Reference Library
Technology Glossary
Enterprise technology terms, defined for technology leaders. Non-vendor-specific, practitioner-grade definitions.
493 terms
Zero Trust Architecture
Zero Trust Architecture (ZTA) is a strategic cybersecurity model that mandates strict identity verification for every user, device...
Cybersecurity & RiskRetrieval-Augmented Generation (RAG)
Retrieval-Augmented Generation (RAG) is an AI technique that enhances large language models (LLMs) by enabling them to access, ret...
Data & AIPlatform Engineering
Platform engineering is a discipline focused on designing, building, and maintaining internal developer platforms that enable self...
Architecture & TechnologyData Mesh
Data Mesh is a decentralized, domain-oriented data architecture that treats data as a product, enabling self-serve access and fede...
Data & AIFinOps
FinOps is an evolving operational framework and cultural practice that unites finance, technology, and business teams to maximize ...
Technology EconomicsTOGAF (The Open Group Architecture Framework)
TOGAF is a comprehensive enterprise architecture framework providing a structured approach for developing, maintaining, and using ...
Architecture & TechnologyMLOps
MLOps is a set of practices for reliably and efficiently deploying, monitoring, and managing machine learning models in production...
Data & AIHyperautomation
Hyperautomation is a business-driven, disciplined approach that rapidly identifies, vets, and automates as many business and IT pr...
Architecture & TechnologyService Mesh
A service mesh is a dedicated infrastructure layer that manages and controls service-to-service communication within a microservic...
Architecture & TechnologyDigital Twin
A digital twin is a virtual representation of a physical asset, process, or system, continuously updated with real-time data to en...
Architecture & TechnologyObservability
Observability is the ability to understand a system's internal state by analyzing its external outputs, enabling proactive identif...
Architecture & TechnologyAI Agents
AI Agents are software systems designed to autonomously perceive their environment, make decisions, and execute actions to achieve...
Data & AITotal Cost of Ownership (TCO)
Total Cost of Ownership (TCO) is a comprehensive financial estimate that includes the direct and indirect costs associated with ac...
Technology EconomicsCISO (Chief Information Security Officer)
The Chief Information Security Officer (CISO) is a senior executive responsible for establishing and maintaining the enterprise vi...
Leadership & StrategyGitOps
GitOps is an operational framework that uses Git as the single source of truth for declarative infrastructure and application mana...
Architecture & TechnologyData Fabric
Data Fabric is an architectural concept that unifies data management across diverse, distributed sources, providing seamless acces...
Data & AIMicrosegmentation
Microsegmentation is a security technique that logically divides data centers into distinct, granular security segments down to th...
Cybersecurity & RiskIT Operating Model
An IT operating model defines how an organization's IT function delivers value, encompassing its structure, processes, governance,...
Leadership & StrategyVector Database
A vector database is a specialized database designed to store, manage, and query high-dimensional vector embeddings, enabling effi...
Data & AIAPI Gateway
An API Gateway is a management layer that sits in front of backend services, acting as a single entry point for all API calls, han...
Architecture & TechnologySovereign AI
Sovereign AI refers to a nation's capability to develop, control, and utilize artificial intelligence technologies and data within...
Data & AITechnical Debt
Technical debt represents the implied cost of additional rework caused by choosing an easy, limited solution now instead of using ...
Architecture & TechnologyComposable Architecture
Composable architecture is an organizational and technical approach that designs systems from interchangeable, independently deplo...
Architecture & TechnologyPrompt Engineering
Prompt engineering is the art and science of crafting effective inputs (prompts) for large language models (LLMs) to elicit desire...
Data & AIChaos Engineering
Chaos Engineering is the discipline of experimenting on a system in production to build confidence in its capability to withstand ...
Architecture & TechnologyShadow IT
Shadow IT refers to the use of information technology systems, devices, software, and services without explicit organizational app...
Leadership & StrategyServerless Computing
Serverless computing is a cloud execution model where the cloud provider dynamically manages server allocation and provisioning, a...
Architecture & TechnologyEnterprise Service Bus (ESB)
An Enterprise Service Bus (ESB) is a software architecture model that provides a communication backbone for integrating diverse ap...
Architecture & TechnologyBusiness Continuity Planning (BCP)
Business Continuity Planning (BCP) is a proactive organizational strategy ensuring critical business functions can continue operat...
Cybersecurity & RiskKubernetes
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containeri...
Architecture & TechnologyLarge Language Model (LLM)
A Large Language Model (LLM) is an advanced artificial intelligence program trained on vast text datasets, enabling it to understa...
Data & AIAI Governance
AI Governance establishes frameworks and processes to ensure artificial intelligence systems are developed and deployed ethically,...
Data & AIGenerative AI
Generative AI refers to artificial intelligence models capable of producing novel content, such as text, images, audio, and code, ...
Data & AIAI Hallucination
AI hallucination refers to instances where artificial intelligence models generate outputs that are factually incorrect, nonsensic...
Data & AIFoundation Model
A Foundation Model is a large-scale AI model, typically a transformer neural network, pre-trained on vast datasets to perform a wi...
Data & AIFine-Tuning
Fine-tuning is the process of adapting a pre-trained large language model (LLM) or other AI model to a specific task or dataset, e...
Data & AIAgentic AI
Agentic AI refers to artificial intelligence systems designed to operate autonomously, making decisions and taking actions to achi...
Data & AIAI Ops (AIOps)
AIOps leverages artificial intelligence and machine learning to automate IT operations, enhancing monitoring, incident management,...
Data & AIData Lakehouse
A data lakehouse unifies the flexibility and low-cost storage of a data lake with the transactional capabilities and structured da...
Data & AIData Governance
Data governance establishes the policies, processes, and responsibilities for managing data assets, ensuring their quality, integr...
Data & AIData Catalog
A data catalog is an organized inventory of all data assets within an enterprise, providing metadata, lineage, and discovery capab...
Data & AIFeature Store
A Feature Store is a centralized repository for managing, serving, and sharing machine learning features, ensuring consistency and...
Data & AIKnowledge Graph
A Knowledge Graph is a structured representation of interconnected entities, their attributes, and relationships, enabling machine...
Data & AISASE (Secure Access Service Edge)
SASE integrates networking and security functions into a single, cloud-native service model, delivering secure and optimized acces...
Cybersecurity & RiskCSPM (Cloud Security Posture Management)
Cloud Security Posture Management (CSPM) continuously monitors cloud environments for misconfigurations, compliance violations, an...
Cybersecurity & RiskIdentity Fabric
An Identity Fabric is a unified, distributed, and intelligent layer that orchestrates identity and access management (IAM) service...
Cybersecurity & RiskCNAPP (Cloud-Native Application Protection Platform)
A Cloud-Native Application Protection Platform (CNAPP) is a unified security solution designed to protect cloud-native application...
Cybersecurity & RiskXDR (Extended Detection and Response)
Extended Detection and Response (XDR) is a unified security platform that automatically collects and correlates security data from...
Cybersecurity & RiskSOAR (Security Orchestration, Automation and Response)
SOAR integrates security tools and automates incident response workflows, enabling organizations to efficiently manage, analyze, a...
Cybersecurity & RiskSupply Chain Security
Supply Chain Security involves identifying, evaluating, and mitigating security risks across the entire lifecycle of products and ...
Cybersecurity & RiskCyber Resilience
Cyber resilience is an organization's comprehensive ability to anticipate, withstand, recover from, and adapt to adverse cyber eve...
Cybersecurity & RiskThreat Intelligence
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, a...
Cybersecurity & RiskIdentity and Access Management (IAM)
Identity and Access Management (IAM) is a cybersecurity framework and set of business processes that manages digital identities an...
Cybersecurity & RiskPrivileged Access Management (PAM)
Privileged Access Management (PAM) is a cybersecurity strategy and set of technologies for controlling, monitoring, and securing a...
Cybersecurity & RiskDevSecOps
DevSecOps integrates security practices throughout the entire software development lifecycle, fostering a collaborative culture to...
Cybersecurity & RiskCloud Security
Cloud security encompasses the policies, technologies, applications, and controls deployed to protect data, applications, and infr...
Cybersecurity & RiskEvent-Driven Architecture
Event-Driven Architecture (EDA) is a software design paradigm where loosely coupled services communicate asynchronously through ev...
Architecture & TechnologyAPI-Led Connectivity
API-led connectivity is a methodical approach to integrate applications and data through reusable APIs, fostering agility and enab...
Architecture & TechnologyMicroservices Architecture
Microservices architecture is an architectural style that structures an application as a collection of loosely coupled, independen...
Architecture & TechnologyDomain-Driven Design (DDD)
Domain-Driven Design (DDD) is an approach to software development that centers on modeling software to match a business domain's r...
Architecture & TechnologyInfrastructure as Code (IaC)
Infrastructure as Code (IaC) is the practice of managing and provisioning IT infrastructure, such as networks, virtual machines, a...
Architecture & TechnologySite Reliability Engineering (SRE)
Site Reliability Engineering (SRE) is a discipline applying software engineering principles to infrastructure and operations probl...
Architecture & TechnologyEdge Computing
Edge computing processes data closer to its source, minimizing latency and bandwidth usage by decentralizing computational resourc...
Architecture & TechnologyQuantum Computing
Quantum computing leverages quantum-mechanical phenomena like superposition and entanglement to perform computations fundamentally...
Architecture & TechnologyWebAssembly (Wasm)
WebAssembly (Wasm) is a binary instruction format for a stack-based virtual machine, designed as a portable compilation target for...
Architecture & TechnologyeBPF
eBPF (extended Berkeley Packet Filter) is a Linux kernel technology enabling sandboxed programs to run within the kernel, allowing...
Architecture & TechnologyService-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA) is an architectural paradigm that structures an application as a collection of loosely coupled...
Architecture & TechnologyCloud-Native
Cloud-native is a modern software approach that builds and runs scalable applications by fully exploiting the advantages of cloud ...
Architecture & TechnologyHeadless Architecture
Headless architecture decouples the frontend user interface from the backend content management and business logic, enabling flexi...
Architecture & TechnologyDigital Transformation
Digital transformation is the strategic adoption of digital technologies and processes to fundamentally change how an organization...
Leadership & StrategyIT Strategy
IT Strategy is a comprehensive plan aligning an organization's technology investments and initiatives with its overarching busines...
Leadership & StrategyCIO First 90 Days
The CIO First 90 Days outlines a structured, strategic framework for new Chief Information Officers to rapidly assess, align, and ...
Leadership & StrategyIT Governance
IT governance is a formal framework ensuring IT investments align with business objectives, manage risks, optimize resources, and ...
Leadership & StrategyEnterprise Architecture
Enterprise Architecture is the practice of analyzing, designing, planning, and implementing enterprise analysis to successfully ex...
Leadership & StrategyChange Management
Change management is the structured approach to transitioning individuals, teams, and organizations from a current state to a desi...
Leadership & StrategyVendor Management
Vendor management is the comprehensive process of overseeing and optimizing relationships with third-party suppliers to ensure the...
Leadership & StrategyIT Portfolio Management
IT Portfolio Management (ITPM) is the centralized management of an organization's IT investments, projects, and assets to optimize...
Leadership & StrategyAgile Transformation
Agile transformation is a comprehensive organizational shift towards adopting agile principles, values, and practices across all l...
Leadership & StrategyProduct Operating Model
A Product Operating Model defines the organizational structure, processes, governance, and cultural norms that enable an enterpris...
Leadership & StrategyOKRs (Objectives and Key Results)
OKRs are a collaborative goal-setting framework used by organizations to set ambitious, measurable objectives and track their prog...
Leadership & StrategyIT Value Realization
IT Value Realization is the systematic process of ensuring that technology investments deliver measurable business benefits, align...
Leadership & StrategyBimodal IT
Bimodal IT is an approach that manages two distinct, coherent modes of IT delivery: one focused on stability and the other on agil...
Leadership & StrategyCloud Economics
Cloud economics is the financial analysis and strategic management of cloud computing costs and benefits, optimizing resource util...
Technology EconomicsIT Chargeback
IT chargeback is an accounting mechanism that allocates the costs of IT services, infrastructure, and resources directly to the bu...
Technology EconomicsTotal Value of Ownership (TVO)
Total Value of Ownership (TVO) is a comprehensive financial framework that evaluates the complete economic impact of an IT asset o...
Technology EconomicsIT Cost Optimization
IT Cost Optimization is the continuous process of reducing IT expenditures while maximizing business value, ensuring technology in...
Technology EconomicsSaaS Management
SaaS Management is the comprehensive practice of overseeing and optimizing an organization's Software-as-a-Service applications, e...
Technology EconomicsIT Financial Management (ITFM)
IT Financial Management (ITFM) is the discipline of managing the costs and value of IT services and assets, ensuring transparency,...
Technology EconomicsUnit Economics
Unit economics analyzes the revenues and costs associated with a business's individual unit, providing insights into profitability...
Technology EconomicsTechnology Debt Quantification
Technology Debt Quantification involves systematically measuring the financial and operational costs associated with technical deb...
Technology EconomicsITIL (IT Infrastructure Library)
ITIL is a comprehensive framework of best practices for IT service management (ITSM), guiding organizations in delivering value th...
Architecture & TechnologyCOBIT (Control Objectives for Information and Related Technologies)
COBIT (Control Objectives for Information and Related Technologies) is a comprehensive framework developed by ISACA that assists o...
Leadership & StrategyZero-Knowledge Proof
Zero-Knowledge Proof (ZKP) is a cryptographic protocol enabling one party to prove to another that a statement is true, without re...
Cybersecurity & RiskPost-Quantum Cryptography
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms designed to secure digital communications and data against atta...
Cybersecurity & RiskConfidential Computing
Confidential Computing protects data in use by performing computation within a hardware-based trusted execution environment (TEE),...
Cybersecurity & RiskAI Ethics
AI Ethics refers to the principles and practices guiding the responsible development, deployment, and use of artificial intelligen...
Data & AIResponsible AI
Responsible AI is an organizational framework and set of practices ensuring the ethical, fair, transparent, and accountable develo...
Data & AIMulti-Cloud Strategy
A multi-cloud strategy involves utilizing two or more public cloud services from different providers to distribute workloads, enha...
Architecture & TechnologyHybrid Cloud
Hybrid cloud integrates on-premises infrastructure with public cloud services, enabling data and application portability between e...
Architecture & TechnologyFinTech Integration
FinTech integration involves seamlessly embedding financial technology solutions into existing enterprise systems and processes to...
Architecture & TechnologyLow-Code/No-Code Platforms
Low-Code/No-Code (LCNC) platforms enable rapid application development by abstracting complex coding, allowing users with varying ...
Architecture & TechnologyRobotic Process Automation (RPA)
Robotic Process Automation (RPA) automates repetitive, rule-based digital tasks by deploying software robots to mimic human intera...
Architecture & TechnologyChief Information Officer (CIO)
The Chief Information Officer (CIO) is a C-suite executive responsible for the overall management, implementation, and usability o...
CIO & CTO LeadershipChief Technology Officer (CTO)
The Chief Technology Officer (CTO) is a C-suite executive responsible for an organization's technology vision, research and develo...
CIO & CTO LeadershipRun, Grow, Transform (RGT) Model
The Run, Grow, Transform (RGT) Model is an IT budget allocation framework that categorizes technology spending into three tiers: r...
CIO & CTO LeadershipValue Stream Management
Value Stream Management (VSM) is a lean management practice that focuses on optimizing the end-to-end flow of value delivery from ...
CIO & CTO LeadershipBusiness-IT Alignment
Business-IT Alignment is the strategic practice of ensuring that an organization's information technology goals, capabilities, and...
CIO & CTO LeadershipIT Sourcing
IT Sourcing is the strategic process of evaluating, selecting, and managing external and internal providers of technology services...
CIO & CTO LeadershipIT Budget
The IT Budget is the comprehensive financial plan that allocates an organization's resources for technology investments, operation...
CIO & CTO LeadershipCapEx vs. OpEx
CapEx vs. OpEx refers to the distinction between Capital Expenditure (CapEx), which involves upfront investments in long-term asse...
CIO & CTO LeadershipReturn on Investment (ROI)
Return on Investment (ROI) is a financial metric that measures the profitability and efficiency of an investment by comparing the ...
CIO & CTO LeadershipKey Performance Indicator (KPI)
A Key Performance Indicator (KPI) is a quantifiable metric used to evaluate the success of an organization, team, or initiative in...
CIO & CTO LeadershipService Level Agreement (SLA)
A Service Level Agreement (SLA) is a formal contract between a service provider and a customer that defines the expected level of ...
CIO & CTO LeadershipScrum
Scrum is a lightweight Agile framework for managing and completing complex projects, organizing work into fixed-length iterations ...
CIO & CTO LeadershipKanban
Kanban is a lean workflow management method that visualizes work, limits work in progress, and optimizes the flow of tasks through...
CIO & CTO LeadershipSAFe (Scaled Agile Framework)
SAFe (Scaled Agile Framework) is a comprehensive framework for scaling Agile and Lean practices across large enterprises, providin...
CIO & CTO LeadershipDevOps
DevOps is a set of cultural practices, organizational principles, and collaborative approaches that unify software development (De...
CIO & CTO LeadershipDigital Native
A Digital Native is an organization that was born in the digital era, with technology as the core foundation of its business model...
CIO & CTO LeadershipLegacy System
A Legacy System is an older technology system, application, or infrastructure component that remains in operation because it suppo...
CIO & CTO LeadershipStakeholder Management
Stakeholder Management is the systematic practice of identifying, analyzing, planning, and engaging with individuals or groups who...
CIO & CTO LeadershipITIL 4
ITIL 4 is the latest evolution of the IT Infrastructure Library framework, providing a comprehensive, flexible approach to IT serv...
CIO & CTO LeadershipIT Service Management (ITSM)
IT Service Management (ITSM) is the practice of designing, delivering, managing, and improving the IT services an organization pro...
CIO & CTO LeadershipIT Asset Management (ITAM)
IT Asset Management (ITAM) is the practice of managing and optimizing the purchase, deployment, maintenance, utilization, and disp...
CIO & CTO LeadershipConfiguration Management Database (CMDB)
A Configuration Management Database (CMDB) is a centralized repository that stores information about the configuration items (CIs)...
CIO & CTO LeadershipZachman Framework
The Zachman Framework is a foundational enterprise architecture classification schema that organizes architectural artifacts into ...
Architecture & TechnologySolution Architecture
Solution Architecture is the practice of designing and defining the structure, components, modules, interfaces, and data flows of ...
Architecture & TechnologyTechnical Architecture
Technical Architecture defines the technology infrastructure, platforms, standards, and technical components that underpin an orga...
Architecture & TechnologyBusiness Architecture
Business Architecture is a discipline that defines the structure of an enterprise in terms of its business capabilities, value str...
Architecture & TechnologyData Architecture
Data Architecture is the discipline of designing, organizing, and governing an organization's data assets, defining how data is co...
Architecture & TechnologySecurity Architecture
Security Architecture is the discipline of designing and integrating security controls, principles, and technologies into an organ...
Architecture & TechnologyApplication Architecture
Application Architecture defines the structure, behavior, and interaction patterns of an organization's software applications, est...
Architecture & TechnologyMonolithic Architecture
Monolithic Architecture is a software design pattern where an application is built as a single, self-contained unit with all compo...
Architecture & TechnologyBounded Context
A Bounded Context is a central pattern in Domain-Driven Design (DDD) that defines an explicit boundary within which a particular d...
Architecture & TechnologyC4 Model
The C4 Model is a lean graphical notation technique for visualizing software architecture at four hierarchical levels of abstracti...
Architecture & TechnologyArchitecture Decision Record (ADR)
An Architecture Decision Record (ADR) is a concise document that captures a significant architectural decision, including the cont...
Architecture & TechnologyREST API
A REST API (Representational State Transfer Application Programming Interface) is a web service interface that follows REST archit...
Architecture & TechnologyGraphQL
GraphQL is a query language and runtime for APIs developed by Facebook that enables clients to request exactly the data they need ...
Architecture & TechnologygRPC
gRPC is a high-performance, open-source remote procedure call (RPC) framework developed by Google that uses Protocol Buffers for s...
Architecture & TechnologyAPI First
API First is a design philosophy that prioritizes the design and development of APIs before building the applications that consume...
Architecture & TechnologyMACH Architecture
MACH Architecture is a technology philosophy that combines Microservices, API-first, Cloud-native, and Headless approaches to crea...
Architecture & TechnologyIntegration Platform as a Service (iPaaS)
Integration Platform as a Service (iPaaS) is a cloud-based platform that provides tools and services for connecting applications, ...
Architecture & TechnologyMessage Queue
A Message Queue is an asynchronous communication mechanism that enables applications to exchange messages through an intermediary ...
Architecture & TechnologyApache Kafka
Apache Kafka is a distributed event streaming platform designed for high-throughput, fault-tolerant, real-time data pipelines and ...
Architecture & TechnologyIstio
Istio is an open-source service mesh platform that provides a uniform way to connect, secure, control, and observe microservices, ...
Architecture & TechnologyLinkerd
Linkerd is a lightweight, open-source service mesh for Kubernetes that provides critical observability, reliability, and security ...
Architecture & TechnologySidecar Pattern
The Sidecar Pattern is a software architecture pattern where a helper component is deployed alongside a primary application as a s...
Architecture & TechnologyStrangler Pattern
The Strangler Pattern (also known as the Strangler Fig Pattern) is an application modernization strategy that incrementally replac...
Architecture & TechnologyAnti-Corruption Layer
An Anti-Corruption Layer (ACL) is a design pattern from Domain-Driven Design that acts as a translation boundary between two syste...
Architecture & TechnologyCircuit Breaker Pattern
The Circuit Breaker Pattern is a resilience design pattern that prevents cascading failures in distributed systems by monitoring f...
Architecture & TechnologyEvent Sourcing
Event Sourcing is an architectural pattern that stores the state of a system as a sequence of immutable events rather than as muta...
Architecture & TechnologyCommand Query Responsibility Segregation (CQRS)
Command Query Responsibility Segregation (CQRS) is an architectural pattern that separates read (query) and write (command) operat...
Architecture & TechnologyIdempotency
Idempotency is a design property of operations where performing the same operation multiple times produces the same result as perf...
Architecture & TechnologyTwelve-Factor App
The Twelve-Factor App is a methodology of twelve best practices for building modern, scalable, and maintainable software-as-a-serv...
Architecture & TechnologyOpenAPI Specification
The OpenAPI Specification (formerly known as Swagger) is an industry-standard, language-agnostic format for describing REST APIs, ...
Architecture & TechnologyAsyncAPI
AsyncAPI is an open-source specification for defining asynchronous APIs, providing a standard format for describing event-driven a...
Architecture & TechnologyArchitecture Review Board
An Architecture Review Board (ARB) is a governance body composed of senior architects and technology leaders responsible for revie...
Architecture & TechnologyArchitecture Maturity Model
An Architecture Maturity Model is an assessment framework that evaluates an organization's enterprise architecture practice agains...
Architecture & TechnologyCloud Computing
Cloud Computing is the on-demand delivery of computing resources—including servers, storage, databases, networking, software, anal...
Cloud & InfrastructurePublic Cloud
A Public Cloud is a cloud computing deployment model where computing resources—such as servers, storage, and applications—are owne...
Cloud & InfrastructurePrivate Cloud
A Private Cloud is a cloud computing deployment model where computing resources are exclusively dedicated to a single organization...
Cloud & InfrastructureInfrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) is a cloud computing service model that provides virtualized computing resources—including serv...
Cloud & InfrastructurePlatform as a Service (PaaS)
Platform as a Service (PaaS) is a cloud computing service model that provides a complete development and deployment environment in...
Cloud & InfrastructureSoftware as a Service (SaaS)
Software as a Service (SaaS) is a cloud computing service model where software applications are hosted by a provider and made avai...
Cloud & InfrastructureFunction as a Service (FaaS)
Function as a Service (FaaS) is a serverless cloud computing model where developers deploy individual functions—discrete units of ...
Cloud & InfrastructureContainerization
Containerization is a lightweight virtualization technology that packages application code together with its dependencies, librari...
Cloud & InfrastructureDocker
Docker is an open-source containerization platform that enables developers to build, package, distribute, and run applications in ...
Cloud & InfrastructureContainer Orchestration
Container Orchestration is the automated management of containerized applications across multiple hosts, encompassing deployment, ...
Cloud & InfrastructureHelm
Helm is the package manager for Kubernetes that simplifies the deployment and management of applications on Kubernetes clusters by...
Cloud & InfrastructureVirtualization
Virtualization is the technology that creates abstract, virtual versions of physical computing resources—including servers, storag...
Cloud & InfrastructureHypervisor
A Hypervisor (also called a Virtual Machine Monitor) is software, firmware, or hardware that creates and manages virtual machines ...
Cloud & InfrastructureTerraform
Terraform is an open-source Infrastructure as Code (IaC) tool created by HashiCorp that enables users to define, provision, and ma...
Cloud & InfrastructureAWS CloudFormation
AWS CloudFormation is Amazon Web Services' native Infrastructure as Code (IaC) service that enables users to model, provision, and...
Cloud & InfrastructureAnsible
Ansible is an open-source IT automation platform that automates configuration management, application deployment, and orchestratio...
Cloud & InfrastructurePuppet
Puppet is an enterprise configuration management tool that uses a declarative language to define and enforce the desired state of ...
Cloud & InfrastructureChef
Chef is a configuration management and automation platform that uses Ruby-based scripts called recipes and cookbooks to define inf...
Cloud & InfrastructureCloud Migration
Cloud Migration is the strategic process of moving an organization's digital assets—including data, applications, workloads, and I...
Cloud & InfrastructureLift and Shift
Lift and Shift (also known as Rehosting) is a cloud migration strategy that involves moving applications from on-premises environm...
Cloud & InfrastructureReplatforming
Replatforming (also known as Lift-Tinker-and-Shift) is a cloud migration strategy that involves making targeted optimizations to a...
Cloud & InfrastructureRefactoring
Refactoring (also known as Re-architecting) in the context of cloud migration is the strategy of fundamentally redesigning and rew...
Cloud & InfrastructureCloud Cost Optimization
Cloud Cost Optimization is the systematic practice of reducing cloud computing expenses while maintaining or improving performance...
Cloud & InfrastructureReserved Instance
A Reserved Instance (RI) is a cloud pricing model that offers significant discounts (typically 30-72%) compared to on-demand prici...
Cloud & InfrastructureSpot Instance
A Spot Instance is a cloud computing pricing model that allows users to bid on and use spare cloud provider capacity at steep disc...
Cloud & InfrastructureContent Delivery Network (CDN)
A Content Delivery Network (CDN) is a geographically distributed network of proxy servers and data centers that caches and deliver...
Cloud & InfrastructureVirtual Private Cloud (VPC)
A Virtual Private Cloud (VPC) is a logically isolated section of a public cloud provider's network where organizations can launch ...
Cloud & InfrastructureSoftware-Defined Networking (SDN)
Software-Defined Networking (SDN) is a network architecture approach that decouples the network control plane from the data forwar...
Cloud & InfrastructureSoftware-Defined Wide Area Network (SD-WAN)
A Software-Defined Wide Area Network (SD-WAN) is a virtual WAN architecture that uses software-defined networking principles to in...
Cloud & InfrastructureZero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA) is a security framework and set of technologies that provides secure remote access to application...
Cloud & InfrastructureVirtual Private Network (VPN)
A Virtual Private Network (VPN) is a technology that creates an encrypted tunnel between a user's device and a remote network over...
Cloud & InfrastructureCloud Access Security Broker (CASB)
A Cloud Access Security Broker (CASB) is a security policy enforcement point positioned between cloud service consumers and cloud ...
Cloud & InfrastructureCloud Workload Protection Platform (CWPP)
A Cloud Workload Protection Platform (CWPP) is a security solution that provides comprehensive protection for workloads running in...
Cloud & InfrastructureDisaster Recovery as a Service (DRaaS)
Disaster Recovery as a Service (DRaaS) is a cloud-based service model that replicates and hosts an organization's critical IT infr...
Cloud & InfrastructureBackup as a Service (BaaS)
Backup as a Service (BaaS) is a cloud-based approach to data backup where an organization subscribes to a third-party service that...
Cloud & InfrastructureAvailability Zone
An Availability Zone (AZ) is one or more physically separate data centers within a cloud provider's region, each with independent ...
Cloud & InfrastructureRegion (Cloud)
A Cloud Region is a specific geographic location where a cloud provider operates a cluster of data centers (availability zones), e...
Cloud & InfrastructureAuto Scaling
Auto Scaling is a cloud computing capability that automatically adjusts the number of compute resources—such as virtual machines, ...
Cloud & InfrastructureLoad Balancer
A Load Balancer is a networking device or service that distributes incoming network traffic across multiple servers, containers, o...
Cloud & InfrastructureObject Storage
Object Storage is a data storage architecture that manages data as objects—each containing the data itself, metadata, and a unique...
Cloud & InfrastructureArtificial Intelligence (AI)
Artificial Intelligence (AI) is the broad field of computer science focused on creating systems capable of performing tasks that t...
Data & AIGPT (Generative Pre-trained Transformer)
GPT (Generative Pre-trained Transformer) is a family of large language models developed by OpenAI that use transformer architectur...
Data & AITransformer Architecture
Transformer Architecture is a neural network architecture introduced in the 2017 paper 'Attention Is All You Need' that uses self-...
Data & AIHallucination (AI)
AI Hallucination refers to the phenomenon where artificial intelligence models, particularly large language models, generate outpu...
Data & AIMultimodal AI
Multimodal AI refers to artificial intelligence systems that can process, understand, and generate information across multiple dat...
Data & AISmall Language Model (SLM)
A Small Language Model (SLM) is a language model with significantly fewer parameters than large language models (typically under 1...
Data & AIMachine Learning (ML)
Machine Learning (ML) is a subset of artificial intelligence that enables computer systems to learn and improve from experience wi...
Data & AIDeep Learning
Deep Learning is a specialized subset of machine learning that uses artificial neural networks with multiple layers (deep architec...
Data & AINeural Network
A Neural Network is a computational model inspired by the biological neural networks of the human brain, consisting of interconnec...
Data & AISupervised Learning
Supervised Learning is a machine learning paradigm where models are trained on labeled datasets—input-output pairs where the corre...
Data & AIUnsupervised Learning
Unsupervised Learning is a machine learning paradigm where models discover hidden patterns, structures, and relationships in data ...
Data & AIReinforcement Learning
Reinforcement Learning (RL) is a machine learning paradigm where an agent learns optimal behavior through trial-and-error interact...
Data & AINatural Language Processing (NLP)
Natural Language Processing (NLP) is a branch of artificial intelligence that enables computers to understand, interpret, generate...
Data & AIComputer Vision
Computer Vision is a field of artificial intelligence that enables computers to derive meaningful information from digital images,...
Data & AIAlgorithmic Bias
Algorithmic Bias refers to systematic and repeatable errors in AI and machine learning systems that create unfair outcomes—such as...
Data & AIExplainable AI (XAI)
Explainable AI (XAI) is a set of methods, techniques, and principles that make artificial intelligence system outputs understandab...
Data & AIAI Safety
AI Safety is the multidisciplinary field focused on ensuring that artificial intelligence systems operate reliably, beneficially, ...
Data & AISynthetic Data
Synthetic Data is artificially generated data that mimics the statistical properties and patterns of real-world data without conta...
Data & AIData Warehouse
A Data Warehouse is a centralized repository that stores large volumes of structured, historical data from multiple source systems...
Data & AIData Mart
A Data Mart is a focused subset of a data warehouse that contains a curated selection of data organized and optimized for the spec...
Data & AIData Quality
Data Quality refers to the degree to which data is accurate, complete, consistent, timely, valid, and fit for its intended use in ...
Data & AIData Lineage
Data Lineage is the complete lifecycle tracking of data as it flows from its origin through various transformations, processes, an...
Data & AIMaster Data Management (MDM)
Master Data Management (MDM) is the discipline of creating and maintaining a single, authoritative, and consistent view of critica...
Data & AIData Privacy
Data Privacy is the practice of protecting personal and sensitive information from unauthorized access, collection, processing, an...
Data & AIData Sovereignty
Data Sovereignty is the principle that data is subject to the laws and governance structures of the country or jurisdiction in whi...
Data & AIETL (Extract, Transform, Load)
ETL (Extract, Transform, Load) is a data integration process that extracts data from multiple source systems, transforms it into a...
Data & AIELT (Extract, Load, Transform)
ELT (Extract, Load, Transform) is a modern data integration pattern that extracts data from source systems, loads it directly into...
Data & AIReverse ETL
Reverse ETL is the process of moving transformed, enriched data from a central data warehouse or data lake back into operational s...
Data & AIData Modeling
Data Modeling is the process of creating a visual and structural representation of an organization's data, defining the entities, ...
Data & AIStar Schema
A Star Schema is a dimensional data modeling approach for data warehouses that organizes data into a central fact table containing...
Data & AISnowflake Schema
A Snowflake Schema is a dimensional data modeling approach that extends the star schema by normalizing dimension tables into multi...
Data & AIBusiness Intelligence (BI)
Business Intelligence (BI) encompasses the strategies, technologies, practices, and tools used to collect, integrate, analyze, and...
Data & AIPredictive Analytics
Predictive Analytics is the practice of using statistical algorithms, machine learning models, and data mining techniques to analy...
Data & AIPrescriptive Analytics
Prescriptive Analytics is the most advanced form of analytics that uses optimization algorithms, simulation, machine learning, and...
Data & AIDescriptive Analytics
Descriptive Analytics is the foundational form of analytics that summarizes and interprets historical data to understand what has ...
Data & AIDiagnostic Analytics
Diagnostic Analytics is the form of analytics that examines data to understand why something happened, using techniques such as dr...
Data & AIData Visualization
Data Visualization is the practice of representing data through visual formats—such as charts, graphs, maps, dashboards, and infog...
Data & AIData Storytelling
Data Storytelling is the practice of combining data analysis, visualization, and narrative to communicate insights in a compelling...
Data & AIChief Data Officer (CDO)
The Chief Data Officer (CDO) is a C-suite executive responsible for enterprise-wide data governance, data strategy, data quality, ...
Data & AIData Steward
A Data Steward is a designated individual responsible for managing and overseeing an organization's data assets for a specific dom...
Data & AIData Scientist
A Data Scientist is a professional who combines expertise in statistics, mathematics, programming, and domain knowledge to extract...
Data & AIData Engineer
A Data Engineer is a technical professional responsible for designing, building, maintaining, and optimizing the data infrastructu...
Data & AIData Analyst
A Data Analyst is a professional who collects, processes, and performs statistical analyses on data to identify trends, patterns, ...
Data & AIData Literacy
Data Literacy is the ability to read, work with, analyze, and communicate with data, encompassing the skills needed to understand ...
Data & AIData Culture
Data Culture is an organizational environment where data-driven decision making is embedded into the norms, behaviors, and practic...
Data & AIData Monetization
Data Monetization is the practice of generating measurable economic value from an organization's data assets, either directly by s...
Data & AIData as a Product
Data as a Product is an approach to data management that treats data outputs as products with defined consumers, quality standards...
Data & AIData Contract
A Data Contract is a formal agreement between a data producer and data consumer that defines the structure, format, semantics, qua...
Data & AIModel Registry
A Model Registry is a centralized repository for managing the lifecycle of machine learning models, providing version control, met...
Data & AICybersecurity
Cybersecurity encompasses the technologies, processes, and practices designed to protect networks, devices, programs, and data fro...
Security & RiskNever Trust, Always Verify
Never Trust, Always Verify is the foundational principle of Zero Trust security architecture, mandating that no user, device, or n...
Security & RiskMulti-Factor Authentication (MFA)
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more independent verification fact...
Security & RiskSingle Sign-On (SSO)
Single Sign-On (SSO) is an authentication scheme that allows users to access multiple independent software systems with a single s...
Security & RiskCertificate-Based Authentication
Certificate-Based Authentication (CBA) is a cryptographic authentication method that uses digital certificates—issued by a trusted...
Security & RiskBiometric Authentication
Biometric Authentication uses unique biological characteristics—fingerprints, facial geometry, iris patterns, voiceprints, or beha...
Security & RiskPasswordless Authentication
Passwordless Authentication eliminates traditional passwords entirely, using alternative verification methods such as FIDO2 securi...
Security & RiskIdentity Governance and Administration (IGA)
Identity Governance and Administration (IGA) is a framework of policies, processes, and technologies for managing digital identiti...
Security & RiskSecurity Orchestration, Automation, and Response (SOAR)
Security Orchestration, Automation, and Response (SOAR) is a category of security solutions that combines incident response automa...
Security & RiskSecurity Information and Event Management (SIEM)
Security Information and Event Management (SIEM) is a security solution that aggregates and analyzes log data and security events ...
Security & RiskExtended Detection and Response (XDR)
Extended Detection and Response (XDR) is an integrated security platform that unifies threat detection, investigation, and respons...
Security & RiskEndpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR) is a cybersecurity solution that continuously monitors endpoint devices—laptops, desktops, s...
Security & RiskThreat Hunting
Threat Hunting is the proactive, human-driven practice of searching through networks, endpoints, and datasets to identify advanced...
Security & RiskIncident Response (IR)
Incident Response (IR) is the structured methodology for detecting, containing, eradicating, and recovering from cybersecurity inc...
Security & RiskIncident Response Plan
An Incident Response Plan (IRP) is a documented, actionable framework that defines the roles, responsibilities, procedures, commun...
Security & RiskRansomware
Ransomware is a category of malicious software that encrypts an organization's files, databases, and systems, rendering them inacc...
Security & RiskPhishing
Phishing is a social engineering attack method that uses deceptive communications—typically email but also SMS (smishing), voice c...
Security & RiskSpear Phishing
Spear Phishing is a targeted form of phishing that crafts highly personalized attack messages for specific individuals or organiza...
Security & RiskSocial Engineering
Social Engineering encompasses the psychological manipulation techniques used by attackers to deceive individuals into divulging c...
Security & RiskMan-in-the-Middle (MitM) Attack
A Man-in-the-Middle (MitM) Attack is a cyberattack where an adversary secretly intercepts and potentially alters communications be...
Security & RiskDistributed Denial of Service (DDoS)
A Distributed Denial of Service (DDoS) attack overwhelms a target's network, servers, or applications with massive volumes of mali...
Security & RiskAdvanced Persistent Threat (APT)
An Advanced Persistent Threat (APT) is a prolonged, targeted cyberattack campaign conducted by well-resourced threat actors—typica...
Security & RiskMalware
Malware (malicious software) is any software intentionally designed to cause damage, gain unauthorized access, or disrupt the norm...
Security & RiskRansomware as a Service (RaaS)
Ransomware as a Service (RaaS) is a criminal business model where ransomware developers create and maintain ransomware toolkits, i...
Security & RiskVulnerability Management
Vulnerability Management is the continuous, systematic process of identifying, classifying, prioritizing, remediating, and mitigat...
Security & RiskPenetration Testing
Penetration Testing (pen testing) is a controlled, authorized simulation of real-world cyberattacks against an organization's syst...
Security & RiskRed Team
A Red Team is a group of security professionals who simulate adversary tactics, techniques, and procedures (TTPs) against an organ...
Security & RiskBlue Team
A Blue Team is the defensive security team responsible for maintaining an organization's security posture, monitoring for threats,...
Security & RiskPurple Team
A Purple Team is a collaborative security approach that combines red team (offensive) and blue team (defensive) activities in a co...
Security & RiskAttack Surface
An Attack Surface is the sum of all potential entry points—known and unknown—through which an unauthorized user could attempt to a...
Security & RiskAttack Surface Management (ASM)
Attack Surface Management (ASM) is the continuous process of discovering, inventorying, classifying, monitoring, and reducing an o...
Security & RiskSecurity Operations Center (SOC)
A Security Operations Center (SOC) is the centralized organizational function responsible for continuous monitoring, detection, an...
Security & RiskChief Information Security Officer (CISO)
The Chief Information Security Officer (CISO) is the senior executive responsible for establishing and maintaining the enterprise ...
Security & RiskSecure Software Development Lifecycle (SSDLC)
The Secure Software Development Lifecycle (SSDLC) integrates security practices, tools, and testing into every phase of the softwa...
Security & RiskShift Left
Shift Left is a software development philosophy that moves security testing, quality assurance, and compliance validation earlier ...
Security & RiskApplication Security (AppSec)
Application Security (AppSec) is the discipline of protecting software applications from security threats throughout their lifecyc...
Security & RiskAPI Security
API Security encompasses the strategies, practices, and tools for protecting Application Programming Interfaces (APIs) from abuse,...
Security & RiskWeb Application Firewall (WAF)
A Web Application Firewall (WAF) is a security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from web appl...
Security & RiskContainer Security
Container Security encompasses the practices, tools, and technologies for protecting containerized applications throughout their l...
Security & RiskShared Responsibility Model
The Shared Responsibility Model is a cloud security framework that delineates the security obligations between cloud service provi...
Security & RiskSoftware Bill of Materials (SBOM)
A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of all components, libraries, and dependencies that co...
Security & RiskThird-Party Risk Management (TPRM)
Third-Party Risk Management (TPRM) is the systematic process of identifying, assessing, monitoring, and mitigating risks introduce...
Security & RiskVendor Risk Management
Vendor Risk Management (VRM) is the subset of third-party risk management specifically focused on evaluating, monitoring, and miti...
Security & RiskCyber Risk Management
Cyber Risk Management is the strategic discipline of identifying, analyzing, evaluating, and treating cybersecurity risks in align...
Security & RiskNIST Cybersecurity Framework (CSF)
The NIST Cybersecurity Framework (CSF) is a voluntary framework developed by the National Institute of Standards and Technology th...
Security & RiskISO 27001
ISO 27001 is the internationally recognized standard for Information Security Management Systems (ISMS), published by the Internat...
Security & RiskSOC 2
SOC 2 (System and Organization Controls 2) is an auditing framework developed by the American Institute of CPAs (AICPA) that evalu...
Security & RiskGeneral Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is the European Union's comprehensive data protection law that governs how organizat...
Security & RiskCalifornia Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA), is a comprehensive US state pr...
Security & RiskHealth Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that establishes national standards for protec...
Security & RiskPayment Card Industry Data Security Standard (PCI DSS)
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards established by the PCI Security Standard...
Security & RiskCyber Insurance
Cyber Insurance is a specialized insurance product that provides financial protection against losses resulting from cyber incident...
Security & RiskDisaster Recovery (DR)
Disaster Recovery (DR) is the set of policies, tools, and procedures designed to enable the recovery or continuation of vital tech...
Security & RiskRecovery Point Objective (RPO)
Recovery Point Objective (RPO) is the maximum acceptable amount of data loss measured in time—the point in time to which data must...
Security & RiskRecovery Time Objective (RTO)
Recovery Time Objective (RTO) is the maximum acceptable duration of time that a business process or system can be offline after a ...
Security & RiskConditional Access
Conditional Access is a security mechanism that dynamically evaluates contextual signals—user identity, device health, location, a...
Security & RiskJust-in-Time (JIT) Access
Just-in-Time (JIT) Access is a privileged access management approach that grants elevated permissions only when needed, for the mi...
Security & RiskLeast Privilege
The Principle of Least Privilege mandates that every user, application, process, and system component is granted only the minimum ...
Security & RiskSegregation of Duties (SoD)
Segregation of Duties (SoD) is an internal control principle that divides critical tasks and privileges among multiple individuals...
Security & RiskIntelligent Automation
Intelligent Automation (IA) combines Robotic Process Automation (RPA) with artificial intelligence capabilities—including machine ...
Automation & ProcessAgentic Process Automation
Agentic Process Automation is an emerging automation paradigm where AI agents autonomously plan, execute, and adapt multi-step bus...
Automation & ProcessDigital Worker
A Digital Worker is a software-based entity that combines RPA, AI, and business logic to perform the work equivalent of a human em...
Automation & ProcessBusiness Process Management (BPM)
Business Process Management (BPM) is a systematic discipline for designing, modeling, executing, monitoring, and optimizing busine...
Automation & ProcessWorkflow Automation
Workflow Automation is the use of technology to automate the sequence of tasks, approvals, notifications, and data movements that ...
Automation & ProcessProcess Mining
Process Mining is a data-driven technique that analyzes event logs from information systems to discover, monitor, and improve real...
Automation & ProcessTask Mining
Task Mining is a process discovery technique that captures and analyzes user interactions at the desktop level—mouse clicks, keyst...
Automation & ProcessIntelligent Document Processing (IDP)
Intelligent Document Processing (IDP) combines OCR, natural language processing, machine learning, and computer vision to automati...
Automation & ProcessOptical Character Recognition (OCR)
Optical Character Recognition (OCR) is a technology that converts images of text—from scanned documents, photographs, or PDF files...
Automation & ProcessConversational AI
Conversational AI is the collection of technologies that enable computers to understand, process, and respond to human language in...
Automation & ProcessChatbot
A Chatbot is a software application that simulates human conversation through text or voice interactions, ranging from simple rule...
Automation & ProcessLow-Code Development
Low-Code Development is a software development approach that uses visual design interfaces, drag-and-drop components, pre-built te...
Automation & ProcessNo-Code Development
No-Code Development is a software development approach that enables users to create applications, workflows, and automations entir...
Automation & ProcessCitizen Developer
A Citizen Developer is a business user who creates application functionality—automations, workflows, reports, and simple applicati...
Automation & ProcessBusiness Process Reengineering (BPR)
Business Process Reengineering (BPR) is the fundamental rethinking and radical redesign of business processes to achieve dramatic ...
Automation & ProcessLean Management
Lean Management is a systematic methodology derived from the Toyota Production System that focuses on maximizing customer value wh...
Automation & ProcessSix Sigma
Six Sigma is a data-driven quality management methodology that seeks to reduce process variation and defects to near-perfection (3...
Automation & ProcessLean Six Sigma
Lean Six Sigma integrates the waste-elimination focus of Lean with the variation-reduction rigor of Six Sigma, creating a comprehe...
Automation & ProcessValue Stream Mapping (VSM)
Value Stream Mapping (VSM) is a Lean management technique that creates a visual representation of every step in a business process...
Automation & ProcessKaizen
Kaizen is the Japanese philosophy and practice of continuous incremental improvement, where every employee—from frontline workers ...
Automation & ProcessContinuous Improvement
Continuous Improvement is an organizational philosophy and systematic approach to making ongoing, incremental enhancements to prod...
Automation & ProcessProcess Excellence
Process Excellence is a holistic organizational capability that combines process management methodologies (BPM, Lean, Six Sigma), ...
Automation & ProcessAutomation Center of Excellence (CoE)
An Automation Center of Excellence (CoE) is a centralized organizational function that establishes standards, governance, best pra...
Automation & ProcessAutomation ROI
Automation ROI measures the financial return on investment from automation initiatives by quantifying benefits (labor savings, err...
Automation & ProcessAttended Automation
Attended Automation refers to RPA and automation solutions that run on a user's workstation and are triggered by or work alongside...
Automation & ProcessUnattended Automation
Unattended Automation refers to RPA and automation solutions that operate independently on servers or virtual machines without hum...
Automation & ProcessScreen Scraping
Screen Scraping is an automation technique that reads and extracts data from application user interfaces by interpreting screen co...
Automation & ProcessAPI Automation
API Automation uses Application Programming Interfaces to automate data exchange, process execution, and system integration throug...
Automation & ProcessEvent-Driven Automation
Event-Driven Automation triggers automated actions in response to real-time events—system alerts, data changes, user actions, IoT ...
Automation & ProcessWorkflow Engine
A Workflow Engine is the core software component that manages and executes defined business process workflows—interpreting process...
Automation & ProcessBusiness Rules Engine (BRE)
A Business Rules Engine (BRE) is a software system that executes business rules—decision logic, policies, and conditions—separatel...
Automation & ProcessDecision Automation
Decision Automation uses technology to make business decisions automatically based on defined rules, data analysis, and AI models—...
Automation & ProcessCognitive Automation
Cognitive Automation applies artificial intelligence technologies—natural language processing, machine learning, computer vision, ...
Automation & ProcessProcess Orchestration
Process Orchestration is the coordination and management of multiple automated and human tasks across systems, services, and depar...
Automation & ProcessEnd-to-End Automation
End-to-End Automation is the complete automation of a business process from initiation to completion—encompassing all tasks, decis...
Automation & ProcessAutomation Anywhere
Automation Anywhere is a leading enterprise RPA and intelligent automation platform that provides cloud-native automation capabili...
Automation & ProcessUiPath
UiPath is a leading enterprise automation platform that provides end-to-end automation capabilities spanning process discovery (Pr...
Automation & ProcessBlue Prism
Blue Prism is an enterprise RPA platform that pioneered the concept of a 'digital workforce,' providing a secure, scalable, and ce...
Automation & ProcessBusiness Transformation
Business Transformation is a fundamental, organization-wide change initiative that reimagines how a company creates, delivers, and...
Digital BusinessDigital Maturity
Digital Maturity is an assessment of an organization's readiness and capability to leverage digital technologies across strategy, ...
Digital BusinessDigital Disruption
Digital Disruption is the transformation of markets, industries, and business models caused by the adoption of digital technologie...
Digital BusinessLegacy Modernization
Legacy Modernization is the strategic process of updating, replacing, or transforming outdated technology systems (mainframes, mon...
Digital BusinessDigital Strategy
Digital Strategy is a comprehensive plan that defines how an organization will use digital technologies and data to create value, ...
Digital BusinessCustomer Experience (CX)
Customer Experience (CX) is the totality of interactions, perceptions, and emotions a customer has with an organization across all...
Digital BusinessEmployee Experience (EX)
Employee Experience (EX) is the sum of all interactions, touchpoints, and perceptions an employee has with their organization thro...
Digital BusinessDigital First
Digital First is an organizational strategy and mindset that prioritizes digital channels, digital processes, and digital interact...
Digital BusinessDigital Ecosystem
A Digital Ecosystem is a network of interconnected organizations, technologies, platforms, and data flows that create and exchange...
Digital BusinessAPI Economy
The API Economy is the commercial ecosystem of Application Programming Interfaces (APIs) that enables organizations to expose busi...
Digital BusinessPlatform Business Model
A Platform Business Model is a business architecture that creates value by facilitating exchanges and interactions between two or ...
Digital BusinessTwo-Sided Platform
A Two-Sided Platform (also called a two-sided market or two-sided network) is a technology-enabled marketplace that serves two dis...
Digital BusinessProduct-Led Transformation
Product-Led Transformation is an organizational change approach that shifts technology delivery from project-based execution to pr...
Digital BusinessADKAR Model
The ADKAR Model is a goal-oriented change management framework developed by Prosci that guides individual transitions through orga...
Digital BusinessKotter's 8-Step Change Model
Kotter's 8-Step Change Model is a strategic change management framework developed by Harvard Business School professor John Kotter...
Digital BusinessInternet of Things (IoT)
The Internet of Things (IoT) is a network of physical devices, vehicles, appliances, sensors, and other objects embedded with elec...
Digital BusinessIndustrial IoT (IIoT)
Industrial IoT (IIoT) is the application of Internet of Things technologies in industrial and manufacturing settings, connecting i...
Digital BusinessSmart Factory
A Smart Factory is a fully connected, digitized manufacturing facility that uses IoT sensors, AI, robotics, cloud computing, and a...
Digital BusinessIndustry 4.0
Industry 4.0 (the Fourth Industrial Revolution) is the ongoing transformation of manufacturing and industrial processes through th...
Digital BusinessDigital Supply Chain
A Digital Supply Chain is an end-to-end supply chain that leverages digital technologies—IoT, AI, blockchain, cloud computing, and...
Digital BusinessCircular Economy
Circular Economy is an economic model that replaces the traditional linear 'take-make-dispose' approach with systems designed to e...
Digital BusinessSustainability in IT
Sustainability in IT is the strategic approach to minimizing the environmental impact of technology operations while leveraging IT...
Digital BusinessGreen IT
Green IT is the practice of designing, manufacturing, using, and disposing of computing resources in ways that reduce environmenta...
Digital BusinessDigital Ethics
Digital Ethics is the systematic examination and application of moral principles and values to the design, development, deployment...
Digital BusinessInnovation Management
Innovation Management is the systematic process of managing an organization's innovation activities—from idea generation and evalu...
Digital BusinessDesign Thinking
Design Thinking is a human-centered innovation methodology that uses empathetic understanding of user needs, iterative prototyping...
Digital BusinessLean Startup
Lean Startup is a methodology for developing businesses, products, and services through validated learning, scientific experimenta...
Digital BusinessMinimum Viable Product (MVP)
A Minimum Viable Product (MVP) is the simplest version of a product that can be released to early adopters to collect the maximum ...
Digital BusinessTech Talent
Tech Talent refers to the skilled technology professionals—software engineers, data scientists, architects, security specialists, ...
IT Talent & CultureSkills Gap
Skills Gap is the disparity between the technology skills an organization needs to execute its strategy and the skills currently a...
IT Talent & CultureTalent Acquisition
Talent Acquisition is the strategic process of identifying, attracting, evaluating, and hiring skilled technology professionals, e...
IT Talent & CultureTalent Retention
Talent Retention is the organizational capability to keep valued technology professionals engaged, productive, and committed to re...
IT Talent & CultureEmployee Value Proposition (EVP)
Employee Value Proposition (EVP) is the unique set of benefits, rewards, experiences, and opportunities that an organization offer...
IT Talent & CultureEmployer Branding
Employer Branding is the strategic process of managing an organization's reputation and identity as a place to work, particularly ...
IT Talent & CulturePsychological Safety
Psychological Safety is a shared belief within a team that the environment is safe for interpersonal risk-taking—speaking up with ...
IT Talent & CultureAgile Culture
Agile Culture is an organizational mindset and set of behaviors that embrace the principles of the Agile Manifesto—valuing individ...
IT Talent & CultureLearning Culture
Learning Culture is an organizational environment that values, supports, and systematically enables continuous learning and knowle...
IT Talent & CultureGrowth Mindset
Growth Mindset is a psychological concept developed by Carol Dweck describing the belief that abilities and intelligence can be de...
IT Talent & CultureCareer Ladder
A Career Ladder is a formalized progression framework that defines the levels, competencies, responsibilities, and expectations fo...
IT Talent & CultureDual Career Ladder
A Dual Career Ladder is an organizational career framework that provides two parallel advancement tracks—a technical individual co...
IT Talent & CultureStaff Engineer
A Staff Engineer is a senior-level individual contributor role in technology organizations, typically the first level above Senior...
IT Talent & CultureDistinguished Engineer
A Distinguished Engineer is a very senior individual contributor role in technology organizations, typically two or more levels ab...
IT Talent & CulturePrincipal Engineer
A Principal Engineer is a senior individual contributor role, typically between Staff Engineer and Distinguished Engineer, respons...
IT Talent & CultureEngineering Manager
An Engineering Manager is a people leadership role in technology organizations responsible for building, developing, and leading e...
IT Talent & CultureTech Lead
A Tech Lead is a senior engineering role that combines technical leadership with coordination responsibilities, guiding a team's t...
IT Talent & CultureTechnical Program Manager (TPM)
A Technical Program Manager (TPM) is a specialized role that combines deep technical understanding with program management experti...
IT Talent & CultureRemote Work
Remote Work is a work arrangement where technology professionals perform their roles from locations outside a central office—typic...
IT Talent & CultureHybrid Work
Hybrid Work is a flexible work model where employees split their time between remote locations and a central office, combining the...
IT Talent & CultureDistributed Teams
Distributed Teams are technology teams whose members work from multiple geographic locations—potentially spanning cities, countrie...
IT Talent & CultureAsynchronous Communication
Asynchronous Communication is a communication approach where information exchange does not require all participants to be engaged ...
IT Talent & CultureDiversity, Equity, and Inclusion (DEI)
Diversity, Equity, and Inclusion (DEI) in technology encompasses organizational strategies, policies, and practices that build wor...
IT Talent & CultureNeurodiversity
Neurodiversity is the concept that neurological differences—such as autism, ADHD, dyslexia, dyspraxia, and Tourette syndrome—are n...
IT Talent & CultureAllyship
Allyship in technology is the practice of members of majority or privileged groups actively supporting, advocating for, and using ...
IT Talent & CultureEmployee Engagement
Employee Engagement is the emotional commitment and psychological investment that technology professionals have toward their organ...
IT Talent & CultureRetention Risk
Retention Risk is the organizational assessment of the likelihood that key technology professionals will voluntarily leave the org...
IT Talent & CultureExit Interview
An Exit Interview is a structured conversation conducted with a departing employee to understand their reasons for leaving, their ...
IT Talent & CultureQuiet Quitting
Quiet Quitting is a workplace phenomenon where employees disengage from discretionary effort—performing only the minimum requireme...
IT Talent & CultureGreat Resignation
The Great Resignation is the widespread, voluntary workforce departure trend that accelerated during and after the COVID-19 pandem...
IT Talent & CultureNet Present Value (NPV)
Net Present Value (NPV) is a financial metric that calculates the present value of all future cash flows (both inflows and outflow...
Technology EconomicsInternal Rate of Return (IRR)
Internal Rate of Return (IRR) is the discount rate at which the net present value of all cash flows from a technology investment e...
Technology EconomicsPayback Period
Payback Period is the length of time required for a technology investment to generate cumulative benefits that equal or exceed its...
Technology EconomicsCost-Benefit Analysis (CBA)
Cost-Benefit Analysis (CBA) is a systematic framework for evaluating technology investments by identifying, quantifying, and compa...
Technology EconomicsCustomer Acquisition Cost (CAC)
Customer Acquisition Cost (CAC) is the total cost of acquiring a new customer, calculated by dividing total sales and marketing ex...
Technology EconomicsCustomer Lifetime Value (LTV)
Customer Lifetime Value (LTV or CLV) is the projected total revenue a customer will generate throughout their entire relationship ...
Technology EconomicsAnnual Recurring Revenue (ARR)
Annual Recurring Revenue (ARR) is the annualized value of recurring subscription or contract revenue from existing customers, serv...
Technology EconomicsBuild vs. Buy
Build vs. Buy is the strategic decision framework for determining whether to develop a technology capability internally (build) or...
Technology EconomicsMake vs. Buy
Make vs. Buy is a strategic decision framework closely related to build vs. buy but broader in scope, encompassing decisions about...
Technology EconomicsOpen Source vs. Proprietary
Open Source vs. Proprietary is a technology selection framework that evaluates whether to adopt open source software (freely avail...
Technology EconomicsVendor Lock-In
Vendor Lock-In is the situation where an organization becomes dependent on a specific technology vendor's products, services, or p...
Technology EconomicsTechnology Business Management (TBM)
Technology Business Management (TBM) is a framework and discipline for managing the business of technology by providing transparen...
Technology EconomicsValue Stream Management (VSM)
Value Stream Management (VSM) is the practice of visualizing, measuring, and optimizing the end-to-end flow of value from business...
Technology EconomicsServerless Architecture
Serverless Architecture is a cloud computing model where the cloud provider dynamically manages the allocation and provisioning of...
Architecture PatternsLayered Architecture
Layered Architecture (also called N-tier architecture) is a software design pattern that organizes code into horizontal layers wit...
Architecture PatternsHexagonal Architecture (Ports and Adapters)
Hexagonal Architecture (also known as Ports and Adapters) is a software design pattern created by Alistair Cockburn that structure...
Architecture PatternsClean Architecture
Clean Architecture is a software design philosophy proposed by Robert C. Martin (Uncle Bob) that organizes code into concentric la...
Architecture PatternsOnion Architecture
Onion Architecture is a software design pattern proposed by Jeffrey Palermo that builds on hexagonal and clean architecture concep...
Architecture PatternsCQRS (Command Query Responsibility Segregation)
CQRS (Command Query Responsibility Segregation) is an architectural pattern that separates read operations (queries) from write op...
Architecture PatternsSaga Pattern
The Saga Pattern is a distributed transaction management approach that manages data consistency across multiple microservices by b...
Architecture PatternsStrangler Fig Pattern
The Strangler Fig Pattern is a migration strategy for incrementally replacing a legacy system by gradually building new functional...
Architecture PatternsBulkhead Pattern
The Bulkhead Pattern is a resilience design pattern that isolates components and resources into separate pools (bulkheads) so that...
Architecture PatternsRetry Pattern
The Retry Pattern is a resilience design pattern that automatically retries failed operations with configurable strategies (immedi...
Architecture PatternsTimeout Pattern
The Timeout Pattern is a resilience design pattern that sets maximum time limits for operations (API calls, database queries, exte...
Architecture PatternsAmbassador Pattern
The Ambassador Pattern is a structural design pattern that creates a helper service (ambassador) that runs alongside a client serv...
Architecture PatternsAdapter Pattern
The Adapter Pattern is a structural design pattern that allows incompatible interfaces to work together by wrapping one interface ...
Architecture PatternsFacade Pattern
The Facade Pattern is a structural design pattern that provides a simplified, unified interface to a complex subsystem of classes,...
Architecture PatternsRepository Pattern
The Repository Pattern is a design pattern that mediates between the domain model and data mapping layers, providing a collection-...
Architecture PatternsUnit of Work Pattern
The Unit of Work Pattern is a design pattern that maintains a list of objects affected by a business transaction and coordinates t...
Architecture PatternsSpecification Pattern
The Specification Pattern is a design pattern that encapsulates business rules into reusable, combinable objects (specifications) ...
Architecture PatternsObserver Pattern
The Observer Pattern is a behavioral design pattern that defines a one-to-many dependency between objects where a subject (publish...
Architecture PatternsPub/Sub (Publish-Subscribe)
Pub/Sub (Publish-Subscribe) is a messaging pattern where message senders (publishers) categorize messages into topics without know...
Architecture PatternsRequest-Response Pattern
Request-Response is the fundamental communication pattern where a client sends a request to a server and synchronously waits for a...
Architecture PatternsIdempotent Consumer
The Idempotent Consumer pattern ensures that processing a message or request multiple times produces the same result as processing...
Architecture PatternsCompensating Transaction
A Compensating Transaction is an operation that undoes the effects of a previously committed transaction, used in distributed syst...
Architecture PatternsOutbox Pattern
The Outbox Pattern is a reliability pattern that ensures atomicity between database updates and message publishing by writing outg...
Architecture PatternsRegTech
RegTech (Regulatory Technology) is the use of technology—including AI, machine learning, cloud computing, and big data analytics—t...
Industry TechnologyInsurTech
InsurTech (Insurance Technology) is the application of technology innovations to the insurance industry, transforming how insuranc...
Industry TechnologyOpen Banking
Open Banking is a regulatory and technology framework that enables third-party financial service providers to access bank customer...
Industry TechnologyPSD2
PSD2 (Payment Services Directive 2) is a European Union regulation that governs electronic payment services, mandating Strong Cust...
Industry TechnologyHealthTech
HealthTech (Health Technology) is the application of digital technologies to healthcare delivery, including electronic health reco...
Industry TechnologyElectronic Health Record (EHR)
An Electronic Health Record (EHR) is a comprehensive, longitudinal digital record of a patient's health information across all hea...
Industry TechnologyElectronic Medical Record (EMR)
An Electronic Medical Record (EMR) is a digital version of a patient's medical chart within a single healthcare organization, cont...
Industry TechnologyFHIR (Fast Healthcare Interoperability Resources)
FHIR (Fast Healthcare Interoperability Resources) is a modern healthcare data interoperability standard developed by HL7 Internati...
Industry TechnologyHL7
HL7 (Health Level Seven) is a set of international standards for the transfer of clinical and administrative health data between s...
Industry TechnologyDICOM
DICOM (Digital Imaging and Communications in Medicine) is the international standard for medical imaging information, defining for...
Industry TechnologyClinical Decision Support (CDS)
Clinical Decision Support (CDS) is a technology capability integrated into clinical workflows that provides clinicians with patien...
Industry TechnologyTelehealth
Telehealth is the delivery of healthcare services, clinical information, and health education through telecommunications and digit...
Industry TechnologyMedTech
MedTech (Medical Technology) encompasses the medical devices, diagnostic equipment, digital health solutions, and healthcare techn...
Industry TechnologyPropTech
PropTech (Property Technology) is the application of digital technology to the real estate and built environment sectors, includin...
Industry TechnologyLegalTech
LegalTech (Legal Technology) is the application of technology to legal services and operations, including contract management, leg...
Industry TechnologyAgriTech
AgriTech (Agricultural Technology) is the application of technology to agriculture and food production, including precision farmin...
Industry TechnologyGovTech
GovTech (Government Technology) is the use of technology to improve government operations, public service delivery, citizen engage...
Industry TechnologyFedRAMP
FedRAMP (Federal Risk and Authorization Management Program) is a US government-wide program that provides a standardized approach ...
Industry TechnologySmart City
A Smart City is an urban environment that uses IoT sensors, data analytics, AI, and connected infrastructure to optimize city oper...
Industry TechnologySupply Chain Technology
Supply Chain Technology encompasses the digital platforms, systems, and tools used to plan, execute, monitor, and optimize supply ...
Industry TechnologyQubit
A Qubit (quantum bit) is the fundamental unit of quantum information, analogous to a classical bit but capable of existing in a su...
Emerging TechnologyQuantum Supremacy
Quantum Supremacy (also called quantum advantage) is the milestone at which a quantum computer can perform a specific computationa...
Emerging TechnologyBlockchain
Blockchain is a distributed, immutable ledger technology that records transactions across a network of computers in a way that mak...
Emerging TechnologyDistributed Ledger Technology (DLT)
Distributed Ledger Technology (DLT) is a broader category of technology that enables the recording, sharing, and synchronization o...
Emerging TechnologySmart Contract
A Smart Contract is a self-executing program stored on a blockchain or distributed ledger that automatically enforces and executes...
Emerging TechnologyWeb3
Web3 is a conceptual framework for a decentralized internet built on blockchain technology and cryptographic protocols, envisionin...
Emerging TechnologyDecentralized Finance (DeFi)
Decentralized Finance (DeFi) is a financial system built on blockchain technology that provides financial services—lending, borrow...
Emerging TechnologyNon-Fungible Token (NFT)
A Non-Fungible Token (NFT) is a unique, cryptographically secured digital token stored on a blockchain that represents ownership o...
Emerging TechnologyDecentralized Autonomous Organization (DAO)
A Decentralized Autonomous Organization (DAO) is an organization represented by rules encoded as smart contracts on a blockchain, ...
Emerging TechnologyMetaverse
The Metaverse is a concept describing persistent, shared, 3D virtual environments where people interact through digital avatars fo...
Emerging TechnologyAugmented Reality (AR)
Augmented Reality (AR) is a technology that overlays digital information—images, text, 3D models, and interactive elements—onto th...
Emerging TechnologyVirtual Reality (VR)
Virtual Reality (VR) is an immersive technology that creates fully synthetic digital environments experienced through headsets tha...
Emerging TechnologyMixed Reality (MR)
Mixed Reality (MR) is a spectrum of technologies that blend physical and digital worlds, enabling real and virtual objects to coex...
Emerging TechnologySpatial Computing
Spatial Computing is the convergence of physical and digital worlds through technologies that enable computers to understand, inte...
Emerging TechnologyExtended Reality (XR)
Extended Reality (XR) is an umbrella term encompassing all immersive technologies that blend physical and digital worlds—including...
Emerging TechnologyDigital Human
A Digital Human is a realistic, AI-powered virtual representation of a human being—complete with natural language capabilities, fa...
Emerging TechnologySynthetic Media
Synthetic Media is content—including images, video, audio, and text—that is generated or significantly modified using artificial i...
Emerging TechnologyDeepfake
A Deepfake is a specific type of synthetic media that uses deep learning AI to create convincing fake video, audio, or images of r...
Emerging Technology5G
5G is the fifth generation of mobile network technology, delivering dramatically higher speeds (up to 20 Gbps), ultra-low latency ...
Emerging Technology6G
6G is the anticipated sixth generation of mobile network technology, expected to deliver terabit-per-second speeds, sub-microsecon...
Emerging TechnologyEdge AI
Edge AI is the deployment of artificial intelligence models and inference capabilities on edge devices and local servers rather th...
Emerging TechnologyTinyML
TinyML is the field of machine learning applied to ultra-low-power, resource-constrained microcontrollers and embedded systems, en...
Emerging TechnologyNeuromorphic Computing
Neuromorphic Computing is an approach to computer engineering that designs processors and systems inspired by the structure and fu...
Emerging TechnologyBiometrics
Biometrics is the measurement and analysis of unique biological and behavioral characteristics—fingerprints, facial features, iris...
Emerging TechnologyPasskeys
Passkeys are a modern, passwordless authentication standard based on FIDO2/WebAuthn protocols that replace traditional passwords w...
Emerging TechnologyGreen Computing
Green Computing is the practice of designing, manufacturing, using, and disposing of computing systems and devices in environmenta...
Emerging TechnologyCarbon Footprint (IT)
Carbon Footprint (IT) is the total greenhouse gas emissions produced directly and indirectly by an organization's technology opera...
Emerging TechnologyE-Waste
E-Waste (Electronic Waste) is discarded electronic equipment—computers, smartphones, servers, networking equipment, peripherals, a...
Emerging TechnologyCircular Economy (IT)
Circular Economy (IT) applies circular economy principles specifically to technology assets—designing technology products for long...
Emerging TechnologyAutonomous Enterprise
The Autonomous Enterprise is a vision for organizations where AI-driven automation handles the majority of routine business proces...
Emerging TechnologySelf-Healing Systems
Self-Healing Systems are technology architectures and platforms that automatically detect, diagnose, and resolve operational issue...
Emerging TechnologyFeature Flags
Feature Flags (also called feature toggles or feature switches) are a software development technique that allows teams to enable o...
Emerging TechnologyProgressive Delivery
Progressive Delivery is an advanced software release strategy that extends continuous delivery with gradual, controlled rollout of...
Emerging TechnologyCanary Deployment
Canary Deployment is a software release strategy that routes a small percentage of production traffic to a new version of a servic...
Emerging TechnologyBlue-Green Deployment
Blue-Green Deployment is a release strategy that maintains two identical production environments (blue and green), where one serve...
Emerging TechnologyPlatform as a Product
Platform as a Product is an approach to internal technology platform development that treats the platform (developer tools, infras...
Emerging Technology