Reference Library

Technology Glossary

500+ enterprise technology terms, defined for technology leaders. Non-vendor-specific, practitioner-grade definitions.

102 terms

Zero Trust Architecture

Zero Trust Architecture (ZTA) is a strategic cybersecurity model that mandates strict identity verification for every user, device...

Cybersecurity & Risk

Retrieval-Augmented Generation (RAG)

Retrieval-Augmented Generation (RAG) is an AI technique that enhances large language models (LLMs) by enabling them to access, ret...

Data & AI

Platform Engineering

Platform engineering is a discipline focused on designing, building, and maintaining internal developer platforms that enable self...

Architecture & Technology

Data Mesh

Data Mesh is a decentralized, domain-oriented data architecture that treats data as a product, enabling self-serve access and fede...

Data & AI

FinOps

FinOps is an evolving operational framework and cultural practice that unites finance, technology, and business teams to maximize ...

Technology Economics

TOGAF (The Open Group Architecture Framework)

TOGAF is a comprehensive enterprise architecture framework providing a structured approach for developing, maintaining, and using ...

Architecture & Technology

MLOps

MLOps is a set of practices for reliably and efficiently deploying, monitoring, and managing machine learning models in production...

Data & AI

Hyperautomation

Hyperautomation is a business-driven, disciplined approach that rapidly identifies, vets, and automates as many business and IT pr...

Architecture & Technology

Service Mesh

A service mesh is a dedicated infrastructure layer that manages and controls service-to-service communication within a microservic...

Architecture & Technology

Digital Twin

A digital twin is a virtual representation of a physical asset, process, or system, continuously updated with real-time data to en...

Architecture & Technology

Observability

Observability is the ability to understand a system's internal state by analyzing its external outputs, enabling proactive identif...

Architecture & Technology

AI Agents

AI Agents are software systems designed to autonomously perceive their environment, make decisions, and execute actions to achieve...

Data & AI

Total Cost of Ownership (TCO)

Total Cost of Ownership (TCO) is a comprehensive financial estimate that includes the direct and indirect costs associated with ac...

Technology Economics

CISO (Chief Information Security Officer)

The Chief Information Security Officer (CISO) is a senior executive responsible for establishing and maintaining the enterprise vi...

Leadership & Strategy

GitOps

GitOps is an operational framework that uses Git as the single source of truth for declarative infrastructure and application mana...

Architecture & Technology

Data Fabric

Data Fabric is an architectural concept that unifies data management across diverse, distributed sources, providing seamless acces...

Data & AI

Microsegmentation

Microsegmentation is a security technique that logically divides data centers into distinct, granular security segments down to th...

Cybersecurity & Risk

IT Operating Model

An IT operating model defines how an organization's IT function delivers value, encompassing its structure, processes, governance,...

Leadership & Strategy

Vector Database

A vector database is a specialized database designed to store, manage, and query high-dimensional vector embeddings, enabling effi...

Data & AI

API Gateway

An API Gateway is a management layer that sits in front of backend services, acting as a single entry point for all API calls, han...

Architecture & Technology

Sovereign AI

Sovereign AI refers to a nation's capability to develop, control, and utilize artificial intelligence technologies and data within...

Data & AI

Technical Debt

Technical debt represents the implied cost of additional rework caused by choosing an easy, limited solution now instead of using ...

Architecture & Technology

Composable Architecture

Composable architecture is an organizational and technical approach that designs systems from interchangeable, independently deplo...

Architecture & Technology

Prompt Engineering

Prompt engineering is the art and science of crafting effective inputs (prompts) for large language models (LLMs) to elicit desire...

Data & AI

Chaos Engineering

Chaos Engineering is the discipline of experimenting on a system in production to build confidence in its capability to withstand ...

Architecture & Technology

Shadow IT

Shadow IT refers to the use of information technology systems, devices, software, and services without explicit organizational app...

Leadership & Strategy

Serverless Computing

Serverless computing is a cloud execution model where the cloud provider dynamically manages server allocation and provisioning, a...

Architecture & Technology

Enterprise Service Bus (ESB)

An Enterprise Service Bus (ESB) is a software architecture model that provides a communication backbone for integrating diverse ap...

Architecture & Technology

Business Continuity Planning (BCP)

Business Continuity Planning (BCP) is a proactive organizational strategy ensuring critical business functions can continue operat...

Cybersecurity & Risk

Kubernetes

Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containeri...

Architecture & Technology

Large Language Model (LLM)

A Large Language Model (LLM) is an advanced artificial intelligence program trained on vast text datasets, enabling it to understa...

Data & AI

AI Governance

AI Governance establishes frameworks and processes to ensure artificial intelligence systems are developed and deployed ethically,...

Data & AI

Generative AI

Generative AI refers to artificial intelligence models capable of producing novel content, such as text, images, audio, and code, ...

Data & AI

AI Hallucination

AI hallucination refers to instances where artificial intelligence models generate outputs that are factually incorrect, nonsensic...

Data & AI

Foundation Model

A Foundation Model is a large-scale AI model, typically a transformer neural network, pre-trained on vast datasets to perform a wi...

Data & AI

Fine-Tuning

Fine-tuning is the process of adapting a pre-trained large language model (LLM) or other AI model to a specific task or dataset, e...

Data & AI

Agentic AI

Agentic AI refers to artificial intelligence systems designed to operate autonomously, making decisions and taking actions to achi...

Data & AI

AI Ops (AIOps)

AIOps leverages artificial intelligence and machine learning to automate IT operations, enhancing monitoring, incident management,...

Data & AI

Data Lakehouse

A data lakehouse unifies the flexibility and low-cost storage of a data lake with the transactional capabilities and structured da...

Data & AI

Data Governance

Data governance establishes the policies, processes, and responsibilities for managing data assets, ensuring their quality, integr...

Data & AI

Data Catalog

A data catalog is an organized inventory of all data assets within an enterprise, providing metadata, lineage, and discovery capab...

Data & AI

Feature Store

A Feature Store is a centralized repository for managing, serving, and sharing machine learning features, ensuring consistency and...

Data & AI

Knowledge Graph

A Knowledge Graph is a structured representation of interconnected entities, their attributes, and relationships, enabling machine...

Data & AI

SASE (Secure Access Service Edge)

SASE integrates networking and security functions into a single, cloud-native service model, delivering secure and optimized acces...

Cybersecurity & Risk

CSPM (Cloud Security Posture Management)

Cloud Security Posture Management (CSPM) continuously monitors cloud environments for misconfigurations, compliance violations, an...

Cybersecurity & Risk

Identity Fabric

An Identity Fabric is a unified, distributed, and intelligent layer that orchestrates identity and access management (IAM) service...

Cybersecurity & Risk

CNAPP (Cloud-Native Application Protection Platform)

A Cloud-Native Application Protection Platform (CNAPP) is a unified security solution designed to protect cloud-native application...

Cybersecurity & Risk

XDR (Extended Detection and Response)

Extended Detection and Response (XDR) is a unified security platform that automatically collects and correlates security data from...

Cybersecurity & Risk

SOAR (Security Orchestration, Automation and Response)

SOAR integrates security tools and automates incident response workflows, enabling organizations to efficiently manage, analyze, a...

Cybersecurity & Risk

Supply Chain Security

Supply Chain Security involves identifying, evaluating, and mitigating security risks across the entire lifecycle of products and ...

Cybersecurity & Risk

Cyber Resilience

Cyber resilience is an organization's comprehensive ability to anticipate, withstand, recover from, and adapt to adverse cyber eve...

Cybersecurity & Risk

Threat Intelligence

Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, a...

Cybersecurity & Risk

Identity and Access Management (IAM)

Identity and Access Management (IAM) is a cybersecurity framework and set of business processes that manages digital identities an...

Cybersecurity & Risk

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity strategy and set of technologies for controlling, monitoring, and securing a...

Cybersecurity & Risk

DevSecOps

DevSecOps integrates security practices throughout the entire software development lifecycle, fostering a collaborative culture to...

Cybersecurity & Risk

Cloud Security

Cloud security encompasses the policies, technologies, applications, and controls deployed to protect data, applications, and infr...

Cybersecurity & Risk

Event-Driven Architecture

Event-Driven Architecture (EDA) is a software design paradigm where loosely coupled services communicate asynchronously through ev...

Architecture & Technology

API-Led Connectivity

API-led connectivity is a methodical approach to integrate applications and data through reusable APIs, fostering agility and enab...

Architecture & Technology

Microservices Architecture

Microservices architecture is an architectural style that structures an application as a collection of loosely coupled, independen...

Architecture & Technology

Domain-Driven Design (DDD)

Domain-Driven Design (DDD) is an approach to software development that centers on modeling software to match a business domain's r...

Architecture & Technology

Infrastructure as Code (IaC)

Infrastructure as Code (IaC) is the practice of managing and provisioning IT infrastructure, such as networks, virtual machines, a...

Architecture & Technology

Site Reliability Engineering (SRE)

Site Reliability Engineering (SRE) is a discipline applying software engineering principles to infrastructure and operations probl...

Architecture & Technology

Edge Computing

Edge computing processes data closer to its source, minimizing latency and bandwidth usage by decentralizing computational resourc...

Architecture & Technology

Quantum Computing

Quantum computing leverages quantum-mechanical phenomena like superposition and entanglement to perform computations fundamentally...

Architecture & Technology

WebAssembly (Wasm)

WebAssembly (Wasm) is a binary instruction format for a stack-based virtual machine, designed as a portable compilation target for...

Architecture & Technology

eBPF

eBPF (extended Berkeley Packet Filter) is a Linux kernel technology enabling sandboxed programs to run within the kernel, allowing...

Architecture & Technology

Service-Oriented Architecture (SOA)

Service-Oriented Architecture (SOA) is an architectural paradigm that structures an application as a collection of loosely coupled...

Architecture & Technology

Cloud-Native

Cloud-native is a modern software approach that builds and runs scalable applications by fully exploiting the advantages of cloud ...

Architecture & Technology

Headless Architecture

Headless architecture decouples the frontend user interface from the backend content management and business logic, enabling flexi...

Architecture & Technology

Digital Transformation

Digital transformation is the strategic adoption of digital technologies and processes to fundamentally change how an organization...

Leadership & Strategy

IT Strategy

IT Strategy is a comprehensive plan aligning an organization's technology investments and initiatives with its overarching busines...

Leadership & Strategy

CIO First 90 Days

The CIO First 90 Days outlines a structured, strategic framework for new Chief Information Officers to rapidly assess, align, and ...

Leadership & Strategy

IT Governance

IT governance is a formal framework ensuring IT investments align with business objectives, manage risks, optimize resources, and ...

Leadership & Strategy

Enterprise Architecture

Enterprise Architecture is the practice of analyzing, designing, planning, and implementing enterprise analysis to successfully ex...

Leadership & Strategy

Change Management

Change management is the structured approach to transitioning individuals, teams, and organizations from a current state to a desi...

Leadership & Strategy

Vendor Management

Vendor management is the comprehensive process of overseeing and optimizing relationships with third-party suppliers to ensure the...

Leadership & Strategy

IT Portfolio Management

IT Portfolio Management (ITPM) is the centralized management of an organization's IT investments, projects, and assets to optimize...

Leadership & Strategy

Agile Transformation

Agile transformation is a comprehensive organizational shift towards adopting agile principles, values, and practices across all l...

Leadership & Strategy

Product Operating Model

A Product Operating Model defines the organizational structure, processes, governance, and cultural norms that enable an enterpris...

Leadership & Strategy

OKRs (Objectives and Key Results)

OKRs are a collaborative goal-setting framework used by organizations to set ambitious, measurable objectives and track their prog...

Leadership & Strategy

IT Value Realization

IT Value Realization is the systematic process of ensuring that technology investments deliver measurable business benefits, align...

Leadership & Strategy

Bimodal IT

Bimodal IT is an approach that manages two distinct, coherent modes of IT delivery: one focused on stability and the other on agil...

Leadership & Strategy

Cloud Economics

Cloud economics is the financial analysis and strategic management of cloud computing costs and benefits, optimizing resource util...

Technology Economics

IT Chargeback

IT chargeback is an accounting mechanism that allocates the costs of IT services, infrastructure, and resources directly to the bu...

Technology Economics

Total Value of Ownership (TVO)

Total Value of Ownership (TVO) is a comprehensive financial framework that evaluates the complete economic impact of an IT asset o...

Technology Economics

IT Cost Optimization

IT Cost Optimization is the continuous process of reducing IT expenditures while maximizing business value, ensuring technology in...

Technology Economics

SaaS Management

SaaS Management is the comprehensive practice of overseeing and optimizing an organization's Software-as-a-Service applications, e...

Technology Economics

IT Financial Management (ITFM)

IT Financial Management (ITFM) is the discipline of managing the costs and value of IT services and assets, ensuring transparency,...

Technology Economics

Unit Economics

Unit economics analyzes the revenues and costs associated with a business's individual unit, providing insights into profitability...

Technology Economics

Technology Debt Quantification

Technology Debt Quantification involves systematically measuring the financial and operational costs associated with technical deb...

Technology Economics

ITIL (IT Infrastructure Library)

ITIL is a comprehensive framework of best practices for IT service management (ITSM), guiding organizations in delivering value th...

Architecture & Technology

COBIT (Control Objectives for Information and Related Technologies)

COBIT (Control Objectives for Information and Related Technologies) is a comprehensive framework developed by ISACA that assists o...

Leadership & Strategy

Zero-Knowledge Proof

Zero-Knowledge Proof (ZKP) is a cryptographic protocol enabling one party to prove to another that a statement is true, without re...

Cybersecurity & Risk

Post-Quantum Cryptography

Post-Quantum Cryptography (PQC) refers to cryptographic algorithms designed to secure digital communications and data against atta...

Cybersecurity & Risk

Confidential Computing

Confidential Computing protects data in use by performing computation within a hardware-based trusted execution environment (TEE),...

Cybersecurity & Risk

AI Ethics

AI Ethics refers to the principles and practices guiding the responsible development, deployment, and use of artificial intelligen...

Data & AI

Responsible AI

Responsible AI is an organizational framework and set of practices ensuring the ethical, fair, transparent, and accountable develo...

Data & AI

Multi-Cloud Strategy

A multi-cloud strategy involves utilizing two or more public cloud services from different providers to distribute workloads, enha...

Architecture & Technology

Hybrid Cloud

Hybrid cloud integrates on-premises infrastructure with public cloud services, enabling data and application portability between e...

Architecture & Technology

FinTech Integration

FinTech integration involves seamlessly embedding financial technology solutions into existing enterprise systems and processes to...

Architecture & Technology

Low-Code/No-Code Platforms

Low-Code/No-Code (LCNC) platforms enable rapid application development by abstracting complex coding, allowing users with varying ...

Architecture & Technology

Robotic Process Automation (RPA)

Robotic Process Automation (RPA) automates repetitive, rule-based digital tasks by deploying software robots to mimic human intera...

Architecture & Technology