Reference Library
Technology Glossary
500+ enterprise technology terms, defined for technology leaders. Non-vendor-specific, practitioner-grade definitions.
102 terms
Zero Trust Architecture
Zero Trust Architecture (ZTA) is a strategic cybersecurity model that mandates strict identity verification for every user, device...
Cybersecurity & RiskRetrieval-Augmented Generation (RAG)
Retrieval-Augmented Generation (RAG) is an AI technique that enhances large language models (LLMs) by enabling them to access, ret...
Data & AIPlatform Engineering
Platform engineering is a discipline focused on designing, building, and maintaining internal developer platforms that enable self...
Architecture & TechnologyData Mesh
Data Mesh is a decentralized, domain-oriented data architecture that treats data as a product, enabling self-serve access and fede...
Data & AIFinOps
FinOps is an evolving operational framework and cultural practice that unites finance, technology, and business teams to maximize ...
Technology EconomicsTOGAF (The Open Group Architecture Framework)
TOGAF is a comprehensive enterprise architecture framework providing a structured approach for developing, maintaining, and using ...
Architecture & TechnologyMLOps
MLOps is a set of practices for reliably and efficiently deploying, monitoring, and managing machine learning models in production...
Data & AIHyperautomation
Hyperautomation is a business-driven, disciplined approach that rapidly identifies, vets, and automates as many business and IT pr...
Architecture & TechnologyService Mesh
A service mesh is a dedicated infrastructure layer that manages and controls service-to-service communication within a microservic...
Architecture & TechnologyDigital Twin
A digital twin is a virtual representation of a physical asset, process, or system, continuously updated with real-time data to en...
Architecture & TechnologyObservability
Observability is the ability to understand a system's internal state by analyzing its external outputs, enabling proactive identif...
Architecture & TechnologyAI Agents
AI Agents are software systems designed to autonomously perceive their environment, make decisions, and execute actions to achieve...
Data & AITotal Cost of Ownership (TCO)
Total Cost of Ownership (TCO) is a comprehensive financial estimate that includes the direct and indirect costs associated with ac...
Technology EconomicsCISO (Chief Information Security Officer)
The Chief Information Security Officer (CISO) is a senior executive responsible for establishing and maintaining the enterprise vi...
Leadership & StrategyGitOps
GitOps is an operational framework that uses Git as the single source of truth for declarative infrastructure and application mana...
Architecture & TechnologyData Fabric
Data Fabric is an architectural concept that unifies data management across diverse, distributed sources, providing seamless acces...
Data & AIMicrosegmentation
Microsegmentation is a security technique that logically divides data centers into distinct, granular security segments down to th...
Cybersecurity & RiskIT Operating Model
An IT operating model defines how an organization's IT function delivers value, encompassing its structure, processes, governance,...
Leadership & StrategyVector Database
A vector database is a specialized database designed to store, manage, and query high-dimensional vector embeddings, enabling effi...
Data & AIAPI Gateway
An API Gateway is a management layer that sits in front of backend services, acting as a single entry point for all API calls, han...
Architecture & TechnologySovereign AI
Sovereign AI refers to a nation's capability to develop, control, and utilize artificial intelligence technologies and data within...
Data & AITechnical Debt
Technical debt represents the implied cost of additional rework caused by choosing an easy, limited solution now instead of using ...
Architecture & TechnologyComposable Architecture
Composable architecture is an organizational and technical approach that designs systems from interchangeable, independently deplo...
Architecture & TechnologyPrompt Engineering
Prompt engineering is the art and science of crafting effective inputs (prompts) for large language models (LLMs) to elicit desire...
Data & AIChaos Engineering
Chaos Engineering is the discipline of experimenting on a system in production to build confidence in its capability to withstand ...
Architecture & TechnologyShadow IT
Shadow IT refers to the use of information technology systems, devices, software, and services without explicit organizational app...
Leadership & StrategyServerless Computing
Serverless computing is a cloud execution model where the cloud provider dynamically manages server allocation and provisioning, a...
Architecture & TechnologyEnterprise Service Bus (ESB)
An Enterprise Service Bus (ESB) is a software architecture model that provides a communication backbone for integrating diverse ap...
Architecture & TechnologyBusiness Continuity Planning (BCP)
Business Continuity Planning (BCP) is a proactive organizational strategy ensuring critical business functions can continue operat...
Cybersecurity & RiskKubernetes
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containeri...
Architecture & TechnologyLarge Language Model (LLM)
A Large Language Model (LLM) is an advanced artificial intelligence program trained on vast text datasets, enabling it to understa...
Data & AIAI Governance
AI Governance establishes frameworks and processes to ensure artificial intelligence systems are developed and deployed ethically,...
Data & AIGenerative AI
Generative AI refers to artificial intelligence models capable of producing novel content, such as text, images, audio, and code, ...
Data & AIAI Hallucination
AI hallucination refers to instances where artificial intelligence models generate outputs that are factually incorrect, nonsensic...
Data & AIFoundation Model
A Foundation Model is a large-scale AI model, typically a transformer neural network, pre-trained on vast datasets to perform a wi...
Data & AIFine-Tuning
Fine-tuning is the process of adapting a pre-trained large language model (LLM) or other AI model to a specific task or dataset, e...
Data & AIAgentic AI
Agentic AI refers to artificial intelligence systems designed to operate autonomously, making decisions and taking actions to achi...
Data & AIAI Ops (AIOps)
AIOps leverages artificial intelligence and machine learning to automate IT operations, enhancing monitoring, incident management,...
Data & AIData Lakehouse
A data lakehouse unifies the flexibility and low-cost storage of a data lake with the transactional capabilities and structured da...
Data & AIData Governance
Data governance establishes the policies, processes, and responsibilities for managing data assets, ensuring their quality, integr...
Data & AIData Catalog
A data catalog is an organized inventory of all data assets within an enterprise, providing metadata, lineage, and discovery capab...
Data & AIFeature Store
A Feature Store is a centralized repository for managing, serving, and sharing machine learning features, ensuring consistency and...
Data & AIKnowledge Graph
A Knowledge Graph is a structured representation of interconnected entities, their attributes, and relationships, enabling machine...
Data & AISASE (Secure Access Service Edge)
SASE integrates networking and security functions into a single, cloud-native service model, delivering secure and optimized acces...
Cybersecurity & RiskCSPM (Cloud Security Posture Management)
Cloud Security Posture Management (CSPM) continuously monitors cloud environments for misconfigurations, compliance violations, an...
Cybersecurity & RiskIdentity Fabric
An Identity Fabric is a unified, distributed, and intelligent layer that orchestrates identity and access management (IAM) service...
Cybersecurity & RiskCNAPP (Cloud-Native Application Protection Platform)
A Cloud-Native Application Protection Platform (CNAPP) is a unified security solution designed to protect cloud-native application...
Cybersecurity & RiskXDR (Extended Detection and Response)
Extended Detection and Response (XDR) is a unified security platform that automatically collects and correlates security data from...
Cybersecurity & RiskSOAR (Security Orchestration, Automation and Response)
SOAR integrates security tools and automates incident response workflows, enabling organizations to efficiently manage, analyze, a...
Cybersecurity & RiskSupply Chain Security
Supply Chain Security involves identifying, evaluating, and mitigating security risks across the entire lifecycle of products and ...
Cybersecurity & RiskCyber Resilience
Cyber resilience is an organization's comprehensive ability to anticipate, withstand, recover from, and adapt to adverse cyber eve...
Cybersecurity & RiskThreat Intelligence
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, a...
Cybersecurity & RiskIdentity and Access Management (IAM)
Identity and Access Management (IAM) is a cybersecurity framework and set of business processes that manages digital identities an...
Cybersecurity & RiskPrivileged Access Management (PAM)
Privileged Access Management (PAM) is a cybersecurity strategy and set of technologies for controlling, monitoring, and securing a...
Cybersecurity & RiskDevSecOps
DevSecOps integrates security practices throughout the entire software development lifecycle, fostering a collaborative culture to...
Cybersecurity & RiskCloud Security
Cloud security encompasses the policies, technologies, applications, and controls deployed to protect data, applications, and infr...
Cybersecurity & RiskEvent-Driven Architecture
Event-Driven Architecture (EDA) is a software design paradigm where loosely coupled services communicate asynchronously through ev...
Architecture & TechnologyAPI-Led Connectivity
API-led connectivity is a methodical approach to integrate applications and data through reusable APIs, fostering agility and enab...
Architecture & TechnologyMicroservices Architecture
Microservices architecture is an architectural style that structures an application as a collection of loosely coupled, independen...
Architecture & TechnologyDomain-Driven Design (DDD)
Domain-Driven Design (DDD) is an approach to software development that centers on modeling software to match a business domain's r...
Architecture & TechnologyInfrastructure as Code (IaC)
Infrastructure as Code (IaC) is the practice of managing and provisioning IT infrastructure, such as networks, virtual machines, a...
Architecture & TechnologySite Reliability Engineering (SRE)
Site Reliability Engineering (SRE) is a discipline applying software engineering principles to infrastructure and operations probl...
Architecture & TechnologyEdge Computing
Edge computing processes data closer to its source, minimizing latency and bandwidth usage by decentralizing computational resourc...
Architecture & TechnologyQuantum Computing
Quantum computing leverages quantum-mechanical phenomena like superposition and entanglement to perform computations fundamentally...
Architecture & TechnologyWebAssembly (Wasm)
WebAssembly (Wasm) is a binary instruction format for a stack-based virtual machine, designed as a portable compilation target for...
Architecture & TechnologyeBPF
eBPF (extended Berkeley Packet Filter) is a Linux kernel technology enabling sandboxed programs to run within the kernel, allowing...
Architecture & TechnologyService-Oriented Architecture (SOA)
Service-Oriented Architecture (SOA) is an architectural paradigm that structures an application as a collection of loosely coupled...
Architecture & TechnologyCloud-Native
Cloud-native is a modern software approach that builds and runs scalable applications by fully exploiting the advantages of cloud ...
Architecture & TechnologyHeadless Architecture
Headless architecture decouples the frontend user interface from the backend content management and business logic, enabling flexi...
Architecture & TechnologyDigital Transformation
Digital transformation is the strategic adoption of digital technologies and processes to fundamentally change how an organization...
Leadership & StrategyIT Strategy
IT Strategy is a comprehensive plan aligning an organization's technology investments and initiatives with its overarching busines...
Leadership & StrategyCIO First 90 Days
The CIO First 90 Days outlines a structured, strategic framework for new Chief Information Officers to rapidly assess, align, and ...
Leadership & StrategyIT Governance
IT governance is a formal framework ensuring IT investments align with business objectives, manage risks, optimize resources, and ...
Leadership & StrategyEnterprise Architecture
Enterprise Architecture is the practice of analyzing, designing, planning, and implementing enterprise analysis to successfully ex...
Leadership & StrategyChange Management
Change management is the structured approach to transitioning individuals, teams, and organizations from a current state to a desi...
Leadership & StrategyVendor Management
Vendor management is the comprehensive process of overseeing and optimizing relationships with third-party suppliers to ensure the...
Leadership & StrategyIT Portfolio Management
IT Portfolio Management (ITPM) is the centralized management of an organization's IT investments, projects, and assets to optimize...
Leadership & StrategyAgile Transformation
Agile transformation is a comprehensive organizational shift towards adopting agile principles, values, and practices across all l...
Leadership & StrategyProduct Operating Model
A Product Operating Model defines the organizational structure, processes, governance, and cultural norms that enable an enterpris...
Leadership & StrategyOKRs (Objectives and Key Results)
OKRs are a collaborative goal-setting framework used by organizations to set ambitious, measurable objectives and track their prog...
Leadership & StrategyIT Value Realization
IT Value Realization is the systematic process of ensuring that technology investments deliver measurable business benefits, align...
Leadership & StrategyBimodal IT
Bimodal IT is an approach that manages two distinct, coherent modes of IT delivery: one focused on stability and the other on agil...
Leadership & StrategyCloud Economics
Cloud economics is the financial analysis and strategic management of cloud computing costs and benefits, optimizing resource util...
Technology EconomicsIT Chargeback
IT chargeback is an accounting mechanism that allocates the costs of IT services, infrastructure, and resources directly to the bu...
Technology EconomicsTotal Value of Ownership (TVO)
Total Value of Ownership (TVO) is a comprehensive financial framework that evaluates the complete economic impact of an IT asset o...
Technology EconomicsIT Cost Optimization
IT Cost Optimization is the continuous process of reducing IT expenditures while maximizing business value, ensuring technology in...
Technology EconomicsSaaS Management
SaaS Management is the comprehensive practice of overseeing and optimizing an organization's Software-as-a-Service applications, e...
Technology EconomicsIT Financial Management (ITFM)
IT Financial Management (ITFM) is the discipline of managing the costs and value of IT services and assets, ensuring transparency,...
Technology EconomicsUnit Economics
Unit economics analyzes the revenues and costs associated with a business's individual unit, providing insights into profitability...
Technology EconomicsTechnology Debt Quantification
Technology Debt Quantification involves systematically measuring the financial and operational costs associated with technical deb...
Technology EconomicsITIL (IT Infrastructure Library)
ITIL is a comprehensive framework of best practices for IT service management (ITSM), guiding organizations in delivering value th...
Architecture & TechnologyCOBIT (Control Objectives for Information and Related Technologies)
COBIT (Control Objectives for Information and Related Technologies) is a comprehensive framework developed by ISACA that assists o...
Leadership & StrategyZero-Knowledge Proof
Zero-Knowledge Proof (ZKP) is a cryptographic protocol enabling one party to prove to another that a statement is true, without re...
Cybersecurity & RiskPost-Quantum Cryptography
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms designed to secure digital communications and data against atta...
Cybersecurity & RiskConfidential Computing
Confidential Computing protects data in use by performing computation within a hardware-based trusted execution environment (TEE),...
Cybersecurity & RiskAI Ethics
AI Ethics refers to the principles and practices guiding the responsible development, deployment, and use of artificial intelligen...
Data & AIResponsible AI
Responsible AI is an organizational framework and set of practices ensuring the ethical, fair, transparent, and accountable develo...
Data & AIMulti-Cloud Strategy
A multi-cloud strategy involves utilizing two or more public cloud services from different providers to distribute workloads, enha...
Architecture & TechnologyHybrid Cloud
Hybrid cloud integrates on-premises infrastructure with public cloud services, enabling data and application portability between e...
Architecture & TechnologyFinTech Integration
FinTech integration involves seamlessly embedding financial technology solutions into existing enterprise systems and processes to...
Architecture & TechnologyLow-Code/No-Code Platforms
Low-Code/No-Code (LCNC) platforms enable rapid application development by abstracting complex coding, allowing users with varying ...
Architecture & TechnologyRobotic Process Automation (RPA)
Robotic Process Automation (RPA) automates repetitive, rule-based digital tasks by deploying software robots to mimic human intera...
Architecture & Technology