- 5G: The fifth generation of mobile networks that promises faster internet speeds, lower latency, and increased capacity for more devices to connect.
- Advanced Persistent Threat (APT): a type of cyber attack in which an attacker establishes a long-term presence on a target network to steal sensitive information or disrupt operations.
- Algorithm: A set of instructions or rules used to solve a problem or perform a specific task.
- API (Application Programming Interface): A set of rules and protocols for building and interacting with software and web-based systems.
- Application programming interface (API): a set of protocols and tools for building software and applications that enable different systems to communicate with each other.
- Artificial General Intelligence (AGI): A branch of artificial intelligence that deals with developing systems that can perform general tasks rather than just specific ones.
- Artificial intelligence (AI): A branch of computer science that deals with creating intelligent machines that can perform tasks that usually require human intelligence, such as understanding natural language, recognizing images, and making decisions.
- Artificial intelligence ethics: the study of the ethical and societal implications of artificial intelligence and its applications.
- Artificial intelligence in healthcare (AI in healthcare): AI techniques, such as machine learning and natural language processing, to analyze healthcare data and improve patient care.
- Augmented Reality (AR): A technology that superimposes a computer-generated image on a user’s view of the natural world, providing a composite view.
- Autonomous vehicle: It can sense its environment and navigate without human input.
- Big Data: Large and complex data sets that traditional data processing software cannot handle.
- Blockchain: A distributed ledger technology that records and verifies transactions across multiple computers.
- Blockchain: a distributed ledger technology that uses cryptography to secure and validate transactions and maintain a tamper-proof data record.
- Cloud computing: The delivery of computing services, including storage, processing, and software, over the internet.
- Cloud-native: A term used to describe applications and infrastructure designed to run in the cloud.
- Cloud security: the practice of protecting data, applications, and infrastructure in the cloud from unauthorized access, breaches, and other cyber threats.
- Cloud storage: A service that allows users to store, access, and share data and files over the internet rather than on a local hard drive.
- Cloud-native architecture: a set of principles and practices for building and deploying software applications in the cloud, such as microservices and containerization.
- Container: A lightweight, stand-alone executable package that contains everything needed to run an application, including code, runtime, system tools, libraries, and settings.
- Continuous Integration (CI): a software development practice in which code changes are regularly integrated and tested to identify and fix problems early.
- Cyber attack: An attempt to damage or disrupt a computer network or system, often for malicious or criminal purposes.
- Cyber hygiene: the practice of maintaining reasonable security practices, such as keeping software updated, using strong passwords, and avoiding suspicious links and attachments, to protect against cyber attacks.
- Cyber Resilience: The ability of an organization to prepare for, withstand, and recover from cyber-attacks and other disruptive events.
- Cybercrime: Criminal activities that are committed using the internet or other forms of digital communication.
- Cybersecurity: Protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access.
- Data governance: managing data throughout its lifecycle, including policies, procedures, and standards for data quality, security, and compliance.
- Data mining: Discovering patterns and knowledge from large data sets.
- Data privacy: protecting personal data from unauthorized collection, use, disclosure, and destruction.
- Data warehousing: the process of collecting, storing, and managing large amounts of data from various sources for reporting and analysis.
- Database: A collection of organized information that can be easily accessed, managed, and updated.
- Deep learning: A subfield of machine learning that uses neural networks with many layers, allowing the system to learn from large amounts of data.
- DevOps: A set of practices and tools that combine software development (Dev) and IT operations (Ops) with improving software releases’ speed and quality.
- Digital signature: A method of verifying the authenticity of an electronic document by using encryption techniques.
- Digital twin: a virtual representation of a physical object or system that can be used to simulate and analyze its behavior and performance.
- Distributed ledger: A digital record of transactions spread across a computer network rather than being stored in a central location.
- Edge computing: a distributed computing paradigm that brings computation and data storage closer to the location needed to improve response times and save bandwidth.
- Edge computing: A distributed computing paradigm that brings computation and data storage closer to the location needed to improve response times and save bandwidth.
- Edge device: A device located on the edge of a network, such as a sensor or a camera, can collect and process data locally.
- Encryption: The process of converting data into a code to protect it from unauthorized access.
- Event-driven architecture: a software design pattern that uses events, or changes in the state of a system, to trigger the execution of code.
- Federated identity: a system that allows users to use the same set of credentials to access multiple systems and applications.
- Federated learning: A machine learning method where models are trained on multiple devices, and the results are combined to improve the overall performance.
- Firewall: A network security system that monitors and controls the incoming and outgoing network traffic based on a set of security rules.
- Human-Computer Interaction (HCI): The study of the interaction between humans and computers, including the design and evaluation of human-computer interfaces.
- Hyperconverged infrastructure: a type of data center infrastructure that integrates computing, storage, and networking into a single, unified system.
- Internet of Drones (IoD): A network of drones that can connect and exchange data to improve navigation, communication, and automation.
- Internet of Medical Things (IoMT): A network of medical devices, such as wearables and sensors, that can connect and exchange data to improve patient care.
- Internet of Things (IoT): A network of physical devices, vehicles, buildings, and other items embedded with electronics, software, sensors, and connectivity that enables these objects to connect and exchange data.
- Internet of Things security (IoT security): Protecting internet-connected devices and systems from unauthorized access, interference, and damage.
- Knowledge graph: A collection of interconnected entities and relationships that can be used to represent and navigate knowledge.
- Knowledge management: the practice of capturing, organizing, and sharing information and knowledge within an organization.
- Low-code development: a software development approach that allows developers to build and deploy applications using drag-and-drop interfaces and pre-built components, with little or no coding required.
- Low-Code/No-Code: Platforms that allow building applications with little to no coding required.
- Low-Code: Platforms that allow the building of applications with little to no coding required.
- Machine learning as a service (MLaaS): a cloud-based service that provides tools and infrastructure for building, deploying, and managing machine learning models.
- Machine learning interpretability: the ability to understand how a machine learning model arrives at its predictions and decisions.
- Machine learning: A type of artificial intelligence that allows systems to learn and improve from experience without being explicitly programmed.
- Machine vision: A branch of artificial intelligence that deals with the ability of machines to interpret and understand visual information from the world.
- Malware: Short for malicious software, it refers to any software designed to harm or exploit computer systems.
- Mobile device: A portable electronic device, such as a smartphone or tablet, can be used for communication, entertainment, and various other tasks.
- Multi-cloud: using multiple cloud providers and services to improve flexibility, scalability, and disaster recovery.
- Natural Language Generation (NLG): A technology that transforms structured data into written or spoken natural language.
- Natural language processing: A field of artificial intelligence that focuses on the interaction between computers and human languages.
- Natural language understanding (NLU): a branch of artificial intelligence that deals with the ability of machines to understand and interpret human language.
- Network: A group of two or more connected computers or devices that can share data and resources.
- Neural network: A machine learning model made up of interconnected nodes inspired by the structure and function of the human brain.
- Open source: Software that is freely available for anyone to use, modify, and distribute.
- Operating system: A collection of software that manages a computer’s resources and provides a platform for other software to run on.
- Platform: A set of technologies or tools that support the development and deployment of software applications.
- Predictive maintenance: using data and analytics to predict when equipment or machinery will need maintenance so that repairs can be scheduled before a failure occurs.
- Quantum computing: The use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
- Quantum internet: A proposed internet that uses quantum mechanics to transmit and process information securely.
- Quantum key distribution (QKD): a method of secure communication that uses the properties of quantum mechanics to distribute secret keys.
- Reinforcement learning: A type of machine learning where an agent learns by taking actions in an environment and receiving feedback as rewards or penalties.
- Remote access: The ability to connect to a computer or network remotely.
- Responsive web design: a web design approach that uses CSS and JavaScript to create websites that adapt to the size and capabilities of the user’s device.
- Robotic process automation (RPA): the use of software robots to automate repetitive and routine tasks.
- Robotics: The branch of engineering that deals with the design, construction, and operation of robots.
- Server: A computer or system that manages and stores data and resources for other computers or devices to access.
- Serverless computing: A cloud computing model where the provider manages the infrastructure and scaling, allowing developers to focus on writing code.
- Smart contract: a self-executing contract with the terms of the agreement written directly into lines of code.
- Smart home: A home equipped with internet-connected devices that can be controlled and automated through a central hub or smartphone app.
- Social media: Websites and apps that allow users to create and share content or to participate in social networking.
- Software as a Service (SaaS): A software delivery model where the software is hosted and managed by a third-party provider and accessed over the internet.
- Software development kit (SDK): a set of tools and libraries that developers can use to create software applications for a specific platform or system.
- Software: A set of instructions that tell a computer what to do.
- Software-Defined Networking (SDN): a networking approach that uses software to control and manage the behavior of network devices rather than configuring them individually.
- Speech recognition: technology that allows a device to recognize and respond to spoken commands.
- Streaming: The continuous delivery of audio and video content over the internet, allowing the user to start watching or listening almost immediately.
- Text analytics: the process of extracting insights and information from unstructured text data using natural language processing techniques.
- Text-to-speech (TTS): A technology that converts written text into spoken words.
- Threat intelligence: the collection, analysis, and dissemination of information about potential cyber threats and adversaries.
- Transfer learning: A machine learning technique where a model trained on one task is used as a starting point to improve the performance of a different but related task.
- User interface (UI): How a person interacts with a computer or device, such as a keyboard, mouse, or touch screen.
- Video analytics: The use of software and algorithms to extract information from video data, such as object recognition and tracking, face recognition, and motion detection.
- Video conferencing: the use of technology to enable live, interactive communication between people in different locations, usually through audio and video.
- Virtual private network (VPN): a network that uses encryption and other security measures to protect the privacy and integrity of data transmitted over the internet.
- Virtual reality: A computer-generated simulation of a three-dimensional environment that can be interacted with using special equipment, such as a headset.
- Virtualization: The creation of a virtual version of something, such as a virtual machine or virtual storage, that can be used to improve efficiency and flexibility.
- Voice recognition: Technology that allows a device to recognize and respond to spoken commands.
- Web scraping: The process of automatically extracting data from websites using the software.
- Workflow automation: using software to automate repetitive and routine tasks, such as data entry, document management, and business processes.
- XR: an umbrella term that includes all forms of computer-generated simulations of the natural world, such as virtual reality (VR), augmented reality (AR), and mixed reality (MR).
- Zero trust: A security model that assumes all users and devices are untrusted by default and requires them to prove their identity and trustworthiness before being granted access to resources.
- Zero-knowledge proof: a method of verifying information without revealing the underlying data.