0-9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z    


0-9
[Back to Top]
3PL (Third-Party Logistics)
Third-party logistics, typically referred to by the acronym 3PL, is the process a company uses to outsource logistics services, including warehousing, inventory management, distribution, and shipping products to customers, distributors, or retailers. 3PL companies help businesses to automate all the functions related to the logistics of supply chain management. With the growth of e-commerce, the relevance of outsourcing logistics services to third-party companies has increased. WHO USES 3PL? Businesses of all sizes depend on third-party logistics for moving products from the manufacturing facility to the point of sale. The e-commerce sector relies on 3PL companies to provide worldwide warehousing, inventory control, shipping, and product return services. According to a study conducted by Research and Markets, the estimated value of the global market has reached $ 1 trillion and is expected to reach $1.75 trillion by 2026. The global 3PL market is also expecting potential growth in the near future with the development of technologies like Artificial Intelligence (AI), and the Internet of Things (IoT). HOW DOES 3PL WORK? 3PL companies provide solutions for businesses’ most tedious and time-consuming workloads. Here’s how 3PL companies work: Warehousing: The primary function of a 3PL service provider is to offer safe storage space to keep products from the time they leave the manufacturing facility until the distribution to their point of sale happens. Transportation: Third-party logistics companies facilitate transportation of goods from the factory to the point of sale. They coordinate transnational and transocean freight by air, rail, and road, as well as transporting products from national points of entry to distribution warehouses and then on to sellers or buyers. Distribution: Distribution logistics entails the storing and shipping of the products from decentralized or regional distribution points to retailer/wholesale bricks & mortar locations. Some of the significant functions of distribution logistics include product kitting, order picking, parcel and freight shipping, and more. Reverse logistics: Most 3PL service providers offer reverse logistics that help businesses to make the return services more simple as third-party logistics companies take care of the process of return, and restock the products, and refund the customers.

A
[Back to Top]
ABIS - Automated Biometric Identification System
ABIS, the Automated Biometric Identification System (IDENT) is a Department of Homeland Security (DHS) managed system that is used for the storing and processing of biometric and biographic information for DHS national security, law enforcement, immigration, intelligence, and other DHS functions.

Ad Targeting
(Ad Targeting) In online advertising, ad targeting refers to the practice of advertisers attempting to reach (target) a specific desired consumer audience.

Ad-Hoc Mode
(Ad-Hoc Mode) An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an access point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.

Adaptive Learning
An educational process where the teaching methods and materials adapt to each students’ pace and level. Technology is often the vehicle for delivering this process, since software can change exercises, questions, and content easily based on previous answers and actions by a student.

Added Value
(Added Value) The value that is added to any product or service as the result of a particular process. For example, VARs add value to systems through the loading of applications or proprietary software onto computers and ASPs add value to the services they provide.

Administrative Domain
(Administrative Domain) A collection of networks, computers, and databases under a common administration, such as an enterprises intranet. The devices that operate in a singular administrative domain share common security features that are administered across the network and the entities that are associated with it.

ADS
(ADS) (pronounced as separate letters) Short for alternate data stream, a function of Microsofts NTFS file system in which files can be embedded in other files and are invisible to the user through Windows Explorer (i.e., the ADS does not affect the size, function or display of the main file the ADS is attached to). While ADS files (which are well known throughout the hacker community) can be used maliciously by an attacker wishing to plant an executable file into another file without it being detected, ADS also is used legitimately by programmers.

AdSense - Google AdSense
(AdSense - Google AdSense) is an advertising placement service by Google. The program is designed for website publishers who want to display targeted text, video or image advertisements on website pages and earn money when site visitors view or click the ads. The advertisements are controlled and managed by Google and Web publishers simply need to create a free AdSense account and copy and paste provided code to display the ads. Revenue using AdSense is generated on a per-click or per-impression basis. It is free to become a verified website publisher in the Google AdSense program.

AdWords - Google AdWords
(AdWords - Google AdWords) is an advertising service by Google for businesses wanting to display ads on Google and its advertising network. The AdWords program enables businesses to set a budget for advertising and only pay when people click the ads. The ad service is largely focused on keywords. Businesses that use AdWords can create relevant ads using keywords that people who search the Web using the Google search engine would use. The keyword, when searched for triggers your ad to be shown. AdWords at the top ads that appear under the heading "Sponsored Links" found on the right-hand side or above Google search results. If your AdWords ad is clicked on, Google search users are then directed to your website. When choosing keywords for your AdWords campaigns different matching options are available. The two main keyword match options include the following: Broad Match: This reaches the most users by showing your ad whenever your keyword is searched for. Negative Match: This option prevents your ad from showing when a word or phrase you specify is searched for. Phrase Match: Your ad is shown for searches that match the exact phrase. Exact Match: Your ad is shown for searches that match the exact phrase exclusively.

API (Application Program Interface)
An application program interface (API) is a set of routines, protocols, and tools for building software applications. Basically, an API specifies how software components should interact. Additionally, APIs are used when programming graphical user interface (GUI) components. A good API makes it easier to develop a program by providing all the building blocks. A programmer then puts the blocks together.

APPLICATION SERVER
Application servers typically sit behind web servers, offering dynamic content (like account logins and cloud-based office suites) upon request. They use scripting languages, like those mentioned above, to create dynamic web page content. Those scripts can request data from databases or third parties and then return content to the web server, which formulates an HTML response for the end user. Application servers interface with multiple protocols: HTTP and HTTPS, but also Transport Layer Security (TLS). This is the most recent secure standard of confirming the authenticity of a web certificate, surpassing SSL. Application servers use multithreading—the ability to communicate with multiple clients and serve multiple requests simultaneously—to more efficiently answer requests.

Assistive Technology
Any piece of technology, hardware or software, that helps a person with disabilities perform everyday tasks that might otherwise be difficult or impossible. This can include everything from wheelchairs to screen readers to text telephones.

Augmentative & Alternative Communication (AAC)
Any communication method that helps individuals with speech and language impairments to communicate. AAC technologies are a sub-category of assistive technologies and include text-to-speech communicators and picture communicators.

Authentication
The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.

auto-answer modem
An auto-answer modem enables your computer to receive calls in your absence. This is only necessary if you are offering some type of computer service that people can call in to use. data compression :Some mo

B
[Back to Top]
Bandwidth
WHAT IS BANDWIDTH? In computer networking, bandwidth refers to the measurement of data that is transferred between two points within a set amount of time. Typically expressed in bits, megabits, or gigabits per second, bandwidth is shared among devices connected to the same network; this means activities like streaming video content or downloading large files can use a large amount of bandwidth and slow down connections for other devices on the network. Bandwidth can also pertain to some data-transferring devices themselves, as in the case of I/O devices. For example, a fast disk drive can be hampered by a bus with a low bandwidth. This is the main reason why buses like AGP were developed for the PC. In telecommunications, bandwidth refers to the range that carries a signal within a band of frequencies. This type of bandwidth is measured in Hertz (Hz) and is calculated by finding the difference between the upper and lower frequency limits of a signal. It is important to note that different types of signals (music, voice, picture, etc.) require different bandwidths. BANDWIDTH VS. SPEED Although bandwidth and speed (or latency) are closely related and often used interchangeably, there are some key differences to highlight between the two concepts: Bandwidth describes the volume of data that can be transferred at a given time. Speed describes the length of time it takes for data to be transferred. To use an analogy, think of an interstate highway. The number of cars that are able to pass from one mile marker to the next within a set timeframe would be considered the highway’s bandwidth, whereas the speed would be the rate of time it takes for one car to travel between mile markers. Factors that impact bandwidth include the size of the road (or the size of the cable) and the number of cars trying to travel at once (or the number of connections in use at the same time). Bandwidth can certainly impact speed (the more cars there are on the road, the longer it takes for all of them to get from place to place), but connection speeds can also be slowed by how far data needs to travel and other environmental factors. Together, bandwidth and speed create a network’s throughput.

Behavior Management
A psychological method where the actions of an individual are altered through various techniques, such as positive and negative reinforcement. The goal is to encourage a repetitive desired behavior.

Big Data
A collection of data sets so large that specialized technologies, techniques, and technicians are required to process, manage, and store them. An industry has arisen around the processing and analysis of large volumes of student data.

Bits Per Second (BPS)
How fast the modem can transmit and receive data. At slow rates, modems are measured in terms of baud rates. The slowest rate is 300 baud (about 25 cps). At higher speeds, modems are measured in terms of bits per second (bps). The fastest modems run at 57,600 bps, although they can achieve even higher data transfer ratesby compressing the data. Obviously, the faster the transmission rate, the faster you can send and receive data. Note, however, that you cannot receive data any faster than it is being sent. If, for example, the device sending data to your computer is sending it at 2,400 bps, you must receive it at 2,400 bps. It does not always pay, therefore, to have a very fast modem. In addition, some telephone lines are unable to transmit data reliably at very high rates.

Blended Learning
A teaching practice that combines, or blends, classroom and online learning. The instruction of a lesson occurs with both teacher interaction and computing devices. Also known as Hybrid Learning.

Block
(n.) (1) In word processing, a block is a group of characters that you have marked to perform some action on them. For example, to move a section of text, you must first block it. This is sometimes called a block move. To specify a block of text, you press special function keys (or click with a mouse) at the beginning and end of the block. The function keys differ from one word processor to another. Word processors usually display blocks by highlighting them on the screen. (2) In data management, a block is a group of records on a storage device. Blocks are manipulated as units. For example, disk drives often read and write data in 512-byteblocks. (3) In network communications, a block is a fixed-size unit of data that is transferred together. For example, the Xmodem protocol transfers blocks of 128 bytes. In general, the larger the block size, the faster the data transfer rate. (v.) In word processing, to specify a section of text. See definition (1) above. Some applications call this selecting.

Blockchain
Blockchain is one of the core technologies behind cryptocurrency. Blockchain is a system of recording digital transactions making it virtually impossible for hackers to cheat the system. In a blockchain, the records or transactions are maintained in a digital ledger that is duplicated and distributed across a wide network of computer systems. Every time there is a change to a blockchain transaction, the digital ledger is updated across the network. That means that the digital ledger of every participant on the network is automatically updated with the latest changes. For hackers to successfully cheat the system, they would have to individually alter every single transaction on the network. This makes blockchain an extremely safe and reliable system for recording transactions, as well as securing applications

Bloom’s Taxonomy
A teaching framework that classifies learning objectives from lower order to higher order thinking skills: Remembering, Understanding, Applying, Analyzing, Evaluating, and Creating. Some criticize elements within this framework or its real-world applications.

Boolean Logic
(bool -&n loj ik) (n.) Named after the nineteenth-century mathematician George Boole, Boolean logic is a form of algebra in which all values are reduced to either TRUE or FALSE. Boolean logic is especially important for computer science because it fits nicely with the binary numbering system, in which each bit has a value of either 1 or 0. Another way of looking at it is that each bit has a value of either TRUE or FALSE.

Bring Your Own Device (BYOD)
Also known as Bring Your Own Technology (BYOT), this is an initiative where students bring their own mobile devices into the classroom for class purposes, as opposed to using school-issued devices. This is often seen as an alternative to 1:1 programs due to lower maintenance costs, though students without devices cannot participate.

Browser
Short for Web browser, a browser is a software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files. As a client/server model, the browser is the client run on a computer that contacts the Web server and requests information. The Web server sends the information back to the Web browser which displays the results on the computer or other Internet-enabled device that supports a browser.

Burn Up Vs Burn Down Charts
Burn up and burn down charts are visual representations of progress in the scope of a project, showing the amount of effort expended against expected output or set goals. Burn charts are common components of Agile and Scrum project management ideologies and are used to visualize progress for team leaders, stakeholders, and even team personnel. This article looks at burn up and burn down charts, how they work, and how they differ from each other for organizations that want to visualize their objectives and project progress.

Burn Up Vs Burn Down Charts
Burn up and burn down charts are visual representations of progress in the scope of a project, showing the amount of effort expended against expected output or set goals. Burn charts are common components of Agile and Scrum project management ideologies and are used to visualize progress for team leaders, stakeholders, and even team personnel. This article looks at burn up and burn down charts, how they work, and how they differ from each other for organizations that want to visualize their objectives and project progress. WHAT IS A BURN UP CHART? Burn up charts are visual representations that track work completed to date against the total work planned for a set time (e.g., project, sprint, or quarter). The total work planned often appears as a straight line—known as the scope—and serves as the team’s ultimate objective. Beneath the scope line, burn up charts use two lines to represent progress over the course of the project. As seen below, the first line (red) represents “to dos” and goals for the project. It equally splits the effort across sprints to meet the project scope, while the second line (green) shows the actual progress made during each sprint of the project. WHAT IS A BURN DOWN CHART? Burn down charts are visual representations of work remaining against work completed in a downward-sloping graph. Unlike burn up charts, burn down charts do not have a scope line because the X-axis serves as the ultimate destination for project completion. Otherwise, the first line (red) shows a similar expected progress line that equally divides effort (also known as “points” within Agile planning) across the length of the project. The second line (green) likewise indicates actual progress per sprint to visualize gaps between expected and real progress.

Bytecode verifier
The bytecode verifier ensures the format and accuracy of Java code before it’s passed to the interpreter. It also checks for illegal code, which is code that violates access rights on objects or violates the implementation of pointers. If a code is in violation, the class will be considered corrupted and will not be loaded.

C
[Back to Top]
Centralized Network
A type of network where all users connect to a central server, which is the acting agent for all communications. This server would store both the communications and the user account information. Most public instant messaging platforms use a centralized network. Also called centralized server-structure.

Certification
In computer-based training (CBT) also called computer-assisted instruction (CAI), certification refers to both the program and the process a student must go through to obtain certification in the studied area. Certification also includes testing and assessment that must be met by the learner with a minimum acceptable score.

Chassis Intrusion Connector
A connector found on a motherboard that supports a chassis security feature that detects if a chassis component is removed or replaced, in which case an alarm sound is heard through the onboard speaker or PC chassis speaker if present. For the chassis intrusion circuit to work, the chassis power supply must be connected to AC power. By default, on the motherboard the pin labeled chassis “signal” and “ground” are shorted with a jumper cap. You need to remove the jumper caps if you intend to use the chassis intrusion detection hardware.

Class
(1) In object-oriented programming, a category of objects. For example, there might be a class called shape that contains objects which are circles, rectangles, and triangles. The class defines all the common properties of the different objects that belong to it. (2) In .NET languages, classes are templates used for defining new types. Classes describe both the properties and behaviors of objects. Properties contain the data that are exposed by the class. Behaviors are the functionality of the object, and are defined by the public methods (also called member functions) and events of the class. Collectively, the public properties and methods of a class are known as the object interface. Classes themselves are not objects, but instead they are used to instantiate (i.e., create) objects in memory.

ClassLoader
The Java ClassLoader dynamically loads all necessary classes needed to run a Java program. It provides security by separating namespaces of the local file system from what’s imported through the network. Since Java classes are only loaded into memory when it’s required, the JRE uses ClassLoader to process this demand.

Classroom Management
A psychological method used by teachers to minimize classroom disruptions and maximize a learning environment. Though a number of tactics can be used, they generally fall into the use of positive or negative reinforcement.

Clickers
A device or mobile app that allows students to answer a multiple-choice question. The teacher presents a question to the class, then students use their clickers to input their answer. Some use this as an alternative to paper quizzes.

Clickjack Attack
Clickjacking, or clickjack attack, is a vulnerability used by an attacker to collect an infected user's clicks. The attacker can force the user to do all sort of things from adjusting the user's computer settings to unwittingly sending the user to Web sites that might have malicious code. Also, by taking advantage of Adobe Flash or JavaScript, an attacker could even place a button under or over a legitimate button, making it difficult for users to detect.

Cloaking
Cloaking - Also known as stealth, a technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to everyone else. There are opposing views as to whether or not cloaking is ethical. Opponents see it as a bait-and-switch, where a Web server is scripted to look out for search engines that are spidering in order to create an index of search results. The search engine thinks it is selecting a prime match to its request based on the meta tags that the site administrator has input. However, the search result is misleading because the meta tags do not correspond to what actually exists on the page. Some search engines, such as Lycos, Hotbot and Excite, even ban cloaked Web sites. Proponents of cloaking assert that cloaking is necessary in order to protect the meta data, as only the spider is supplied with the meta tags

Cloud
A generic term used to represent the concept of distributed computing – where a set of networked computers allow for shared services. Also used synonymously with the Internet.

Cloud Computing
Cloud computing is a type of computing that relies on shared computing resources rather than having local servers or personal devices to handle applications. In its most simple description, cloud computing is taking services ("cloud services") and moving them outside an organization's firewall. Applications, storage and other services are accessed via the Web. The services are delivered and used over the Internet and are paid for by the cloud customer on an as-needed or pay-per-use business model.

Cloud Computing
Another generic term that refers to the computer hardware and software that powers the cloud. This includes servers (a computer with specialized software on it), data storage, applications, and more.

Cloud Computing
Cloud computing is the delivery of computing services over the internet rather than having local servers or personal devices handle applications. Computing services can include servers, storage, databases, networking, software, analytics, and intelligence. These services are moved outside an organization’s firewall and can be accessed via the web. Cloud computing lowers operating costs and allows for efficient scaling as customers pay on an as-needed or pay-per-use business model. CHARACTERISTICS OF CLOUD COMPUTING According to the National Institute of Standards and Technology (NIST), all true cloud environments have five key characteristics: On-demand self-service: Cloud customers can quickly sign up, pay for, and start using cloud resources on their own without help from a sales agent. Broad network access: Customers access cloud services via the internet. Resource pooling: Different types of customers (individuals, organizations, or different departments within an organization) all use the same servers, storage, or other computing resources. Rapid elasticity or expansion: Cloud customers can easily scale their use of resources up or down as their needs change. Measured service: Customers pay for the amount of resources they use in a given period of time rather than paying for hardware or software upfront. (Note that in a private cloud, this measured service usually involves some form of chargebacks where IT keeps track of how many resources different departments within an organization are using.) TYPES OF CLOUD COMPUTING Not all clouds are the same. Cloud computing is divided into subcategories depending on the physical location of computing resources and who can access those resources. Public cloud Public clouds are owned and operated by a third-party cloud service provider who offers services to the general public. With a public cloud, all hardware, software, and other supporting infrastructure is owned and managed by the cloud provider. These services are accessed and managed using a web browser. Private cloud A private cloud is a cloud environment used exclusively by one organization and can be physically located on the organization’s on-site data center. Large enterprises typically choose to keep their data and applications in a private cloud for security reasons. In other cases, private clouds are used in order to comply with company regulations. Organizations have two options when using a private cloud: it can be set up in the organization’s own data center, or a hosted private cloud service can be used. With a hosted private cloud, a public cloud vendor agrees to set aside computing resources and allow only one customer to use those resources. Hybrid cloud A hybrid cloud is a combination of public and private clouds bound together by the technology that allows data and applications to be shared between them. Companies choose hybrid cloud computing for greater flexibility, increased deployment options, and optimized infrastructure, security, and compliance.

Command
An instruction to a computer or device to perform a specific task. Commands come in different forms. They can be: special words (keywords) that a program understands. function keys choices in a menu buttons or other graphical objects on your screen Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands. Internal commands are commands, such as COPY and DIR, that can be handled by the COMMAND.COM program. External commands include the names of all other COM files, as well as EXE and BAT files.

Common Core Standards (CCS)
A US initiative to provide a national set of learning standards. Has not yet been adopted by all fifty states. This initiative has both supporters who favor a national standard and detractors who criticize its one-size-fits-all strategy.

Computational Thinking
Computational thinking (CT) is a study of the problem-solving skills and tactics involved in writing or debugging software programs and applications. Computational thinking is closely related to computer science, although it focuses primarily on the big-picture process of abstract thinking used in developing computational programs rather than on the study of specific programming languages. As a result, it often serves as an introduction to more in-depth computer science courses.

Computer
WHAT IS A COMPUTER? A computer is a programmable machine. The two principal characteristics of a computer are: It responds to a specific set of instructions in a well-defined manner, and it can execute a prerecorded list of instructions (a program). Modern computers are electronic and digital. The actual machinery wires, transistors, and circuits are called hardware; the instructions and data are called software. All general-purpose computer systems require the following hardware components: Memory: Memory enables a computer to store, at least temporarily, data and programs. Mass storage device: This allows a computer to permanently retain large amounts of data. Common mass storage devices include solid state drives (SSDs) or disk drives and tape drives. Input device: Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer. Output device: An output device is a display screen, printer, or other device that lets you see what the computer has accomplished. Central processing unit (CPU): The heart of the computer, this is the component that actually executes instructions. A motherboard: This component allows all of the other components to communicate with one another. WHEN WAS THE FIRST COMPUTER INVENTED? The first mechanical computer was developed in the early 19th century by Charles Babbage, an English engineer, and Ada Lovelace, a mathematician. At the computer’s core was the Difference Engine, which was responsible for making calculations using multiple sets of numbers printing the outputs. The first digital computer was the Atanasoff-Berry Computer (ABC). The ABC was developed in 1942 by Iowa State University professor John Vincent Atanasoff and graduate student Cliff Berry. This computer used vacuum tubes to make binary computations and processed Boolean logic. However, the ABC lacked a CPU and was, therefore, not programmable. Subsequent computer evolutions added programming capabilities, RAM, transistors, microprocessors, and portability as key characteristics.

Container Software
Container software breaks applications down into individual units and places them in containers, making them much easier to run and transport between systems or the cloud. This process, called containerization, was developed to allow more applications to run on the same server or transfer seamlessly to different environments. The application and all of the features it needs to run independently are packaged within the container. Containers can be prevented from interacting with each other; they stay separate. Unlike a virtual machine, which has its own operating system (OS), containers all run independently on the same operating system. Virtual machines are heavier and consume more energy than containers. Because they’re more lightweight, more containers can run on one OS without bogging it down.

Containerization
Containerization is a lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment. This provides many of the benefits of loading an application onto a virtual machine, as the application can be run on any suitable physical machine without any worries about dependencies. Containerization has gained recent prominence with the open-source Docker. Docker containers are designed to run on everything from physical computers to virtual machines, bare-metal servers, OpenStack cloud clusters, public instances and more.

Conversational AI
Conversational AI is an artificial intelligence technology that comprehends human speech and corresponds with human interaction. Conversational AI is increasingly being used for numerous business purposes. While current types of conversational AI can handle simple commands, future iterations of this technology are projected to engage in more complex conversations and perform tasks for users. Learn more about conversational AI, how it works, and how this technology helps enterprises to communicate effectively and efficiently.

Core Logic
Related Terms •coring •Storage Logical Partition •Cache Logical Partition •dual-core •multi-core technology •logical •core memory •Logical Link Control layer •EPLD •logic gate Also referred to as the core logic chipset, the central processing logic of a complete system (such as a desktop PC), a component of that system or a function of a specific component. A system��s core logic can include a controller for handling memory functions, a cache for instructions, the logic for bus interfaces and the functions of data paths.

CPU - Central Processing Unit
CPU (pronounced as separate letters) is the abbreviation for central processing unit. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computer where most calculations take place. In terms of computing power, the CPU is the most important element of a computer system.

Credit Freeze
Credit Freeze - Also known as a credit security freeze or security freeze. A credit freeze is a method by which a consumer can limit access to his or her credit report to companies with which he or she has a pre-existing credit relationship, such as mortgage, auto loan and credit card, or a company they wish to enter into a credit relationship with. By freezing their credit report, consumers can block the opening of a new credit account without their specific permission. When the consumer wants to open a new credit account, they can lift the freeze to allow access to their credit report by the potential creditor.

Customer Experience (CX)
Customer Experience, or CX, refers to how a customer feels about a brand or company based on their experiences with it. CX managers and departments responsible for creating an optimal Customer Experience Strategy are tasked with ensuring customers have positive experiences with the company, whether through purchasing a product or service, receiving support for their purchase, or being engaged by marketing or advertising initiatives. Each of these touchpoints, or ways by which consumers can interact with a company, can create negative or positive impressions, and CX strategies involve both differentiating a brand from the competition and maximizing the positive experiences consumers have with the brand, with the overall goal of reducing customer churn and improving overall customer lifetime value (LTV). CUSTOMER EXPERIENCE: OPTIMIZING EACH POINT ON THE CUSTOMER JOURNEY Specifically, customer experience managers and departments analyze each point on the customer journey or customer lifecycle from the perspective of the customer and work to ensure the company is delivering an optimal experience for consumers along the various steps of the process. The customer journey typically includes most or all of the following steps: discovering the brand via marketing or advertising, researching the brand and comparing it with alternatives through research and reviews, purchasing products or services from the brand, receiving support from customer service, and ideally, purchasing from the company again or remaining on subscription-based revenue models offered by the company. By successfully optimizing each stage of the customer journey, customer experience departments create a higher likelihood of brand loyalty and positive advocacy for the company and its products or services while also increasing overall revenues and customer LTV.

Customer Lifecycle
Customer lifecycle refers to the various stages a prospective or existing customer progresses through in a company’s marketing and sales funnel. While there’s no real consensus for the names of each stage of the customer lifecycle, the lifecycle typically includes the following stages: Awareness – Lead generation for the company’s product(s) Marketing and Knowledge Company-generated information for the product as well as a customer’s research of ratings and reviews from other sites and customers and comparison against competing products Sales Conversion The customer purchases product from sales funnel Customer Experience and Product Support Customer consumes product and utilizes company’s customer support as needed Retention Satisfied customers develop brand loyalty and continue to use product Advocacy and/or Repeat Purchase Satisfied customers share positive customer experience with friends, colleagues and social network community as well as potentially purchase additional products / services from the company Companies analyze each stage of the customer lifecycle to maximize conversions, revenue, and overall satisfaction for their products. As a result, the customer lifecycle and metrics for each stage play key roles in both customer relationship management (CRM) and customer experience management (CEM) strategies.

Cyber Crime
Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Cyber Security
Cyber security is the practice of protecting computer systems, networks, and data by using a variety of different strategies and tools. Many large companies hire entire teams devoted to maintaining cyber security, whereas smaller organizations often rely on third-party vendors to provide cyber security services. Like physical security, cyber security must be constantly monitored to minimize risk to business resources and assets.

D
[Back to Top]
Data Center
Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the company’s information technology (IT) needs, which typically involve storing, processing and serving large amounts of mission-critical data to clients in a client/server architecture. A data center, or datacenter, often requires extensive redundant or backup power supply systems, cooling systems, redundant networking connections and policy-based security systems for running the enterprise’s core applications. Data center management involves ensuring the reliability of both the connections to the data center as well as the mission-critical information contained within the data center’s storage. It also entails efficiently placing application workloads on the most cost-effective compute resource available. THE RISE OF THE SOFTWARE-DEFINED DATA CENTER While data centers are traditionally thought of as large-scale physical environments where an extensive number of computers and servers are housed, the software-defined data center (SDDC) has created a new breed of virtualized data centers and cloud-based data centers that extend a company s on-premises infrastructure to off-premises sites. These virtual data centers can serve as a bridge to the enterprise’s private data center in a hybrid, or blended, fashion, or the company can completely offload its data center operations by relying on a public data center from a third-party service provider.

Data Processing
(1) Refers to a class of programs that organize and manipulate data, usually large amounts of numeric data. Accounting programs are the prototypical examples of data processing applications. In contrast, word processors, which manipulate text rather than numbers, are not usually referred to as data processing applications.

Data Visualization
Data visualization is the graphic representation of data so that analysts, readers, clients, and stakeholders can more easily see the implications of the raw data. Data visualization can also refer to the technique of communicating information by encoding data in a visual way through the use of lines, bars, and points. Data visualization can be a standalone product. It is also often part of business intelligence or analytics software, and is commonly included in business applications like CRM and even spreadsheets. With the overwhelming amount of data businesses aggregate every day, data visualization makes it easier to interpret data and avoid confusion. It enables users to see analytics in a visual way to understand concepts or identify new patterns. Data visualization is more aligned with the way the human brain processes information by using charts and graphs, which are easier to understand than poring over reports and spreadsheets.

Database
(1) Often abbreviated DB, a database is basically a collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system. Traditional databases are organized by fields, records, and files. A field is a single piece of information; a record is one complete set of fields; and a file is a collection of records. For example, a telephone book is analogous to a file. It contains a list of records, each of which consists of three fields: name, address, and telephone number.

DDL
Short for Data Definition Language, DDL is a computer language that is used to define data structures. In Database Management Systems (DBMS), it is used to specify a database scheme as a set of definitions (expressed in DDL). In SQL, the Data Definition Language (DDL) allows you to create, alter, and destroy database objects.

Decentralization
In a blockchain network, data is kept in several network nodes that are located at various locations. Decentralization in blockchain means that no single individual, group, or organization has decision-making power, supervision, or control over the blockchain network. WHAT IS DECENTRALIZATION IN BLOCKCHAIN? Decentralization is one of the most common approaches to blockchain network infrastructure and management. The objective of decentralization is to reduce the degree of dependency or trust that participants must place on one another and to prevent corruption of the blockchain network via decentralized management. DECENTRALIZED VS CENTRALIZED NETWORKS A centralized network is designed around a single master node, which is responsible for all major data processing and data storage on the network. Most web services, such as online banking and YouTube, use a centralized network. A blockchain network can also be centralized, but this is less common than a decentralized blockchain network in which data processing and storage are spread across multiple nodes. DECENTRALIZED VS DISTRIBUTED NETWORKS Another type of network is the distributed network or distributed blockchain. It is similar to a decentralized network, as it does not have a single master node, but unlike a decentralized network, it is owned and managed by a network service provider or another third-party vendor. This means it has no single point of failure, similar to a decentralized network, but the service provider maintains control over the distributed network.

DES
DES is short for Data Encryption Standard, a popular symmetric-key encryption method developed in 1975 and standardized by ANSI in 1981 as ANSI X.3.92. DES uses a 56-bit key and the block cipher method, which breaks text into 64-bit blocks and then encrypts them. WHAT IS THE DATA ENCRYPTION STANDARD (DES)? The DES algorithm was developed by an IBM team and later adopted by the National Institute of Standards and Technology (NIST). The encryption algorithm was the first one approved by the U.S. government for public usage and was soon adopted by industries like the financial services sector. It formed the foundation of all subsequent encryption algorithms. The purpose of DES was to protect the privacy of numerical data saved on computer systems and distributed via the internet. DES was first used to secure the confidential data of government agencies. HOW IS DES USED? After the U.S. government approved the Data Encryption Standard for public usage, different industries started using it. It has been used to encrypt SIM cards, smart cards, routers, and modems. Today, DES is not used to encrypt any confidential data, but the symmetric key encryption algorithm is still used to provide training on cryptography. DES is used for academic training that explains the basics of digital cryptography

Dictionary Attack
(1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with words that have a higher possibility of being used, such as names and places. The word "dictionary" refers to the attacker exhausting all of the words in a dictionary in an attempt to discover the password. Dictionary attacks are typically done with software instead of an individual manually trying each password. (2) An e-mail spamming technique in which the spammer sends out thousands or millions of e-mails with randomly generated addresses using combinations of letters added to known domain names in the hopes of reaching a percentage of actual e-mail addresses. For example, a dictionary attack list might begin with john@webopedia.com, john1@xyz.com, john2@xyz.com, and so on until all possible combinations of letters and numbers has been exhausted.

Digital Classroom
A classroom that mostly or entirely relies on electronic devices and software instead of paper and pens. It is usually characterized by a central computing device, like a laptop or tablet, and a number of online software and apps.

Digital Native
An individual born during or after the common use of digital technologies, such as the Internet, mobile devices, apps, etc. It is assumed that such individuals have a strong grasp of digital technology because it was a regular part of their lives.

Digital Wallet
A digital wallet is an online platform or software application that stores payment information. They can be used on mobile devices, tablets, smart watches, and laptop or desktop computers. Digital wallets don’t process transactions themselves; instead, they store the debit and credit card details, bank account and routing numbers, loyalty card information, and digital coupons, then provide this information to the payment processor upon request. Digital wallets can be used for e-commerce transactions or in-person purchases, though some older point of sale (POS) hardware is not compatible with digital wallet technology. In addition to payment details, digital wallets can also store hotel keys, flight boarding passes, concert tickets, and membership cards.

Disk
A disk (or diskette) is a flat, round plate on which data can be encoded and stored. Fixed disks in the form of hard disks are a common component of a computer’s storage system, but most other forms of disk hardware (floppy disks, CD-ROMs, etc.) have become obsolete. Accessing data from a disk is not as fast as accessing data from main memory, but disks are much cheaper. And unlike RAM, disks hold on to data even when the computer is turned off. Consequently, disks have historically been the storage medium of choice for most types of data, but are slowly being replaced by newer forms of storage like flash drives, solid state drives, and cloud storage. DISK VS. DISC Like several other common spelling variations, most of the disk/disc distinction comes from differences in American English and British English spelling conventions. In the United States, “disk” is the common usage, whereas “disc” is preferred in the United Kingdom. There are also distinctions that are relevant to biology and computer hardware, regardless of geographic location. In medical settings, “disc” should be used in all anatomical references (optic disc, spinal disc, etc.). In computer engineering, “disk” is the preferred spelling, except in audio/visual contexts like disc jockey (DJ), compact disc (CD), or digital versatile disc (DVD).

DLL
1) Short for Dynamic Link Library, a library of executable functions or data that can be used by a Windows application. Typically, a DLL provides one or more particular functions and a program accesses the functions by creating either a static or dynamic link to the DLL. A static link remains constant during program execution while a dynamic link is created by the program as needed. DLLs can also contain just data. DLL files usually end with the extension .dll,.exe., drv, or .fon. A DLL can be used by several applications at the same time. Some DLLs are provided with the Windows operating system and available for any Windows application. Other DLLs are written for a particular application and are loaded with the application. 2) Short for Delay Locked Loop, Delay-Locked Loop (DLL) supports high-bandwidth data rates between devices. These DLLs are circuits that provide zero propagation delay, low-clock skew between output clock signals throughout a device, and advanced clock domain control. These dedicated DLLs can be used to implement several circuits that improve and simplify system level design.

Docker
Docker is an open-source platform used for developing and running applications by allowing users to package the software application into containers. Containers are standardized executable units of software in which the code of the application is packaged. Containers simplify the delivery of code and are becoming increasingly popular as businesses shift to cloud-native deployment systems. Docker’s approach allows software developers to separate the infrastructure from the application so the software can be delivered quickly. Being able to deliver the code quickly means reducing the time between writing the code and production. Docker is designed to optimize the shipping, testing, and deployment of application code.

Domo
Provides capability to build a modern business, driven by data. Connect to any data source to bring your data together into one unified view, then make analytics available to drive insight-based actions—all while maintaining security and control. Domo serves enterprise customers in all industries looking to manage their entire organization from a single platform.

E
[Back to Top]
Education Technology
Any kind of technology that is used for educational purposes by an educator or educational institution. Most commonly used in reference to software utilized in primary, secondary, and higher education, though it can cover much more than that. Also known as “edtech.”

Educator
Anyone who formally teaches a learner. It is a broad term that can be used to encompass primary & secondary school teachers, higher education professors, adult instructors, homeschool parents, tutors, trainers, lecturers, mentors, etc.

Edupunk
An attitude where learning can happen on your own, without any formal structure. Often described as “do-it-yourself (DIY) education.” Interestingly, the originator of this term, Jim Groom, no longer calls himself an edupunk.

Email Appending
Email Appending - The process of merging a database of customer information that lacks email addresses for the customers with a third-partys database of email addresses in an attempt to match the e-mail addresses with the information in the initial database. A typical email appending scenario involves a business that has name, address and telephone data on its customers to do business through mail or over the telephone, but the company wants to expand into e-mail communication and pays a third party that has a database of e-mail addresses in order to merge the data together.

Embedded Analytics
Embedded analytics is a digital workplace capability designed to incorporate data analysis within a user’s natural workflow without using a separate application or software. Embedding analytics integrates reporting and business intelligence capabilities into one software application, where the capabilities exist natively, helping users work more efficiently using their everyday applications, mitigate issues, and spot opportunities. EMBEDDED ANALYTICS VS. BUSINESS INTELLIGENCE Embedded analytics and business intelligence are often used interchangeably. While they have many things in common, the big difference is how they fit into applications and workflows. Business intelligence is composed of people, processes, systems, and technologies that enable organizations to analyze data to guide strategic and operational decisions. Users have to leave the applications they use to get the insights they need using a separate set of tools. Thus, business intelligence fails to deliver the exact analysis because it is not integrated with the user’s workflow. Embedded analytics, on the other hand, is a set of capabilities incorporated into an organization’s existing systems such as marketing automation, CRM, or financial systems, and is designed to provide awareness and support in decision making. It puts self-service functionality and analytical output together in a business’s core applications, making everything available in one application. Embedded analytics is usually purchased as a separate product that integrates with a customer’s applications. CAPABILITIES OF EMBEDDED ANALYTICS Embedded analytics offers a number of features and capabilities: Data visualizations and interactive reports that include tabular views of data, with or without setting capabilities and parameters Benchmarking to compare performance metrics against best practices and goals Mobile reporting that enables interactive capabilities on mobile devices Predictive analytics to so organizations can change outcomes based on current data

Encryption
Encryption is the process of translating data into a secret format so that only authorized parties can understand the information. Plain text, or readable data that is not encrypted, is converted into cipher text, or scrambled data that is unreadable. Encrypting takes readable data and alters it so it appears random. This is done to protect and secure the confidentiality of data transmitted through a network. Encryption is the process of translating data into a secret format so that only authorized parties can understand the information. Plain text, or readable data that is not encrypted, is converted into cipher text, or scrambled data that is unreadable. Encrypting takes readable data and alters it so it appears random. This is done to protect and secure the confidentiality of data transmitted through a network.

Engagement
Used in the context of education, it means the attentiveness and interest of a student to the lesson at hand. If a student is highly engaged, it means the student is focused, and maybe even enthusiastic about the topic. The best learning occurs when there is high engagement.

Enhanced Keyboard
(1) A 101- or 102-key keyboard from IBM that supersedes the keyboard for the PC /AT computer. The most significant difference between the enhanced keyboard and previous models is that the enhanced keyboard has a row of 12 function keys at the top instead of 10 function keys grouped on the left side of the keyboard. Nearly all PCs made today come with an Enhanced Keyboard. (2) For Macintoshes, see under extended keyboard.

Enterprise Resource Planning (ERP) Software
Enterprise resource planning (ERP) is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back-office functions related to technology, services, and human resources. Enterprise resource planning software typically integrates all facets of an operation — including product planning, development, manufacturing, sales, and marketing — in a single database, application, and user interface.

EPLD
Short for electrically programmable logic device, an integrated circuit that is comprised of an array of programmable logic devices that do not come pre-connected; the connections are programmed electrically by the user.

Escape Character
A special character that can have many different functions. It is often used to abort the current command and return to a previous place in the program. It is also used to send special instructions to printers and other devices. An escape character is generated with the Escape key, a special key that exists on most computer keyboards. When the escape character is combined with other characters, it is called an escape sequence.

Extension
(1) An extra feature added to a standard programming language or system. (2) In DOS and some other operating systems, one or several letters at the end of a filename. Filename extensions usually follow a period (dot) and indicate the type of information stored in the file. For example, in the filename EDIT.COM, the extension is COM, which indicates that the file is a command file. (Depending on the operating system, the punctuation separating the extension from the rest of the filename may or may not be considered part of the extension itself.) Also see Data Formats and Their File Extensions in the Quick Reference section of Webopedia. (3) In Macintosh environments, a program that extends the system’s capabilities. When they reside in the Extensions folder, extensions are loaded into memory when the system starts. On older Macs (System 6 and earlier), extensions were called inits. (4) Same as plug-in.

Extranet
A buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view. Extranets are becoming a very popular means for business partners to exchange information.

F
[Back to Top]
Flash Memory
Flash memory is non-volatile, or secondary, computer memory typically present in devices such as solid-state drives (SSDs) and USB flash drives. It is commonly found in personal computers’ drives and enterprise storage solutions. WHAT IS FLASH MEMORY? Flash memory is a type of electrically erasable programmable read-only memory (EEPROM) that can be erased and reprogrammed in blocks, also known as cells. Cells are arranged in a grid on a flash device. Each cell has two transistors, and when electrical charge passes through, the behavior of the transistor determines the cell’s charge and whether the bit value is 0 or 1. Flash memory was invented by an engineer working at Toshiba in the 1980s. Unlike random access memory, the data on a solid-state drive or other flash device does not disappear when the device is disconnected from power. NAND is the most common variation of flash memory and is used in most standard consumer computing flash devices. NOR flash, another well-known flash architecture, works well for applications that require byte-level random access. NOR flash memory has parallel connections between cells, while NAND cell connections travel in a series and are more dependent on each other. NOR flash permits individual cell access, while NAND does not. Flash memory refers specifically to the type of computer or device memory used, while a flash drive or SSD is a device that uses flash memory. The terms are connected but not interchangeable.

Flipped Classroom
A form of blended learning, this is the practice of students watching lecture material (usually in video form) at home, then practicing their learnings in an interactive environment in the classroom. Households without computers or an Internet connection cannot participate in this practice, however.

FOMO
FOMO is an acronym for Fear Of Missing Out, which is a feeling of envy or anxiety over missing out or being out of touch with events, experiences, or interactions. The phrase-turned-acronym has become so widely used and popular that Oxford and Merriam-Webster added it to their dictionaries as an officially defined word. WHAT IS FOMO? While originating from the fear of missing out, the term has taken on additional connotations. FOMO is the fear of not being included in an exciting or enjoyable activity or event that others are experiencing and sharing. People often don’t want to feel as if opportunities or events pass them by in life. Patrick McGinnis first created the term in 2004, in which FOMO became a term that has taken greater cultural precedence with the rise of social media. The psychological problem with FOMO is it can increase a person’s stress and anxiety while also negatively impacting a person’s self-esteem. If a person perceives that they are missing out on opportunities, events, or things, they may see a negative impact on their mental health and self-esteem, believing others are experiencing more joy in their lives. Those experiencing the phenomenon don’t know what they’re missing most of the time, but they worry others are having fun without them. This feeling of missing out on something has been around for centuries but wasn’t formally identified until 1996 by a marketing strategist.

Format
(v.) (1) To prepare a storage medium, usually a disk, for reading and writing. When you format a disk, the operating system erases all bookkeeping information on the disk, tests the disk to make sure all sectors are reliable, marks bad sectors (that is, those that are scratched), and creates internal address tables that it later uses to locate information. You must format a disk before you can use it. Note that reformatting a disk does not erase the data on the disk, only the address tables. Do not panic, therefore, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself.

Format
(v.) (1) To prepare a storage medium, usually a disk, for reading and writing. When you format a disk, the operating system erases all bookkeeping information on the disk, tests the disk to make sure all sectors are reliable, marks bad sectors (that is, those that are scratched), and creates internal address tables that it later uses to locate information. You must format a disk before you can use it. Note that reformatting a disk does not erase the data on the disk, only the address tables. Do not panic, therefore, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself. The previous discussion, however, applies only to high-level formats, the type of formats that most users execute. In addition, hard disks have a low-level format, which sets certain properties of the disk such as the interleave factor. The low-level format also determines what type of disk controller can access the disk (e.g., RLL or MFM). Almost all hard disks that you purchase have already had a low-level format. It is not necessary, therefore, to perform a low-level format yourself unless you want to change the interleave factor or make the disk accessible by a different type of disk controller. Performing a low-level format erases all data on the disk. Also see “Formatting a Hard Disk Drive” in the “Did You Know…?” section of Webopedia. (2) To specify the properties, particularly visible properties, of an object. For example, word processing applications allow you to format text, which involves specifying the font, alignment, margins, and other properties. (n.) A specific pre-established arrangement or organization of data. Data in a file is stored in a format that is established by whatever application created the file (i.e., organized the data) and typically needs to be read by the same or similar program that can interpret the format and present the data to the user on the computer screen. Almost everything associated with computers has a format.

Fourth-Generation Language
Often abbreviated 4GL, fourth-generation languages are programming languages closer to human languages than typical high-level programming languages. Most 4GLs are used to access databases

Function Keys
Special keys on the keyboard that have different meanings depending on which program is running. Function keys are normally labeled F1 to F10 or F12 (or F15 on Macintoshes). On older PCs, for example, 10 function keys are grouped on the left side of the keyboard; new PCs have the enhanced keyboard, with twelve function keys aligned along the top of the keyboard.

G
[Back to Top]
Gamification
The practice of applying game mechanics into an activity. Examples of game mechanics are goals, badges, competition, immediate feedback, and leveling up.

Gantt Chart
A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule status. It is a visual view of tasks scheduled over time. The chart is commonly seen in project management and is used to adhere to project schedules. The Gantt chart was named after the inventor Henry Gantt, who designed the chart between the years 1910 and 1915. The chart encompasses: The start date of the project The project tasks The project task owner When tasks are started and finished How long the task will take to complete How tasks relate to one another The end date of the project ADVANTAGES OF GANTT CHARTS Advantages of a Gantt chart include: Being able to manage a project visually, as a project may seem less complex if the timeline is easily visualized. Dividing a large project into smaller parts, making it easier to divide and conquer the project task by task. Setting realistic goals and timeframes as the project is put into perspective with the bars on the chart indicating when a task should be completed. Having the chart visible to all working on the project, which allows everyone to be on the same page with the flow of the project and deadlines. DISADVANTAGES OF GANTT CHARTS Disadvantages of a Gantt chart includes: Becoming overwhelmed by the depth and/or complexity of the project because it is presented all at once. Misrepresenting task complexity, as the size of a bar does not indicate the amount of work required. Instead, each bar indicates the time period over which a particular set of tasks will be completed. This means a Gantt chart does not show how difficult or what level of resources are required to complete the task. Requiring constant updating. As a project progresses, tasks and deadlines change. If the chart is not updated with the changes, it becomes obsolete.

GitLab
GitLab is a DevOps platform where software development and IT operations teams collaborate in one place. It aims to increase work efficiency and accelerate product delivery with better security. As a web-based Git repository, GitLab provides free databases for private use, issue-following capabilities, documentation, and wikis. Teams can leverage various tools, such as project planning or source code management and monitoring to build and deploy software applications faster. GitLab simplifies app development, accelerates DevOps adoption, and removes toolchain complexity. Using the platform and its centralized repository eases the developer workloads.

Go
Go is an open source procedural programming language designed at Google in 2007 and launched in 2009. Go is easy to read and allows multiple processes to run simultaneously. Its flexibility gives it a range of uses, notably in Big Data, machine learning, containers and virtualization. A number of well known applications are programmed in Go. It is a statically typed and compiled language that is syntactically similar to C, but has memory safety, garbage collection, structural typing, and CSP-style concurrency, making it good for multi-core uses. Programs are assembled by using packages for effective management of dependencies. Like dynamic languages, Go supports environment-adopting patterns. The programming language is sometimes referred to as Golang because of its domain name golang.org, but the correct name is Go.

Google+ (Google Plus)
Google+ (Google Plus) is Googles attempt at social networking. The Google+ service that delivers functionality and many features similar to those of Facebook. Features in Google+ include Posts for posting status updates, Circles for sharing information with different groups of people (like Facebook Groups), Sparks for offering videos and articles users might like, and Hangouts and Huddles for video chatting with a friend or group of friends. Google+ follows the companys earlier social networking endeavors, including the short-lived Google Wave, which Google discontinued in early 2010. Google+ is expected to expand to a larger audience as the project matures.

H
[Back to Top]
Hacker
A hacker is a person who uses computer programming to overcome a problem or challenge within a computer system. While the term hacker often carries a negative connotation, not all hacking involves criminal or malicious activity. WHAT KINDS OF HACKERS ARE THERE? Some of the kinds of hackers include: Black hat hackers: Hackers are often most associated with black hat hackers, or cyber criminals who exploit weaknesses to illegally intrude into computer systems for money, revenge, or just for fun. White hat hackers: These hackers can use their skills to fix problems in a computer system or to help companies strengthen their IT systems by identifying potential weak spots in the security infrastructure. Gray hat hackers: While gray hat hackers have good intentions, they may not use lawful or ethical methods during the hacking process. The term hacker can have a negative connotation, as it is often associated with black hat hackers, or cyber criminals who illegally intrude into computer systems for money, revenge, or just for fun. While a black hat hacker exploits any potential weaknesses in the system to gain unethical or unlawful entry into the system, a white hat hacker can use similar skills with the intention of fixing a problem. White hat hackers also help companies strengthen their IT security systems by identifying potential weak spots in the security infrastructure. Another category of hackers includes gray hat hackers, who hack with positive intentions but not might use lawful or ethical means for the hacking process.

Hand Of Thief Trojan
Hand of Thief Trojan is Trojan malware developed to enable cyber criminals to compromise Linux systems and steal user information from the systems. The Hand of Thief Trojan (HoT Trojan) is one of the first strains of malware to specifically target desktop Linux systems, and it s claimed that the HoT Trojan can currently compromise at least fifteen different variants of Linux. The Hand of Thief Trojan is considered a work in progress, lacking some of the key features to be an effective attack tool, but it s still being sold for $2,000 by its Russian-based developer. And while the code isn’t yet complete at this time, the Hand of Thief Trojan could eventually have full malware capabilities, including the ability to inject content into banking websites as well as better exfiltration and filtering features.

HDV
Short for High Definition Video, HDV is a video format, commonly used in camcorders, that allows high-definition footage to be recorded onto standard DV tapes. HDV uses Long GOP MPEG2 compression. The HDV format includes both 720p and 1080i specifications. The HDV standard was established by Canon Inc., Sharp Corp., Sony Corp., and the Victor Company of Japan, Ltd.

Hierarchy
Hierarchical, or hierarchy, refers to systems that are organized in the shape of a pyramid. Items, such as objects, names, categories, or values, are represented as above, below, or at the same level as another item. Hierarchical systems are used in everyday life. For example, the army uses a hierarchy in that generals are at the top of the pyramid and privates are at the bottom. Similarly, the system for classifying plants and animals according to species, family, and genus is hierarchical. The term is derived from the Greek words hieros, meaning sacred, and archein, meaning rule or order. HIERARCHY IN COMPUTING File system hierarchy The most common type of hierarchy in computing is a file system, in which computer files are placed somewhere in a hierarchical tree structure. File systems have a top level that is referred to as the root of the file system. Under the root are subdirectories such as Program Files, Documents, and Setting. Under these subdirectories are more subdirectories. Memory hierarchy Similarly, computer memory ranks components in terms of response times. Since response time, complexity, and capacity are related, the levels may also be distinguished by their performance and controlling technologies. There are four major memory storage levels: Internal: Such as processor registers and cache Main: Such as the system RAM and controller cards Online mass storage: Such as secondary storage Offline bulk storage: Such as tertiary and offline storage While this is a general memory hierarchy, there are other useful structures out there. Computer System Level Hierarchy Computer System Level Hierarchy (CSLH) is the combination of different levels that connect the computer with the user and that make use of the computer. In addition, it describes how the computational activities are performed on the computer and the elements used in different levels of the system. CSLH consists of seven levels: Level 0: Related to digital logic Level 1: Related to control Level 2: Consists of machines Level 3: Consists of system software Level 4: Consists of assembly language Level 5: Consists of high-level language Level 6: Consists of users and executable programs.

High Definition Photo
In digital camera terminology, high definition photo is a shooting mode found on some digital cameras that produces a 1920x1080 pixel high-definition (HD) quality photo that will perfectly fit a wide-screen HDTV (16:9) for full-screen viewing. High definition photos may also be available on some digital cameras when capturing motion picture recording (videos) using the camera, rather than still pictures. Digital cameras that have the high definition photo feature also will offer an optional component cable that you can use to connect the digital camera directly to the HDTV.

HRIS
Human resources information system (HRIS) solutions help businesses manage multiple facets of their workforce operations. They provide a central platform for human resources professionals and individual employees alike to view organizational data and manage their HR processes. HRIS solutions share standard features like a management portal and self-service tools and help businesses visualize their human resources data more clearly.

HTML - HyperText Markup Language
Short for HyperText Markup Language, the authoring language used to create documents on the World Wide Web. HTML is similar to SGML, although it is not a strict subset. HTML defines the structure and layout of a Web document by using a variety of tags and attributes. The correct structure for an HTML document starts with (enter here what document is about) and ends with . All the information youd like to include in your Web page fits in between the and tags.

Hybrid Learning
Synonymous with Blended Learning. See the Blended Learning definition above.

Hypervisor
A hypervisor, also known as a virtual machine motor or virtualizer, is computer software, firmware, or hardware that creates and runs virtual machines. A host machine is the computer the hypervisor is running the virtual machines on. Each virtual machine is called a guest machine. A hypervisor allows one host computer to support many guest machines by virtually sharing resources such as memory, CPU, and storage. Multiple operations systems can run alongside each other and share the same virtualized resources with a hypervisor. Since the guest machines are independent of the host, a system’s available resources are better used and IT mobility is improved, making moves between different servers easier. A hypervisor reduces space, energy used, and the maintenance typically required.

I
[Back to Top]
Individual Education Program (IEP)
A comprehensive and personalized plan that helps a child with disabilities achieve a specific set of education goals. Parents, teachers, and school specialists work together to construct and carry out this plan.

Information & Communications Technology (ICT)
A field related to Information Technology (IT). Used by some as synonymous with IT, and by others as more expansive than IT, since it includes communication technologies as well. In the US, IT is more commonly used within schools, while ICT is more common in the UK.

Inheritance
In object-oriented programing (OOP) inheritance is a feature that represents the “is a” relationship between different classes. Inheritance allows a class to have the same behavior as another class and extend or tailor that behavior to provide special action for specific needs.

Instant Messaging
An instant message (IM) service is a type of communication platform that enables users to chat online in real time. It’s similar to a live phone conversation, but it uses text-based instead of voice-based communication. HISTORY OF INSTANT MESSAGING The first widely used GUI-based instant messenger was ICQ, which was launched in 1996. IQC enabled users to communicate one-on-one or in chat rooms and share files with one another over the Internet. Before then, most instant messaging took place in the context of bulletin board systems (BBS) and modem-based text messages through services like MIT’s Compatible Time-Sharing System (CTSS), Quantum Link, and Internet Relay Chat (IRC). The next year, America Online (AOL) launched its instant messaging software, AIM. It added more user-centric features like the Buddy List, user profiles, and custom away messages. Several technology companies started launching competitive programs of their own and the instant messaging market was quickly saturated by vendors including Yahoo, MSN, and Pidgin. In the 2000s and 2010s, vendors including Apple, Google, Skype, MySpace, Meebo, Facebook, and Slack began offering instant messaging services that were also paired with video and voice features. This meant a user could call, video conference, and chat with other users from the same platform. Instant messaging has also become an integral part of social media use. In fact, nearly all of the major social media platforms have some sort of private messaging function that allows users to communicate without publishing content publicly. This has led to most modern instant messaging functions to be used interchangeably with direct messaging (DM) and private messaging (PM).

Instruction
A basic command. The term instruction is often used to describe the most rudimentary programming commands. For example, a computers instruction set is the list of all the basic commands in the computers machine language.

Instructional Technology
A subset of education technology, this practice focuses more on the use of technology for instructional purposes, though the terms are sometimes used interchangeably.

Intel Microprocessors
Microprocessors made by Intel Corporation form the foundation of all PCs. Models after the 8086 are often referred to by the last three digits (for example, the 286, 386, and 486). Many of the microprocessors come in different varieties that run at various clock rates. The 80486 architecture, for example, supports clock rates of from 33 to 66 MHz. Because Intel discovered that it couldn’t trademark its CPU numbers, it shifted to a naming scheme, starting with the Pentium processors. Intel’s latest and sixth-generation chip is called the Pentium Pro. All Intel microprocessors are backward compatible, which means that they can run programs written for a less powerful processor. The 80386, for example, can run programs written for the 8086, 8088, and 80286. The 80386 and later models, however, offer special programming features not available on previous models. Software written specifically for these processors, therefore, may not run on older microprocessors. The common architecture behind all Intel microprocessors is known as the x86 architecture. Until the late 80s, Intel was essentially the only producer of PC microprocessors. Increasingly, however, Intel is facing competition from other manufacturers who produce “Intel-compatible ” chips. These chips support the Intel instruction set and are often less expensive than Intel chips. In some cases, they also offer better performance. Two of the leading manufacturers of Intel-compatible chips are Cyrix and AMD.

International Society for Technology in Education (ISTE)
A non-profit organization that serves educators interested in the use of technology in education. It is most known for its annual conference held in the US.

Intrusion Prevention System
An IPS, or intrusion prevention system is used in computer security. It provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted. Some compare an IPS to a combination of IDS and an application layer firewall for protection.

Inventory Management
Inventory management is the collection of strategies and tools that businesses use to manage their merchandise, as well as production and delivery workflows. Read on to learn more about how inventory management works and why it’s important for various industries. WHAT IS INVENTORY MANAGEMENT? Inventory management aids businesses in determining which merchandise to order when and in what quantities. Inventory is tracked from product acquisition to sale. To guarantee an adequate inventory to fulfill client orders and a proper reminder of any inventory shortfall, inventory management techniques recognize trends and react to them. Inventory turns into revenue after it is sold. It ties up cash before being sold while being listed as an asset on the company’s balance sheet. As a result, having too much stock is expensive and lowers cash flow. FEATURES OF INVENTORY MANAGEMENT Centralization of inventory control The inventory management system’s ability to monitor all inventory data is one of its most crucial features. A solid inventory management system consistently keeps a record of the product’s history, inventory levels, and many other details. Inventory control software’s ability to synchronize with other inventory system components aids in the precise running of the system. A unified inventory management system boosts team member efficiency and cooperation. As a result, team members from various locations can communicate and collaborate. Product availability and demand Utilizing inventory management software, business owners more effectively manage their inventories. Managers are able to better manage and visualize supply and demand for the company’s products, which helps them to optimize their inventory for appropriate availability and maximum profit. Backup and inventory security Regardless of what kind of business you run, inventory safety and backup measures are essential to effective inventory management and operations. Software for inventory management systems contains strong security measures that prevent hacking. Business owners can access and use the data from a backup when inventory software is compromised. Therefore, the inventory management solution’s backup and security features help to avoid any problems. Alerts regarding details of the inventory The era of manual inventory control is over. Managers no longer need to devote a lot of time and effort to managing stock data. A stock-out alert tool is an excellent addition to an inventory management system. This system feature describes many potential consequences of low stock for a specific item in the notifications.

IOS 12
iOS 12 is the twelfth major update for Apple’s iOS mobile operating system that runs on mobile Apple devices like the iPhone, iPad and iPod Touch. Apple iOS 12 was introduced as the successor to iOS 11 at the company’s 2018 Worldwide Developers Conference (WWDC) in early June 2018 along with the debut announcements of the iPhone XS and iPhone XR. Apple iOS 12 officially began arriving on devices on September 17th, 2018. WHAT’S NEW IN APPLE IOS 12? Referred to internally under the codenames Peace and Hope, Apple iOS12 builds on iOS 11 with feature additions and enhancements like a new Screen Time dashboard and tool that reports on iPhone and app usage and enables limits to be set for usage, a Group FaceTime feature (FaceTime with support for up to 32 people at once), Grouped Notifications to make managing notifications and messages easier, Siri Shortcuts, and new emojis like Animojis and alter ego Memojis.

IoT Security
IoT (Internet of Things) security helps enterprises protect their networks from threats exacerbated by internet-connected devices, which often aren’t designed with advanced security features that prevent network compromise or data breaches. For enterprises using multiple smart devices on their company network, IoT security is critical to protecting sensitive data and important software. WHAT IS IOT SECURITY? IoT security includes the limitations placed on IoT device access, the proper updating and patching of IoT software, and networks designed to protect systems and applications from unauthorized access. IoT security is possible, but it’s difficult because the Internet of Things sprang up before enterprises were prepared to implement proper protective measures. For some vendors, IoT security has been reactive; many devices come with hardcoded passwords, which can’t be changed and make breaches much easier for attackers. Setting access policies for all IoT endpoints is critical for preventing unauthorized access and lateral movement across devices. Access policies specify who can enter a network. Even simple identity and access management (IAM) features like strong passwords are essential for IoT devices. Internet of Things networks often include devices and network technology from different vendors, which may have either no built-in security features or use a variety of protective programs. It’s very difficult to build a unified approach to security if your enterprise is using multiple software solutions that aren’t designed to integrate. Some IoT devices also have software that isn’t regularly updated or patched.

IPv4
Internet Protocol Version 4, known as IPv4, manages the transmission of communication between devices on a network through IP data packets. IP packets contain information that directs them from one IP address to another. IPv4 was initialized in the early 1980s. Each device receives an IP address, which is either entirely unique or unique within its own network. IP addresses for IPv4 come in a series of numbers and periods; they can be up to 32 bits. IPV4 AND DNS Though computer networks use IP addresses to communicate, human users would have a much more difficult time trying to pair devices and web servers with the appropriate lengthy IP address. The Internet‘s Domain Name System (DNS) provides a solution. Each IP address that belongs to a web server receives a domain name (for example, walmart.com). DNS servers record and cache IP addresses, and when an Internet user makes an IP request (such as loading a website), the DNS servers go through the process of retrieving the corresponding IP address. IPV4 PACKET STRUCTURE IPv4 data packets have two different layers-the header layer (which contains fourteen different informational fields) and the data layer. The header fields contain data in bits and bytes and serve different functions within the packet. For example, the Total Length field lists how many bytes the IP packet has, and the Source and Destination Address fields indicate which IP address the packet is coming from and to which one it’s going. The header fields contain useful information about the packets that the computer can read and interpret. This information indicates how packets pass between networks, how long they live, and more.

IT Due Diligence
Information technology (IT) due diligence is the process of investigating and understanding a company’s IT systems, most often before a merger or acquisition (M&A). IT due diligence ensures companies understand all IT risks, assets, and liabilities prior to the M&A. IT due diligence is a complex process, typically involving an in-depth audit and analysis of IT components such as security and disaster recovery.

J
[Back to Top]
Java Runtime Environment
Java Runtime Environment (JRE) is a software layer that runs on top of a computer’s operating system, providing additional services that a specific Java program needs to run. JRE is one of three interrelated components that form a trifecta for developing and running Java applications. The other two are: Java Development Kit (JDK): A set of tools for developing Java applications. JDKs are chosen by developers by Java version and edition, such as the Java Enterprise Edition. Regardless of version or edition, JDK always includes a compatible JRE. Java Virtual Machine (JVM): Executes live Java applications. Every JRE includes a default JVM. JRE combines Java code created using the JDK with the libraries required to run it on a JVM. Then, an instance is created of the JVM that executes the resulting program. JRE provides many integration libraries such as Java IDL, Java Database Connectivity, and Java Naming and Directory Interface to help developers create seamless data connections between applications and services. JRE also includes packages that are foundational for the design of applications. Some packages include collections framework, concurrency utilities, preferences API, and Java Archive.

JDBC – Java Database Connectivity
Short for Java Database Connectivity, a Java API that enables Java programs to execute SQL statements. This allows Java programs to interact with any SQL-compliant database. Since nearly all relational database management systems (DBMSs) support SQL, and because Java itself runs on most platforms, JDBC makes it possible to write a single database application that can run on different platforms and interact with different DBMSs. JDBC is similar to ODBC, but is designed specifically for Java programs, whereas ODBC is language-independent. JDBC was developed by JavaSoft, a subsidiary of Sun Microsystems.

Jitter
(1) Flickering on a display screen. Jittering can be caused by the following: (a) a number of hardware problems, such as a slow refresh rate, a bad connection between the video adapter and monitor, a hardware malfunction in the monitor, or poor synchronization in the signals being sent; (b) a nearby electrical conduit or transformer creating a higher-than-usual local magnetic field level. (2) In VoIP terminology jitter refers to a type of packet delay where the delay has an impact on the quality of the voice conversation. (3) Generally, any distortion of a signal or image caused by poor synchronization.

Jumper
A metal bridge that closes an electrical circuit. Typically, a jumper consists of a plastic plug that fits over a pair of protruding pins. Jumpers are sometimes used to configure expansion boards. By placing a jumper plug over a different set of pins, you can change a board’s parameters.

Jumperfree Configuration
An ASUS BIOS configuration utility (tab) that offers users access to overclocking options including AI Overclocking, CPU Ratio, FSB Frequency, PCIe Frequency, DRAM Frequency, DRAM Timing Control, and other options.

JVM – Java Virtual Machine
JVM is short for Java Virtual Machine. JVM is an abstract computing machine, or virtual machine. It is a platform-independent execution environment that converts Java bytecode into machine language and executes it. Most programming languages compile source code directly into machine code that is designed to run on a specific microprocessor architecture or operating system, such as Windows or UNIX. Recommended Reading: Webopedia Study Guides – Java Basics: Variables, Syntax and Conventions and Java Basics Part 2: Operators, Modifiers and Structures. A MACHINE WITHIN A MACHINE JVM — a machine within a machine — mimics a real Java processor, enabling Java bytecode to be executed as actions or operating system calls on any processor regardless of the operating system. For example, establishing a socket connection from a workstation to a remote machine involves an operating system call. Since different operating systems handle sockets in different ways, the JVM translates the programming code so that the two machines that may be on different platforms are able to connect. JVMs are not the only virtual machines being used today.

K
[Back to Top]
Key
1.) A button on a keyboard. 2.) In database management systems, a key is a field used to sort data. It can also be called a key field, sort key, index, or keyword. For example, if you sort records by age, then the age field is a key. Most database management systems allow you to have more than one key to sort records in different ways. One of the keys is designated the primary key and must hold a unique value for each record. A key field that identifies records in a different table is called a foreign key. 3.) In cryptography, an encryption key is a string of characters used in combination with an algorithm (a cipher) to transform plaintext into ciphertext and vice versa for decryption algorithms. An encryption key is used to encrypt, decrypt, or carry out both functions based on the encryption software used. The longer a key is built, the harder it is to crack the encryption code. 4.) A password or table needed to decipher encoded data. 5.) Memory keys are physical notches on the module that prevent the memory from being incorrectly installed in a computer system. Memory keys also prevent the memory from being installed into an incompatible computer system.

Keyboard
A keyboard is the set of typewriter-like keys that enables you to enter data into a computer. Computer keyboards are similar to electric-typewriter keyboards but contain additional keys. The keys on computer keyboards are often classified as follows: •alphanumeric keys -- letters and numbers •punctuation keys -- comma, period, semicolon, and so on. •special keys -- function keys, control keys, arrow keys, Caps Lock key, and so on. QWERTY, AZERTY, Dvorak and Other Keyboards The standard layout of letters, numbers, and punctuation is known as a QWERTY keyboard because the first six keys on the top row of letters spell QWERTY. The QWERTY keyboard was designed in the 1800s for mechanical typewriters and was actually designed to slow typists down to avoid jamming the keys. The AZERTY keyboard is the French version of the standard QWERTY keyboard. AZERTY keyboards differ slightly from the QWERTY keyboard.

Kubernetes
Kubernetes (K8s) is an open-source container management software developed to help organizations in orchestrating machines that power modern cloud applications. Kubernetes can be used to quickly and efficiently launch, organize, and manage containers, which are the lightweight virtual machines (VMs) advancing modern application development. The orchestration manager automates the deployment, scaling, and managing of containerized applications. Some of its essential containerization management features include service discovery, automatic load balancing, container replication – all powered via a web API.

L
[Back to Top]
Language
A system for communicating. Written languages use symbols (that is, characters) to build words. The entire set of words is the languages vocabulary. The ways in which the words can be meaningfully combined is defined by the languages syntax and grammar. The actual meaning of words and combinations of words is defined by the languages semantics.

Learner
Any individual who is receiving an education. Can be taught by an educator or self-taught.

Learning Management System (LMS)
A piece of software that manages, analyzes, and runs educational courses and training programs. Also included are student registration, curriculum management, skill & competency management, and reporting features. Most modern LMS packages are web-based.

Learning Theory
Any conceptual framework rooted in psychological principles and used for administering education. There are multiple learning models out there, such as the behaviorist, cognitive constructivist, and social constructivist models. This field is constantly evolving as we understand more about how people learn.

Library
(1) A collection of files. (2) In programming, a library is a collection of precompiled routines that a program can use. The routines, sometimes called modules, are stored in object format. Libraries are particularly useful for storing frequently used routines because you do not need to explicitly link them to every program that uses them. The linker automatically looks in libraries for routines that it does not find elsewhere. In MS-Windows environments, library files have a .DLL extension.

Liquid Network
Liquid Network is another type of sidechain platform with an emphasis on the efficiency of digital transactions. It also allows for the tokenization of multiple assets. This allows users to issue all sorts of tokens, ranging from digital collectibles to securities. Another key benefit of Liquid Network is that it offers confidential transactions by masking the asset type and amount of the transaction.

Log4Shell
Log4Shell was a zero-day vulnerability found in Log4j, a popular Java logging framework used on several Java platforms. Log4j, a project of Apache Software Foundation, offers an open-source logging framework for developers for logging purposes, which is a process commonly used by software development teams to record an activity. WHAT IS LOG4SHELL? Log4Shell is a zero-day vulnerability, as it went unnoticed since 2013. At the time of Log4Shell’s discovery, it had affected hundreds of millions of devices. According to some estimates, it has impacted 3 billion systems globally. WHEN WAS LOG4SHELL DISCOVERED? In November 2021, the Log4Shell vulnerability was privately disclosed to Apache Software Foundation by Chen Zhaojun. Zhaojun is a security researcher for Alibaba, which is the largest e-commerce company in China. The vulnerability was disclosed publicly on December 9, 2021, when servers hosting the game Minecraft were attacked. The Apache security team set Log4Shell’s severity rating at 10/10 and issued a patch to fix the vulnerability; however, the first patch was not completely successful, requiring subsequent patches to fix Log4 Shell. On December 28, 2021, Apache released the fourth patch to fix the vulnerability. HOW DOES LOG4SHELL WORK? One of the reasons Log4Shell is dangerous is how easy it is to use and how widely used the Log4j library is. Some of the major applications such as VMware and Amazon Web Services (AWS) use Log4j. This widespread use of Log4j makes patching to fix Log4Shell extremely difficult and complex. The Log4j library controls how a computer program logs information. This means that when the attackers exploit the Log4Shell vulnerability, they can gain access and control over the string to execute malicious code on the computer program or device. Attackers can even use Log4Shell to take over the servers that house it.

Logical
(1) Refers to a user’s view of the way data or systems are organized. The opposite of logical is physical, which refers to the real organization of a system. For example, a logical description of a file is that it is a collection of data stored together. This is the way files appear to users. Physically, however, a single file can be divided into many pieces scattered across a disk. (2) Refers to any Boolean logic operation.

M
[Back to Top]
Main Memory
Main memory refers to physical memory that is internal to the computer. More specifically, main memory is a computer’s short-term storage. WHAT DOES MAIN MEMORY DO? Main memory’s job is to hold data that the CPU needs to access frequently, such as instructions and data currently being processed. Data can be accessed much more quickly than data stored on disk drives or other secondary storage devices. Instructions are read into the CPU by an instruction fetch unit, decoded by an instruction decode unit, and executed by one or more execution units within the CPU. WHERE DID THE TERM COME FROM? The term was coined by IBM engineer George Scalise in 1956 when he designed RAMAC (Random Access Method of Accounting and Control), the first commercial computer with a hard disk drive. In early computers, all processing took place in the main memory because there was no hard disk drive for long-term storage of programs and data. The word main is used to distinguish it from external mass storage devices such as disk drives. Other terms used to denote this type of memory include RAM and primary storage. Today, most personal computers have both a hard disk drive for permanent storage and random access memory (RAM) for temporary information that must be available during program execution.

Mainchain
This base layer or the mainchain is where all the transactions are executed and finalized. Every blockchain has a central or mainchain to facilitate transactions on the network. All transactions that are done layers on top of the mainchain are not confirmed until they are finalized on the mainchain. This makes the mainchain one of the most important components of any blockchain network. The upgrades to the mainchain have allowed for several privacy, security, and data decentralization features to be added to the mainchain through the development of applications and layers on top of the chain.

Malware
(mal´wãr) (n.) Short for malicious software, malware refers to software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

Massive Open Online Course (MOOC)
An online course that includes video lectures, reading materials, problem sets, and a student community. Supporters see MOOCs as a disruptive innovation and detractors question its actual educational efficacy.

Math Manipulatives
An object that can be moved around as an aid for understanding a mathematical concept. Sometimes handling a real-world object can help students learn an abstract concept like addition and multiplication.

Memoization
Memoization in programming allows a programmer to record previously calculated functions, or methods, so that the same results can be reused for that function rather than repeating a complicated calculation. This means using the command or function memoize, which accesses the library of memos that have been previously recorded. Memoization optimizes computing time, though it does take more resources accordingly. Memoizing functions or methods allow the program to avoid calculating complicated processes multiple times. A method in object-oriented programming, or the way an object behaves in its class, can then perform a process more quickly rather than taking time to recalculate an input. Inputs, which allow programmers to enter data quickly into a program rather than directly coding everything, are memoized to keep the exact same calculation in storage for next time.

Microprocessor
A silicon chip that contains a CPU. In the world of personal computers, the terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and most workstations sits a microprocessor. Microprocessors also control the logic of almost all digital devices, from clock radios to fuel-injection systemsfor automobiles. Three basic characteristics differentiate microprocessors: Instruction set: The set of instructions that the microprocessor can execute. bandwidth : The number of bitsprocessed in a single instruction. clock speed : Given in megahertz (MHz), the clock speed determines how many instructions per second the processor can execute. In both cases, the higher the value, the more powerful the CPU. For example, a 32-bit microprocessor that runsat 50MHz is more powerful than a 16-bit microprocessor that runs at 25MHz. In addition to bandwidth and clock speed, microprocessors are classified as being either RISC (reduced instruction set computer) or CISC(complex instruction set computer).

MIDL
Short for Microsoft Interface Definition Language, MIDL defines interfaces between client and server programs. Microsoft includes the MIDL compiler with the Platform SDK to enable developers to create the interface definition language (IDL) files and application configuration files (ACF) required for remote procedure call interfaces and COM/DCOM interfaces. MIDL also supports the generation of type libraries for OLE Automation. Create client and server programs for heterogeneous network environments that include such operating systems as Unix and Apple. [Source: MSDN Library - MIDL]

Mobile Security
Mobile security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops and other mobile devices. The term mobile security is a broad one that covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss of the mobile device.

Mobile Security
Mobile Security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops and other mobile devices. The term mobile security is a broad one that covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss of the mobile device.

Modem
(m dem) (n.) Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms. STANDARD MODEM INTERFACE The USB standard has largely replaced RS-232 in both telephone and cable modems. and Early telelphone modems used a standard interface for connecting external modems to computers called RS-232. Consequently, any external modem can be attached to any computer that has an RS-232 port, which almost all personal computers have. There are also modems that come as an expansion board that you can insert into a vacant expansion slot in your PC. These are sometimes called onboard or internal modems.

Module
(1) In software, a module is a part of a program. Programs are composed of one or more independently developed modules that are not combined until the program is linked. A single module can contain one or several routines. (2) In hardware, a module is a self-contained component.

Multi-Factor Authentication (MFA)
Multi-factor authentication (MFA) is an electronic authentication process that provides extra layers of security to an application or service against various cyber attacks. Also referred to as 2-factor authentication (2FA), MFA requires a minimum of two pieces of authentication to log in to an application either through verification code, biometrics, or browser notifications.

MySQL
Pronounced “my ess cue el” (each letter separately) and not “my SEE kwill.” MySQL is an open source RDBMS that relies on SQL for processing the data in the database. MySQL provides APIs for the languages C, C++, Eiffel, Java, Perl, PHP and Python. In addition, OLE DB and ODBC providers exist for MySQL data connection in the Microsoft environment. A MySQL .NET Native Provider is also available, which allows native MySQL to .NETaccess without the need for OLE DB. MySQL is most commonly used for Web applications and for embedded applications and has become a popular alternative to proprietary database systems because of its speed and reliability. MySQL can run on UNIX, Windows and Mac OS.

N
[Back to Top]
Namespace
(1)The set of names in a naming system. (2)A logical grouping of the names used within a program. Also called name scope. (3) A library of classes in .NET. (4) XML namespace: In XML, a namespace is a collection of names, identified by a URI reference, that are used in XML documents as element types and attributenames. In order for XML documents to be able to use elements and attributes that have the same name but come from different sources, there must be a way to differentiate between the markup elements that come from the different sources. (5) DNS namespace: DNS is the name service provided by the Internet for TCP/IP networks. DNS is broken up into domains, a logical organization of computers that exist in a larger network. The domains exist at different levels and connect in a hierarchy that resembles the root structure of a tree. Each domain extends from the node above it, beginning at the top with the root-level domain. Under the root-level domain are the top-level domains, under those are the second-level domains, and on down into subdomains. DNS namespace identifies the structure of the domains that combine to form a complete domain name. For example, in the domain name sub.secondary.com, “com” is the top-level domain, “secondary” identifies the secondary domain name (commonly a site hosted by an organization and/or business), and “sub” identifies a subdomain within the larger network. This entire DNS domain structure is called the DNS namespace. The name assigned to a domain or computer relates to its position in the namespace.

Network Virtualization
Network virtualization (NV) is using network resources through a logical segmentation of a single physical network, or making multiple networks appear as one in a virtual data center. Network virtualization is achieved by installing software and services to manage the sharing of network resources among storage, computing cycles and applications. Network virtualization treats all servers and services in the network as a single pool of resources that can be accessed without regard for its physical components. Software-defined networking (SDN) is one type of network virtualization. The term network virtualization has been used to describe many things, including network management, storage virtualization, and even grid computing.

NFC Tag
Near field communication (NFC) is a protocol that allows two devices to communicate wirelessly via radio signal when in close proximity with one another, approximately 4 inches or less. It’s a subset of radio-frequency identification (RFID) and is similar to Bluetooth and WiFi. An NFC tag is a RFID transponder—a small chip connected to an antenna. The chip has a unique ID, used to uniquely pair an NFC tag with an object, and rewritable memory. The antenna allows the chip to interact with an NFC scanner, such as a smartphone. An NFC tag is passive, meaning it doesn’t have a power source. Instead, it draws power from the device that reads it. When the reading device comes into proximity, it energizes the NFC tag and transfers data via radio waves broadcasting at 13.56 MHz.

NFT (Non-Fungible Token)
A non-fungible token (NFT) is a digital asset that has been tokenized with unique digital certificates by its creators, making it valuable in the same way as a painting or very rare piece of sports memorabilia. The unique token is published on blockchain technology. However, NFTs themselves carry no inherent value; all of their value is derived from what a buyer is willing to pay for the digital asset or file that they symbolize.

Nginx
Nginx is an open source HTTP Web server and reverse proxy server. Pronounced as Engine-Ex, Nginx has emerged as the third most popular Web server behind the Apache Web server and Microsoft s IIS, and it currently powers popular websites like Pinterest, WordPress.com, Netflix, Hulu, CloudFlare, Zappos and Zynga. In addition to offering HTTP server capabilities, Nginx can also operate as an IMAP/POP3 mail proxy server as well as function as a load balancer and HTTP cache server. Nginx can run on Linux, Mac OS X, Solaris, AIX, HP-UX and BSD variants.

Nonrepudiation
Nonrepudiation - In reference to digital security, nonrepudiation means to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Nonrepudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.

O
[Back to Top]
One-to-one (1:1)
Most commonly refers to a program where a school provides one device (e.g. laptop, tablet, etc) per student. This is a new initiative and a lot of conflicting reports exist citing its advantages and disadvantages. Many K-12 schools are currently running 1:1 pilots to test this concept.

Online
Turned on and connected. For example, printers are online when they are ready to receive data from the computer. You can also turn a printer offline. While the printer is offline, you can perform certain tasks such as advancing the paper, but you cannot send data to it. Most printers have an online button you can press to turn the machine on- or offline. Users are considered online when they are connected to a computer service through a modem. That is, they are actually on the line.

Open Educational Resource (OER)
Any online educational material that is freely accessible and openly licensed for public consumption. Such materials can be online courses, lectures, homework assignments, exercises, quizzes, interactive simulations, games, etc.

Open Source Software
Any piece of software that is freely available and openly licensed. Other programmers can contribute to the original software or create their own versions of it. Most modern websites incorporate some kind of open source software, including edshelf!

Oracle SQL Developer
SQL Developer is a free database management software offered by Oracle, one of the leading database management companies in the world. The name SQL Developer refers to Structured Query Language, a language for making queries within databases. SQL Developer offers database administrators many features that allow them to organize their data and manage the database more efficiently. Oracle SQL Developer’s features include: Data modeling that makes the data more visibly organized and relational, so that developers and administrators can see the relationship between objects Connections that users can create, choosing the type of connection and color-coding it if they want An object browser to search data objects in a variety of formats Object editor with many different options (such as adding a column to a table) Data importing and exporting for different data formats Report generation for database sessions Data migrations from other databases

OS - operating system
The operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.

P
[Back to Top]
PDA - personal digital assistant
Short for personal digital assistant, a handheld device that combines computing, telephone/fax, Internet and networking features. A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer. PDAs may also be referred to as a palmtop, hand-held computer or pocket computer.

Pedagogy
The science and art of education and learning theory. Just as there are fields of study in other subjects, this is the study of teaching.

Personal Learning Network (PLN)
An informal network of people that is professional in nature and meant to aid an educator in furthering his/her pedagogical craft. Since teaching in a classroom doesn’t lend itself to a lot of peer interaction, teachers create PLNs to meet other teachers for advice and support.

Pharming
Pharming - Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming poisons a DNS server by infusing false information into the DNS server, resulting in a users request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.

PostgreSQL
PostgreSQL is an open source database system that began as an enhancement to the POSTGRES research prototype DBMS. Where POSTGRES used the PostQuel query language, PostgreSQL uses a subset of SQL.

Professional Development (PD)
A generic term for the growth of one’s career-oriented competencies. Teachers regularly attend workshops and conferences, expand their PLN, and undergo performance evaluations to further their craft.

Programming Language
A programming language is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal. HOW DOES PROGRAMMING LANGUAGE WORK? Each programming language has a unique set of keywords (words that it understands) and a special syntax for organizing program instructions. A program written in a particular programming language has two parts: instructions written in that language and statements written in another language called machine code. Machine code is a binary format that consists of ones and zeros (1 and 0); each digit represents either an instruction or data within the program. When a programmer types a command into their computer’s terminal, it sends those instructions to their computer’s processor, which translates them into machine code, so it can execute them. It then takes any information produced by those commands and translates it back into something humans can understand—usually English. The process is similar for websites; when a user enters text into a search engine like Google, it converts the user’s query into machine code before sending it off to its servers. It then processes all of the results from its search algorithm using machine code before translating them back into a human-readable form.

Project Based Learning (PBL)
A teaching method based on the idea of “learning by doing.” Students work on a hands-on real-world activity that demonstrates the concepts they are learning. PBL learning tends to have high student engagement.

Project Manager
A project manager is an individual who is responsible for planning, organizing, managing, and completing small business or enterprise projects. Learn more about what a project manager does and how to become one here. WHAT IS A PROJECT MANAGER? Virtually every industry from healthcare to manufacturing requires the support of professional project managers to manage projects. However, information technology (IT) is a common industry for project managers, as many IT projects are complex and require dedicated oversight. Project managers within IT roles are tasked with ensuring IT projects are completed successfully. Projects may include web development, software implementation, app development, computer networking, and other initiatives that include multiple steps and workflows. Project managers are involved throughout the lifecycle of projects, from planning to execution and completion. These individuals are especially important in IT because they ensure projects don’t cause serious network downtime or otherwise severely impact business operations. WHAT DO PROJECT MANAGERS DO? Project managers are responsible for managing each stage of a project, from initial planning to closing. During the planning stage, an IT project manager works with the IT team to solidify project goals, determine budgets, define project scope, create schedules, and prepare both employee and monetary resources. After a project begins, the project manager is tasked with managing the project team, updating stakeholders on project progress, mitigating issues and concerns, and ensuring key milestones are met.

Proxy Server
A proxy server is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. PURPOSE OF A PROXY SERVER Proxy servers have two main purposes: to improve performance and to filter requests. Improve Performance Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we’ll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. Filter Requests Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.

PwC
PwC is one of the most prestigious groups of accounting firms that offers audit, assurance, tax, and advisory services. Beyond its core audit and consultation services, PwC’s capabilities also include emerging technologies, cybersecurity, data analytics, and managed services. Learn more about what PwC offers its customers in this comprehensive guide.

Q
[Back to Top]
QR Code
Short for quick response code, a QR code is a type of two-dimensional (2D) barcode that can be read using a QR barcode reader or camera-enabled smartphone with QR reader software. A QR code is able to carry information in both the vertical and the horizontal direction, which is why it is called a 2D barcode. The QR Code is a registered trademark of Denso Wave Inc. in Japan and other countries. QR Codes are popular with mobile phone users as the barcode can be used to store addresses and URLs. With a camera-enabled smartphone, users can scan the QR Code which has been coded to do things like display text, provide contact data or even open a webpage in the browser on the smartphone. The QR Code specification outlines data types, or services for this information. By using the standards it ensures QR Code software can correctly read the barcode.

QWERTY keyboard
(Pronounced kwer-tee). QWERTY refers to the arrangement of keys on a standard English computer keyboard or typewriter. The name derives from the first six characters on the top alphabetic line of the keyboard. Arrangement of Characters The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations. However, there is no evidence to supportthis assertion, except that the arrangement does, in fact, inhibit fast typing.

R
[Back to Top]
Resume
A resume is a formal document created and used by a person to show their career background and skills. Resumes are used for a variety of reasons, but they are most often used to secure a new job by supplying information such as relevant job experience and education. Resume originated from the french term r sum , which means summary. The term is also similar to the latin term curriculum vitae, which is a written overview of someone’s life work. RESUME FORMAT The purpose of a resume is so that a job candidate can introduce themselves to their employer, present their qualifications, and hopefully obtain an interview. A resume should include a candidate’s experience, education, and skills in an easy-to-read format. A resume is typically limited to one or two pages of size A4 or letter size. It highlights only the experience and skills the candidate considers the most relevant to the desired position they are applying to. A good resume contains keywords or skills the employer is looking for, heavily uses active verbs, and displays the content in an attractive manner. The complexity or simplicity of a resume varies from person to person occupation to occupation. For example, a doctor or professor may have a longer resume than a general business resume because of the specialized field. Other industries may require special cases. An artist might include an extensive list of solo or group exhibitions they’ve shown.

Retina Display
Retina Display is a marketing term developed by Apple to refer to devices and monitors that have a resolution and pixel density so high – roughly 300 or more pixels per inch – that a person is unable to discern the individual pixels at a normal viewing distance. Apple's Retina Display made its debut on 2011's iPhone 4S, which featured a 960x640 pixel screen with four times the number of pixels (326 pixels per inch) as the iPhone 4. The new iPad that was released in early 2012 included a 2048x1536 resolution Retina Display as well. The 2012 lines of updated Mac Book Pro and Mac Book Air notebooks are expected to include Retina Display screens with 2880x1800 resolution displays. Intel is also expected to help make Retina Display a reality in laptops and Windows 8 tablets and ultrabooks with its new Ivy Bridge processor architecture.

Retina HD Display
Retina HD Display is a marketing term first introduced by Apple with the debut of its iPhone 6 and iPhone 6 Plus smartphones. Retina HD Displays have a high-definition quality resolution and pixel density of at least 326 pixels per inch, which is sufficiently high enough for the average person to be unable to discern the individual pixels at a normal viewing distance.

Reverse Engineering
Reverse engineering, oftentimes called back engineering, is a process of deconstructing aircrafts, software, machines, and other products to retrieve design information. It involves deconstructing individual components of larger products to determine how each part is made so users can recreate them. From the name itself, reverse engineering works backwards through the original design process to identify a system s components and their interrelationships to create a physical representation of the system. USES OF REVERSE ENGINEERING Reverse engineering captures the physical components, features, and material properties of an item. It can be used for a variety of purposes, including: Original Equipment Manufacturer (OEM) issues In the event an OEM no longer trades a specific product or has lost its design measurements, reverse engineering can help provide vital information for recreating the product. Legacy components Reverse engineering helps recreate products that were designed decades ago when no 2D or 3D CAD data was available to illustrate them. Competitor analysis Many manufacturing companies use reverse engineering to analyze competitor products. Digital archiving Historic artifacts and museum pieces can be captured through 3D scanning and reverse engineered to result in CAD data. This data helps reproduce parts of the item in case of damage.

Rezence
Rezence is a wireless charging technology and specification based on the principles of magnetic resonance and developed to wirelessly power smartphones, tablets, wearable computing devices and other mobile electronics. The name Rezence is derived from the words resonance and essence. The Alliance for Wireless Power (A4WP) organization is responsible for maintaining, promoting and evolving the Rezence technology. The A4WP was formed in 2012, and it launched the Rezence name and compatibility program in late 2013. The non-profit organization also revealed the Rezence logo at that time, a lightning bolt between a bottom and top bracket that together form the letter "Z." The Nascent But Heated Wireless Charging Battle Rezence contends in the nascent wireless charging sector with a number of competing standards, including the Wireless Power Consortium's Qi and the Power Matters Alliance's PowerMat. In February 2014, the A4WP and the Power Matters Alliance signed an agreement to adopt each other's technologies for greater compatibility and a higher likelihood of gaining mainstream acceptance.

RootStock (RSK)
The RootStock (RSK) is the type of smart contract platform used for sidechains in Bitcoin and Ethereum blockchains. It is one of the leading platforms for use of sidechains. Using RSK is a reliable and efficient way to scale up Bitcoin and Ethereum networks.

S
[Back to Top]
Science Technology Engineering Art Math (STEAM)
An acronym that stands for the fields of science, technology, engineering, arts, and mathematics. This is a reaction to the STEM initiative and includes the arts as a priority as well. Though it is not yet as widely promoted as STEM, it is gaining in popularity.

Science Technology Engineering Mathematics (STEM)
An acronym that stands for the fields of science, technology, engineering, and mathematics. These fields are often grouped together because of a national movement to promote these subjects in the US. This includes initiatives to integrate their curriculums together and hopes that such an emphasis will lead to a stronger high-tech workforce.

Sidechain
A sidechain is a type of blockchain network that allows cryptocurrency to be transferred between multiple blockchains. Sidechains add immense potential to the scale, scope, and efficiency of blockchain technology, as they allow previously isolated blockchain networks to integrate into a larger ecosystem. Sidechains were introduced to enable cryptocurrencies, such as Bitcoin and other ledger assets, to be interoperable so users have access to new cryptocurrency systems while using the digital assets they already own. Using a sidechain can also help mit

Silicon
A nonmetallic chemical element in the carbon family of elements. Silicon – atomic symbol “Si” – is the second most abundant element in the earth’s crust, surpassed only by oxygen. Silicon does not occur uncombined in nature. Sand and almost all rocks contain silicon combined with oxygen, forming silica. When silicon combines with other elements, such as iron, aluminum or potassium, a silicate is formed. Compounds of silicon also occur in the atmosphere, natural waters, many plants and in the bodies of some animals. Silicon is the basic material used to make computer chips, transistors, silicon diodes and other electronic circuits and switching devices because its atomic structure makes the element an ideal semiconductor. Silicon is commonly doped, or mixed, with other elements, such as boron, phosphorous and arsenic, to alter its conductive properties. Silicon was first isolated and described as an element in 1824 by J ns Jacob Berzelius, a Swedish chemist.

Smartphone
Smartphones are a handheld device that integrates mobile phone capabilities with the more common features of a handheld computer or PDA. Smartphones allow users to store information, e-mail, install programs, along with using a mobile phone in one device. For example a Smartphone could be a mobile phone with some PDA functions integrated into the device, or vise versa.

Social Network
A social structure made of nodes that are generally individuals or organizations. A social network represents relationships and flows between people, groups, organizations, animals, computers or other information/knowledge processing entities. The term itself was coined in 1954 by J. A. Barnes.

Soft Skills
Soft skills are non-technical attributes, characters, and interpersonal skills that define how a person relates with their professional colleagues and others in work and social environments. These include but are not limited to leadership, communication, problem-solving, team-building, collaboration, and time management skills. Unlike hard skills, these skills are unquantifiable, immeasurable, and hard to teach.

Software-Defined Data Center (SSDC)
SDDC is short for software-defined data center. May also be called software-defined datacenter (SDD) or virtual data center. Software-defined data center (SDDC) is the phrase used to refer to a data center where all infrastructure is virtualized and delivered as a service. Control of the data center is fully automated by software, meaning hardware configuration is maintained through intelligent software systems. This is in contrast to traditional data centers where the infrastructure is typically defined by hardware and devices. Software-defined data centers are considered by many to be the next step in the evolution of virtualization and cloud computing as it provides a solution to support both legacy enterprise applications and new cloud computing services. CORE COMPONENTS OF THE SOFTWARE-DEFINED DATA CENTER According to Torsten Volk, EMA, there are three core components of the software-defined data center: network virtualization, server virtualization and storage virtualization. A business logic layer is also required to translate application requirements, SLAs, policies and cost considerations. (Source: EMA Blogs; The Software-Defined Data center: Core Components) Software-defined data center is a relatively new enterprise computing phrase, but a number of vendors have announced software-defined data center products, including the VMware vCloud Suite. The phrase software-defined data center (SDDC) was coined by VMware’s CTO, Dr. Steve Herrod.

Software-Defined Servers
A marketing term coined by HP for its ultra-low power Project Moonshot servers developed for specific data center workloads such as cloud computing and big data. The HP Moonshot software-defined servers use 89 percent less power and 80 percent less space than traditional server systems and reduce complexity by 97 percent.

SORBS
SORBS - SORBS was originally an anti-spam project where a daemon would check, in real time, all servers from which it received e-mail to determine if that e-mail was sent via various types of proxy and open-relay servers. SORBS has evolved into SORBS DNSbl (DNS-based blacklist) which now includes more than 3 million listed hosts that are considered to be compromised (Web servers which have vulnerabilities that can be used by spammers).

SQL
SQL is a standardized query language for requesting information from a database. It is an abbreviation for structured query language and is pronounced as separate letters, although some users pronounce it see-kwell. The original version, called SEQUEL (structured English query language), was designed by an IBM research center in 1974 and 1975. SQL was first introduced as a commercial database system in 1979 by Relational Software, which later became Oracle. Before SQL, databases used the CODASYL (the Conference/Committee on Data Systems Languages) system to retrieve data. Searching for data using CODASYL’s method required more steps, but it also took less computer memory and time than SQL to return a query. Some professionals believe that SQL, though the standard language for databases, is not the best possible solution. However, it’s by far the most well known. Historically, SQL has been the favorite query language for database management systems running on minicomputers and mainframes. Increasingly, however, SQL is being supported by PC database systems because it supports distributed databases (databases that are spread out over several computer systems). This enables multiple users on a local-area network to access the same database simultaneously.

Stealth Mode
Stealth mode is a business term that is commonly used to describe taking on new business opportunities, projects, or company initiatives privately. It is a strategy that many startups use to build up their customer base and gain traction before going public with their brand. A business in stealth mode remains silent about its products or services, keeping its ideas under wraps until they are ready for release. In this definition, learn more about what stealth mode means for startups and best practices for launching a stealth mode startup.

Storage
(1) The capacity of a device to hold and retain data. (2) Short for mass storage.

Storage Logical Partition
Storage Logical Partition (SLPR) defines the assignment of one or more Cache Logical Partitions (CLPRs) and the assignment of one or more target physical ports for the Cache Logical Partitions (CLPRs) to use

Student Assessment
An item that can be used to measure a student’s competency in a particular topic. Assessments can take many forms, such as tests, essays, projects, presentations, etc.

Student Information System (SIS)
A piece of software that manages student data. This includes grades, attendance, background information, discpline records, health records, etc.

Student Response Systems
Synonymous with Clickers. Sometimes also called Classroom Response Systems or, more generically, Audience Response Systems. See the Clickers definition above.

Subdomain
(sub d -m n ) (n.) Also called a child domain, a domain that is part of a larger domain name in DNS hierarchy. DNS hierarchy consists of the root-level domain at the top, underneath which are the top-level domains, followed by second-level domains and finally subdomains. For example, in the domain name webopedia.internet.com, “webopedia” is a subdomain of the larger second-level domain “internet.com.”

Substitution Augmentation Modification Redefinition (SAMR)
The four levels of this model represent how integrated technology is into a curriculum, from substituting non-technical tools with technical ones, augmenting existing tasks with technology, modifying existing tasks with technology, to redefining tasks using technology in ways that were previously inconceivable.

Supply Chain Management
supply chain management(SCM) is the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. Supply chain management does not involve only the movement of a physical product (such as a microchip) through the chain but also any data that goes along with the product (such as order status information, payment schedules, and ownership titles) and the actual entities that handle the product from stage to stage of the supply chain. There are essentially three goals of SCM: to reduce inventory, to increase the speed of transactions with real-timedata exchange, and to increase revenue by satisfying customer demands more efficiently. In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain.

T
[Back to Top]
Tag
(n) A command inserted in a document that specifies how the document, or a portion of the document, should be formatted. Tags are used by all format specifications that store documents as text files. This includes SGML and HTML. (v) To mark a section of a document with a formatting command.

Technological Pedagogical Content Knowledge (TPACK)
A model for how pedagogy, technology, and content can interact and work together. Often drawn as a Venn diagram of three intersecting circles, Matthew Koehler and Punya Mishra created this framework on top of Lee Shulman’s PCK (Pedagogical Content Knowledge) model by adding technology into the mix.

Third-Party Apps
A third-party application is an application provided by a vendor other than the device or operating system (OS) manufacturer. For example, most smartphones have a camera app, but there are also third-party camera apps that offer advanced features for photo editing. Unless the device manufacturer incorporates the same features in their camera app, smartphone owners frequently choose to download and use the third-party app. Third-party applications can be standalone programs or plugins that enhance the functionality of existing programs. Read on to learn more about what third-party applications are and how they can be used.

Throughput
WHAT IS THROUGHPUT? Throughput is the rate data is processed and transferred from one location to another. In networking, it’s used to measure the performance—meaning speed—of hard drives and RAM along with internet and network connections. Throughput is measured in bits per second or data per second. A hard drive that has a maximum transfer rate of 200 Mbps has twice the throughput of a hard drive with a transfer rate of 100 Mbps. A 60 Mbps wireless connection has three times as much throughput as a 20 Mbps wireless connection. The maximum throughput of a device or network may be significantly higher than the actual throughput achieved in daily use due to contributing factors such as internet connection speed and other network traffic. Generally, the realistic operational throughput is approximately 95 percent of maximum throughput. In manufacturing, the term is used in the context of a company’s rate of production, or the speed at which an item is processed from beginning to end. A business with a higher throughput level can take market share away from a business with a lower throughput level, since a higher throughput generally indicates more efficient product production. Also read: What is Bandwidth? NETWORK THROUGHPUT WIthin networking, throughput was originally conceived to evaluate the productivity of computer processors. This was calculated in terms of batch jobs, or millions of instructions per second. Throughput measures how many packets arrive at their destination successfully. How fast packets or units of data travel from source to destination or from sender to recipient determines how much information can be sent within a given timeframe. For example, if a packet with a size of 100 bytes takes one second to flow from Computer A to Computer B, the throughput between the two devices is 800 bps. One byte is equal to eight bits, so 100 bytes is 800 bits, resulting in a calculation of 800 bits per second. Packet arrival is key to high performance within a network. Packets lost in transit leads to poor or slow network performance. Slow network performance leads to slow speed within applications, meaning users experience latency. Using throughput to measure network speed roots out the exact cause of a slow network, such as packet loss, and alerts administrators to specific problems. Packet loss, latency, and jitters are all related to slow throughput speed. To increase throughput speed and overall data performance, these factors must be minimized.

Tokenization
Tokenization is the process of replacing sensitive data with non-sensitive or anonymized data, often referred to as “tokens,” while retaining the essence of the data (for example, an account number or payment source) without compromising its security. The tokens used to replace or represent data have no value on their own, and only become meaningful when they are securely associated with the data they represent. Tokenization offers the data security required by financial institutions, payment processing firms, and other private and public institutions handling sensitive details, such as medical records, bank account information, credit card information, Social Security numbers, and many more.

Tokenization
Tokenization is the process of replacing sensitive data with non-sensitive or anonymized data, often referred to as “tokens,” while retaining the essence of the data (for example, an account number or payment source) without compromising its security. The tokens used to replace or represent data have no value on their own, and only become meaningful when they are securely associated with the data they represent. Tokenization offers the data security required by financial institutions, payment processing firms, and other private and public institutions handling sensitive details, such as medical records, bank account information, credit card information, Social Security numbers, and many more. TYPES OF TOKENIZATION Vault tokenization: In this form of tokenization, users keep a secure tokenization vault database where sensitive data and associated non-sensitive data are securely stored. Vaultless tokenization: Instead of using a database, a more cryptographic device is used in vaultless tokenization, making it more secured and reliable than the vault approach. To convert sensitive data into non-sensitive data or generate tokens, secure cryptographic devices use standards-based algorithms.

Tunneling
(tun &l-ing) (n.) A technology that enables one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft’s PPTP technology enables organizations to use the Internet to transmit data across a VPN. It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. Tunneling is also called encapsulation.

U
[Back to Top]
UNIX
Pronounced yoo-niks, a popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. Created by just a handful of programmers, UNIX was designed to be a small, flexible system used exclusively by programmers. UNIX was one of the first operating systems to be written in a high-level programming language, namely C. This meant that it could be installed on virtually any computer for which a C compiler existed. This natural portability combined with its low price made it a popular choice among universities. (It was inexpensive because antitrust regulations prohibited Bell Labs from marketing it as a full-scale product.)

User Defined Function
û´z&r di-fînd´ funk´sh&n) (n.) A programmed routine that has its parameters set by the user of the system. User defined functions often are seen as programming shortcuts as they define functions that perform specific tasks within a larger system, such as a database or spreadsheet program.

V
[Back to Top]
Vectorization
WHAT IS VECTORIZATION? Vectorization is a parallel computing method that compiles repetitive program instructions into a single vector (combination of multiple datasets), which is then executed simultaneously and maximizes computer speed. Vectorization is an example of single instruction, multiple data (SIMD) processing because it executes a single operation (e.g., addition, division) over a large dataset. Today, vectorization is a critical micro-process and universally present in modern computers. HOW DOES VECTORIZATION WORK? Vectorization starts with the understanding the downside of scalar programming—the process of operating on a dataset sequentially. For example, a developer writes a for-loop to add two sets of numbers [a,b] to get a result [c]. In early computing, computers did just that, repeating the addition of a and b pairs one after another. Because these processes take place sequentially, the time needed to complete the program can be massive, depending on the datasets’ size. This excess runtime is no problem for most users for a small set of numbers, but the simple repeated instruction means lost time and energy when working with large datasets. Using applications that automatically detect and convert scalar instructions into vectorized implementations, computers can drastically decrease runtime processing. Most computers today contain automatic vectorization abilities and multi-core CPUs, which mean order of magnitude performance gains.

Virtual SAN
Virtual SAN is a software-defined storage offering from VMware that enables enterprises to pool their storage capabilities and to instantly and automatically provision virtual machine storage via simple policies that are driven by the virtual machine.

VMWare Workstation
VMware Workstation is a line of hosted hypervisor products running on x64 computers that allows users to run virtual machines, containers, and Kubernetes clusters on a single physical machine and use them simultaneously along with the host machine. Each virtual machine can execute its own operating system, including versions of Windows, Linux, BSD, and MS-DOS. The software is developed and sold by VMware, Inc., a division of Dell Technologies. In layman’s terms, VMWare Workstation enables the installation of multiple operating systems, including both client and server operating systems, at the same time. It helps network or system administrators check, test, and verify the client/server environment. Authorized users can switch between different virtual machines at the same time.

W
[Back to Top]
WEB SERVER
Web servers run as one computer, multiple computers, or a rack. They can be as simple as a laptop on a desk or as high-performance as rack servers in an enterprise data center. On their own, web servers use the HTTP or HTTPS protocol to deliver static web content to web pages on end users’ devices. Static content is cached and remains the same each time it is loaded unless the source code is manually edited. The web browser uses HTML and CSS to place static content on the page as the designer or developer designated. Web servers may use add-ons to support scripting languages like PHP or Python to provide dynamic content to web pages. These scripting languages provide functionality for connecting to databases or making calls to third-party APIs, which are needed for web application content.

Windows 10
Windows 10 is the latest release of Microsoft's Windows operating system and the successor to the underwhelming Windows 8 (and Windows 8.1). Initially codenamed Windows Threshold, Windows 10 debuted on July 29, 2015, following a "technical preview" beta release of the new operating system that arrived in Fall 2014 and a "consumer preview" beta in early 2015. With Windows 8 suffering from mostly negative reactions by both enterprises and consumers, Microsoft chose to eschew going with the logical next iteration of Windows, Windows 9, opting instead for the name Windows 10.

Windows Firewall
Windows Firewall is a Microsoft Windows application that filters information coming to your system from the Internet and blocking potentially harmful programs. The software blocks most programs from communicating through the firewall. Users simply add a program to the list of allowed programs to allow it to communicate through the firewall. When using a public network, Windows Firewall can also secure the system by blocking all unsolicited attempts to connect to your computer.

Wireless Internet
Wireless Internet enables wireless connectivity to the Internet via radio waves rather than wires on a person's home computer, laptop, smartphone or similar mobile device. Wireless Internet can be accessed directly through providers like AT&T, Verizon, T-Mobile, Boingo and Clearwire. While most wireless Internet options lack the high speed of landline broadband Internet connections such as cable and DSL, newer wireless Internet technologies like EV-DO and WiMAX are narrowing the gap, with maximum speeds of up to 7 Mbps in some cases. Wi-Fi hotspots and wireless LANs are also options for wireless Internet connectivity. In these cases, Internet connectivity is typically delivered to a network hub via a wired connection like satellite, cable, DSL or fiber optics and then made available to wireless devices via a wireless access point.

Word Processor
A word processor is software or a device that allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. Of all computer applications, word processing is the most common. Today, most word processors are delivered either as a cloud service or as software that users can install on a PC or mobile device. WHAT IS THE HISTORY OF WORD PROCESSING? The earliest word processors were standalone machines similar to electric typewriters that debuted in the 1960s. The great advantage of these early machines over using a typewriter was that you could make changes without retyping the entire document. Over time, the devices acquired more advanced features, such as the ability to save documents on a disk, elaborate formatting options, and spell-checking. While there are still some standalone word processors in use today, word processing began to move to personal computers in the 1980s. In the early days of the PC, a word processor called WordPerfect became one of the most widely used applications of any kind. Over time, however, What You See Is What You Get (WYSIWYG) word processors that showed users exactly what would print on their final documents became more popular. One of those WYSISWG word processors, Microsoft Word, became dominant in the 1990s.

Workflow
The defined series of tasks within an organization to produce a final outcome. Sophisticated workgroup computing applications allow you to define different workflows for different types of jobs. So, for example, in a publishing setting, a document might be automatically routed from writer to editor to proofreader to production. At each stage in the workflow, one individual or group is responsible for a specific task. Once the task is complete, the workflow software ensures that the individuals responsible for the next task are notified and receive the data they need to execute their stage of the process.

Workgroup Computing
A workgroup is a collection of individuals working together on a task. Workgroup computing occurs when all the individuals have computers connected to a network that allows them to send e-mail to one another, share data files, and schedule meetings. Sophisticated workgroup systems allow users to define workflows so that data is automatically forwarded to appropriate people at each stage of a process.

World Wide Web
The World Wide Web is a system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web.

X
[Back to Top]
Xerox
Best known for its copier machines, Xerox Corporation has also had a profound influence on the computer industry. During the 70s and 80s, its Palo Alto Research Center conducted pioneering work on user interfaces. Many of their inventions, such as the mouse and the graphical user interface (GUI), have since become commonplace. Xerox continues to do groundbreaking research, especially in the area of document management.

XML Schema Definition - XSD
Short for XML Schema Definition, a way to describe and validate data in an XML environment. (A schema is a model for describing the structure of information.) XSD is a recommendation of the W3C. XSD has advantages over earlier XML schema languages, such as DTD. Because XSD is written in XML, there is no need for a parser. XSD defines a richer set of data typessuch as booleans, numbers, dates and times, and currencies -- which is invaluable for e-commerce applications. DTDs, on the other hand, express data types as explicit enumerations, which makes validation much more difficult and less accurate.

Y
[Back to Top]
YaCy
YaCy (pronounced as - ya see) is a free and open source (GPL-licensed) distributed search engine. Using principles of peer-to-peer (P2P) networks, it is fully decentralized. That means all users of the search engine network are equal, and the network does not store user search requests, which makes it impossible for anyone to censor the content of the shared index. YaCy also helps to prevent spam in search results by performing link verification as part of the search process.

Z
[Back to Top]
Zapier
Zapier is a no-code automation tool that translates APIs among hundreds of web applications to simplify integrations and complex workflows. Essentially, it allows users to create commands between two or more applications based on the “if X happens, do Y” structure. Zapier’s automation of workflows takes the place of manual API integrations that require a significant degree of technical expertise. At the heart of Zapier’s functionality are automated workflows called Zaps. Every Zap has one specific trigger that happens in one application and at least one action that happens in one or more applications. Once a user has connected the applications they use to Zapier, they can choose from commonly used Zap templates or create custom workflows based on the business’s unique needs. ZAPIER HISTORY Zapier was founded in 2011 as a part of the first Startup Weekend in Columbia, Missouri. The company was accepted to Y Combinator startup accelerator in the summer of 2012, where it raised $1.3 million in seed funding. It became profitable in 2014. In 2016, the company introduced multi-step Zaps for even greater automation functionality and reached one million users. 2017 saw the launch of Zapier for Teams and Zap Sharing for teams in the span of six months, adding an enterprise-focused appeal. The company also announced its Delocation Package to help employees relocate away from the San Francisco Bay area. Zapier was listed on the Forbes Cloud 100 List in September, 2018. The same year, the company announced a steady growth in both supported app integrations and annual revenue. In 2021, Zapier announced that it had acquired Makerpad, a no-code education service and community.

Zero Knowledge Proof
Zero knowledge proof is a concept of cryptography, most commonly used to prove that a particular statement is true without revealing the facts or veracity of the statement. The concept of zero knowledge proof was first introduced in 1985 by MIT researchers. The reason it is called “zero knowledge” is that the verifier does not learn anything other than the fact that the statement is true, therefore does not gain any knowledge from it. The concept of zero-knowledge has applications in authentication systems, nuclear disarmament, finance, online voting, and blockchain.