A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
An open standard for parallel programming of heterogeneous systems that include CPUs, GPUs, and other processors.
You will find this term commonly used in Programming, High-Performance Computing
A communications protocol that gives access to the forwarding plane of a network switch or router over the network.
You will find this term commonly used in Networking, Security
An open-standard authentication protocol that allows users to be authenticated by co-operating sites using a third-party service.
You will find this term commonly used in Security, Web Development, General IT
A decentralized authentication protocol that allows users to authenticate using a third-party service provider, simplifying login processes across multiple websites.
You will find this term commonly used in Cybersecurity, Web Development
An authentication protocol that extends OAuth 2.0 to provide identity verification services for web and mobile applications.
You will find this term commonly used in Security, Web Development, General IT
A service that specializes in registering OpenID URLs or XRIs. OpenID allows users to be authenticated using a third-party service following the OpenID standards.
You will find this term commonly used in Security, Web Development
An application programming interface (API) that supports multi-platform shared-memory multiprocessing programming in C, C++, and Fortran, on most processor architectures and operating systems.
You will find this term commonly used in Programming, High-Performance Computing
An open standard for encrypting and decrypting email over the internet using public key cryptography to provide increased confidentiality and authenticity.
You will find this term commonly used in Security, Communications
A suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client-server architecture.
You will find this term commonly used in Networking, Security
An open-source cloud computing platform for building and managing public and private clouds.
You will find this term commonly used in Cloud Computing, Virtualization, General IT
An open source object storage system that is scalable and redundant, part of the OpenStack suite of software, used for storing and retrieving lots of data with a simple API.
You will find this term commonly used in Cloud Computing, Storage
A format for scalable computer fonts that was built on its predecessor TrueType, retaining TrueType's basic structure and adding many intricate data structures for prescribing typographic behavior.
You will find this term commonly used in Software Development, Typography
An operating system from the Digital Equipment Corporation (DEC) that runs in its VAX and Alpha lines of computers. OpenVMS is known for its high-level of reliability, availability, scalability, and security.
You will find this term commonly used in Operating Systems
An open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point connections.
You will find this term commonly used in Security, Networking, General IT
The environment in which a computer program or software runs. It is a term that can refer to a software environment in which applications or programs run or the hardware/software environment of a computer system.
You will find this term commonly used in General IT, Software Development
A framework that defines how an organization's IT infrastructure and resources are organized and managed to support its business objectives.
You will find this term commonly used in Business Strategy, IT Management, General IT
Software that manages computer hardware and provides common services for computer programs.
You will find this term commonly used in General IT
Software that manages hardware resources and provides a user interface for interacting with a computer system.
You will find this term commonly used in General IT
The process of ensuring OS integrity, confidentiality, and availability. OS security encompasses the protection of resources and data from unauthorized access and their secure use.
You will find this term commonly used in Security, Operating Systems
Operating system virtualization is the process of running multiple operating systems on a single physical machine concurrently, using virtualization technology to partition resources and isolate operating environments.
You will find this term commonly used in Virtualization, Operating Systems
Real-time, dynamic business intelligence that delivers reporting and analysis to business operations, integrating operational activities with analytical tools to increase efficiency and improve decision-making.
You will find this term commonly used in Business Intelligence, Data Analysis
A database designed to integrate data from multiple sources for additional operations on the data, unlike a master data store, the data is not passed back to operational systems. It may be passed for further operations and to the data warehouse for reporting.
You will find this term commonly used in Data Management, Business Intelligence
Databases designed for managing dynamic data in real-time, supporting day-to-day operations of an organization with transactions, updates, and queries.
You will find this term commonly used in Database Management, Real-time Processing
A measure of the efficiency of any operation, particularly in business, to convert input resources (such as labor and materials) into outputs like goods and services.
You will find this term commonly used in General IT, Business Management
A philosophy in the workplace where problem-solving, teamwork, and leadership results in ongoing improvement in an organization. In IT, it involves improving processes through technology and aligning IT services with business needs.
You will find this term commonly used in Business Management, General IT
The process of identifying, assessing, and controlling risks to an organization's earnings and capital arising from operational failures. In IT, this includes risks related to IT systems, data breaches, and cybersecurity threats.
You will find this term commonly used in Risk Management, IT Management
Computer systems used by telecommunications service providers to manage their networks (such as telephone networks). They support management functions such as network inventory, service provisioning, network configuration, and fault management.
You will find this term commonly used in Networking, Telecommunications
Hardware and software that detects or causes a change through the direct monitoring and/or control of industrial equipment, assets, processes, and events.
You will find this term commonly used in Networking, Security
The practice of securing industrial control systems (ICS), including systems in critical infrastructure, manufacturing, and other facilities, from physical and cyber threats.
You will find this term commonly used in Cybersecurity, Industrial Control
In programming, a symbol that represents a specific operation or process, such as addition (+), subtraction (-), or comparison (==).
You will find this term commonly used in Programming, Software Development
The process of making an operator to exhibit different behaviors in different instances, especially with respect to different data types.
You will find this term commonly used in Programming
Email that is sent to individuals who have specifically requested to receive it, a common practice in email marketing to ensure compliance with anti-spam laws.
You will find this term commonly used in Online Marketing, Compliance
Technology that recognizes text within a digital image. It is commonly used to recognize text in scanned documents and images.
You will find this term commonly used in AI, Document Management
Optical character recognition (OCR) is the process of converting images of text into machine-encoded text, allowing computers to recognize and extract text data from scanned documents, images, or other sources.
You will find this term commonly used in AI, Data Processing, Document Management
The technology that enables computers to interpret and convert images of text into machine-readable text.
You will find this term commonly used in General IT
The mechanical or electronic conversion of images of typed, handwritten, or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo, or from subtitle text superimposed on an image.
You will find this term commonly used in AI, Document Management
The process of verifying that printed characters are legible and correctly formed by comparing them to a standard or template, often used in quality control processes.
You will find this term commonly used in AI, Quality Assurance
A storage medium that uses a laser to read and write data on a reflective surface, such as CDs, DVDs, and Blu-ray discs.
You will find this term commonly used in Data Storage, Media, General IT
A type of high-speed transmission medium consisting of thin strands of glass or plastic that carry data using light signals.
You will find this term commonly used in Networking, Telecommunications, General IT
The process of capturing human-marked data from document forms such as surveys and tests. It is a method used to read questionnaires, multiple choice examination paper in the form of lines or shaded areas.
You will find this term commonly used in Data Processing, Education Technology
A computer pointing device that uses a light-emitting diode (LED) and optical sensor to detect movement on a surface.
You will find this term commonly used in Input Devices, Computer Peripherals, General IT
A type of data communication network built primarily on optical fiber technology, capable of delivering high-bandwidth connections over long distances.
You will find this term commonly used in Networking, Telecommunications
A device that connects to the termination point of a provider's fiber optic network, serving as a modem to provide Internet service to a home or business.
You will find this term commonly used in Networking
A communications network based on optical fibers for transmitting data using light signals.
You will find this term commonly used in Networking, Telecommunications, General IT
The process of routing optical data signals without the need for converting them to electrical signals.
You will find this term commonly used in Networking, Telecommunications
A physical security device that uses infrared beams, cameras, or other optical sensors to detect and manage pedestrian traffic flow in and out of a space without the need for a physical barrier.
You will find this term commonly used in Security, Physical Security Systems
In digital photography, the actual zoom achieved by physically adjusting the camera lens to change the focal length, thereby producing a magnified image without losing quality.
You will find this term commonly used in Hardware, Photography
An algorithm in computer science for page replacement in virtual memory systems, theoretically producing the lowest possible page fault rate. The algorithm replaces the page that will not be used for the longest period of time.
You will find this term commonly used in Operating Systems, Algorithms
The process of finding the most efficient route between nodes in a network, often used in the context of network traffic to minimize latency and maximize throughput.
You will find this term commonly used in Networking, Traffic Management
Algorithms designed to find the optimal solution or a near-optimal solution to computational problems within a reasonable time frame.
You will find this term commonly used in AI, Programming
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.