Finlabs India

Discover Technology Terms Alphabetically

glossary-icon-1
Agile Development
Agile Development

A methodology in software development that promotes continuous iteration of development and testing throughout the software development lifecycle.

glossary-icon-2
Algorithm
Algorithm

A set of rules or steps for solving a problem or performing a task. Algorithms are essential in computer programming and software development, providing the logic behind computer operations.

glossary-icon-3
Analytics
Analytics

The systematic computational analysis of data or statistics. It's used for the discovery, interpretation, and communication of meaningful patterns in data.

glossary-icon-3
API (Application Programming Interface)
Analytics

A set of protocols, routines, and tools for building software and applications. APIs allow different software systems to communicate with each other, enabling integration and functionality sharing.

glossary-icon-5
App (Application)
Analytics

A software program that runs on a computer, phone, tablet, or other electronic devices. Apps can be desktop-based or web-based.

glossary-icon-6
Artificial Intelligence (AI)
Artificial Intelligence (AI)

The simulation of human intelligence processes by machines, especially computer systems. AI applications include expert systems, natural language processing, speech recognition, and machine vision.

glossary-icon-7
Augmented Reality (AR)
Augmented Reality (AR)

An interactive experience where real-world environments are enhanced by computer-generated perceptual information. AR can involve visual, auditory, haptic, and other sensory modalities.

glossary-icon-8
Back-end
Back-end

The server side of an application. It includes the server, database, and application logic. The back-end interacts with the front-end to relay information back and forth.

glossary-icon-9
Backup
Backup

The process of copying and archiving computer data so it can be used to restore the original after a data loss event.

glossary-icon-10
Bandwidth
Bandwidth

The maximum rate of data transfer across a network path. It is usually measured in bits per second (bps) and affects how quickly information can be sent and received over a network.

glossary-icon-11
Big Data
Big Data

Large, complex datasets that traditional data-processing software cannot adequately manage. Big data involves high volume, velocity, and variety, requiring advanced analytics for insights.

glossary-icon-12
Blockchain
Blockchain

A decentralized digital ledger that records transactions across many computers in a way that ensures the security and immutability of the data. Blockchains are used in cryptocurrencies, supply chain management, and other applications.

glossary-icon-13
Bot
Bot

An automated software application that performs tasks on the internet, such as web crawling, chat interactions, or data processing. Bots can be helpful (e.g., chatbots) or harmful (e.g., spambots).

glossary-icon-14
Cache
Cache

A hardware or software component that stores data in a super high speed buffer so that future requests for that data can be served faster.

glossary-icon-15
Cloud Computing
Cloud Computing

The delivery of computing services, including storage, processing, and networking, over the internet. Cloud computing enables flexible resources, scalability, and remote accessibility.

glossary-icon-16
Compiler
Compiler

A program that translates code written in a high-level programming language into a lower-level language, often machine code, that can be executed by a computer.

glossary-icon-17
CPU (Central Processing Unit)
CPU (Central Processing Unit)

The primary component of a computer that performs most of the processing tasks. The CPU executes instructions from software to carry out operations on data.

glossary-icon-18
CRM (Customer Relationship Management)
CRM (Customer Relationship Management)

CRM systems help businesses improve customer relationships, streamline processes, and increase profitability. *(May also refer to Crew Resource Management)

glossary-icon-19
Cybersecurity
Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks. Cybersecurity measures include firewalls, encryption, anti-virus software, and security policies.

glossary-icon-20
Data Mining
Data Mining
The process of discovering patterns and knowledge from large amounts of data. It involves techniques from statistics, machine learning, and database systems.
glossary-icon-21
Data Warehouse
Data Warehouse

A system used for reporting and data analysis, which stores current and historical data from multiple sources in a central repository.

glossary-icon-22
Database
Database

An organized collection of data, generally stored and accessed electronically from a computer system. Common databases include SQL, NoSQL, and relational databases.

glossary-icon-23
Deep Learning
Deep Learning

A subset of machine learning involving neural networks with many layers, effective at recognizing patterns in large datasets, such as images, speech, and text.

glossary-icon-24
Deploy
Deploy

It involves integrating the new technology with the existing infrastructure to ensure that it works smoothly and minimizes disruption.

glossary-icon-25
DevOps
DevOps

A set of practices that combines software development (Dev) and IT operations (Ops), aiming to shorten the systems development life cycle and provide continuous delivery with high software quality.

glossary-icon-27
Distributed Computing
Distributed Computing

A field of computer science that studies distributed systems, where components located on networked computers communicate and coordinate their actions by passing messages.

glossary-icon-26
DNS (Domain Name System)
Distributed Computing

The system that translates human-friendly domain names (like www.example.com) into IP addresses that computers use to identify each other on the network.

edge-computing_18231530
Edge Computing
Edge Computing

A distributed computing model that brings computation and data storage closer to the data sources (e.g., sensors, IoT devices), reducing latency and bandwidth usage.

code_8666061
Encryption
Encryption

The process of converting information into a code to prevent unauthorized access, ensuring the confidentiality and security of data transmitted over networks.

allocation_12608542
ERP (Enterprise Resource Planning)
ERP (Enterprise Resource Planning)

Integrated management software that automates and manages core business processes, consolidating information across departments to improve efficiency and decision-making.

6321943
Ethernet
Ethernet
A family of wired networking technologies commonly used in local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
16432382
ETL (Extract, Transform, Load)
ETL (Extract, Transform, Load)

A process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse.

9918173
Extranet
Extranet

A controlled private network allowing customers, partners, vendors, suppliers, and other businesses to gain information without granting access to an entire organization’s network.

firewall
Firewall
Firewall

A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting networks from unauthorized access and cyber threats.

Firmware
Firmware
Firmware

Permanent software programmed into a hardware device, providing low-level control for the device's specific hardware, and can be updated to fix bugs or add features.

Full Stack Developer
Full Stack Developer
Full Stack Developer

A developer skilled in both front-end and back-end development, capable of handling projects that involve databases, building user-facing websites, or even working with clients during the planning phase.

gateway
Gateway
Gateway

A network node that connects two different networks using different protocols. Gateways are essential for network interoperability.

git
Git
Git

A distributed version control system designed to handle everything from small to very large projects with speed and efficiency.

gpu
GPU (Graphics Processing Unit)
GPU (Graphics Processing Unit)

GPUs are used in gaming, video editing, and increasingly for general-purpose computing tasks like AI and machine learning.

GC
Green Computing
Green Computing

The study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems in an environmentally sustainable way.

gui
GUI (Graphical User Interface)
GUI (Graphical User Interface)

A user interface that includes graphical elements like windows, icons, and buttons. GUIs make software easier to use by allowing users to interact with visual representations.

h1
Hadoop
Hadoop

An open-source framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.

h2
HTML (HyperText Markup Language)
HTML (HyperText Markup Language)

The standard markup language for creating web pages. HTML defines the structure and content of a webpage using elements and tags.

h3
HTTP (HyperText Transfer Protocol)
HTTP (HyperText Transfer Protocol)

HTTP defines how messages are formatted and transmitted and how web servers and browsers should respond to various commands.

h4
Hypervisor
Hypervisor

A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.

i1
IDE (Integrated Development Environment)
IDE (Integrated Development Environment)

A software application that provides comprehensive facilities to computer programmers for software development.

i2
IM (Instant Messaging)
IM (Instant Messaging)

A type of online chat that offers real-time text transmission over the internet.

i3
Immutable
Immutable

In the context of blockchain, it refers to the property that data cannot be changed once it has been written to the blockchain.

i4
IoT (Internet of Things)
IoT (Internet of Things)

A network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet.

i5
IP Address (Internet Protocol Address)
IP Address (Internet Protocol Address)

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

i6
ISP (Internet Service Provider)
ISP (Internet Service Provider)

A company that provides individuals and organizations access to the internet. ISPs offer various services, including broadband, DSL, and fiber-optic internet connections.

j1
JavaScript
JavaScript

JavaScript enables interactive web pages and is an essential part of web technologies alongside HTML and CSS.

j2
JSON (JavaScript Object Notation)
JSON (JavaScript Object Notation)

A lightweight data-interchange format. It is easy for humans to read and write and easy for machines to parse and generate.

j3
JVM (Java Virtual Machine)
JVM (Java Virtual Machine)

An abstract computing machine that enables a computer to run a Java program.

k1
Kernel
Kernel

The kernel manages system resources, handles communication between hardware and software, and provides essential services for all other parts of the OS.

k2
Kubernetes
Kubernetes

An open-source platform designed to automate deploying, scaling, and operating application containers.

L1
LAN (Local Area Network)
LAN (Local Area Network)

A network that connects computers and devices within a limited area, such as a home, school, or office building. LANs enable resource sharing and communication between connected devices.

L2
Load Balancer
Load Balancer

A device that acts as a reverse proxy and distributes network or application traffic across a number of servers to ensure no single server becomes overwhelmed.

L3
Low Code
Low Code

A software development approach that requires little to no coding to build applications and processes, allowing people with no formal coding experience to create applications.

m1
Machine Learning
Machine Learning

A subset of AI that involves the development of algorithms and statistical models that enable computers to perform tasks without explicit instructions. 

m2
Malware
Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems. Common types of malware include viruses, worms, Trojans, and ransomware.

m3
Microcontroller
Microcontroller

A compact integrated circuit designed to govern a specific operation in an embedded system. Microcontrollers are essentially small computers with a processor, memory, and input/output peripherals.

m4
Microprocessor
Microprocessor

A computer processor that incorporates the functions of a computer's central processing unit on a single integrated circuit (IC).

m5
Middleware
Middleware

Software that provides common services and capabilities to applications outside of what's offered by the operating system. Examples include database management, application servers.

n1
Network
Network

A group of interconnected devices that can communicate with each other to share resources and information. Networks can be local (LAN) or wide-area (WAN), including the internet.

n2
NLP (Natural Language Processing)
NLP (Natural Language Processing)
A field of AI that gives machines the ability to read, understand, and derive meaning from human languages.
n3
Node.js
Node.js

An open-source, cross-platform JavaScript runtime environment that executes JavaScript code outside of a web browser.

n4
NVMe (Non-Volatile Memory Express)
NVMe (Non-Volatile Memory Express)

A storage protocol designed to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer's high-speed PCIe bus.

o1
OAuth (Open Authorization)
OAuth (Open Authorization)

An open standard for token-based authentication and authorization on the internet.

o2
Open Source
Open Source
Software for which the original source code is made freely available and may be redistributed and modified.
p1
PaaS (Platform as a Service)
PaaS (Platform as a Service)

A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building.

p2
Patch
Patch
A piece of software designed to update or fix problems with a computer program or its supporting data.
p3
Phishing
Phishing
A type of social engineering attack often used to steal user data, including login credentials and credit card numbers, by masquerading as a trustworthy entity in electronic communications.
q1
Quantum Computing
Quantum Computing

A type of computing that uses quantum bits or qubits, which can be in superpositions of states, allowing quantum computers to solve certain problems much faster than classical computers.

r1
Ransomware
Ransomware

A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access. Ransomware attacks can be devastating for individuals and organizations.

r2
REST (Representational State Transfer)
REST (Representational State Transfer)

An architectural style for designing networked applications. REST relies on a stateless, client-server, cacheable communications protocol and in virtually all cases, the HTTP protocol is used.

r3
RPA (Robotic Process Automation)
RPA (Robotic Process Automation)

The use of software with AI and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.

s1
SaaS (Software as a Service)
SaaS (Software as a Service)

A software distribution model in which applications are hosted by a service provider and made available to customers over the internet. 

s2
Scalability
Scalability

he capability of a system to handle a growing amount of work or its potential to accommodate growth. Scalability can refer to hardware, software, or both.

s3
Scrum
Scrum

An agile process framework for managing complex knowledge work, with an initial emphasis on software development.

s4
SDK (Software Development Kit)
SDK (Software Development Kit)

A collection of software tools and libraries that developers use to create applications for specific platforms.

s5
SDN (Software-Defined Networking)
SDN (Software-Defined Networking)

An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware.

s6
SLA (Service Level Agreement)
SLA (Service Level Agreement)

A contract between a service provider and a customer that specifies the performance standards the provider is obligated to meet.

s7
SOC (System on Chip)
SOC (System on Chip)

An integrated circuit that consolidates the components of a computer or other electronic system into a single chip.

s8
Spyware
Spyware

Malicious software designed to enter your computer device, gather data about you, and forward it to a third party without your consent.

t1
Turing Test
Turing Test

A test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human.

t2
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)

An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password.

u1
UI/UX (User Interface/User Experience)
UI/UX (User Interface/User Experience)

UI refers to the graphical layout of an application. UX refers to the overall experience a user has with a product, including how they feel about interacting with the product.

u2
Uptime
Uptime

The amount of time a system, typically a computer or network, is operational and available.

v1
Version Control
Version Control

A system that records changes to a file or set of files over time so that you can recall specific versions later.

v2
Virtual Machine (VM)
Virtual Machine (VM)

A software emulation of a physical computer. Virtual machines run an operating system and applications just like a physical computer but are isolated from the actual hardware.

v3
Virtual Reality (VR)
Virtual Reality (VR)

A simulated experience that can be similar to or completely different from the real world. VR applications include entertainment (e.g., video games) and educational purposes.

v4
VPN (Virtual Private Network)
VPN (Virtual Private Network)

A technology that creates a secure, encrypted connection over a less secure network, such as the internet. VPNs protect user privacy and allow secure access to remote networks.

w1
WAN (Wide Area Network)
WAN (Wide Area Network)

A telecommunications network that extends over large geographic areas, connecting multiple smaller networks (such as LANs). 

w2
Web Browser
Web Browser

A software application for accessing and viewing information on the World Wide Web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.

w3
Web Scraping
Web Scraping

The process of using bots to extract content and data from a website. Web scraping allows a user to transform unstructured data on the web into structured data.

w4
WebSocket
WebSocket

A computer communications protocol, providing full-duplex communication channels over a single TCP connection. WebSocket is designed to be implemented in web browsers and web servers.

w5
Wi-Fi
Wi-Fi

Wi-Fi is based on the IEEE 802.11 standards and is commonly used for internet access in homes, offices, and public spaces.

x1
XaaS (Anything as a Service)
XaaS (Anything as a Service)

Refers to the growing diversity of services delivered over the internet via cloud computing as opposed to being provided locally or on-site.

x2
XML (eXtensible Markup Language)
XML (eXtensible Markup Language)

A flexible text format used to create structured documents by defining custom tags. XML is commonly used for data exchange between systems.

y1
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language)

A human-readable data serialization standard that can be used in conjunction with all programming languages and is often used to write configuration files.

y2
Yottabyte
Yottabyte

A unit of digital information equal to one septillion (10^24) bytes. It is the largest standard unit of data measurement currently in use.

z1
Zero Trust Security
Zero Trust Security

A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything.

z2
Zero-Day
Zero-Day

A software vulnerability that is unknown to the software maker or to antivirus vendors. Zero-day vulnerabilities can be exploited by hackers before they are patched.

z3
Zigbee
Zigbee

An IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection.

z4
Zip File
Zip File

A file format that supports lossless data compression. Zip files can contain one or more files or directories that may have been compressed to reduce file size.

Scroll to Top

Schedule a Demo

Tell us a bit about your organization and we'll help you find the perfect solution.