News
AI
Energy
Geoengineering
SaaS
Security
Semiconductors
Reviews
Glossary
Archives
Menu
News
AI
Energy
Geoengineering
SaaS
Security
Semiconductors
Reviews
Glossary
Archives
Search
Close this search box.
News
AI
Energy
Geoengineering
SaaS
Security
Semiconductors
Reviews
Glossary
Archives
News
AI
Energy
Geoengineering
SaaS
Security
Semiconductors
Reviews
Glossary
Archives
Search
Menu
News
AI
Energy
Geoengineering
SaaS
Security
Semiconductors
Reviews
Glossary
Archives
All Terms (A-Z) - DevX Technology Glossary
Abandonment
Abnormal End
Abstract Class
Abstract IL
Accelerated Graphics Port
Accelerator Board
Accelerometer
Access Control List (Microsoft)
Access Modifiers
ACD Canvas
Active Component
Active Reconnaissance
Active-Matrix Liquid Crystal Display
ActiveX Data Object.NET
ActiveX Data Objects
Ad Hoc Polymorphism
Adaptive Software
Add/Drop Multiplexer
Address Bus
Address Resolution Protocol Spoofing
Adobe Acrobat
Advanced Business Application Programming: Definition, Examples
Advertising: Definition, Examples
Adware
Affiliate Agreement
Affiliate Reporting Service
Agile Software Development: Definition, Examples
Air Cooling
Algorithm
All-In-One Printer
Alpha Test
Ambient Temperature
AMD Virtualization
Analog-to-Digital Converter
Android App
Android Cell Phone
Android Debug Bridge: Definition, Examples
Android Eclair
Android G1
Android Gingerbread
Android Market
Android Operating System
Android OS: Definition, Examples
Android Platform: Definition, Examples
Android SDK
Android: Definition, Examples
Anisotropic Filtering
Annual Change Traffic
Anonymizer
Anonymous (Computing)
Anonymous Login
Anonymous Post
Answer-Only Modem
Anti-Static Mat
Anti-Virus Software
Apache Hadoop
Application Lifecycle Management: Definition, Examples
Application Portfolio
Application Programming Interface
Application Programming Model
Application Software
Application-Specific Integrated Circuit
Arithmetic Logic Unit
Artificial Intelligence
Artificial Neural Network
ASP.NET
Aspect-Oriented Programming: Definition, Examples
Astronomical Markup Language: Definition, Examples
Asymmetric Digital Subscriber Line
Asynchronous Messaging
Asynchronous Transmission
Atom
Atomicity Consistency Isolation Durability: Definition, Examples
Authentication Authorization and Accounting: Definition, Examples
Authentication: Definition, Examples
Authorized Education Reseller
Authorized Programming Analysis Report
Auto-Answer
AutoCAD
Autodesk Animator
Autodesk Inventor
Automated Merchandising
Automatic Backup System
Automatic Document Feeder
Automatic Fall-over
Automatic Identification and Data Capture
Automatic Location Identification
Autonomic Computing
Availability
Average Hold Time
Back Office Application
Back-End System
Backplane
Backside Bus
Backsourcing
Backup
Backup on the Web
Backward Chaining
Backward Compatible
Bad Sector
Bait Advertising
Bake-Off
Balanced Technology Extended
Ball Grid Array
Bandwidth Allocation Protocol
Bandwidth Shaping
Banner Rotator
Barebones Computer
Base Class
Base Station
Basic Input/Output System: Definition, Examples
Batch File
Batch Processing
Bayesian Filter
Bayonet Neill-Concelman Connector
Bernoulli Disk Drive
Best Practice: Definition, Examples
Big Iron
Big Red Switch
Bilinear Filtering
Binary Digit
Binary Number System: Definition, Examples
Binary Runtime Environment for Wireless: Definition, Examples
BitComet
Bits Per Second
Bitwise Operator
BizTalk Server
Black Friday
Black Hole
BlackBerry: Definition, Examples
Bleeding Edge
Bloatware
Blogosphere
Blowfish
Blu-Ray Disk
Boilerplate
Bonanza
Boolean Logical Operator
Boot Disk
Bootstrap
Bootstrap Protocol
Brand Advocate
Breadcrumb Navigation
Breakpoint
BREW Applications: Definition, Examples
Bridge Router
Bridging: Definition, Examples
British Thermal Unit
Broadband
Broadband Global Area Network
Broadcast Storm: Definition, Examples
Browser Hijacker
Brush
Bubble Sort
Buffer Overflow
Bug Tracking
Bug: Definition, Examples
Build Tool
Bump Mapping
Burndown Chart
Business Activity Monitoring
Business Application Programming Interface
Business Blog
Business Components
Business Continuity Plan
Business Event Management
Business Intelligence
Business Intelligence Software
Business Object
Business Process Execution Language
Business Process Extraction Language For Web Services
Business Process Management: Definition, Examples
Business Process Modeling Language
Business Rule Engine
Business Service Management
Business-to-Business
Business-to-Consumer
Business-to-Government
Bypass Airflow
Bytecode
C# (C Sharp)
Cabinet File
Cable Modem
Call Detail Record
CAN-SPAM Act
Candidate Key: Definition, Examples
Card Not Present
Cascading Style Sheet
Cathode Ray Tube
Cell Relay
Cellular Phone
Cellular Phone Hacking
Centers for Medicare and Medicaid Services
Certification Authority
Certification Commission for Healthcare Information Technology
Certified eBay Solutions Provider
Challenge Handshake Authentication Protocol
Charles Babbage
Chatbot
Chernobyl Virus
Chinese Wall
Chuck Norris Facts
Chunk
Class Library
Clean Room Design
Click-Through Rate
Client-Server Model
Clipboard
Clonezilla
Cloud Capitalist
Cloud Computing: Definition, Examples
Cluster (Disk)
Cluster (Servers)
Co-branding
Co-marketing
Codd’s Rules
Code Access Security
Code Division Multiple Access
Code Division Multiple Access 2000
Cold Standby: Definition, Examples
Collapsed Backbone
Collision Detection
Comma-Separated Values File: Definition, Examples
Commerce Services Provider
Commit: Definition, Examples
Common Address Redundancy Protocol
Common Business Oriented Language
Common Language Infrastructure
Common Management Information Protocol: Definition, Examples
Communication Software
Compact HTML
Comparison Shopping Engine
Completely Automated Public Turing Test To Tell Computers And Humans Apart
Computational Grid
Computer Aided Three-Dimensional Interactive Application
Computer Cluster
Computer Graphics Metafile
Computer Port: Definition, Examples
COMPUter SECurity
Computer Security Incident Response Team
Computer Telephony Integration
Computer-Aided Manufacturing
Configuration Management
Coning
Connection Admission Control
Container
Content Filtering
Content Management System
Content Spoofing
Contextual Menu
Conversion Marketing
Cookie
CoolTalk
Core Router
Cost Management
Cost Per Action
Cost Per Click
Creeping Featuritis
Critical Security Parameter
Cross Site Scripting: Definition, Examples
Cupcake: Definition, Examples
Customer Data Integration
Customer Premises Equipment Device
Customer Relationship Management: Definition, Examples
Cyberloafing
Cyberpunk
Cybersecurity
Cybersquatting
Cyberthreat
Cyberveillance
Dalvik Debug Monitor Service: Definition, Examples
Dalvik: Definition, Examples
Data
Data Analytics
Data Binding
Data Center Container
Data De-Identification
Data Definition Language
Data Encapsulation
Data Encryption Standard
Data Link Layer
Data Manipulation Language
Data Mining
Data Mirroring
Data Modeling
Data Modeling: Definition, Examples
Data Obfuscation
Data Over Cable Service Interface Specification
Data Perturbation
Data Profiling
Data Transformation Services
Data Warehouse
Database Column: Definition, Examples
Database Encryption and Decryption
Database Engine Tuning Advisor
Database Management System
Database Object
Database Report: Definition, Examples
Database Row: Definition, Examples
Database Trigger: Definition, Examples
Datagram
DataStage Parallel Extender
DB-25
Debugger
Dedicated Access Line
Default Values – Database
Default-Free Zone
Demultiplex
Denial-of-Service Attack
Dense Wavelength Division Multiplexing
Deobfuscate
Design Pattern: Definition, Examples
Design Reuse
Desktop Virtualization
Development Data Platform
Development Environment
Device Manager
Dial-on-Demand Routing
Diffusing Update Algorithm
Digital Rights
Digital Simultaneous Voice and Data
Digital Subscriber Line
Digital Versatile Disc-Read Only Memory
Digital Versatile Disk Rewritable: Definition, Examples
Digital Video Broadcasting – Cable
Digital Visual Interface
Direct Deposit
Direct Memory Access
Direct Payment
Direct-Connect Modem
Disaster Recovery Plan
Disk Image
Distributed Computing System: Definition, Examples
Distributed Relational Database Architecture
Double Data Rate
Download
Drawing Exchange Format
Dual In-line Memory Module
Dual Inline Package Switch
Dual-Ring Topology
Dynamic Random Access Memory
E-Commerce Advisor
E-commerce Hosting
E-commerce Remarketing
E-commerce Trustmark
E-Cycle
eBay
eBay
Eclipse Foundation
Eclipse Platform
Edgar F. Codd
Edge Router
Edge Switch
Egosurfing
Electrically Programmable Logic Device
Electronic Audit Trail
Electronic Book
Electronic Business XML
Electronic Data Interchange
Electronic Discovery
Electronic Health Record
Electronic Mail
Electronic Medical Record
Electronic Medication Administration Records
Electronic Patient Release of Information Form
Electronic Product Environmental Assessment Tool
Electronic Retailing
Electronic Serial Number
Electronic Signatures in Global National Commerce Act
Electronic Signatures in Global National Commerce Act
Electronic Storefront
Electronic Waste
Electrophoretic Ink
Eligible Provider: Definition, Examples
Elk Cloner
Email Appending
Email Encryption
Email Harvesting
Email Spoofing
Email Spoofing
Emboss Bump Mapping
Emergency Responder Electronic Health Record
Emergent Gameplay
Encoding
Encrypting File System
Encryption
End-to-End Test
End-to-End Test
Endpoint Identifier
Endpoint Security
Energy Star
Engine
Enhanced Data GSM Environment: Definition, Examples
Enhanced Interior Gateway Routing Protocol
Enhanced Interior Gateway Routing Protocol
Enhanced Messaging Service
Enhancement
Enterprise Application Security
Enterprise Application Security
Enterprise Development Tools
Enterprise Development Tools
Enterprise Feedback Management: Definition, Examples
Enterprise Messaging System
Enterprise Portal Software: Definition, Examples
Enterprise Private Network
Enterprise Relationship Management: Definition, Examples
Enterprise Report Management
Enterprise Report Management
Enterprise Resource Planning: Definition, Examples
Enterprise Software
Enterprise Systems Connection
Entity Data Model
Environment-Mapped Bump Mapping
Erlang Programming Language: Definition, Examples
EtherLoop
Ethernet Networking Interface
Event
Event Router
Event-Driven Architecture
Evolution Data Only
Evolution-Data Optimized
Executable
Execute Disable Bit
Exokernel
Expanded Memory Specification
Expanded Memory Specification
Expansion Card: Definition, Examples
Expansion Slot
ExpressCard
Extended Data Out
Extended Data Out
Extended Service Set
Extended System Configuration Data
Extensible Authentication Protocol
Extensible Business Reporting Language
Extensible Markup Language: Definition, Examples
Extensible Media Commerce Language
External Modem
External Serial Advanced Technology Attachment
Extreme Programming: Definition, Examples
Eye Path
Fabric Port
Facebook
Facebook f8
Facility Management
Facsimile Machine
Fail
Failover
Fair Use
False Positive
False Rejection
Fast Common Gateway Interface
FastIP
Fat Client
Fatal Exception
Fault Management
Fault Tolerance
Fax Modem
Fax Over Internet Protocol
Feature Group D
Federal Desktop Core Configuration: Definition, Examples
Federal Health Architecture: Definition, Examples
Federal Information Security Management Act
Federal Information Technology Strategic Plan of 2011-2015
Federal Internet Exchange
Federated Identity Management
Federated Network Identity
Federation Against Software Theft
Femtocell
Fiber Channel Arbitrated Loop
Fiber Channel Over Ethernet: Definition, Examples
Fiber Channel over Internet Protocol
Fiber to the Curb
Fighting Game
File Allocation Table 32
File Area Network
File Exchange Protocol
File Sharing
File Transfer Protocol
File Virtualization: Definition, Examples
FileMaker Pro
Fill Rate
Financial Information Exchange
Financial Information System
Financial Malware
Fire Fighting
Fire Walking
Firefox Sync
Firesheep
Firewall
FireWire
Firmware: Definition, Examples
First Come, First Served
First Normal Form
First Person Shooter
Fixed Routing
Flag
Flash Memory
Flash Mob
Flat Database
Flat File Database
Flight Mode
Floating-Point Unit
Flooding
Floppy Disk Drive
Flow Chart
Flow Control: Definition, Examples
Flowchart
Follow Fatigue
Foo
Food and Drug Administration
Foreign Key
Form
Fourth Generation Wireless
Frame Check Sequence
Frames Per Second
Frankenpine
Fraud over Internet Protocol
Free and Open-Source Software
Free Software: Definition, Examples
Freedom of Information
Freenet
Frequency Division Duplex
Friend Assembly
Front and Back Ends: Definition, Examples
Frontside Bus
FTP Trojan
Functional Programming: Definition, Examples
Functional Specification
Fuzzy Logic
Fuzzy Matching
G.711
G.721
G.722
G.723
G.726
G.727
G.728
G.729
G.7xx
G3
Game Balance
Gamification
Gaming
Gammima
Garbage Collection: Definition, Examples
Garbage In, Garbage Out: Definition, Examples
Gatekeeper Transaction Message Protocol
Gateway: Definition, Examples
Generic Access Network
Generic Port
Generics
Geoport
Geosynchronous Satellite
Geotagging: Definition, Examples
Ghost Site
Ghostball Virus
Gigabit Ethernet
Gigabit: Definition, Examples
Gigabyte
Gigahertz
Gingerbread
GLib
Global Area Network
Global Assembly Cache
Global Internet Exchange
Global System for Mobile Communications: Definition, Examples
Global Threat Bot
Global-Regular-Expression-Print
Globalization Management System
Globally Unique Identifier
GNU
GNU General Public License
GNU GRUB
GNU Project
Gnutella
Gold Code
Google Apps
Google Bomb
Google Bookmarks
Google Data Liberation Front: Definition, Examples
Google Docs: Definition, Examples
Google File System
Google Health
Google Phone
Google Takeout
Google Talk
Google Toolbar
Google Wallet
Googlewashing
Gordon Moore
Governance Plan
GPRS Tunneling Protocols
Graffiti
Gramm-Leach-Bliley Act
Graphical User Interface
Graphics Device Interface +
Graphics Processing Unit
Gray Market
Green Computing
Green Personal Computer
Greenfield Deployment
Greenwashing
Grid Computing: Definition, Examples
Griefer
Grinding
Groovy
Group 3 Protocols: Definition, Examples
Group 4 Protocols
Groupware
Guest Virtual Machine
Hack
Hacker
Hackerazzi
Hacking
Hacking Tool
Hacktivism
Hairpin
Hammering
Hamming Code
Hampster Dance
Handheld Device Markup Language
Handoff
Handover
Haptic
Hard Disk Drive
Hard Disk Loading
Hard Drive Encryption
Hardening
Hardware Abstraction Layer
Hardware Configuration
Hardware Identification
Hardware Management Console: Definition, Examples
Hardware Virtual Private Network
Hardware Virtualization
Hash Function
Hashing
Hashtag
Health Care Data Encryption: Definition, Examples
Health Information Organization: Definition, Examples
Health Insurance Portability and Accountability Act Privacy Rule
Health Level Seven Clinical Document Architecture
Heap
Heat Sink
Heavy Internet Use
Hello World
Help Desk
Help System
Hierarchical Storage Management
High-Energy Radio Frequency Weapon: Definition, Examples
High-Gain Antenna
High-Level Assembler
High-Level Data Link Control
High-Performance Computing (HPC)
High-Performance File System
High-Ping Bastard
High-Speed Downlink Packet Access: Definition, Examples
High-Speed Packet Access
High-Speed Uplink Packet Access: Definition, Examples
Hold Down Timer
Home Audio Video Interoperability
HomePNA
HoneyMonkey
Honeynet: Definition, Examples
Honeypot
Hop: Definition, Examples
Horsemanning
Horsemanning
Host Identity Protocol
Host Operating System
Host-Based Modem
Hot Fix
Hot Plugging
Hot Potato Routing
Hot Server
Hot Site
Hot Spare
Hot Standby
Hot Standby Router Protocol
Hotspot
HTM
HTML::Mason
HTML5: Definition, Examples
HTTP Proxy
Hub (Computing)
Hub (Networking)
Human Interface Device
Human-Computer Interaction
Hundred Dollar Laptop
Hungarian Notation
Hybrid Encryption
Hybrid Fiber Coaxial
Hybrid Kernel
Hybrid Routing Protocol
Hyperlink
Hypertext Markup Language
Hypertext Markup Language Comment
Hypertext Transfer Protocol
Hyperthreading
HyperTransport Bus
Hypervisor
I/O Virtualization
IEC Connector
IEEE 1394 Interface
iJack
iMac
Image Scanner
In-Betweening
Inbound Filters
Incentive Payment
Incumbent Local Exchange Carrier
Independent Verification and Validation
InfiniBand
Informatica PowerCenter
Information Analyzer
Information and Content Exchange
Information Assurance: Definition, Examples
Information Hiding
Information Processing
Information Security
Information Security Policy
Information Sharing
Information System
Information Systems Security
Information Systems Security Engineer
Infrastructure as a Service
Ingress Traffic
Inheritance
Inline Frame
Input/Output: Definition, Examples
Instant Message
Instantiate
Integer Overflow
Integrated Development Environment
Integrated Development Environment – .NET
Intellectual Property
Intelligent Device
Intentional Programming: Definition, Examples
Intentional Software: Definition, Examples
Interactive Data Language
Interactive Voice Response
Interactivity: Definition, Examples
Interior Gateway Protocol
Interior Gateway Routing Protocol
Intermediate Distribution Frame
Intermediate System-to-Intermediate System Protocol
Internal Border Gateway Protocol
Internal Modem
International Standard Works Code
Internet Addiction
Internet Assigned Numbers Authority: Definition, Examples
Internet Connection Firewall
Internet Content Adaptation Protocol
Internet Explorer
Internet Meme
Internet Protocol
Internet Protocol Address
Internet Protocol Security
Internet Protocol Switching
Internet Protocol Television
Internet Protocol Version 4 Packet Header
Internet Protocol Version 6
Internet Security and Acceleration Server
Internet Small Computer Systems Interface
Internet Software Piracy
Internetworking
Internetworking Device: Definition, Examples
Interrupt Request
Intranet: Definition, Examples
Intrusion Detection System
Inverse Multiplexer: Definition, Examples
IP Spoofing
iPad
iPhone: Definition, Examples
IRIX
IronRuby
IT Certification
IT Healthcare
Iteration
Iterative and Incremental Development
ITunes
J#
J#
J2EE Application Deployer and Administrator
J2EE Client
J2EE Product Provider
Jabber
Jailbreak
Jailbreak App
Jammer
Jank
JApplet: Definition, Examples
Java
Java 2 Platform Micro Edition: Definition, Examples
Java 2 Platform, Enterprise Edition (J2EE) Components
Java 2 Platform, Enterprise Edition: Definition, Examples
Java Access Control List
Java API for XML Web Services
Java API For XML-based RPC
Java Applet
Java Archive
Java Bytecode
Java Card
Java Data Objects
Java Database Connectivity
Java Database Connectivity Architecture
Java Database Connectivity Architecture
Java Database Connectivity Connector
Java Database Connectivity Interface
Java Development Kit: Definition, Examples
Java Foundation Classes
Java Foundation Classes
Java HyperText Markup Language
Java Management Extensions
Java ME WTK
Java Media Framework
Java Media Framework
Java Message Service
Java Object
Java Platform Micro Edition
Java Platform Micro Edition
Java Remote Method Invocation
Java Remote Method Invocation
Java Runtime Environment: Definition, Examples
Java Servlet
Java Swing
Java Virtual Machine: Definition, Examples
Java Zero Day
JavaBeans
Javadoc
JavaScript Object Notation: Definition, Examples
JavaScript: Definition, Examples
JavaServer Pages
JavaStation
JBoss Application Server
JenniCam
Jerusalem Virus
JFlow
Jigsaw
Jini
Jitter (VoIP)
Jitter (VoIP)
Jitter Buster
Jitter Test
JK Flip-Flop
Job Control Language
Job Scheduling
Job: Definition, Examples
JobTracker
Joe Job
John Draper
John von Neumann
John von Neumann
Join
Joint Application Development
Joint Photographic Experts Group
Joli OS
Joseph Carl Robnett Licklider
Joystick
jQuery
JScript: Definition, Examples
JSON Query Language
Jukex
Jumper
Just A Bunch Of Disks
Just Enough Operating System
Just-In-Time
JXTA
JXTA
Jython
K Desktop Environment
K Virtual Machine: Definition, Examples
Kademlia: Definition, Examples
Kaizen
Kanban: Definition, Examples
Karnaugh Map
Katmai
Katmai (Pentium III Core)
Keep It Simple Stupid Principle
Kelvir Worm
Ken’s Law
Kerberos
Kerfless Wafering
Kernel-Based Virtual Machine
Kernel: Definition, Examples
Kerr Effect
Kevin Mitnick
Key
Key Distribution Center
Key Escrow
Key Fob
Key Generator
Key Length
Key Lime Pie
Key Management
Key Performance Indicators: Definition, Examples
Key Process Input Variable
Key Process Output Variable
Key Telephone System
Key Value Store
Key-Value Pair
Keyboard
Keyboard Buffer
Keyboard Macro
Keyboard Shortcut
Keyboard Wedge: Definition, Examples
Keyboard, Video, Mouse
Keycap
Keyhole Mark-up Language
Keylogger
Keypad: Definition, Examples
Keypunch
Keystone Jack
Keystroke
Keystroke Logger
Keyword
Keyword Stuffing
Keyword-Driven Testing
Kibibyte
KidsRuby
Kill Switch
Killer Application
Kilobit
Kilobits Per Second
Kilobyte: Definition, Examples
Kilowatt-Hour
Kindle
Kindle Fire
Kinect
Kiosk Browser
Kirchhoff’s Laws
Kludge
Knowledge Base: Definition, Examples
Knowledge Discovery in Databases: Definition, Examples
Knowledge Engineer
Knowledge Management
Knowledge Management System
Knowledge-Based Authentication
Knowledge-Based System
Knowledge, Skills and Abilities
Knowledgebase Software
KnowledgeTree
Konrad Zuse
Korea Scale
Kriz Virus
Kryder’s Law
Kurtz-Above Band
Kurtz-Under Band
Kyoto Cooling
La Fonera
Lag
Lambda Calculus
LAN Switching
LAN Switching
LANDesk Client Manager
Landscape
Laptop: Definition, Examples
Last Mile Technology
Latency: Definition, Examples
LaTeX
Layer
Layer 2 Tunneling Protocol
Layer Two Forwarding
Lazy Loading
Lean Programming: Definition, Examples
Leech
Legacy Code: Definition, Examples
Legacy Network
Legacy System
Leisure Diving
Level Design
Level Design
Level of Detail
License
Licensing Collective
Lifecasting
Light Intensity Modulated Direct Overwrite
Light Intensity Modulated Direct Overwrite
Lights Out Data Center
Lightweight Directory Access Protocol
Likejacking
LimeWire
Line of Sight
Line of Sight
Linear Pulse Code Modulation
Linear Tape Open
Linear Tape Open Ultrium
Link Aggregation
Link Control Protocol
Link Farming
Linkbait
Linkerati
Linux Mobile Foundation
Linux Mobile Foundation
Linux, Apache, MySQL and Perl/PHP/Python: Definition, Examples
Linux, Apache, MySQL and PHP: Definition, Examples
Linux: Definition, Examples
Liquid Cooling System
Lithium-Ion Battery
Live Support