
In networking, a communication model where data is sent from one sender to multiple recipients. Common in broadcasting and multicast messaging.
You will find this term commonly used in Networking, Communication Protocols
A marketing strategy that relies on gathering detailed information about an individual's preferences, behaviors, and interests to tailor marketing messages specifically to them.
You will find this term commonly used in Marketing, CRM
A method of encryption where data can be encrypted but not easily decrypted without a key, commonly used for storing sensitive information like passwords.
You will find this term commonly used in Security, Cryptography
A function that takes an input (or 'message') and returns a fixed-size string of bytes. The output is typically a 'digest' that is unique to each unique input. It is computationally infeasible to reverse the operation or find two different inputs that produce the same output.
You will find this term commonly used in Security, Cryptography
A technique for anonymous communication over a computer network, in which messages are encapsulated in layers of encryption, analogous to layers of an onion.
You will find this term commonly used in Security, Networking
A category of software tools that provides analysis of data stored in a database. OLAP tools enable users to analyze different dimensions of multidimensional data.
You will find this term commonly used in Data Analysis, Business Intelligence
A data structure that allows fast analysis of data according to the multiple dimensions that define a business problem. A multidimensional cube for reporting and data analysis.
You will find this term commonly used in Data Analysis, Business Intelligence
A virtual marketplace where buyers place bids and compete to purchase items or services over the internet.
You will find this term commonly used in E-Commerce, Auctions, General IT
The process of backing up data to a remote, cloud-based server over the internet.
You will find this term commonly used in Data Storage, Security, General IT
A form of advertising that uses information collected on an individual's web-browsing behavior, such as the pages they have visited or the searches they have made, to select which advertisements to display to that individual.
You will find this term commonly used in Online Marketing, Privacy
A protocol for maintaining the security of a server and other network resources by checking the revocation status of an X.509 digital certificate.
You will find this term commonly used in Security, Networking
A method to check the revocation status of an X.509 digital certificate that allows the presenter of a certificate to bear the cost of providing OCSP responses by appending a time-stamped OCSP response to the initial TLS handshake.
You will find this term commonly used in Security, Web Development
A tool or service that uses the OCSP for checking the revocation status of an X.509 digital certificate.
You will find this term commonly used in Security, Networking
Online collaboration involves the use of digital tools and platforms to enable individuals or groups to work together on projects, share information, and communicate in real-time, regardless of geographical location.
You will find this term commonly used in General IT, Communication, Collaboration
Software applications and platforms that enable remote teams to work together, share information, and collaborate on projects over the internet.
You will find this term commonly used in Collaboration, Communication, General IT
A group of people who interact and communicate with each other over the internet, often sharing common interests or goals.
You will find this term commonly used in Social Networking, Collaboration, General IT
The process of moving data from one location to another, one format to another, or one application to another, while it remains accessible to users or applications.
You will find this term commonly used in Data Management, Cloud Computing
Video games played over the internet, typically involving multiplayer interaction and competition.
You will find this term commonly used in Gaming, Entertainment, General IT
A web-based support system that provides assistance and troubleshooting to users of a product or service.
You will find this term commonly used in Customer Support, IT Support, General IT
Education delivered over the internet, typically through web-based platforms and resources.
You will find this term commonly used in Education, E-Learning, General IT
Marketing strategies and tactics conducted over the internet to promote products or services and attract customers.
You will find this term commonly used in Digital Marketing, Advertising, General IT
A digital platform that connects buyers and sellers, facilitating transactions of goods and services over the internet.
You will find this term commonly used in E-Commerce, Retail, General IT
A service that authorizes payment transactions for online purchases, facilitating secure transfer of funds between buyers and sellers.
You will find this term commonly used in E-Commerce, Finance, General IT
The process of managing and curating a brand or individual's presence on the internet and digital platforms, including social media, websites, and online advertising.
You will find this term commonly used in Online Marketing, Brand Management
The protection of personal information and data transmitted over the internet from unauthorized access or disclosure.
You will find this term commonly used in Security, Privacy, General IT
Strategies and techniques used to monitor, influence, and control the online perception of individuals, organizations, or brands.
You will find this term commonly used in Marketing, Brand Management, General IT
The sale of goods and services conducted over the internet through digital platforms or e-commerce websites.
You will find this term commonly used in E-Commerce, Retail, General IT
The delivery of multimedia content, such as video or audio, over the internet in real-time, allowing users to consume the content as it is being delivered.
You will find this term commonly used in Media Streaming, Entertainment, General IT
A data collection method conducted over the internet, typically through web-based questionnaires or forms, to gather information from respondents.
You will find this term commonly used in Market Research, Data Collection, General IT
Online transaction processing (OLTP) is a type of transaction processing that emphasizes fast response times and real-time data processing for handling high volumes of online transactions in databases and systems.
You will find this term commonly used in General IT, Database Management, E-commerce
A formal representation of knowledge, typically organized in a hierarchical structure, used in knowledge-based systems and AI.
You will find this term commonly used in AI, Knowledge Management, General IT
The portion of a machine language instruction that specifies the operation to be performed. Beyond specifying the operation, an opcode may also specify the data to be used by the operation.
You will find this term commonly used in Programming, Computer Engineering
A technique to improve PHP script performance by storing precompiled script bytecode in shared memory, eliminating the need for PHP to load and parse scripts on each request.
You will find this term commonly used in Web Development
A technique used in virtualization that involves intercepting and emulating sensitive operations of a virtual machine to maintain control over the virtualized environment.
You will find this term commonly used in Virtualization, Security
The practice of providing unrestricted access to research publications and data, typically facilitated by digital technologies and the internet.
You will find this term commonly used in Education, Research, General IT
An application programming interface that is publicly available and allows developers to access certain features or data of a software application.
You will find this term commonly used in Software Development, Web Development, General IT
A security principle that uses a decentralized authentication protocol, allowing users to be authenticated by cooperating sites using a third party service, without exposing passwords.
You will find this term commonly used in Security, Cybersecurity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.