5G: The fifth generation of mobile networks that promises faster internet speeds, lower latency, and increased capacity for more devices to connect.
Advanced Persistent Threat (APT): a type of cyber attack in which an attacker establishes a long-term presence on a target network to steal sensitive information or disrupt operations.
Algorithm: A set of instructions or rules used to solve a problem or perform a specific task.
API (Application Programming Interface): A set of rules and protocols for building and interacting with software and web-based systems.
Application programming interface (API): a set of protocols and tools for building software and applications that enable different systems to communicate with each other.
Artificial General Intelligence (AGI): A branch of artificial intelligence that deals with developing systems that can perform general tasks rather than just specific ones.
Artificial intelligence (AI): A branch of computer science that deals with creating intelligent machines that can perform tasks that usually require human intelligence, such as understanding natural language, recognizing images, and making decisions.
Artificial intelligence ethics: the study of the ethical and societal implications of artificial intelligence and its applications.
Artificial intelligence in healthcare (AI in healthcare): AI techniques, such as machine learning and natural language processing, to analyze healthcare data and improve patient care.
Augmented Reality (AR): A technology that superimposes a computer-generated image on a user’s view of the natural world, providing a composite view.
Autonomous vehicle: It can sense its environment and navigate without human input.
Big Data: Large and complex data sets that traditional data processing software cannot handle.
Blockchain: A distributed ledger technology that records and verifies transactions across multiple computers.
Blockchain: a distributed ledger technology that uses cryptography to secure and validate transactions and maintain a tamper-proof data record.
Cloud computing: The delivery of computing services, including storage, processing, and software, over the internet.
Cloud-native: A term used to describe applications and infrastructure designed to run in the cloud.
Cloud security: the practice of protecting data, applications, and infrastructure in the cloud from unauthorized access, breaches, and other cyber threats.
Cloud storage: A service that allows users to store, access, and share data and files over the internet rather than on a local hard drive.
Cloud-native architecture: a set of principles and practices for building and deploying software applications in the cloud, such as microservices and containerization.
Container: A lightweight, stand-alone executable package that contains everything needed to run an application, including code, runtime, system tools, libraries, and settings.
Continuous Integration (CI): a software development practice in which code changes are regularly integrated and tested to identify and fix problems early.
Cyber attack: An attempt to damage or disrupt a computer network or system, often for malicious or criminal purposes.
Cyber hygiene: the practice of maintaining reasonable security practices, such as keeping software updated, using strong passwords, and avoiding suspicious links and attachments, to protect against cyber attacks.
Cyber Resilience: The ability of an organization to prepare for, withstand, and recover from cyber-attacks and other disruptive events.
Cybercrime: Criminal activities that are committed using the internet or other forms of digital communication.
Cybersecurity: Protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access.
Data governance: managing data throughout its lifecycle, including policies, procedures, and standards for data quality, security, and compliance.
Data mining: Discovering patterns and knowledge from large data sets.
Data privacy: protecting personal data from unauthorized collection, use, disclosure, and destruction.
Data warehousing: the process of collecting, storing, and managing large amounts of data from various sources for reporting and analysis.
Database: A collection of organized information that can be easily accessed, managed, and updated.
Deep learning: A subfield of machine learning that uses neural networks with many layers, allowing the system to learn from large amounts of data.
DevOps: A set of practices and tools that combine software development (Dev) and IT operations (Ops) with improving software releases’ speed and quality.
Digital signature: A method of verifying the authenticity of an electronic document by using encryption techniques.
Digital twin: a virtual representation of a physical object or system that can be used to simulate and analyze its behavior and performance.
Distributed ledger: A digital record of transactions spread across a computer network rather than being stored in a central location.
Edge computing: a distributed computing paradigm that brings computation and data storage closer to the location needed to improve response times and save bandwidth.
Edge computing: A distributed computing paradigm that brings computation and data storage closer to the location needed to improve response times and save bandwidth.
Edge device: A device located on the edge of a network, such as a sensor or a camera, can collect and process data locally.
Encryption: The process of converting data into a code to protect it from unauthorized access.
Event-driven architecture: a software design pattern that uses events, or changes in the state of a system, to trigger the execution of code.
Federated identity: a system that allows users to use the same set of credentials to access multiple systems and applications.
Federated learning: A machine learning method where models are trained on multiple devices, and the results are combined to improve the overall performance.
Firewall: A network security system that monitors and controls the incoming and outgoing network traffic based on a set of security rules.
Human-Computer Interaction (HCI): The study of the interaction between humans and computers, including the design and evaluation of human-computer interfaces.
Hyperconverged infrastructure: a type of data center infrastructure that integrates computing, storage, and networking into a single, unified system.
Internet of Drones (IoD): A network of drones that can connect and exchange data to improve navigation, communication, and automation.
Internet of Medical Things (IoMT): A network of medical devices, such as wearables and sensors, that can connect and exchange data to improve patient care.
Internet of Things (IoT): A network of physical devices, vehicles, buildings, and other items embedded with electronics, software, sensors, and connectivity that enables these objects to connect and exchange data.
Internet of Things security (IoT security): Protecting internet-connected devices and systems from unauthorized access, interference, and damage.
Knowledge graph: A collection of interconnected entities and relationships that can be used to represent and navigate knowledge.
Knowledge management: the practice of capturing, organizing, and sharing information and knowledge within an organization.
Low-code development: a software development approach that allows developers to build and deploy applications using drag-and-drop interfaces and pre-built components, with little or no coding required.
Low-Code/No-Code: Platforms that allow building applications with little to no coding required.
Low-Code: Platforms that allow the building of applications with little to no coding required.
Machine learning as a service (MLaaS): a cloud-based service that provides tools and infrastructure for building, deploying, and managing machine learning models.
Machine learning interpretability: the ability to understand how a machine learning model arrives at its predictions and decisions.
Machine learning: A type of artificial intelligence that allows systems to learn and improve from experience without being explicitly programmed.
Machine vision: A branch of artificial intelligence that deals with the ability of machines to interpret and understand visual information from the world.
Malware: Short for malicious software, it refers to any software designed to harm or exploit computer systems.
Mobile device: A portable electronic device, such as a smartphone or tablet, can be used for communication, entertainment, and various other tasks.
Multi-cloud: using multiple cloud providers and services to improve flexibility, scalability, and disaster recovery.
Natural Language Generation (NLG): A technology that transforms structured data into written or spoken natural language.
Natural language processing: A field of artificial intelligence that focuses on the interaction between computers and human languages.
Natural language understanding (NLU): a branch of artificial intelligence that deals with the ability of machines to understand and interpret human language.
Network: A group of two or more connected computers or devices that can share data and resources.
Neural network: A machine learning model made up of interconnected nodes inspired by the structure and function of the human brain.
Open source: Software that is freely available for anyone to use, modify, and distribute.
Operating system: A collection of software that manages a computer’s resources and provides a platform for other software to run on.
Platform: A set of technologies or tools that support the development and deployment of software applications.
Predictive maintenance: using data and analytics to predict when equipment or machinery will need maintenance so that repairs can be scheduled before a failure occurs.
Quantum computing: The use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
Quantum internet: A proposed internet that uses quantum mechanics to transmit and process information securely.
Quantum key distribution (QKD): a method of secure communication that uses the properties of quantum mechanics to distribute secret keys.
Reinforcement learning: A type of machine learning where an agent learns by taking actions in an environment and receiving feedback as rewards or penalties.
Remote access: The ability to connect to a computer or network remotely.
Responsive web design: a web design approach that uses CSS and JavaScript to create websites that adapt to the size and capabilities of the user’s device.
Robotic process automation (RPA): the use of software robots to automate repetitive and routine tasks.
Robotics: The branch of engineering that deals with the design, construction, and operation of robots.
Server: A computer or system that manages and stores data and resources for other computers or devices to access.
Serverless computing: A cloud computing model where the provider manages the infrastructure and scaling, allowing developers to focus on writing code.
Smart contract: a self-executing contract with the terms of the agreement written directly into lines of code.
Smart home: A home equipped with internet-connected devices that can be controlled and automated through a central hub or smartphone app.
Social media: Websites and apps that allow users to create and share content or to participate in social networking.
Software as a Service (SaaS): A software delivery model where the software is hosted and managed by a third-party provider and accessed over the internet.
Software development kit (SDK): a set of tools and libraries that developers can use to create software applications for a specific platform or system.
Software: A set of instructions that tell a computer what to do.
Software-Defined Networking (SDN): a networking approach that uses software to control and manage the behavior of network devices rather than configuring them individually.
Speech recognition: technology that allows a device to recognize and respond to spoken commands.
Streaming: The continuous delivery of audio and video content over the internet, allowing the user to start watching or listening almost immediately.
Text analytics: the process of extracting insights and information from unstructured text data using natural language processing techniques.
Text-to-speech (TTS): A technology that converts written text into spoken words.
Threat intelligence: the collection, analysis, and dissemination of information about potential cyber threats and adversaries.
Transfer learning: A machine learning technique where a model trained on one task is used as a starting point to improve the performance of a different but related task.
User interface (UI): How a person interacts with a computer or device, such as a keyboard, mouse, or touch screen.
Video analytics: The use of software and algorithms to extract information from video data, such as object recognition and tracking, face recognition, and motion detection.
Video conferencing: the use of technology to enable live, interactive communication between people in different locations, usually through audio and video.
Virtual private network (VPN): a network that uses encryption and other security measures to protect the privacy and integrity of data transmitted over the internet.
Virtual reality: A computer-generated simulation of a three-dimensional environment that can be interacted with using special equipment, such as a headset.
Virtualization: The creation of a virtual version of something, such as a virtual machine or virtual storage, that can be used to improve efficiency and flexibility.
Voice recognition: Technology that allows a device to recognize and respond to spoken commands.
Web scraping: The process of automatically extracting data from websites using the software.
Workflow automation: using software to automate repetitive and routine tasks, such as data entry, document management, and business processes.
XR: an umbrella term that includes all forms of computer-generated simulations of the natural world, such as virtual reality (VR), augmented reality (AR), and mixed reality (MR).
Zero trust: A security model that assumes all users and devices are untrusted by default and requires them to prove their identity and trustworthiness before being granted access to resources.
Zero-knowledge proof: a method of verifying information without revealing the underlying data.