Browse Definitions :

Browse Definitions by Alphabet

  • K-12 - K-12, a term used in education and educational technology in the United States, Canada and some other countries, is a short form for the publicly supported school grades prior to college.
  • Kaizen (continuous improvement) - Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.
  • kanban - Kanban is a visual system used to manage and keep track of work as it moves through a process.
  • Karnaugh map (K-map) - A Karnaugh map (K-map) is a visual method used to simplify the algebraic expressions in Boolean functions without having to resort to complex theorems or equation manipulations.
  • Kbps (kilobits per second) - In the U.S.
  • Kebab case - Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.
  • kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • Kerberos - Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet.
  • kernel - The kernel is the essential foundation of a computer's operating system (OS).
  • kernel panic - A kernel panic refers to a computer error from which the system's operating system (OS) cannot quickly or easily recover.
  • Kessler Syndrome - The Kessler Syndrome is a theoretical scenario in which Earth's orbit is overpopulated with objects and debris, preventing the use of satellites in certain sections of Earth's orbit.
  • key fob - A key fob is a small, programmable device that provides access to a physical object.
  • key performance indicators (KPIs) - Key performance indicators (KPIs) are quantifiable business metrics that corporate executives and other managers use to track and analyze factors deemed crucial to the success of an organization.
  • key results indicator (KRI) - A key result indicator (KRI) is a metric that measures the quantitative results of business actions to help companies track progress and reach organizational goals.
  • key risk indicator (KRI) - A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be successful.
  • key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data.
  • keyboard wedge (KBW) - A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader (MSR) into keyboard strokes for a computer.
  • keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone.
  • keystone jack - A keystone jack is a female connector used in audio, video and data communications.
  • kibi, mebi, gibi, tebi, pebi and exbi - Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the International Electrotechnical Commission (IEC).
  • kill switch - A kill switch in an IT context is a mechanism used to shut down or disable a device or program.
  • Kilo, mega, giga, tera, peta, exa, zetta and all that - Kilo, mega, giga, tera, peta, exa and zetta are among the binary prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.
  • kilobyte (KB or Kbyte) - A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage.
  • kilogram-meter per second - The kilogram-meter per second is the standard unit of momentum.
  • kinematics - Kinematics is the study of the motion of mechanical points, bodies and systems without consideration of their associated physical properties and the forces acting on them.
  • kinetic energy - Kinetic energy is the energy of motion, observable as the movement of an object or subatomic particle.
  • kiosk mode (Windows assigned access) - Kiosk mode is a feature in Windows operating system (OS) that allows a device to run only specified applications and settings.
  • KLOC (thousands of lines of code) - KLOC (thousands of lines of code) is a traditional measure of how large a computer program is or how long or how many people it will take to write it.
  • Klout score - A Klout score is a measure of a social influence that aggregates one's reach on various social media platforms.
  • Knative - Knative is an open source project based on the Kubernetes platform for building, deploying and managing serverless workloads that can run in the cloud, on premises or in a third-party data center.
  • knowledge base - In general, a knowledge base is a centralized repository of information.
  • knowledge engineering - Knowledge engineering is a field of artificial intelligence (AI) that tries to emulate the judgment and behavior of a human expert in a given field.
  • knowledge graph in ML - In the realm of machine learning (ML), a knowledge graph is a graphical representation that captures the connections between different entities.
  • knowledge management (KM) - Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.
  • knowledge-based authentication - Knowledge-based authentication (KBA) is an authentication method in which users are asked to answer at least one secret question.
  • knowledge-based systems (KBSes) - Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to provide a method for problem-solving.
  • Kong - Kong is an open source API gateway and platform that acts as middleware between compute clients and the API-centric applications.
  • Korn shell (ksh) - The Korn shell (ksh) is an operating system (OS) command shell that was developed for Unix by David Korn at Bell Labs.
  • Kotlin - Kotlin is a statically typed, object-oriented programing language that is interoperable with the Java virtual machine, Java Class Libraries and Android.
  • Kubernetes - Kubernetes, also referred to as K8s for the number of letters between K and S, is an open source platform used to manage containerized applications across private, public and hybrid cloud environments.
  • Kubernetes node - A Kubernetes node is a logical collection of IT resources that runs workloads for one or more containers in a Kubernetes cluster.
  • Kubernetes operator - A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.
  • Kubernetes pod - Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management.
  • Kubernetes scheduler - The Kubernetes scheduler is a component of the open source Kubernetes container orchestration platform that controls performance, capacity and availability through policies and topology awareness.
  • Kubernetes volume - A Kubernetes volume is a directory containing data accessible to containers in a given pod, the smallest deployable unit in a Kubernetes cluster.
  • Unfreeze, Change, Refreeze (Kurt Lewin Change Management Model) - Unfreeze, Change, Refreeze or Kurt Lewin's Change Management Model is a model to understand and manage organizational change.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
  • Nvidia Omniverse

    Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial ...

  • model-based systems engineering (MBSE)

    Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and...

  • digital strategy (digital media strategy)

    A digital strategy, sometimes called a digital media strategy, is a plan for maximizing the business benefits of data assets and ...

HRSoftware
  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close