Glossary
- Aarch64
- ABAC (Attribute-Based Access Control)
- Abandonment Rate
- Abandonware
- Abductive Logic Programming (ALP)
- Abort
- Absolute Address
- Absolute Path
- Abstract Class
- Abstract Data Types (ADTs)
- Abstract Factory Pattern
- Abstraction
- Abstraction Layer
- Abstraction Penalty
- Abstract Syntax Tree (AST)
- A/B Testing
- Accelerated Mobile Pages (AMP)
- Accelerated Processing Unit (APU)
- Accelerationism (e/acc)
- Accelerator Card
- Acceptance Criteria
- Acceptance Sampling
- Acceptance Testing
- Access Control List (ACL)
- Access Control Matrix
- Access Management
- Accessory
- Access Point (AP)
- Access Time
- Accountability
- Accountability Act (HIPAA)
- Account Discovery
- Account Takeover (ATO)
- Accumulator (Processor register)
- Accumulator Register
- Ace (File format)
- ACID Compliance
- ACID properties
- Acid Test
- ACID transactions
- Ack (Acknowledgement code)
- Acoustic Coupler
- Acoustic Modeling
- Actionable intelligence
- Action Recognition
- Action Script
- Activation functions
- Active-Active / Active-Passive Cluster
- Active Cache
- Active Data Warehouse
- Active Directory (AD)
- Active Directory Domain Services (AD DS)
- Active Hub
- Active learning in machine learning
- Active Learning Loop
- Active Matrix
- Active noise cancellation (ANC)
- Active Object Pattern
- Active Partition
- Active Records
- Active Server Pages (ASP)
- Active-State Power Management (ASPM)
- Active Threat Hunting
- ActiveX
- Actor Model
- Ada (Programming language)
- Adapter Pattern
- Adaptive AI Systems
- Adaptive Bitrate (ABR)
- Adaptive Bitrate Streaming (ABS)
- Adaptive Computing
- Adaptive Filtering
- Adaptive Gradient Algorithm
- Adaptive Learning
- Adaptive Maintenance
- Adaptive Resonance Theory (ART)
- Adaptive Routing
- Adaptive Thresholding
- Adder
- Address Bus
- Address Decoding
- Address Generation Unit (AGU)
- Address Mask
- Address Resolution Protocol (ARP)
- Address space
- Address Translation
- Ad-hoc Networking
- Ad-hoc Query
- Ad-injection
- Adjacency List
- Adjacency Matrix
- Administrative Distance
- Ad-muncher
- Adobe AIR
- Adobe PostScript
- Adobe Sensei
- ADO.NET
- ADSL (Asymmetric Digital Subscriber Line)
- Advanced analytics
- Advanced Audio Coding (AAC)
- Advanced Configuration and Power Interface (ACPI)
- Advanced Encryption Standard (AES)
- Advanced Host Controller Interface (AHCI)
- Advanced Persistent Threat (APT)
- Advanced Programmable Interrupt Controller (APIC)
- Advanced Technology Attachment (ATA)
- Adversarial Attack
- Adversarial machine learning
- Adware
- Aerial Cable
- Affiliation Network
- Affine Transformation
- Affinity Diagram
- Affinity Mask
- Agent-Based Modeling (ABM)
- Agent-Based Security
- Agentic AI
- Agentic RAG
- Aggregate Data
- Aggregate Function (SQL)
- Aggregation (OOPS)
- Agile Methodology
- AGI Safety
- AI accelerators
- AI Agent Orchestration
- AI agents
- AI alignment
- AI art
- AI assistants
- AI Bias
- AI browser
- AI Center of Excellence (AI CoE)
- AI chip
- AI Compliance
- AI Content Detector
- AI content moderation
- AI copilots
- AI data labeling
- AI democratization
- AI-Enabled Automation
- AI ethics
- AI Ethics Board
- AI Explainability (XAI)
- AI factory
- AI fairness
- AI firewall
- AI-Generated Content (AIGC)
- AI Governance
- AI Governance Framework
- AI hallucinations
- AI inference
- AI Infrastructure
- AI Life Cycle
- AI Middleware
- AI/ML model validation
- AI Model Governance
- AI Model Hub
- AI Multi-agent Systems
- AI-Native
- AI observability
- AI Observability Platform
- AI Orchestration
- AI Overviews
- AI PC
- AI Persona
- AI Policy
- AI-Powered Analytics
- AI prompt engineer
- AI Prompt Injection
- AI prompts
- AI psychosis
- AI Quality Assurance (AIQA)
- Air-Cooled System
- AI readiness
- AI Red Teaming
- AI red teaming
- AI Regulation
- AI Reputation Management
- Airflow DAG
- Airflow Sensor
- Air-gap / Air-gapped Environment
- AI Risk Assessment
- AI Safety
- AI Sandbox
- AI Security Posture Management (AI-SPM)
- AI Self-Correction
- AI Service Mesh
- AI Simulation
- AI slop
- AI Sovereignty
- AI Sprinkling
- AI steerability
- AI supercomputers
- AI Talent Gap
- AI Tokenization
- AI Trust, Risk and Security Management (AI TRiSM)
- AI watermarking
- AI winter
- AI Workflows
- AJAX (Asynchronous JavaScript and XML)
- Alarm Fatigue
- Alarm Management
- A-law algorithm
- Alerting Threshold
- Algebraic Data Types
- ALGOL (Programming language)
- Algorithm
- Algorithm Audit
- Algorithm Efficiency
- Algorithmic Bias
- Algorithmic Trading
- Algorithmic transparency
- Alias
- Aliasing
- Alignment Problem
- Alignment Scoring
- Alignment Tax
- All-Flash Array
- Allocated Memory
- Allocation Unit
- Allscripts EHR systems
- Alpha-Beta Pruning
- Alpha Channel
- Alpha Compositing
- Alphanumeric
- Alpha-Numeric Code
- Alpha Testing
- Altair (Computer history)
- Alternating Current (AC)
- Alt-text
- ALU (Arithmetic Logic Unit)
- Always-on AI
- Amazon AI
- Amazon Aurora
- Amazon Bedrock
- Amazon DynamoDB
- Amazon Elastic Block Store (EBS)
- Amazon machine learning
- Amazon Rekognition
- Ambient Computing
- Ambient Intelligence (AmI)
- Ambient Light Sensor
- Ambient Occlusion
- Amdahl’s Law
- Amdahl's Law
- American Standard Code for Information Interchange (ASCII)
- Amorphous Silicon
- Amortized Analysis
- Ampere
- Ampere hour (Ah)
- Amplitude Modulation (AM)
- Analog Computing
- Analog Signal Processing
- Analog-to-Digital Conversion
- Analog-to-Digital Converter (ADC)
- Analytical Engine
- Analytical Processing (OLAP)
- Analytics as a Service (AaaS)
- Analytics databases
- Anaplan
- Anchoring Bias
- Anchor Text
- Android Debug Bridge (ADB)
- Android Package (APK)
- Android Runtime (ART)
- ANFIS
- Angular (Framework)
- Animatronics
- Anisotropic Filtering
- Annex (Protocols)
- Annotation (Data)
- Annotation Tool
- Annualized Loss Expectancy (ALE)
- Anomalous Activity
- Anomaly detection
- Anomaly Score
- Anonymization
- Anonymous FTP
- Anonymous Proxy
- ANSI (American National Standards Institute)
- ANSI C
- ANSI SQL
- Answer Engine Optimization (AEO)
- Answer Set Programming (ASP)
- Ant-Colony Optimization
- Anthropic
- Anti-Affinity
- Anti-Aliasing
- Anti-Glare
- Anti-Malware
- Antipattern
- Anti-Phishing
- Anti-Spam
- Anti-Stiction
- Antivirus (AV) Software
- Anycast
- Any-to-Any Connectivity
- Apache Airflow
- Apache Beam
- Apache Cassandra
- Apache Flink
- Apache Hive
- Apache Kafka
- Apache Lucene
- Apache Mahout
- Apache MXNet
- Apache Solr
- Apache Spark
- Aperture
- API Economy
- API endpoints
- API First Design
- API Gateway
- API Management
- API Monetization
- API Rate Limiting
- API Specification
- Appearance Search (AI Surveillance)
- Apple File System (APFS)
- Apple Intelligence
- Apple Silicon
- Applet
- Apple User Enrollment
- Application Binary Interface (ABI)
- Application Container
- Application Firewall (WAF)
- Application Integration
- Application Layer
- Application Layer Gateway (ALG)
- Application Lifecycle Management (ALM)
- Application Logic
- Application Manifest
- Application Package Manager
- Application Performance Monitoring (APM)
- Application Profiling
- Application Programming Interface (API)
- Application Sandboxing
- Application Security (AppSec)
- Application Server
- Application Stack
- Application Virtualization
- Applied AI
- Applied Mathematics
- Approximation Algorithm
- App Store
- App Store Optimization (ASO)
- Arachnid (Web Crawler)
- Arbitrary Code Execution (ACE)
- Architecture-as-a-Service
- Architecture (Computer)
- Archival Storage
- Archive Bit
- Archive Format
- Area Network
- Area Under the Curve (AUC)
- Argument (Programming)
- Arithmetic Logic Unit (ALU)
- ARM Architecture
- ARM Cortex
- ARMv9
- ARPANET
- Array (Data Structure)
- Array Processor
- Arrival Rate
- Artifact (Software)
- Artificial Brain
- Artificial Consciousness
- Artificial general intelligence (AGI)
- Artificial intelligence (AI)
- Artificial intelligence as a service (AIaaS)
- Artificial intelligence of things (AIoT)
- Artificial Life
- Artificial Life (Alife)
- Artificial neural networks (ANNs)
- Artificial neuron
- ASCII
- A-Series (Apple chips)
- Asilomar AI Principles
- ASIMO (Robotics)
- ASISC
- ASLR (Address Space Layout Randomization)
- ASM (Assembler)
- ASN.1 (Abstract Syntax Notation One)
- AS-Path (BGP)
- Aspect-Oriented Programming (AOP)
- Aspect Ratio
- ASP.NET Core
- Assembly Language
- Asset Discovery
- Asset Management
- Asset Tag
- Assignment Operator
- Assisted GPS (A-GPS)
- Assistive technology
- Associated Data
- Association Mapping
- Association Rule Learning
- Association rules
- Associative Array
- Associative Memory
- Assurance Level
- Assured Isolation
- Astable Multivibrator
- Astro (Framework)
- Asymmetric Encryption
- Asymmetric Link
- Asymmetric Multiprocessing (AMP)
- Asynchronous Data
- Asynchronous I/O
- Asynchronous JavaScript
- Asynchronous Programming
- Asynchronous Transfer Mode (ATM)
- ATA over Ethernet (AoE)
- ATAPI
- AT Command Set
- AT Form Factor
- Atlas (Database/AI)
- Atlassian Confluence/Jira
- Atmospheric Noise
- Atomic Clock
- Atomic Commit
- Atomicity (Database)
- Atomic Operation
- Atrophy (Model Atrophy)
- Attack Path Analysis
- Attack Surface
- Attack Vector
- Attention in machine learning
- Attention Mechanism
- Attenuation
- Attributes
- Attributes in computing
- Audio Compression
- Audio Fingerprinting
- Audio Interface
- Audit Log
- Audit Trail
- Augmented analytics
- Augmented Analytics
- Augmented Data Discovery
- Augmented Data Management
- Augmented intelligence
- Augmented Reality (AR)
- Authentication (AuthN)
- Authentication Factor
- Authentication Header (AH)
- Authenticator App
- Authoring Tool
- Authorization (AuthZ)
- Auto-Archiving
- Auto-Associative Memory
- Autoboxing
- Auto-Complete
- Auto-Correction
- Auto-Deployment
- Autodesk
- Auto-encoders
- Auto-Encoders
- Auto-GPT
- Auto-Layout
- Automated Clearing House (ACH)
- Automated Data Discovery
- Automated Driving System (ADS)
- Automated machine learning (AutoML)
- Automated reasoning
- Automated Regression Testing
- Automated Speech Recognition (ASR)
- Automated Testing Framework
- Automatic Call Distributor (ACD)
- Automatic Repeat Request (ARQ)
- Automation Anywhere
- AutoML
- Autonomic Computing
- Autonomous Agents
- Autonomous AI
- Autonomous AI agents
- Autonomous Database
- Autonomous Systems
- Autonomous Vehicle (AV)
- Autoregressive Integrated Moving Average (ARIMA)
- Autoregressive models
- Autoscale Group
- Auto-Scaling
- A/UX (Apple Unix)
- Auxiliary Data
- Auxiliary Memory
- Auxiliary Port
- Availability bias
- Availability (System)
- Availability Zone (AZ)
- Average Bitrate (ABR)
- Average precision
- Average Response Time
- Average Seek Time
- Avro (Data serialization)
- AVX (Advanced Vector Extensions)
- Awareness Training (Cybersecurity)
- AWK (Scripting language)
- AWS Amplify
- AWS CloudFormation
- AWS EC2
- AWS Fargate
- AWS Lambda
- AWS S3
- AWS SageMaker
- Axial Lead
- Axiom
- Azure Data Studio
- Azure DevOps
- Azure Functions
- Backdoor
- Backend
- Backend as a Service (BaaS)
- Backpropagation
- Backup
- Backup and Restore
- Backup as a Service (BaaS)
- Backup Retention Policy
- Backward Compatibility
- Badge
- Bagging
- Bandwidth
- Bandwidth Throttling
- Bank Transfer
- Bare Metal
- Bare Metal Cloud
- Bare-Metal Server
- Baseline
- Baseline Configuration
- Bastion Host
- Batch
- Batch Job
- Batch Learning
- Batch Normalization
- Batch Processing
- Battery Optimization
- Bayesian Inference
- Bayesian Network
- Bayes' Theorem
- Beaconing
- Bear Market
- Behavioral Analytics
- Behavioral Biometrics
- Behavior Analysis
- Benchmark
- Benchmark Dataset
- Benchmarking
- Benchmark Model
- BERT
- Beta Access
- Beta Feature
- Beta Testing
- Beta Version
- BGP Hijacking
- Bias
- Bias (AI Bias)
- Bias Mitigation
- Bias-Variance Tradeoff
- BI Dashboard
- Big Data
- Big Data as a Service (BDaaS)
- Big Data Engineer
- Big Data Management
- BigQuery
- Bigtable
- Binary
- Binary Analysis
- Binary Classification
- Binary Cross Entropy
- Binary Files
- Binary Tree
- Binomial Distribution
- Biometric Authentication
- Biometric Data
- Biometric Login
- Biometric Template
- BIOS
- Biotechnology
- Bit
- Bitcoin
- Bitcoin Address
- Bitcoin Wallet
- Bit Depth
- Bitrate
- Bit Rot
- Bitwise Operation
- Black Box Model
- Black Hat
- Blackhole Routing
- Blacklist
- Blast Radius
- Bloatware
- Blob
- Blob Storage
- Blockchain
- Blockchain Storage
- Block-Level Storage
- Block Reward
- Block Storage
- Block Validation
- Blog
- Blog Platform
- Bloom Filter
- Blue-Green Deployment
- Bluetooth
- Bluetooth Low Energy (BLE)
- BNB
- BNB Chain
- Bookmark
- Boolean Logic
- Boot
- Bootloader
- Bootstrap
- Boot Time
- Bot
- Bot Detection
- Bot Management
- Botnet
- Bottleneck
- Bounce Rate
- Brain-Computer Interface (BCI)
- Branch
- Branching Strategy
- Branch Prediction
- Brand Safety
- Breach
- Bridge
- Broker
- Brontobyte
- Browser
- Browser Cache
- Browser Engine
- Browser Extension
- Browser Fingerprinting
- Browser History
- Browser Isolation
- Browser Rendering
- Brute Force Attack
- Brute Force Protection
- Bucket
- Bucket Policy
- Buffer
- Buffered I/O
- Buffer Overflow
- Bug
- Bug Bounty
- Bug Tracking System
- Build
- Build Artifact
- Build Automation
- Build Pipeline
- Build System
- Bulk Upload
- Bull Market
- Burn
- Business Account
- Business Analytics
- Business Continuity
- Business Continuity Planning (BCP)
- Business Criticality
- Business Email Compromise (BEC)
- Business Intelligence (BI)
- Business Model
- Byte
- Bytecode
- Cable modem
- Caching
- Calibration curve
- Calibration (model)
- Callback function
- Camel case
- Canary analysis
- Canary deployment
- Candidate key
- Capacity management
- Capacity on demand
- Capacity planning
- Capacity reservation
- CapEx (Capital Expenditure)
- Capsule networks
- Captcha
- Cardinality
- Cardinality estimation
- Carrier
- Carrier-grade NAT (CGN)
- Carrier Sense Multiple Access (CSMA)
- Cascading delete
- Cascading Style Sheets (CSS)
- Cassandra
- Casting (type)
- Catalog
- CatBoost
- Categorical variables
- Categorization
- Causal AI
- Causal inference
- Causal language modeling (CLM)
- CDC (Change Data Capture)
- CDN (Content Delivery Network)
- Cellular automata
- Central processing
- Centroid
- Certificate Authority (CA)
- Certificate pinning
- Certificate Revocation List (CRL)
- Certificate Signing Request (CSR)
- Chain of Responsibility pattern
- Chain-of-thought
- Chain-of-thought prompting (CoT)
- Chaos engineering
- Character encoding
- Character-level model
- Checkpoint
- Checksum
- Chipset
- Chosen plaintext attack
- Chunk
- Cipher
- Cipher Block Chaining (CBC)
- Cipher suite
- Ciphertext
- Circuit breaker pattern
- Circuit switching
- Circular buffer
- Circular dependency
- CISC architecture
- Class activation mapping (CAM)
- Classifier
- Class imbalance
- Classless routing
- Class (OOP)
- Class weights
- Clean code
- ClickHouse
- Clickstream data
- Client
- Client-server architecture
- CLIP (Contrastive Language-Image Pre-training)
- Clock cycle
- Cloud Access Security Broker (CASB)
- Cloud AI
- Cloud audit
- Cloud automation
- Cloud backup
- Cloud broker
- Cloud bursting
- Cloud computing
- Cloud cost optimization
- Cloud database
- Cloud data warehouse
- Cloud elasticity
- Cloud federation
- Cloud governance
- Cloud migration
- Cloud native
- Cloud orchestration
- Cloud portability
- Cloud provisioning
- Cloud scalability
- Cloud security
- Cloud service provider (CSP)
- Cloud SLA
- Cloud storage
- Cloud storage API
- Cluster
- Cluster analysis
- Cluster autoscaling
- Clustered database
- Clustering algorithms
- Clustering (machine learning)
- CMOS
- Codec
- Code coverage
- Code deployment
- Code injection
- Code interpreter
- Code obfuscation
- Code refactoring
- Code repository
- Code review
- Code signing
- Code smell
- Cognitive automation
- Cognitive computing
- Cognitive search
- Cold boot attack
- Cold data
- Cold start problem
- Cold start (serverless)
- Collation
- Collection (data structure)
- Collision detection
- Collision domain
- Column store
- Columnstore index
- Command and Control (C2)
- Command injection
- Command-line interface (CLI)
- Commit
- Commit log
- Common Criteria
- Common Table Expression (CTE)
- Common Vulnerabilities and Exposures (CVE)
- Common Weakness Enumeration (CWE)
- Communication protocol
- Communications security (COMSEC)
- Compilation
- Compiler optimization
- Compliance as Code
- Component-based architecture
- Composable analytics
- Composite key
- Compound index
- Compression
- Computational complexity
- Computational graph
- Compute instance
- Compute node
- Concurrency
- Concurrency control
- Concurrent programming
- Conditional GANs (cGANs)
- Conditional probability
- Conditional random field (CRF)
- Configuration
- Connectionless protocol
- Connection-oriented protocol
- Connection pooling
- Consistency level
- Consistency models
- Constraint satisfaction
- Containers
- Content addressable storage (CAS)
- Content delivery
- Content personalization
- Context embedding
- Contextual embeddings
- Context window
- Context window (LLMs)
- Contrastive learning
- Control flow
- Control plane
- Convergence
- Convolutional neural networks (CNNs)
- Cookie
- Correlation analysis
- Cosine similarity
- Cost function
- CouchDB
- CPU cache
- CPU (Central Processing Unit)
- Crash recovery
- Credential stuffing
- Critical section
- Cross-attention
- Cross-compilation
- Cross-domain learning
- Cross-entropy
- Cross-entropy loss
- Cross-modal learning
- Cross-platform
- Cross-validation
- CRUD
- Cryptanalysis
- Crypto-agility
- Cryptographic hash function
- Cryptography
- Cryptojacking
- CSMA/CA
- CSMA/CD
- Cursor
- Custom exception
- Cybersecurity
- Cybersecurity framework
- Cybersecurity mesh
- Cyber threat intelligence (CTI)
- Cyclic Redundancy Check (CRC)
- Cylinder (disk storage)