1,221 Terms.
One Reference.
A comprehensive glossary spanning artificial intelligence, blockchain, quantum computing, enterprise systems, cybersecurity, and 17 more technology domains.
3D Printing
Additive manufacturing technology that creates three-dimensional objects by depositing material layer by layer.
3D Reconstruction
The process of capturing and creating three-dimensional models of real-world objects or environments from visual data.
4D Printing
3D printing with materials that can change shape or properties over time in response to stimuli.
5G
The fifth generation of mobile network technology offering higher speeds, lower latency, and massive device connectivity.
A/B Testing
A controlled experiment comparing two variants to determine which performs better against a defined metric.
A/B Testing
Comparing two versions of a design to determine which performs better against a specific objective.
A/B Testing
A controlled experiment methodology that compares two versions of a product, feature, or experience to determine which performs better against a defined metric.
Abductive Reasoning
A form of logical inference that seeks the simplest and most likely explanation for a set of observations.
Abstractive Summarisation
A text summarisation approach that generates novel sentences to capture the essential meaning of a document, rather than simply extracting and rearranging existing sentences.
Acceptable Use Policy
A document defining the permitted use of an organisation's IT resources and networks.
Access Control Policy
A set of rules defining who can access specific resources and what actions they can perform.
Accessibility
Designing products and services that can be used by people with a wide range of abilities and disabilities.
Account Abstraction
A blockchain architecture improvement that allows smart contracts to act as user accounts, enabling features like social recovery, gas sponsorship, and batched transactions.
Action Recognition
Identifying and classifying human actions or activities from video sequences.
Action Space
The complete set of possible actions available to an AI agent in a given environment, defining the boundaries of what the agent can do to accomplish its objectives.
Activation Function
A mathematical function applied to neural network outputs to introduce non-linearity, enabling the learning of complex patterns.
Active Learning
A machine learning approach where the algorithm interactively queries a user or oracle to label new data points.
Actuator
A device that converts energy into motion to control a mechanism or system based on received commands.
Adam Optimiser
An adaptive learning rate optimisation algorithm combining momentum and RMSProp for efficient deep learning training.
Adapter Layers
Small trainable modules inserted between frozen transformer layers that enable task-specific adaptation without modifying the original model weights.
Adiabatic Quantum Computing
A form of quantum computing based on the adiabatic theorem, gradually evolving a system from an initial to a problem-encoding Hamiltonian.
Advanced Materials
Materials engineered with novel properties for superior performance in specific applications.
Adversary Simulation
Advanced red team exercises that replicate the tactics, techniques, and procedures of specific threat actors to evaluate an organisation's detection and response capabilities.
Affective Computing
Computing that relates to, arises from, or influences emotions, recognising and responding to human affect.
Affordance
A design property suggesting how an object should be used, making actions discoverable without instructions.
Agent Autonomy Level
The degree of independence an AI agent has in making and executing decisions without human approval.
Agent Benchmarking
Standardised evaluation of AI agent capabilities across tasks like tool use, planning, reasoning, and task completion.
Agent Chaining
The sequential composition of multiple AI agents where each agent's output becomes the input for the next, creating automated pipelines for complex multi-stage processes.
Agent Collaboration
The process of multiple AI agents working together, sharing information and coordinating actions to achieve common goals.
Agent Communication Language
Standardised protocols and languages used for inter-agent communication in multi-agent systems.
Agent Competition
A multi-agent scenario where agents pursue conflicting objectives, leading to adversarial or game-theoretic interactions.
Agent Context
The accumulated information, history, and environmental state that informs an AI agent's decision-making.
Agent Evaluation
Methods and metrics for assessing the performance, reliability, and safety of autonomous AI agents.
Agent Guardrailing
Safety constraints imposed on AI agents that limit their action space, prevent dangerous operations, enforce budgets, and require approval for irreversible decisions.
Agent Guardrails
Safety constraints and boundaries that limit agent behaviour to prevent harmful, unintended, or out-of-scope actions.
Agent Handoff
The transfer of a task or conversation from one specialised AI agent to another based on skill requirements, escalation rules, or domain boundaries.
Agent Hierarchy
An organisational structure where agents are arranged in levels, with higher-level agents delegating tasks to lower-level ones.
Agent Lifecycle Management
The processes of developing, deploying, monitoring, updating, and retiring AI agents throughout their operational life.
Agent Loop
The iterative cycle of perception, reasoning, planning, and action execution that drives autonomous agent behaviour.
Agent Memory
The storage mechanism enabling AI agents to retain and recall information from previous interactions and experiences.
Agent Memory Bank
A persistent knowledge store that enables AI agents to accumulate and recall information across sessions, supporting long-term learning and personalised interactions.
Agent Negotiation
The process by which AI agents reach agreements through offers, counteroffers, and compromise strategies.
Agent Observability
The ability to monitor, trace, and understand the internal states, decisions, and actions of AI agents in production.
Agent Orchestration
The coordination and management of multiple AI agents working together to accomplish complex workflows.
Agent Persona
The defined role, personality, and behavioural characteristics assigned to an AI agent for consistent interaction.
Agent Planning
The ability of an AI agent to formulate a sequence of actions to achieve a goal from its current state.
Agent Reasoning Loop
The iterative cycle of observation, thought, action, and reflection that AI agents execute to break down complex goals into achievable subtasks and verify progress.
Agent Reflection
The ability of an AI agent to evaluate its own outputs and reasoning, identifying errors and improving responses.
Agent Sandbox
An isolated environment where AI agents can safely execute actions and experiment without affecting production systems.
Agent Skill
A specific capability or function that an AI agent can perform, such as web search, code execution, or data analysis.
Agent Supervisor
A meta-agent that coordinates, monitors, and manages a team of sub-agents, allocating tasks and synthesising results to fulfil complex multi-domain objectives.
Agent Swarm
A large collection of AI agents operating collaboratively using emergent behaviour patterns to solve complex tasks.
Agent Telemetry
The automated collection and transmission of performance data from AI agents for monitoring and analysis.
Agent Tool Registry
A catalogue of available tools and APIs that agents can discover and invoke, with descriptions, schemas, and authentication details enabling dynamic capability acquisition.
Agentic AI
AI systems that can autonomously plan, reason, and take actions to achieve goals with minimal human intervention.
Agentic Hyperscaler
An organisation that has achieved autonomous scaling of operations through pervasive deployment of AI agents across all functions.
Agentic RAG
An advanced retrieval-augmented generation pattern where an agent dynamically decides what information to retrieve, from which sources, and how to refine queries iteratively.
Agentic Transformation
The strategic process of redesigning business operations around autonomous AI agents to achieve hyperscale efficiency.
Agentic Workflow
A business process that is partially or fully executed by autonomous AI agents rather than human workers.
Agile Methodology
An iterative approach to software development emphasising flexibility, collaboration, and rapid delivery of working software.
Agricultural Robot
A robot designed for agricultural applications including planting, harvesting, monitoring, and soil analysis.
AI Accelerator
Specialised hardware designed to speed up AI computations, including GPUs, TPUs, and custom AI chips.
AI Adoption Maturity Model
A framework that describes the progressive stages of organisational AI capability from experimental pilots through scaled deployment to enterprise-wide autonomous operations.
AI Agent
An autonomous software entity that perceives its environment, makes decisions, and takes actions to achieve specified objectives.
AI Agent Orchestration
The coordination and management of multiple AI agents working together to accomplish complex tasks, routing subtasks between specialised agents based on capability and context.
AI Alignment
The research field focused on ensuring AI systems act in accordance with human values, intentions, and ethical principles.
AI Audit
An independent assessment of an AI system's compliance with regulatory requirements, ethical standards, and organisational policies, examining data, models, outputs, and governance.
AI Benchmark
Standardised tests and datasets used to evaluate and compare the performance of AI models across specific tasks.
AI Bias
Systematic errors in AI outputs that arise from biased training data, flawed assumptions, or prejudicial algorithm design.
AI Centre of Excellence
A cross-functional team within an organisation that defines AI strategy, develops best practices, builds shared capabilities, and accelerates AI adoption across business units.
AI Chip
A semiconductor designed specifically for AI and machine learning computations, optimised for parallel processing and matrix operations.
AI Companion
A persistent AI entity that forms an ongoing relationship with a user, accumulating shared history, adapting to preferences, and providing personalised assistance over time.
AI Copilot
An AI assistant embedded in software applications that helps users complete tasks through suggestions and automation.
AI Democratisation
The movement to make AI tools, knowledge, and resources accessible to non-experts and organisations of all sizes.
AI Ethics
The branch of ethics examining moral issues surrounding the development, deployment, and impact of artificial intelligence on society.
AI Ethics Board
An advisory body within an organisation composed of diverse stakeholders who review, guide, and provide oversight on the ethical implications of AI projects and deployments.
AI Explainability
The ability to describe AI decision-making processes in human-understandable terms, enabling trust and regulatory compliance.
AI Fairness
The principle of ensuring AI systems make equitable decisions without discriminating against any group based on protected attributes.
AI Feature Store
A centralised platform for storing, managing, and serving machine learning features consistently across training and inference.
AI Governance
The frameworks, policies, and regulations that guide the responsible development and deployment of AI technologies.
AI Guardrails
Safety mechanisms and constraints implemented around AI systems to prevent harmful, biased, or policy-violating outputs while preserving useful functionality.
AI Hallucination
When an AI model generates plausible-sounding but factually incorrect or fabricated information with high confidence.
AI Impact Assessment
A systematic evaluation of the potential effects and risks of an AI system before and during its deployment.
AI Inference
The process of using a trained AI model to make predictions or decisions on new, unseen data.
AI Infrastructure
The specialised hardware, software, and networking stack required to train and serve AI models at scale, including GPU clusters, high-bandwidth interconnects, and model serving frameworks.
AI Interpretability
The degree to which humans can understand the internal mechanics and reasoning of an AI model's predictions and decisions.
AI Memory Systems
Architectures that enable AI agents to store, retrieve, and reason over information from past interactions, providing continuity and personalisation across conversations.
AI Model Card
A documentation framework that provides standardised information about an AI model's intended use, performance characteristics, limitations, and ethical considerations.
AI Model Registry
A centralised repository for storing, versioning, and managing trained AI models across an organisation.
AI Orchestration
The coordination and management of multiple AI models, services, and workflows to achieve complex end-to-end automation.
AI Orchestration Layer
Middleware that manages routing, fallback, load balancing, and model selection across multiple AI providers to optimise cost, latency, and output quality.
AI Pipeline
A sequence of data processing and model execution steps that automate the flow from raw data to AI-driven outputs.
AI Readiness Assessment
A structured evaluation of an organisation's data maturity, technical infrastructure, talent, culture, and governance preparedness for successful AI adoption and deployment.
AI Red Teaming
The systematic adversarial testing of AI systems to identify vulnerabilities, failure modes, harmful outputs, and safety risks before deployment.
AI Regulation
The developing body of laws and policies governing the development, deployment, and use of artificial intelligence systems.
AI Risk Management Framework
A structured approach to identifying, assessing, and mitigating risks associated with AI systems, as defined by standards such as NIST AI RMF and ISO/IEC 42001.
AI Robustness
The ability of an AI system to maintain performance under varying conditions, adversarial attacks, or noisy input data.
AI Safety
The interdisciplinary field dedicated to making AI systems safe, robust, and beneficial while minimizing risks of unintended consequences.
AI Security
The discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.
AI Tokenomics
The economic model governing the pricing and allocation of computational resources for AI inference, including per-token billing, rate limiting, and credit systems.
AI Training
The process of teaching an AI model to recognise patterns by exposing it to large datasets and adjusting its parameters.
AI Transformation
The strategic reimagining of an organisation's operations, products, and business models through the systematic integration of artificial intelligence across all functions and processes.
AI Transparency
The practice of making AI systems' operations, data usage, and decision processes openly visible to stakeholders.
AI Watermarking
Techniques for embedding imperceptible statistical patterns in AI-generated content to enable reliable detection and provenance tracking of synthetic outputs.
AI-Augmented Workforce
An organisational model where human workers are empowered by AI tools that handle routine tasks, surface insights, and enhance decision-making, amplifying human capabilities.
AI-Generated Content
Text, images, audio, video, and code created by artificial intelligence systems, raising questions about authenticity, intellectual property, and the future of creative work.
AI-Powered Threat Detection
Security systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.
Alerting
Automated notifications triggered when system metrics or conditions exceed predefined thresholds.
Algorithmic Accountability
The principle that organisations should be answerable for the outcomes and impacts of their algorithmic systems.
Algorithmic Impact Assessment
A systematic evaluation of the potential social, economic, and civil rights impacts of an automated decision-making system before and after deployment.
Algorithmic Transparency
Making the logic, data, and decisions of algorithms visible and understandable to affected parties.
Ambient Intelligence
Electronic environments that are sensitive and responsive to the presence of people, adapting to their needs.
Anomaly Detection
Identifying data points, events, or observations that deviate significantly from the expected pattern in a dataset.
Ansible
An open-source automation tool for configuration management, application deployment, and task automation.
Anti-Money Laundering
Laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.
API
Application Programming Interface — a set of protocols and tools for building and integrating software applications.
API Design
The process of defining interfaces for software components to communicate with each other effectively.
API Economy
The commercial exchange of business capabilities through application programming interfaces.
API Gateway
A server that acts as a single entry point for API calls, handling request routing, composition, and protocol translation.
Appchain
A purpose-built blockchain designed for a single application or use case, offering customised consensus, throughput, and governance optimised for specific requirements.
Application Modernisation
Updating existing applications to newer computing approaches including cloud, containers, and microservices.
Artifact Repository
A centralised storage system for managing binary artifacts produced during the software build process.
Artificial General Intelligence
A hypothetical form of AI that possesses the ability to understand, learn, and apply knowledge across any intellectual task a human can perform.
Artificial Intelligence
The simulation of human intelligence processes by computer systems, including learning, reasoning, and self-correction.
Artificial Narrow Intelligence
AI systems designed and trained for a specific task or narrow range of tasks, such as image recognition or language translation.
Artificial Superintelligence
A theoretical level of AI that surpasses human cognitive abilities across all domains, including creativity and social intelligence.
Aspect-Based Sentiment Analysis
A fine-grained sentiment analysis approach that identifies opinions directed at specific aspects or features of an entity, such as a product's price, quality, or design.
Association Rule Learning
A method for discovering interesting relationships and patterns between variables in large datasets.
Asynchronous Programming
A programming paradigm where operations can proceed without waiting for other operations to complete.
Atomic Swap
A peer-to-peer exchange of cryptocurrencies across different blockchain networks using cryptographic hash time-locked contracts, eliminating the need for trusted intermediaries.
Attack Surface
The total number of points where an unauthorised user can try to enter or extract data from a system.
Attack Surface Management
The continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.
Attack Vector
The specific path, method, or scenario used by an attacker to gain unauthorised access to a system.
Attention Head
An individual attention computation within a multi-head attention layer that learns to focus on different aspects of the input, with outputs concatenated for richer representations.
Attention Mechanism
A neural network component that learns to focus on relevant parts of the input when producing each element of the output.
AUC Score
Area Under the ROC Curve, a single metric summarising a classifier's ability to distinguish between classes.
Audit Trail
A chronological record of system activities enabling the reconstruction and examination of a sequence of events.
Augmented Analytics
The use of machine learning and natural language processing to automate data preparation, insight discovery, and explanation, making analytics accessible to business users.
Augmented Reality
Technology overlaying digital information onto the real world through devices like smartphones or smart glasses.
Auto-Scaling
Automatically adjusting compute resources based on current demand to maintain performance and optimise costs.
Autoencoder
A neural network trained to encode input data into a compressed representation and then decode it back to reconstruct the original.
Automated Machine Learning
The end-to-end automation of the machine learning pipeline including feature engineering, model selection, hyperparameter tuning, and deployment, making ML accessible to non-experts.
Automated Market Maker
A decentralised exchange protocol that uses algorithmic pricing instead of traditional order books.
AutoML
Automated machine learning that automates the end-to-end process of applying machine learning to real-world problems.
Autonomous Agent
An AI agent capable of operating independently, making decisions and taking actions without continuous human oversight.
Autonomous Mobile Robot
A robot that can navigate and perform tasks in its environment without human guidance.
Autonomous Navigation
The ability of a robot or vehicle to move through an environment independently using sensors and algorithms.
Autonomous Operations
The use of AI, robotics, and automation to run business processes and industrial operations with minimal human intervention, achieving continuous optimisation.
Autonomous Perception
The AI subsystem in autonomous vehicles that interprets sensor data to understand the surrounding environment.
Autonomous Vehicle
A vehicle capable of navigating and operating without human input, using sensors, AI, and advanced control systems to perceive surroundings and make driving decisions.
Autonomous Workflow
A multi-step business process executed entirely by AI agents with minimal human intervention, spanning planning, execution, monitoring, and error recovery phases.
Availability Zone
An isolated location within a cloud region with independent power, cooling, and networking for high availability.
Backpropagation
The algorithm for computing gradients of the loss function with respect to network weights, enabling neural network training.
Backward Chaining
An inference strategy that starts with a goal and works backward through rules to determine what facts must be true.
Bagging
Bootstrap Aggregating — an ensemble method that trains multiple models on random subsets of data and averages their predictions.
Bandit Algorithm
An online learning algorithm that balances exploration of new options with exploitation of known good options to maximise reward.
Bandwidth
The maximum rate of data transfer across a network path, typically measured in bits per second.
Batch Learning
Training a machine learning model on the entire dataset at once before deployment, as opposed to incremental updates.
Batch Normalisation
A technique that normalises layer inputs during training to stabilise and accelerate deep neural network learning.
Bayesian Reasoning
A statistical approach to AI that uses Bayes' theorem to update probability estimates as new evidence becomes available.
Bayesian Statistics
A statistical approach that incorporates prior knowledge and updates probability estimates as new data is observed.
BDI Architecture
Belief-Desire-Intention — an agent architecture where agents reason about beliefs, desires, and intentions to decide actions.
Behaviour-Driven Development
A development approach where application behaviour is described in a natural language format before implementation.
BERT
Bidirectional Encoder Representations from Transformers — a language model that understands context by reading text in both directions.
BGP
Border Gateway Protocol — the routing protocol that manages how packets are routed across the internet between autonomous systems.
Bias-Variance Tradeoff
The balance between a model's ability to minimise bias (error from assumptions) and variance (sensitivity to training data fluctuations).
Big Data
Extremely large and complex datasets that require advanced computational tools and techniques to store, process, and analyse.
Biocomputing
Using biological materials and systems to perform computational operations and information processing.
Biometric Authentication
Using unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
Blameless Culture
An organisational approach where incident reviews focus on systemic improvements rather than individual blame.
BLE
Bluetooth Low Energy — a wireless protocol designed for short-range, low-power IoT device communication.
BLEU Score
A metric for evaluating the quality of machine-generated text by comparing it to reference translations or texts.
Bloch Sphere
A geometrical representation of the state space of a single qubit as a point on the surface of a sphere.
Block Storage
A data storage technology that manages data as individual blocks, each acting as an independent hard drive.
Blockchain
A distributed, immutable digital ledger that records transactions across a network of computers without a central authority.
Blockchain Forensics
The analysis of blockchain transaction data to trace asset flows, identify illicit activity, and support regulatory compliance using graph analysis and clustering techniques.
Blockchain Interoperability
The ability of different blockchain networks to communicate, share data, and transfer assets seamlessly, enabling cross-chain applications and unified digital asset ecosystems.
Blockchain Oracle
A service that provides smart contracts with verified external data from off-chain sources such as market prices, weather conditions, and real-world events.
Blue Ocean Strategy
A business theory that suggests companies create new market spaces rather than competing in existing ones.
Blue Team
A group of security professionals who defend against both real attackers and simulated attacks from red teams.
Blue-Green Deployment
A deployment strategy using two identical production environments to achieve zero-downtime releases.
Blue-Green Infrastructure
Maintaining two identical production environments to enable instant switching between versions.
Boosting
An ensemble technique that sequentially trains models, each focusing on correcting the errors of previous models.
Bounding Box
A rectangular region drawn around an object in an image to indicate its location for object detection tasks.
Brain-Computer Interface
A direct communication pathway between the brain's electrical activity and an external computing device.
Breach and Attack Simulation
Automated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.
Browser Agent
An AI agent that autonomously navigates web pages, fills forms, extracts information, and completes online tasks by controlling a browser through programmatic or visual interfaces.
Buffer Overflow
A programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.
Bug Bounty
A programme where organisations pay individuals for discovering and reporting software vulnerabilities.
Build Automation
The process of automating the compilation, testing, and packaging of software applications.
Build vs Buy Analysis
A strategic decision framework for evaluating whether to develop technology capabilities internally or procure them from external vendors, weighing cost, time, differentiation, and risk.
Business Agility
An organisation's ability to rapidly adapt to market and environmental changes in productive and cost-effective ways.
Business Analytics
The practice of iterative exploration of organisational data to drive business planning and decision-making.
Business Case
A justification for a proposed project or undertaking based on its expected commercial benefit.
Business Continuity Planning
The process of creating systems of prevention and recovery to deal with potential threats to an organisation.
Business Ethics
The application of ethical principles and moral standards to business activities, decisions, and relationships.
Business Intelligence
Technologies, practices, and strategies for collecting, integrating, and analysing business data to support decision-making.
Business Model Innovation
The process of creating, refining, or transforming a company's business model to capture new value.
Business Process Management
The discipline of modelling, automating, executing, and optimising organisational business processes.
Byte-Pair Encoding
A subword tokenisation algorithm that iteratively merges the most frequent character pairs to build a vocabulary.
Byzantine Fault Tolerance
The ability of a distributed system to reach consensus despite some nodes acting maliciously or failing.
Caching
Storing frequently accessed data in a fast-access storage layer to reduce latency and improve performance.
Canary Deployment
A deployment strategy where changes are gradually rolled out to a small subset of users before full deployment.
Capacity Planning
The process of determining the production capacity needed to meet changing demands for an organisation's products.
Capsule Network
A neural network architecture that groups neurons into capsules to better capture spatial hierarchies and part-whole relationships.
Carbon Capture
Technologies for capturing carbon dioxide emissions from sources or the atmosphere and storing or utilising them.
Catastrophic Forgetting
The tendency of neural networks to completely lose previously learned knowledge when trained on new tasks, a fundamental challenge in continual and multi-task learning.
Causal Inference
The process of determining cause-and-effect relationships from data, going beyond correlation to establish causation.
CCPA
California Consumer Privacy Act — a US state law enhancing privacy rights and consumer protection for California residents.
Central Bank Digital Currency
A digital form of fiat currency issued and regulated by a country's central bank on blockchain infrastructure.
Certificate Authority
An entity that issues digital certificates, verifying the identity of organisations and encrypting communications.
Chain of Agents
A workflow pattern where multiple specialised agents are sequentially connected, with each agent's output feeding the next.
Chain-of-Thought Prompting
A prompting technique that encourages language models to break down reasoning into intermediate steps before providing an answer.
Chainlink
A decentralised oracle network that connects smart contracts with external data sources, APIs, and payment systems.
Change Management
A structured approach to transitioning individuals, teams, and organisations from a current state to a desired future state.
Change Readiness
An organisation's preparedness and capability to embrace and implement significant changes.
Chaos Engineering
The discipline of experimenting on distributed systems to build confidence in their ability to withstand turbulent conditions.
Chatbot
A software application that simulates human conversation through text or voice interactions using NLP.
ChatOps
A collaboration model connecting tools, processes, and automation with team chat platforms for operations management.
Chef
A configuration management tool using Ruby-based scripts to automate infrastructure setup and maintenance.
Chinese Room Argument
A thought experiment by John Searle arguing that executing a program cannot give a computer genuine understanding or consciousness.
Chunking Strategy
The method of dividing long documents into smaller segments for embedding and retrieval, balancing context preservation with optimal chunk sizes for vector search accuracy.
Churn Analysis
The process of analysing customer attrition to understand why customers stop using a product or service.
CI/CD Pipeline
An automated workflow that builds, tests, and deploys software changes from development to production.
Circuit Breaker Pattern
A design pattern that prevents cascading failures by stopping calls to a failing service temporarily.
Cirq
Google's open-source framework for writing, manipulating, and running quantum circuits on quantum hardware and simulators.
Citizen Developer
A non-IT employee who creates business applications using low-code or no-code platforms sanctioned by IT departments.
Citizen Development
A practice that empowers non-technical business users to create applications and automations using low-code and no-code platforms with appropriate governance guardrails.
Class Imbalance
A situation where the distribution of classes in a dataset is significantly skewed, with some classes vastly outnumbering others.
Clean Architecture
A software design philosophy separating concerns into layers with dependencies pointing inward toward business rules.
Cloud Bursting
A configuration where an application runs in a private cloud and bursts into a public cloud when demand spikes.
Cloud Computing
The delivery of computing services — servers, storage, databases, networking, software — over the internet on demand.
Cloud Cost Optimisation
Strategies and practices for minimising cloud computing expenses while maintaining performance and functionality.
Cloud Database
A database service built, deployed, and accessed through a cloud platform, offering scalability and managed operations.
Cloud Governance
The policies, procedures, and tools for managing cloud resource usage, security, compliance, and costs.
Cloud Migration
The process of moving data, applications, and workloads from on-premises infrastructure to cloud environments.
Cloud Orchestration
The automated arrangement, coordination, and management of complex cloud computing systems and services.
Cloud Repatriation
The process of moving workloads back from public cloud environments to on-premises or private cloud infrastructure.
Cloud Security
The set of policies, technologies, and controls deployed to protect cloud-based systems, data, and infrastructure.
Cloud Security Posture Management
Automated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Cloud Workload Protection
Security solutions designed to protect server workloads running in cloud environments, providing vulnerability management, runtime protection, and compliance monitoring.
Cloud-Native
An approach to building applications that fully exploit cloud computing advantages like elasticity, resilience, and automation.
Cloud-Native Application Protection
An integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.
Cloud-Native Database
A database designed from the ground up to operate in cloud environments with automatic scaling and high availability.
Cloud-Native Development
An approach to building applications that fully exploit cloud computing advantages including microservices, containers, dynamic orchestration, and continuous delivery.
Clustering
Unsupervised learning technique that groups similar data points together based on inherent patterns without predefined labels.
CoAP
Constrained Application Protocol — a specialised web transfer protocol for use with constrained devices in IoT networks.
COBIT
Control Objectives for Information and Related Technologies — a framework for IT governance and management.
Code Generation
The automated production of source code from natural language specifications or partial code context, powered by large language models trained on programming repositories.
Code Review
A systematic examination of source code by developers other than the author to identify bugs and improve quality.
Coding Agent
An AI agent specialised in writing, debugging, refactoring, and testing software code, capable of operating across multiple files and understanding project-level context.
Cognitive Architecture
A theoretical framework that models the structure and processes of the human mind for building intelligent agents.
Cognitive Computing
Computing systems that simulate human thought processes using self-learning algorithms, data mining, pattern recognition, and natural language processing.
Cognitive Load
The total amount of mental effort required to process and understand information in a user interface.
Cohort Analysis
A behavioural analytics technique that groups users with shared characteristics to track metrics over time.
Cold Wallet
An offline cryptocurrency storage solution disconnected from the internet for maximum security.
Collaborative Filtering
A recommendation technique that makes predictions based on the collective preferences and behaviour of many users.
Collaborative Robot
A robot designed to work alongside humans in a shared workspace, equipped with safety features.
Commonsense Reasoning
The AI capability to make inferences based on everyday knowledge that humans typically take for granted.
Competitive Advantage
A condition or circumstance that puts a company in a superior business position relative to competitors.
Compliance
Adherence to laws, regulations, guidelines, and specifications relevant to an organisation's business.
Compliance as Code
The practice of expressing regulatory and security compliance requirements as machine-readable policies that can be automatically validated against infrastructure and application configurations.
Compliance Framework
A structured set of guidelines and best practices for meeting regulatory requirements and industry standards.
Component Library
A collection of pre-built, reusable UI components that maintain consistency across applications.
Composable Architecture
A technology design approach that assembles applications from modular, independent building blocks through APIs, enabling rapid adaptation to changing business requirements.
Composable Enterprise
An organisation design principle where business capabilities are assembled from modular, interchangeable components.
Computer Network
A collection of interconnected computing devices that share resources and communicate using standardised protocols.
Computer Numerical Control
The automated control of machining tools using a computer and coded programmed instructions.
Computer Use Agent
An AI agent that interacts with graphical user interfaces by perceiving screen content and executing mouse clicks, keyboard inputs, and navigation actions like a human operator.
Computer Vision
The field of AI that enables computers to interpret and understand visual information from images and video.
Concept Drift
Changes in the underlying patterns that a model was trained to capture, requiring model adaptation.
Concurrency
The ability of a system to handle multiple tasks simultaneously by interleaving their execution.
Condition Monitoring
Continuously tracking equipment parameters to detect changes that indicate developing faults.
Confidential Computing
Technology that protects data during processing by performing computations in hardware-based trusted execution environments.
Configuration Management
The practice of systematically managing and maintaining the consistency of system configurations.
Configure, Price, Quote
Enterprise software that automates the configuration of complex products, accurate pricing calculations, and professional quote generation for sales teams.
Confusion Matrix
A table used to evaluate classification model performance by comparing predicted classifications against actual classifications.
Connected Enterprise
An organisation with seamlessly integrated systems, processes, and data flows across all business functions.
Connected Vehicle
A vehicle equipped with internet connectivity and sensors enabling communication with other vehicles and infrastructure.
Connected Worker
Technology solutions that equip frontline workers with digital tools, wearables, and AI assistance to improve safety, productivity, and access to information in operational environments.
Connectionism
An approach to AI modelling cognitive processes using artificial neural networks inspired by biological neural structures.
Consensus Mechanism
The method by which a distributed network agrees on the current state of the ledger and validates transactions.
Constitutional AI
An approach to AI alignment where models are trained to follow a set of principles or constitution.
Constraint Satisfaction
A computational approach where problems are defined as a set of variables, domains, and constraints that must all be simultaneously satisfied.
Container
A lightweight, portable software package that bundles application code with all its dependencies for consistent execution.
Container Orchestration
The automated management of containerised application deployment, scaling, networking, and availability across clusters of machines, with Kubernetes as the dominant platform.
Container Registry
A repository for storing, managing, and distributing container images.
Content Delivery Network
A distributed network of servers that delivers web content to users based on their geographic location.
Content-Based Filtering
A recommendation approach that suggests items similar to those a user has previously liked, based on item attributes.
Context Window
The maximum amount of text a language model can consider at once when generating a response.
Contextual Embedding
Word representations that change based on surrounding context, capturing polysemy and contextual meaning.
Continual Learning
A machine learning paradigm where models learn from a continuous stream of data, accumulating knowledge over time without forgetting previously learned information.
Continuous Compliance
An automated approach to maintaining regulatory compliance through real-time monitoring, policy enforcement, and evidence collection integrated into development and operations pipelines.
Continuous Delivery
A software practice where code changes can be released to production at any time through automated pipelines.
Continuous Deployment
An extension of continuous integration where code changes are automatically deployed to production after passing tests.
Continuous Integration
A development practice where code changes are automatically built and tested when merged to a shared repository.
Contrastive Learning
A self-supervised learning approach that trains models by comparing similar and dissimilar pairs of data representations.
Control Framework
A structured set of controls and processes designed to manage risk and ensure compliance with regulations.
Conversational AI
AI systems designed to engage in natural, context-aware dialogue with humans across multiple turns.
Conversion Rate Optimisation
The practice of increasing the percentage of users who complete a desired action on a website.
Convolutional Layer
A neural network layer that applies learnable filters across input data to detect local patterns and features.
Convolutional Neural Network
A deep learning architecture designed for processing structured grid data like images, using convolutional filters to detect features.
Core Competency
A unique capability or advantage that distinguishes a company from its competitors and creates sustainable value.
Coreference Resolution
The task of identifying all expressions in text that refer to the same real-world entity.
Corporate Governance
The system of rules, practices, and processes by which a company is directed and controlled.
Corporate Innovation Lab
A dedicated unit within a corporation focused on exploring and developing new technologies and business models.
Corporate Venture Capital
Investment of corporate funds directly into external startup companies to gain strategic benefits such as access to innovation, market intelligence, and potential acquisitions.
Correlation Analysis
Statistical analysis measuring the strength and direction of the relationship between two or more variables.
Cross-Chain Bridge
Infrastructure enabling the transfer of assets and data between different blockchain networks.
Cross-Lingual Transfer
The application of models trained in one language to perform tasks in another language, leveraging shared multilingual representations learned during pre-training.
Cross-Site Scripting
A web security vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.
Cross-Validation
A resampling technique that partitions data into subsets, training on some and validating on others to assess model generalisation.
Cryptographic Hash
A one-way function producing a fixed-length output that is computationally infeasible to reverse or find collisions for.
Curriculum Learning
A training strategy that presents examples to a model in a meaningful order, typically from easy to hard.
Customer Analytics
The practice of collecting and analysing customer data to understand behaviour, preferences, and lifetime value.
Customer Data Platform
A software system that creates a unified customer database accessible to other systems for marketing and analytics.
Customer Experience
The sum of all interactions and perceptions a customer has with a brand throughout their entire journey.
Customer Lifetime Value
The total revenue a business can expect from a single customer account throughout their relationship.
Customer Relationship Management
Technology for managing a company's interactions, relationships, and data with current and potential customers.
Cyber Insurance
Insurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.
Cyber Kill Chain
A model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Cyber Resilience
An organisation's ability to continuously deliver intended outcomes despite adverse cyber events, encompassing prevention, detection, response, and recovery capabilities.
Cyber Threat Intelligence
Evidence-based knowledge about adversary capabilities, infrastructure, motives, and tactics that informs security decisions and enables proactive defence against cyber attacks.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.
Dark Pattern
A deceptive user interface design that tricks users into doing things they didn't intend to do.
Dashboard
A visual interface displaying key metrics and data points for monitoring performance and making informed decisions.
Data Analysis Agent
An AI agent that interprets datasets, generates visualisations, performs statistical analysis, and produces actionable insights through autonomous exploratory data investigation.
Data Annotation
The process of labelling data with informative tags to make it usable for training supervised machine learning models.
Data Augmentation
Techniques that artificially increase the size and diversity of training data through transformations like rotation, flipping, and cropping.
Data Availability
The guarantee that all data required to verify blockchain transactions is accessible to network participants, a critical requirement for the security of rollup-based scaling solutions.
Data Catalogue
A metadata management tool that helps organisations find, understand, and manage their data assets.
Data Contract
A formal agreement between data producers and consumers that defines the structure, semantics, quality standards, and service levels of a shared data interface.
Data Democratisation
Making data accessible to all members of an organisation regardless of their technical expertise.
Data Drift
Changes in the statistical properties of data over time that can degrade machine learning model performance.
Data Engineering
The practice of designing, building, and maintaining data infrastructure, pipelines, and architectures.
Data Fabric
An architecture that provides a unified, intelligent layer for integrating data management across cloud and on-premises environments.
Data Governance
The framework of policies, processes, and standards for managing data assets to ensure quality, security, and compliance.
Data Integration
The process of combining data from different sources to provide users with a unified, consistent view.
Data Labelling
The process of annotating raw data with informative tags or classifications for supervised machine learning training.
Data Lake
A centralised repository for storing vast amounts of raw data in its native format until needed for analysis.
Data Lakehouse
A hybrid data architecture combining the flexibility of data lakes with the structured querying capabilities of data warehouses.
Data Lineage
The documentation of data's origins, movements, and transformations throughout its lifecycle.
Data Loss Prevention
Technology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
Data Mart
A subset of a data warehouse focused on a particular business area, department, or subject.
Data Mesh
A decentralised data architecture approach where domain teams own and manage their own data products.
Data Monetisation
The process of generating measurable economic benefits from data assets, either by improving internal operations or creating external revenue streams through data products and services.
Data Observability
The ability to understand, diagnose, and resolve data quality issues across the data stack by monitoring freshness, distribution, volume, schema, and lineage of data assets.
Data Parallelism
A distributed training strategy that replicates the model across multiple devices and divides training data into batches processed simultaneously, synchronising gradients after each step.
Data Pipeline
An automated set of processes that moves and transforms data from source systems to target destinations.
Data Privacy
The proper handling of personal data including collection, storage, processing, and sharing in compliance with regulations.
Data Product
A reusable, well-documented, and managed dataset or analytical asset created to serve specific business needs, treated with the same rigour as software products.
Data Profiling
The process of examining, analysing, and creating summaries of data to assess quality and structure.
Data Protection Impact Assessment
A process required under GDPR for assessing the risks of personal data processing activities and identifying measures to mitigate those risks before implementation.
Data Protection Officer
An individual responsible for overseeing an organisation's data protection strategy and regulatory compliance.
Data Quality
The measure of data's fitness for its intended purpose based on accuracy, completeness, consistency, and timeliness.
Data Science
An interdisciplinary field using scientific methods, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
Data Silo
An isolated repository of data controlled by one department, inaccessible to other parts of the organisation.
Data Sovereignty
The concept that data is subject to the laws and governance structures of the country where it is collected or processed.
Data Storytelling
The practice of building narratives around data insights using visualisations and narrative techniques.
Data Visualisation
The graphical representation of data and information using visual elements like charts, graphs, and maps.
Data Warehouse
A centralised repository of integrated data from multiple sources, designed for query and analysis.
Data Wrangling
The process of cleaning, structuring, and enriching raw data into a desired format for analysis.
Data-Driven Culture
An organisational culture where decisions at all levels are informed by data analysis and empirical evidence rather than intuition, supported by accessible analytics and data literacy.
Data-Driven Organisation
An enterprise where strategic decisions are made based on data analysis and interpretation rather than intuition alone.
Database Design
The process of defining the structure, storage, and retrieval of data in a database system.
DBSCAN
Density-Based Spatial Clustering of Applications with Noise — a clustering algorithm that finds arbitrarily shaped clusters based on density.
Decentralised Application
An application that runs on a decentralised peer-to-peer network rather than a single centralised server.
Decentralised Autonomous Organisation
An organisation governed by smart contracts and token holder votes rather than centralised management.
Decentralised Finance
Financial services built on blockchain technology that operate without traditional intermediaries like banks or brokerages.
Decentralised Identity
A self-sovereign identity framework where individuals control their own digital identity credentials without centralised authorities.
Decentralised Physical Infrastructure
Networks that use blockchain token incentives to coordinate the deployment and operation of physical infrastructure such as wireless networks, energy grids, and compute resources.
Decentralised Storage
Distributed file storage systems where data is spread across multiple nodes rather than centralised servers.
Deception Technology
Security solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.
Decision Intelligence
A discipline that augments human decision-making with data analytics, AI, and behavioural science to improve the speed, quality, and outcomes of business decisions.
Decision Tree
A tree-structured model where internal nodes represent feature tests, branches represent outcomes, and leaves represent predictions.
Decoherence
The loss of quantum coherence when a quantum system interacts with its environment, causing errors in computation.
Deep Learning
A subset of machine learning using neural networks with multiple layers to learn hierarchical representations of data.
Deep Reinforcement Learning
Combining deep neural networks with reinforcement learning to enable agents to learn complex decision-making from raw sensory input.
Deepfake
AI-generated synthetic media where a person's likeness is convincingly replaced or manipulated in images or videos.
Degrees of Freedom
The number of independent parameters that define a robot's configuration and range of motion.
Delegated Proof of Stake
A consensus mechanism where token holders vote for delegates who validate transactions on their behalf.
Deliberative Agent
An AI agent that maintains an internal model of its world and reasons about actions before executing them.
Denial of Service Attack
An attack designed to make a machine or network resource unavailable by overwhelming it with traffic.
Dependency Injection
A design pattern where dependencies are provided to a component rather than created within it.
Dependency Parsing
The syntactic analysis of a sentence to establish relationships between head words and words that modify them.
Depth Estimation
Predicting the distance of surfaces in a scene from the camera viewpoint using visual information.
Descriptive Analytics
The analysis of historical data to understand what has happened in the past and identify patterns.
Design Pattern
A reusable solution to a commonly occurring problem within a given context in software design.
Design Sprint
A five-day process for answering critical business questions through design, prototyping, and user testing.
Design System
A collection of reusable components, guidelines, and standards for building consistent digital products.
Design Thinking
A human-centred problem-solving methodology that emphasises empathy, ideation, prototyping, and testing.
Device Authentication
Verifying the identity of IoT devices before allowing them to connect to a network or service.
Device Provisioning
The process of configuring and enrolling IoT devices into a management platform for secure operation.
DevOps
A set of practices combining software development and IT operations to shorten the development lifecycle and deliver continuous value.
DevSecOps
An approach integrating security practices within the DevOps process, making security a shared responsibility.
DHCP
Dynamic Host Configuration Protocol — automatically assigns IP addresses and network configuration to devices.
Diagnostic Analytics
Analysis techniques focused on understanding why something happened by examining data patterns and correlations.
Dialogue Management
The component of conversational systems that tracks conversation state, determines the next system action, and maintains coherent multi-turn interactions with users.
Dialogue System
A computer system designed to converse with humans, encompassing task-oriented and open-domain conversation.
Diffusion Model
A generative model that learns to reverse a gradual noising process, generating high-quality samples from random noise.
Digital Adoption Platform
Software that overlays on enterprise applications to guide users through features and processes in real time.
Digital Biology
The convergence of biological sciences with computational methods and AI to accelerate drug discovery, protein design, genomic analysis, and synthetic biology applications.
Digital Bond
A fixed-income security issued and managed on blockchain infrastructure, automating coupon payments, settlement, and transfer of ownership through smart contracts.
Digital Dexterity
The ability and desire of individuals and organisations to leverage existing and emerging technologies for better business outcomes, encompassing both skill and mindset.
Digital Disruption
The change that occurs when new digital technologies fundamentally alter the way business is conducted.
Digital Ecosystem
A network of interconnected organisations, technologies, and processes that create and distribute value digitally.
Digital Ethics
The application of moral principles to the creation, use, and governance of digital technologies, addressing questions of privacy, equity, transparency, and societal impact.
Digital Factory
A comprehensive network of digital models and simulation tools replicating the entire production process.
Digital Forensics
The process of collecting, preserving, and analysing electronic evidence for investigating security incidents.
Digital Identity
The online representation of an individual comprising their attributes, credentials, and digital footprint.
Digital Literacy
The ability to effectively and critically navigate, evaluate, and create information using digital technologies.
Digital Maturity
An assessment of an organisation's ability to adapt and respond to digital trends and competitive threats.
Digital Maturity Model
A framework that assesses an organisation's current level of digital capability across dimensions such as strategy, culture, technology, data, and operations.
Digital Operating Model
The blueprint for how an organisation delivers value through digital capabilities, processes, and technology.
Digital Operational Resilience
An organisation's ability to build, assure, and review its technological integrity to ensure it can withstand all types of ICT-related disruptions and threats.
Digital Product
A product that exists in digital form, delivered and consumed electronically, often as software or digital content.
Digital Product Management
The discipline of guiding digital products through their lifecycle from ideation to retirement, balancing user needs, business objectives, and technical constraints.
Digital Signature
A cryptographic mechanism that verifies the authenticity and integrity of digital messages or documents.
Digital Strategy
A plan that uses digital initiatives to create new competitive advantages and support business transformation goals.
Digital Supply Chain
A technology-enabled supply chain that uses AI, IoT, blockchain, and analytics to create end-to-end visibility, predict disruptions, and optimise logistics in real time.
Digital Thread
An integrated data framework that connects information across the entire product lifecycle from design through manufacturing to service, enabling traceability and analytics.
Digital Transformation
The fundamental integration of digital technology into all areas of a business, changing how it operates and delivers value.
Digital Twin
A virtual replica of a physical system, process, or product that simulates its real-world counterpart for analysis and optimisation.
Digital Twin
A virtual model of a physical device or system that simulates its behaviour for monitoring and optimisation.
Digital Twin Organisation
A dynamic virtual model of an entire organisation used to simulate, predict, and optimise business performance.
Digital Venturing
Creating new digital businesses or ventures within or alongside an established organisation.
Digital Workplace
A virtual equivalent of a physical workplace enabled by digital tools for collaboration, communication, and productivity.
Dimensionality Reduction
Techniques that reduce the number of input variables in a dataset while preserving essential information and structure.
Direct Preference Optimisation
A simplified alternative to RLHF that directly optimises language model policies using preference data without requiring a separate reward model.
Disaster Recovery
The policies, tools, and procedures for recovering technology infrastructure and systems after a natural or human-induced disaster.
Disaster Recovery as a Service
A cloud computing model that enables the replication and recovery of infrastructure and data in the cloud.
Disruptive Innovation
Innovation that creates a new market and value network, eventually disrupting existing markets and displacing established firms.
Distributed Ledger Technology
A digital system for recording, sharing, and synchronising data across multiple sites without a central administrator.
Distributed Tracing
A method of tracking requests as they flow through distributed systems to diagnose latency and failure points.
DNA Data Storage
Using synthetic DNA molecules to encode and store digital data with extreme density and longevity.
DNS
Domain Name System — the hierarchical system that translates human-readable domain names into numerical IP addresses.
Docker
A platform for developing, shipping, and running applications in isolated containers with consistent environments.
Document Understanding
AI systems that extract structured information from unstructured documents by combining optical character recognition, layout analysis, and natural language comprehension.
Domain-Driven Design
A software design approach focusing on modelling the business domain and aligning code with business logic.
Drone
An unmanned aerial vehicle operated remotely or autonomously for applications like surveillance, delivery, and mapping.
Dropout
A regularisation technique that randomly deactivates neurons during training to prevent co-adaptation and reduce overfitting.
Due Diligence
A comprehensive appraisal of a business or investment undertaken to establish its assets, liabilities, and commercial potential.
Ecosystem Strategy
A strategic approach that leverages partnerships and collaborative networks to create collective value.
Edge AI
Artificial intelligence algorithms processed locally on edge devices rather than in centralised cloud data centres.
Edge Analytics
Performing data analysis at the network edge, close to data sources, for real-time insights and reduced latency.
Edge Computing
Processing data near the source of data generation rather than in a centralised cloud data centre.
Edge Device
A computing device at the boundary of a network that processes data locally before sending it to the cloud.
Elastic Net
A regularisation technique combining L1 and L2 penalties, balancing feature selection and coefficient shrinkage.
Elasticity
The ability of a system to automatically scale resources up or down based on current demand.
ELT
Extract, Load, Transform — a modern data pipeline approach where raw data is loaded first and transformed within the target system.
Embedded System
A dedicated computer system designed for specific functions within a larger mechanical or electrical system.
Embedding
A learned dense vector representation of discrete data (like words or categories) in a continuous vector space.
Embodied AI
Artificial intelligence that operates within physical robots or virtual bodies, learning from sensory experiences and physical interaction with its environment.
Emergent Behaviour
Complex patterns and capabilities that arise from the interactions of simpler agent components or rules.
Emergent Capabilities
Abilities that appear in large language models at certain scale thresholds that were not present in smaller versions, such as in-context learning and complex reasoning.
Employee Experience Platform
A unified digital platform improving employee engagement, productivity, and satisfaction across the work lifecycle.
Encoder-Decoder Architecture
A neural network design where an encoder processes input into a fixed representation and a decoder generates output from it.
Encryption
The process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
End Effector
The device at the end of a robotic arm designed to interact with the environment, such as grippers or tools.
End-to-End Encryption
A communication system where only the communicating users can read the messages, with encryption at both endpoints.
End-to-End Testing
Testing the complete application workflow from start to finish to ensure the system meets requirements.
Endpoint Detection and Response
Security technology that monitors endpoint devices to detect, investigate, and respond to cyber threats.
Energy Harvesting
Technology that captures and converts ambient energy from the environment into usable electrical power.
Ensemble Learning
Combining multiple machine learning models to produce better predictive performance than any single model.
Ensemble Methods
Machine learning techniques that combine multiple models to produce better predictive performance than any single model, including bagging, boosting, and stacking approaches.
Enterprise AI Platform
An integrated software platform that provides organisations with tools for building, deploying, and managing AI applications at enterprise scale with governance, security, and compliance controls.
Enterprise Architecture
A strategic framework for aligning an organisation's IT infrastructure and processes with its business objectives.
Enterprise Digital Twin
A comprehensive digital replica of an entire organisation's operations, processes, and assets that enables simulation, optimisation, and predictive analysis at enterprise scale.
Enterprise Integration
The practice of connecting different enterprise systems, applications, and data sources to work together seamlessly.
Enterprise Resource Planning
Integrated management software that connects core business processes including finance, HR, manufacturing, supply chain, and procurement.
Enterprise Service Bus
Middleware architecture that enables communication between different enterprise applications through a central messaging backbone.
Epoch
One complete pass through the entire training dataset during the machine learning model training process.
ERC-20
A technical standard for implementing fungible tokens on the Ethereum blockchain.
ERC-721
A technical standard for non-fungible tokens on the Ethereum blockchain, ensuring each token is unique.
Error Budget
The maximum amount of time a service can be unavailable within a given period based on its SLO.
ESG
Environmental, Social, and Governance — a set of standards for measuring a company's ethical impact and sustainability.
Ethereum Virtual Machine
The runtime environment for executing smart contracts on the Ethereum blockchain network.
Ethical AI Framework
A set of principles, guidelines, and processes that an organisation adopts to ensure its AI systems are developed and deployed in a manner that is fair, transparent, and accountable.
ETL
Extract, Transform, Load — the process of extracting data from sources, transforming it to fit needs, and loading it into a target system.
ETL Pipeline
An automated workflow that extracts data from sources, transforms it according to business rules, and loads it into a target system.
EU AI Act
The European Union's comprehensive legislation establishing rules for the development and use of AI systems based on risk levels.
Event Loop
A programming construct that waits for and dispatches events or messages in a program.
Event-Driven Architecture
An architecture pattern where the flow of the system is determined by events — significant changes in state.
Experience Level Agreement
A service management metric that measures the quality of user experience rather than just technical uptime, encompassing performance, usability, and satisfaction outcomes.
Experiment Tracking
The systematic recording of machine learning experiment parameters, metrics, artifacts, and code versions to enable reproducibility and comparison across training runs.
Expert System
An AI program that emulates the decision-making ability of a human expert by using a knowledge base and inference rules.
Explainable AI
AI techniques that make model decisions transparent and understandable to humans.
Exploding Gradient
A problem where gradients grow exponentially during backpropagation, causing unstable weight updates and training failure.
Exploratory Data Analysis
An approach to analysing datasets to summarise their main characteristics, often using statistical graphics and visualisation.
Extended Detection and Response
A unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.
Extended Detection and Response
A unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.
Extended Reality
An umbrella term encompassing augmented reality, virtual reality, mixed reality, and all immersive technologies.
Extractive Summarisation
A summarisation technique that identifies and selects the most important sentences from a source document to compose a condensed version without generating new text.
F1 Score
A harmonic mean of precision and recall, providing a single metric that balances both false positives and false negatives.
Facial Recognition
Technology that identifies or verifies individuals by analysing facial features and patterns in images or video.
Fault-Tolerant Quantum Computing
Quantum computing systems that can continue to operate correctly even in the presence of errors.
Feature Engineering
The process of using domain knowledge to create, select, and transform input variables to improve model performance.
Feature Extraction
The process of identifying and extracting relevant visual features from images for downstream analysis.
Feature Flag
A software development technique allowing features to be enabled or disabled at runtime without deploying new code.
Feature Importance
A technique for determining which input variables have the most significant impact on model predictions.
Feature Selection
The process of identifying and selecting the most relevant input variables for a machine learning model.
Feature Store
A centralised repository for storing, managing, and serving machine learning features, ensuring consistency between training and inference environments across an organisation.
Federated Learning
A machine learning approach where models are trained across decentralised devices without sharing raw data, preserving privacy.
Few-Shot Learning
A machine learning approach where models learn to perform tasks from only a small number of labelled examples, often achieved through in-context learning in large language models.
Few-Shot Prompting
A technique where a language model is given a small number of examples within the prompt to guide its response pattern.
Fine-Tuning
The process of taking a pretrained model and further training it on a smaller, task-specific dataset.
Fine-Tuning
The process of adapting a pre-trained model to a specific task by continuing training on a smaller task-specific dataset, transferring learned representations to new domains.
FinOps
A cultural practice combining technology, finance, and business to manage cloud costs through data-driven decision making.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Firmware
Permanent software programmed into a hardware device's read-only memory that controls its basic functions.
First-Mover Advantage
The competitive advantage gained by being the first company to enter a new market or develop a new product.
Fitts's Law
A predictive model of human movement stating that time to reach a target depends on distance and size.
Flash Attention
An IO-aware attention algorithm that reduces memory reads and writes by tiling the attention computation, enabling faster training of long-context transformer models.
Flash Loan
An uncollateralised loan in DeFi that must be borrowed and repaid within a single blockchain transaction.
Flywheel Effect
A concept where small consistent efforts compound over time to create self-sustaining momentum in business growth.
Fog Computing
A distributed computing paradigm extending cloud capabilities to the edge of the network for IoT processing.
Force Sensing
The capability of a robot to detect and measure physical forces applied to it during interaction with objects.
Fork
A divergence in a blockchain's protocol or chain, creating two separate paths — can be hard (incompatible) or soft (backward-compatible).
Forward Chaining
An inference strategy that starts with known facts and applies rules to derive new conclusions until a goal is reached.
Foundation Model
A large AI model trained on broad data that can be adapted to a wide range of downstream tasks.
Frame Problem
The challenge in AI of representing the effects of actions without having to explicitly state everything that remains unchanged.
Full Node
A blockchain node that downloads and validates every block and transaction against the complete set of consensus rules.
Fully Connected Layer
A neural network layer where every neuron is connected to every neuron in the adjacent layers.
Function as a Service
A serverless cloud computing model where individual functions are executed in response to events.
Function Calling
A mechanism allowing language models to invoke external functions or APIs based on natural language instructions.
Fungible Token
A blockchain token where each unit is identical and interchangeable with any other unit of the same token.
Funnel Analysis
Tracking and analysing the sequential steps users take toward a desired action to identify drop-off points.
Fusion Energy
Energy produced by fusing light atomic nuclei, potentially providing nearly limitless clean energy.
Fuzzy Logic
A form of logic that handles approximate reasoning, allowing variables to have degrees of truth rather than strict binary true/false values.
Garbage Collection
Automatic memory management that reclaims memory occupied by objects no longer referenced by the program.
Gas Fee
The transaction fee paid to blockchain network validators for processing and confirming transactions.
Gasless Transaction
A blockchain transaction where the end user does not pay network fees directly, with costs covered by a third party or subsidised through meta-transaction relay services.
Gated Recurrent Unit
A simplified variant of LSTM that combines the forget and input gates into a single update gate.
GDPR
General Data Protection Regulation — EU legislation governing the collection and processing of personal data of EU residents.
Generative Adversarial Network
A framework where two neural networks compete — a generator creates synthetic data while a discriminator evaluates its authenticity.
Generative AI
AI systems that can create new content including text, images, music, code, and video from learned patterns.
Geospatial Analytics
The analysis of geographic and spatial data to discover patterns, relationships, and trends tied to location.
Git
A distributed version control system for tracking changes in source code during software development.
GitOps
An operational framework using Git repositories as the single source of truth for declarative infrastructure and applications.
GloVe
Global Vectors for Word Representation — an unsupervised learning algorithm for obtaining word vector representations from aggregated word co-occurrence statistics.
Go-to-Market Strategy
A plan that specifies how a company will reach target customers and achieve competitive advantage with a new product.
Goal-Oriented Agent
An AI agent that formulates and pursues explicit goals, planning actions to achieve desired outcomes.
Governance
The system of policies, rules, and processes by which activities are directed, controlled, and managed.
Governance Token
A cryptocurrency token that grants holders voting rights on protocol decisions and changes.
GPT
Generative Pre-trained Transformer — a family of autoregressive language models that generate text by predicting the next token.
GPU Cloud Computing
Cloud infrastructure providing on-demand access to graphics processing units optimised for AI training and inference, enabling organisations to scale compute without capital investment.
Graceful Degradation
A design approach where a system continues to operate with reduced functionality when components fail.
Gradient Boosting
An ensemble technique that builds models sequentially, with each new model correcting residual errors of the combined ensemble.
Gradient Checkpointing
A memory optimisation that trades computation for memory by recomputing intermediate activations during the backward pass instead of storing them all during the forward pass.
Gradient Clipping
A technique that caps gradient values during training to prevent the exploding gradient problem.
Gradient Descent
An optimisation algorithm that iteratively adjusts parameters in the direction of steepest descent of the loss function.
Grafana
An open-source analytics and visualisation platform for monitoring metrics from multiple data sources.
Graph Analytics
Analysing relationships and connections between entities represented as nodes and edges in a graph structure.
Graph Neural Network
A neural network designed to operate on graph-structured data, learning representations of nodes, edges, and entire graphs.
Graphene
A single layer of carbon atoms arranged in a hexagonal lattice with extraordinary electrical, thermal, and mechanical properties.
GraphQL
A query language for APIs that lets clients request exactly the data they need in a single request.
Green Cloud Computing
Cloud computing practices that minimise environmental impact through renewable energy usage, efficient cooling, workload consolidation, and carbon-aware scheduling of compute tasks.
Grounding
Connecting language model outputs to real-world knowledge, facts, or data sources to improve factual accuracy.
Grover's Algorithm
A quantum search algorithm that provides quadratic speedup for searching unsorted databases.
gRPC
A high-performance remote procedure call framework developed by Google using Protocol Buffers for serialisation.
Hallucination Detection
Techniques for identifying when AI language models generate plausible but factually incorrect or unsupported content.
Haptic Feedback
Technology that creates touch-based sensations, allowing users to feel virtual objects or robot interactions.
Hard Fork
A radical change to a blockchain's protocol that makes previously invalid blocks or transactions valid, requiring all nodes to upgrade.
Hash Function
A mathematical function that converts input data of any size into a fixed-size output, used extensively in blockchain security.
Headless Commerce
An e-commerce architecture that decouples the front-end presentation layer from back-end commerce logic through APIs, enabling flexible omnichannel customer experiences.
Health Check
An automated test that verifies a service or system component is functioning correctly.
Helm
A package manager for Kubernetes that simplifies the deployment and management of applications using charts.
Heuristic Evaluation
A usability inspection method where evaluators examine an interface against established design principles.
Heuristic Search
Problem-solving techniques that use practical rules of thumb to find satisfactory solutions when exhaustive search is impractical.
Hierarchical Clustering
A clustering method that builds a tree-like hierarchy of clusters through successive merging or splitting of groups.
High Availability
A system design approach that ensures a certain degree of operational continuity during a given measurement period.
Homomorphic Encryption
An encryption method allowing computations on encrypted data without decrypting it first.
Honeypot
A decoy system designed to attract attackers and study their methods while protecting real systems.
Horizontal Scaling
Adding more machines or nodes to a system to handle increased load.
Hot Wallet
A cryptocurrency wallet connected to the internet for convenient but less secure asset management.
HTTP
Hypertext Transfer Protocol — the application-layer protocol for transmitting hypermedia documents on the World Wide Web.
HTTPS
HTTP Secure — an encrypted version of HTTP using TLS for secure communication over the internet.
Human Capital Management
Software and strategies for recruiting, managing, developing, and optimising an organisation's workforce.
Human-Computer Interaction
The study of how people interact with computers and designing technologies for effective human use.
Human-in-the-Loop
A system design where human oversight and approval are required at critical decision points in automated processes.
Human-on-the-Loop
A system where humans monitor AI operations and can intervene when necessary, but don't approve every action.
Humanoid Robot
A robot designed to resemble the human body in shape and movement capabilities.
Hybrid Cloud
An IT architecture combining on-premises infrastructure with public and private cloud services.
Hybrid Quantum-Classical Computing
Computing architectures that combine quantum processors with classical computers to leverage the strengths of both.
Hydrogen Economy
An economic system where hydrogen serves as the primary energy carrier for power generation and transportation.
Hyperautomation
An approach combining multiple automation technologies (RPA, AI, ML, process mining) to automate as many processes as possible.
Hyperledger
An open-source collaborative project hosting enterprise-grade blockchain frameworks and tools.
Hyperparameter Tuning
The process of optimising the external configuration settings of a machine learning model that are not learned during training.
Hypervisor
Software that creates and manages virtual machines, allowing multiple operating systems to share a single hardware host.
Hypothesis Testing
A statistical method for making decisions about population parameters based on sample data evidence.
Idempotency
The property where an operation produces the same result regardless of how many times it is executed.
Identity and Access Management
A framework for managing digital identities and controlling user access to resources and systems.
Identity Threat Detection and Response
Security solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.
Image Augmentation
Applying transformations like rotation, flipping, and colour adjustment to training images to improve model robustness.
Image Captioning
Automatically generating natural language descriptions of the content depicted in images.
Image Classification
The task of assigning a label or category to an entire image based on its visual content.
Image Generation
Creating new images from scratch using generative AI models like GANs, diffusion models, or VAEs.
Image Registration
The process of aligning two or more images of the same scene taken at different times, viewpoints, or by different sensors.
Image Segmentation
Partitioning an image into multiple segments or regions, assigning each pixel to a specific class or object.
Immutability
The property of blockchain data that prevents alteration or deletion once recorded on the ledger.
Immutable Infrastructure
An approach where infrastructure components are never modified after deployment but replaced entirely with updated versions.
In-Context Learning
The ability of large language models to learn new tasks from examples provided within the input prompt without parameter updates.
Incident Management
The processes and tools for detecting, responding to, resolving, and learning from service disruptions.
Incident Reporting
The formal process of documenting and communicating security incidents, breaches, or compliance violations.
Incident Response Plan
A documented set of procedures for detecting, responding to, and recovering from cybersecurity incidents.
Industrial IoT
The application of IoT technology in industrial settings for monitoring, automation, and optimisation of operations.
Industrial Robot
A programmable mechanical device used in manufacturing for tasks like welding, painting, assembly, and material handling.
Industry 4.0
The fourth industrial revolution characterised by smart automation, IoT, cloud computing, and AI in manufacturing.
Industry 5.0
The next evolution of industrial production that emphasises human-machine collaboration, sustainability, and resilience, moving beyond the automation focus of Industry 4.0.
Inference Engine
The component of an AI system that applies logical rules to a knowledge base to derive new information or make decisions.
Information Architecture
The structural design of shared information environments, organising content for findability and usability.
Information Classification
The process of categorising data based on its sensitivity level and the impact of unauthorised disclosure.
Information Extraction
The process of automatically extracting structured information from unstructured or semi-structured text sources.
Information Governance
The overarching strategy for managing an organisation's information assets, balancing the need for data availability with security, privacy, compliance, and lifecycle management.
Information Security
The practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Infrastructure as a Service
Cloud computing model providing virtualised computing resources like servers, storage, and networking over the internet.
Infrastructure as Code
Managing and provisioning computing infrastructure through machine-readable configuration files rather than manual processes.
Innovation Management
The systematic process of managing an organisation's innovation procedure from ideation to implementation.
Instance Segmentation
Detecting and delineating each distinct object instance in an image at the pixel level.
Instruction Following
The capability of language models to accurately interpret and execute natural language instructions, a core skill developed through instruction tuning and alignment training.
Instruction Tuning
Training a language model to follow natural language instructions by fine-tuning on instruction-response pairs.
Integration Testing
Testing the interaction between different software modules or components to verify they work together correctly.
Intelligent Automation
The combination of RPA with AI capabilities like machine learning and NLP to automate complex cognitive tasks.
Intelligent Automation ROI
The measurement framework for evaluating the financial returns of AI and automation investments, considering cost savings, productivity gains, error reduction, and revenue impact.
Intelligent Enterprise
An organisation that applies advanced technologies like AI and analytics to automate processes and enhance decision-making.
Intelligent Process Automation
The combination of robotic process automation with artificial intelligence capabilities such as natural language processing and machine learning to automate complex business processes.
Intent Detection
The classification of user utterances into predefined categories representing the user's goal or purpose, a fundamental component of conversational AI and chatbot systems.
Intent-Based Transactions
A blockchain interaction model where users specify desired outcomes rather than exact execution steps, with solvers competing to fulfil the intent optimally.
Internal Audit
An independent assurance function that evaluates the effectiveness of an organisation's internal controls and governance.
Internal Developer Portal
A centralised web interface that provides developers with self-service access to infrastructure, services, documentation, and templates within their organisation.
Internet of Things
The network of physical devices embedded with sensors, software, and connectivity that exchange data over the internet.
Interoperability
The ability of different blockchain networks to communicate, share data, and transfer value between each other.
Intrapreneurship
The practice of entrepreneurial behaviour within an established organisation to drive innovation.
Intrusion Detection System
A system that monitors network traffic or system activities for malicious activity or policy violations.
Intrusion Prevention System
A network security technology that examines network traffic to detect and prevent vulnerability exploits.
Inverse Kinematics
Computing the joint parameters needed to place a robot's end effector at a desired position and orientation.
IoT Gateway
A device that connects IoT sensors and devices to cloud platforms, handling protocol translation and data filtering.
IoT Platform
A middleware solution connecting IoT devices with applications, providing device management, data processing, and integration.
IoT Security
The practices and technologies for protecting IoT devices, networks, and data from unauthorised access and attacks.
IP Address
A unique numerical label assigned to each device connected to a computer network for identification and routing.
IPFS
InterPlanetary File System — a peer-to-peer distributed file system for storing and sharing data in a decentralised manner.
IPv6
The most recent version of the Internet Protocol, providing a vastly larger address space than IPv4.
ISO 27001
An international standard for information security management systems specifying requirements for establishing and maintaining security.
ISO/IEC 42001
The international standard for AI management systems that specifies requirements for establishing, implementing, maintaining, and improving AI governance within organisations.
IT Modernisation
The process of updating legacy IT systems to modern technologies and architectures for improved performance.
K-Means Clustering
A partitioning algorithm that divides data into k clusters by minimising the distance between points and their cluster centroids.
K-Nearest Neighbours
A simple algorithm that classifies data points based on the majority class of their k closest neighbours in feature space.
Kanban
A visual workflow management method that limits work in progress and optimises the flow of tasks through a system.
Key Performance Indicator
A measurable value that demonstrates how effectively an organisation is achieving key business objectives.
Key-Value Cache
An optimisation in autoregressive transformer inference that stores previously computed key and value tensors to avoid redundant computation during sequential token generation.
Kinematics
The study of motion without considering forces, used in robotics for calculating joint positions and movements.
Know Your Customer
The process of verifying the identity, suitability, and risks of customers in financial transactions.
Knowledge Distillation
A model compression technique where a smaller student model learns to mimic the behaviour of a larger teacher model.
Knowledge Graph
A structured representation of real-world entities and the relationships between them, used by AI for reasoning and inference.
Knowledge Representation
The field of AI dedicated to representing information about the world in a form that computer systems can use for reasoning.
Kubernetes
An open-source container orchestration platform for automating deployment, scaling, and management of containerised applications.
Label Noise
Errors or inconsistencies in the annotations of training data that can degrade model performance and lead to unreliable predictions if not properly addressed.
Land and Expand
A sales strategy where a vendor establishes an initial foothold with a small deployment and systematically grows the account through demonstrated value and expanded use cases.
Language Model
A probabilistic model that assigns probabilities to sequences of words, enabling prediction of the next word in a sequence.
Large Language Model
A neural network trained on massive text corpora that can generate, understand, and reason about natural language.
Lasso Regression
A regularised regression technique that adds an L1 penalty, enabling feature selection by driving some coefficients to zero.
Latent Dirichlet Allocation
A generative probabilistic model for discovering topics in a collection of documents.
Layer 1
The base blockchain protocol layer that handles consensus, data availability, and transaction settlement.
Layer 2
Scaling solutions built on top of a base blockchain that process transactions off-chain while inheriting security from the main chain.
Layer 2 Scaling
Solutions built on top of a base blockchain that process transactions off the main chain to improve throughput and reduce fees while inheriting the security of the underlying network.
Layer Normalisation
A normalisation technique that normalises across the features of each individual sample rather than across the batch.
Lean Methodology
A systematic approach to minimising waste within a system while maximising value delivery to customers.
Learning Rate
A hyperparameter that controls how much model parameters are adjusted with respect to the loss gradient during training.
Legacy System
Outdated computing software or hardware that remains in use despite the availability of more modern alternatives.
LiDAR
Light Detection and Ranging — a remote sensing method using laser light to measure distances and map environments.
Light Node
A blockchain node that only downloads block headers and relies on full nodes for complete transaction verification.
Lighthouse Project
A high-visibility pilot initiative designed to demonstrate the value of a new technology or approach, building organisational confidence and momentum for broader adoption.
Lights-Out Manufacturing
A fully automated manufacturing process that requires no human presence on the factory floor.
Linear Regression
A statistical method modelling the relationship between a dependent variable and one or more independent variables using a linear equation.
Liquid Staking
A mechanism that allows users to stake cryptocurrency while receiving a liquid derivative token representing their staked position, maintaining capital flexibility during the lock-up period.
Liquidity Pool
A collection of funds locked in a smart contract that provides liquidity for decentralised trading and lending.
Load Balancer
A device or software that distributes network traffic across multiple servers to ensure no single server is overwhelmed.
Load Testing
Testing a system's behaviour under expected and peak load conditions to ensure adequate performance.
Lock-In
A situation where a customer is dependent on a vendor for products and services and cannot easily switch.
Logging
The practice of recording events, errors, and system activities for debugging, auditing, and analysis.
Logistic Regression
A classification algorithm that models the probability of a binary outcome using a logistic function.
Long Short-Term Memory
A recurrent neural network architecture designed to learn long-term dependencies by using gating mechanisms to control information flow.
Long-Context Modelling
Techniques and architectures that enable language models to process and reason over extremely long input sequences, from tens of thousands to millions of tokens.
LoRA
Low-Rank Adaptation — a parameter-efficient fine-tuning technique that adds trainable low-rank matrices to frozen pretrained weights.
LoRaWAN
Long Range Wide Area Network — a low-power protocol designed for wirelessly connecting IoT devices over long distances.
Loss Function
A mathematical function that measures the difference between predicted outputs and actual target values during model training.
Low-Code Platform
Development platforms that require minimal hand-coding, using visual interfaces and pre-built components to build applications.
Machine Learning
A subset of AI that enables systems to automatically learn and improve from experience without being explicitly programmed.
Machine Translation
The use of AI to automatically translate text or speech from one natural language to another.
Malware
Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems.
Mamba Architecture
A selective state space model that achieves transformer-level performance with linear-time complexity by incorporating input-dependent selection mechanisms into the recurrence.
Man-in-the-Middle Attack
An attack where the attacker secretly relays and potentially alters communication between two parties.
Managed Service
A cloud service where the provider handles infrastructure management, maintenance, updates, and monitoring.
Managed Services Model
An outsourcing arrangement where a service provider assumes responsibility for the ongoing management, operation, and optimisation of defined business or technology functions.
Market Basket Analysis
A data mining technique discovering associations between items frequently purchased together.
Market Segmentation
Dividing a market into distinct groups of consumers with similar needs, characteristics, or behaviours.
Markov Decision Process
A mathematical framework for modelling sequential decision-making where outcomes are partly random and partly controlled.
Master Data Management
The processes, governance, policies, and technologies for ensuring the uniformity, accuracy, and accountability of master data.
Matrix Factorisation
A technique that decomposes a matrix into constituent matrices, widely used in recommendation systems and dimensionality reduction.
Maximal Extractable Value
The maximum profit that can be extracted from block production by reordering, inserting, or censoring transactions, a fundamental economic phenomenon in blockchain networks.
Mean Time Between Failures
The average time between system failures, measuring reliability and availability.
Mean Time to Recovery
The average time it takes to restore a system to normal operation after a failure or incident.
Medical Imaging AI
Application of computer vision and deep learning to analyse medical images for diagnosis, screening, and treatment planning.
Memory Leak
A type of resource leak where a program fails to release memory that is no longer needed.
Mergers and Acquisitions
The consolidation of companies through various types of financial transactions including mergers, acquisitions, and takeovers.
Merkle Tree
A hash-based data structure that efficiently verifies the integrity and consistency of large sets of data.
Mesh Network
A network topology where each node relays data for the network, providing self-healing and redundant paths.
Message Queue
A communication method where messages are stored in a queue until the receiving application can process them.
Meta-Learning
Learning to learn — algorithms that improve their learning process by leveraging experience from multiple learning episodes.
Metaverse
A persistent, shared virtual world where users interact through avatars using VR, AR, and other immersive technologies.
Metrics
Quantitative measurements collected over time to track system performance, health, and business outcomes.
Micro-Interaction
Small, contained product moments that revolve around a single task, enhancing the user experience.
Microservices
An architectural style structuring an application as a collection of loosely coupled, independently deployable services.
Microsoft Dynamics 365
Microsoft's suite of enterprise resource planning and customer relationship management cloud applications.
Middleware
Software that bridges operating systems and applications, providing common services and capabilities to applications outside the OS.
Mini-Batch
A subset of the training data used to compute a gradient update during stochastic gradient descent.
Minimum Viable Product
The simplest version of a product that can be released to validate assumptions and gather user feedback.
Mining
The process of using computational power to validate transactions and add new blocks to a proof-of-work blockchain.
MITRE ATT&CK
A globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
Mixed Precision Training
Training neural networks using both 16-bit and 32-bit floating-point arithmetic to speed up computation while maintaining accuracy.
Mixed Reality
Technology blending physical and digital worlds where real and virtual objects co-exist and interact in real time.
Mixture of Experts
An architecture where different specialised sub-networks (experts) are selectively activated based on the input.
MLOps
The practice of collaboration between data science and operations to automate and manage the machine learning lifecycle.
Model Calibration
The process of adjusting a model's predicted probabilities so they accurately reflect the true likelihood of outcomes, essential for risk-sensitive decision-making.
Model Collapse
A degradation phenomenon where AI models trained on AI-generated data progressively lose diversity and accuracy, converging toward a narrow distribution of outputs.
Model Distillation
A technique where a smaller, simpler model is trained to replicate the behaviour of a larger, more complex model.
Model Merging
Techniques for combining the weights and capabilities of multiple fine-tuned models into a single model without additional training, creating versatile multi-capability systems.
Model Monitoring
Continuous observation of deployed machine learning models to detect performance degradation, data drift, anomalous predictions, and infrastructure issues in production.
Model Parallelism
A distributed training approach that partitions a model across multiple devices, enabling training of models too large to fit in a single accelerator's memory.
Model Pruning
The process of removing redundant or less important parameters from a neural network to reduce its size and computational cost.
Model Quantisation
The process of reducing the numerical precision of a model's weights and activations from floating-point to lower-bit representations, decreasing memory usage and inference latency.
Model Registry
A versioned catalogue of trained machine learning models with metadata, lineage, and approval workflows, enabling reproducible deployment and governance at enterprise scale.
Model Risk Management
The governance framework for identifying, measuring, and mitigating risks arising from AI and analytical models.
Model Serialisation
The process of converting a trained model into a format that can be stored, transferred, and later reconstructed for inference.
Model Serving
The infrastructure and processes for deploying trained machine learning models to production environments for real-time predictions.
Model-Based Agent
An AI agent that maintains an internal representation of the world to inform its decision-making process.
Modular Blockchain
A blockchain architecture that separates execution, consensus, settlement, and data availability into independent layers, enabling specialisation and improved scalability.
Monitoring
The continuous observation of system performance, availability, and health using automated tools and dashboards.
Monolithic Architecture
A software architecture where all components are tightly integrated into a single deployable unit.
Monorepo
A version control strategy where multiple projects or packages are stored in a single repository.
Monte Carlo Simulation
A computational technique using repeated random sampling to obtain numerical results for problems with many coupled variables.
Motion Planning
The process of determining a sequence of valid configurations to move a robot from start to goal.
MQTT
Message Queuing Telemetry Transport — a lightweight messaging protocol designed for IoT devices with limited bandwidth.
mTLS
Mutual Transport Layer Security — a protocol where both client and server authenticate each other using certificates.
Multi-Agent System
A system composed of multiple interacting AI agents that collaborate, negotiate, or compete to solve complex problems.
Multi-Cloud
A strategy using services from multiple cloud providers to avoid vendor lock-in and optimise capabilities.
Multi-Cloud Strategy
An approach that distributes workloads across multiple cloud providers to avoid vendor lock-in, optimise costs, meet regulatory requirements, and improve resilience.
Multi-Factor Authentication
An authentication method requiring two or more verification factors to gain access to a resource.
Multi-Head Attention
An attention mechanism that runs multiple attention operations in parallel, capturing different types of relationships.
Multi-Signature Wallet
A wallet requiring multiple private key signatures to authorise a transaction, enhancing security.
Multi-Task Learning
A machine learning approach where a model is simultaneously trained on multiple related tasks to improve generalisation.
Multi-Tenancy
A software architecture where a single instance serves multiple customers, with each tenant's data isolated and invisible to others.
Multilingual Model
A language model trained on text from dozens or hundreds of languages simultaneously, enabling cross-lingual understanding and generation without language-specific fine-tuning.
Multimodal AI
AI systems capable of processing and generating multiple types of data including text, images, audio, and video.
Naive Bayes
A probabilistic classifier based on applying Bayes' theorem with the assumption of independence between features.
Named Entity Recognition
An NLP task that identifies and classifies named entities in text into categories like person, organisation, and location.
Nanotechnology
The manipulation of matter on an atomic and molecular scale for applications in medicine, electronics, and materials.
NAT
Network Address Translation — a method of mapping one IP address space into another by modifying packet headers.
Natural Language Analytics
Using NLP techniques to extract insights and sentiment from unstructured text data at scale.
Natural Language Generation
The subfield of NLP concerned with producing natural language text from structured data or representations.
Natural Language Processing
The field of AI focused on enabling computers to understand, interpret, and generate human language.
Natural Language Querying
The ability for users to ask questions about data in plain language and receive answers, with AI translating natural language into database queries and visualisations.
Natural Language Understanding
The subfield of NLP focused on machine reading comprehension and extracting meaning from text.
NB-IoT
Narrowband IoT — a cellular technology standard for low-power, wide-area IoT applications.
Net Revenue Retention
A metric measuring the percentage of recurring revenue retained from existing customers over a period, including expansion revenue and accounting for churn and contraction.
Network Analysis
The study of graphs representing relationships between discrete objects to understand network structure and dynamics.
Network Automation
Using software to automatically configure, manage, test, deploy, and operate network devices and services.
Network Effect
The phenomenon where a product or service becomes more valuable as more people use it.
Network Function Virtualisation
Replacing dedicated network hardware with software running on commodity servers.
Network Latency
The time delay between sending and receiving data across a network, measured in milliseconds.
Network Monitoring
The practice of continuously observing a computer network for slow or failing components.
Network Orchestration
The automated coordination and management of network resources, services, and policies across infrastructure.
Network Resilience
The ability of a network to maintain acceptable service levels despite faults, challenges, and threats.
Network Segmentation
Dividing a computer network into smaller subnetworks to improve security and performance.
Network Topology
The arrangement of elements such as nodes, links, and devices in a computer network.
Neural Architecture Search
An automated technique for designing optimal neural network architectures using search algorithms.
Neural Network
A computing system inspired by biological neural networks, consisting of interconnected nodes that process information in layers.
Neural Processing Unit
A specialised processor designed to accelerate neural network computations in edge devices and mobile platforms.
Neural Scaling Laws
Empirical relationships describing how AI model performance improves predictably with increases in model size, training data volume, and computational resources.
Neuromorphic Computing
Computing architectures inspired by the structure and function of biological neural networks.
Next-Generation Firewall
An advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
NISQ
Noisy Intermediate-Scale Quantum — the current era of quantum computing with limited, error-prone qubits.
NIST Cybersecurity Framework
A set of voluntary guidelines for managing and reducing cybersecurity risk developed by the US National Institute of Standards.
No-Code Platform
Development platforms that enable non-technical users to build applications entirely through visual interfaces without writing code.
Node
A computer connected to a blockchain network that maintains a copy of the ledger and participates in consensus.
Non-Fungible Token
A unique digital asset on a blockchain that represents ownership of a specific item, artwork, or piece of content.
North Star Metric
A single metric that best captures the core value a product delivers to customers, guiding company strategy.
NoSQL Database
A non-relational database designed for specific data models offering flexible schemas for modern applications.
OAuth
An open standard for token-based authentication and authorisation on the internet.
Object Detection
Identifying and locating specific objects within an image by drawing bounding boxes around them.
Object Storage
A data storage architecture managing data as objects rather than file hierarchies or block addresses.
Object-Relational Mapping
A technique that maps objects in code to relational database tables, abstracting direct SQL interaction.
Observability
The ability to understand a system's internal state from its external outputs, encompassing metrics, logs, and traces.
OKR
Objectives and Key Results — a goal-setting framework that defines objectives and tracks measurable outcomes.
OLAP
Online Analytical Processing — a category of software tools enabling analysis of data stored in databases for business intelligence.
Omnichannel
A multichannel approach providing seamless customer experiences across all touchpoints and communication channels.
On-Chain Governance
A decentralised decision-making process where protocol changes are proposed, debated, and voted on through blockchain-based mechanisms by token holders or validators.
Online Learning
A machine learning method where models are incrementally updated as new data arrives, rather than being trained in batch.
Ontology
A formal representation of knowledge as a set of concepts, categories, and relationships within a specific domain.
OPC-UA
Open Platform Communications Unified Architecture — a machine-to-machine communication protocol for industrial automation.
Open Innovation
A business model where organisations use external ideas and paths to market alongside internal capabilities.
Operating Model
The way an organisation delivers value, encompassing people, processes, technology, and governance structures.
Operating Model Design
The structured approach to defining how an organisation configures its people, processes, technology, and governance to execute strategy and deliver value to customers.
Operational Risk
The risk of loss resulting from inadequate or failed internal processes, people, systems, or external events.
Optical Character Recognition
Technology that converts images of text into machine-readable text data.
Optical Flow
The pattern of apparent motion of objects in a visual scene caused by relative movement between an observer and the scene.
Oracle
A service that provides external real-world data to blockchain smart contracts that cannot access off-chain information directly.
Oracle ERP Cloud
Oracle's cloud-based enterprise resource planning suite covering financials, procurement, project management, and risk.
Order Management System
Software that manages the complete order lifecycle from capture through fulfilment and returns across all sales channels, optimising inventory allocation and customer satisfaction.
OTA Update
Over-the-Air update — remotely delivering software, firmware, or configuration updates to IoT devices wirelessly.
Outcome-Based Model
A business approach focused on delivering measurable results and outcomes rather than outputs or activities.
Outcome-Driven Innovation
An innovation methodology that identifies unmet customer needs by studying the outcomes customers are trying to achieve, rather than asking customers what solutions they want.
Outlier Detection
Identifying data points that differ significantly from other observations in a dataset.
Overfitting
When a model learns the training data too well, including noise, resulting in poor performance on unseen data.
Package Manager
A tool that automates the process of installing, upgrading, configuring, and removing software packages.
Packet Sniffing
The process of capturing and analysing data packets travelling across a network for monitoring or troubleshooting.
Panoptic Segmentation
A unified approach combining semantic and instance segmentation to provide complete scene understanding.
Parallelism
The simultaneous execution of multiple computations across multiple processors or cores.
Parameter-Efficient Fine-Tuning
Methods for adapting large pretrained models to new tasks by only updating a small fraction of their parameters.
Part-of-Speech Tagging
The process of assigning grammatical categories (noun, verb, adjective) to each word in a text.
Path Planning
The computational problem of finding a route between two points while avoiding obstacles.
Penetration Testing
A simulated cyberattack against a system to evaluate the security of its defences and identify exploitable vulnerabilities.
Performance Testing
Evaluating a system's speed, responsiveness, and stability under various load conditions.
Permissioned Blockchain
A blockchain network where participation is restricted to authorised entities, common in enterprise applications.
Permissionless Blockchain
A blockchain network open to anyone to participate as a node, validator, or user without requiring approval.
Perplexity
A measurement of how well a probability model predicts a sample, commonly used to evaluate language model performance.
Personalisation
Tailoring products, services, and experiences to individual users based on their preferences and behaviour data.
Phishing
A social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information.
Phishing-Resistant Authentication
Authentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.
Photonic Computing
Using photons (light particles) instead of electrons for data processing, potentially offering massive speed improvements.
Photonic Quantum Computing
Quantum computing using photons as qubits, manipulated through optical components.
Pipeline Parallelism
A form of model parallelism that splits neural network layers across devices and pipelines micro-batches through stages, maximising hardware utilisation during training.
Plan-and-Execute Pattern
An agentic architecture where a planning module decomposes goals into ordered tasks and a separate executor carries them out, enabling complex multi-step problem solving.
Planning Algorithm
An AI algorithm that generates a sequence of actions to achieve a specified goal from an initial state.
Platform as a Service
Cloud computing model that provides a platform for developers to build, deploy, and manage applications without managing infrastructure.
Platform Business Model
A business model that creates value by facilitating exchanges between two or more interdependent groups, leveraging network effects and data to scale efficiently.
Platform Economy
An economic model where value is created through facilitating exchanges between producers and consumers via digital platforms.
Platform Engineering
The practice of building and maintaining internal developer platforms that provide self-service capabilities, standardised tooling, and golden paths for software delivery teams.
Platform Strategy
A business approach centred on creating value by facilitating interactions between multiple user groups.
Playbook
A comprehensive guide containing strategies, procedures, and best practices for managing specific operational scenarios.
PLC
Programmable Logic Controller — an industrial digital computer adapted for controlling manufacturing processes and machinery.
Point Cloud
A set of data points in 3D space, typically generated by LiDAR or depth sensors, representing surface geometry.
Polynomial Regression
A form of regression analysis where the relationship between variables is modelled as an nth degree polynomial.
Pooling Layer
A neural network layer that reduces spatial dimensions by aggregating values, commonly using max or average operations.
Porter's Five Forces
A framework for analysing competitive forces in an industry: rivalry, new entrants, substitutes, buyer power, and supplier power.
Pose Estimation
The computer vision task of detecting the position and orientation of a person's body joints in images or video.
Positional Encoding
A technique that injects information about the position of tokens in a sequence into transformer architectures.
Post-Mortem Analysis
A structured review conducted after an incident to identify root causes and prevent recurrence.
Post-Quantum Cryptography
Cryptographic algorithms designed to be secure against both classical and quantum computer attacks.
Pre-Training
The initial phase of training a deep learning model on a large unlabelled corpus using self-supervised objectives, establishing general-purpose representations for downstream adaptation.
Precision
The ratio of true positive predictions to all positive predictions, measuring accuracy of positive classifications.
Predictive Analytics
Using historical data, statistical algorithms, and machine learning to forecast future outcomes and trends.
Predictive Maintenance
Using IoT sensor data and analytics to predict when equipment will fail and schedule maintenance proactively.
Prefix Tuning
A parameter-efficient method that prepends trainable continuous vectors to the input of each transformer layer, guiding model behaviour without altering base parameters.
Prescriptive Analytics
Advanced analytics that recommends specific actions to achieve desired outcomes based on predictive analysis.
Pretraining
Training a model on a large general dataset before fine-tuning it on a specific downstream task.
Principal Component Analysis
A dimensionality reduction technique that transforms data into orthogonal components ordered by the amount of variance they explain.
Privacy by Design
An approach to systems engineering that takes privacy into account throughout the entire engineering process.
Privacy-Enhancing Technology
Technologies that protect personal data and privacy while allowing useful data processing and analysis.
Privacy-Preserving Analytics
Techniques such as differential privacy, federated learning, and secure computation that enable data analysis while protecting individual privacy and complying with regulations.
Private Cloud
Cloud computing resources used exclusively by a single organisation, either on-premises or hosted by a third party.
Private Equity
Investment funds that directly invest in private companies or conduct buyouts of public companies.
Privileged Access Management
Security solutions that control and monitor access for users with elevated permissions to critical systems.
Process Mining
Analysing event logs from information systems to discover, monitor, and improve real business processes.
Product Information Management
A centralised system for managing all product-related data, content, and digital assets needed to market and sell products across multiple channels and markets.
Product-Led Growth
A business strategy where the product itself drives customer acquisition, expansion, and retention.
Product-Market Fit
The degree to which a product satisfies strong market demand and meets the needs of its target customers.
Programmable Matter
Materials engineered to change their physical properties such as shape, density, or conductivity in response to external stimuli or programmatic instructions.
Programmable Money
Digital currency embedded with executable logic that can enforce spending conditions, automate payments, and integrate with smart contracts for conditional financial operations.
Progressive Disclosure
A design technique that sequences information across screens to reduce complexity and cognitive load.
Prometheus
An open-source monitoring and alerting toolkit designed for reliability and scalability in cloud-native environments.
Prompt Engineering
The practice of designing and optimising input prompts to elicit desired outputs from large language models.
Prompt Injection
A security vulnerability where malicious inputs manipulate a language model into ignoring its instructions or producing unintended outputs.
Proof of Stake
A consensus mechanism where validators are selected based on the amount of cryptocurrency they hold and stake.
Proof of Work
A consensus mechanism requiring computational effort to validate transactions and create new blocks, used by Bitcoin.
Propensity Modelling
Statistical models that predict the likelihood of a specific customer behaviour such as purchasing, churning, or responding to an offer, guiding targeted business actions.
Prototype
An early model of a product built to test concepts and validate design decisions before full development.
Proxy Server
An intermediary server that forwards requests between clients and other servers, providing security and caching.
Pub/Sub
A messaging pattern where publishers send messages to topics and subscribers receive messages from topics of interest.
Public Cloud
Cloud computing resources shared among multiple organisations and available to the general public over the internet.
Public Key Cryptography
An encryption system using mathematically linked key pairs — a public key for encryption and a private key for decryption.
Puppet
A configuration management tool that automates the provisioning and management of infrastructure.
Purple Team
A collaborative security approach combining red team attack knowledge with blue team defensive capabilities.
Qiskit
IBM's open-source quantum computing framework for creating and running quantum programs.
Quality of Service
Network management techniques that prioritise certain types of traffic to ensure consistent performance.
Quantisation
Reducing the precision of neural network weights and activations from floating-point to lower-bit representations for efficiency.
Quantum Advantage
The practical ability of a quantum computer to solve real-world problems faster or better than classical computers.
Quantum Algorithm
An algorithm designed to run on a quantum computer, potentially solving certain problems faster than classical algorithms.
Quantum Annealing
A quantum computing approach that finds the lowest energy state of a system, useful for optimisation problems.
Quantum Approximate Optimisation Algorithm
A hybrid algorithm designed to solve combinatorial optimisation problems on near-term quantum hardware.
Quantum Chemistry
The application of quantum mechanics and quantum computing to simulate chemical systems and molecular interactions.
Quantum Circuit
A sequence of quantum gates applied to qubits to perform a quantum computation.
Quantum Cloud Computing
Accessing quantum computing resources remotely through cloud-based platforms and APIs.
Quantum Compiler
Software that translates high-level quantum algorithms into sequences of quantum gates executable on specific hardware.
Quantum Computing
A computing paradigm that uses quantum mechanical phenomena like superposition and entanglement to process information exponentially faster for certain problems.
Quantum Entanglement
A phenomenon where two or more qubits become correlated such that the quantum state of one instantly influences the other regardless of distance.
Quantum Error Correction
Techniques for protecting quantum information from errors due to decoherence and other quantum noise sources.
Quantum Gate
A basic quantum circuit operation that manipulates one or more qubits, analogous to logic gates in classical computing.
Quantum Interference
The phenomenon where quantum probability amplitudes combine, allowing quantum algorithms to amplify correct answers and cancel wrong ones.
Quantum Internet
A proposed network infrastructure that uses quantum signals for ultra-secure communication and distributed quantum computing.
Quantum Key Distribution
A secure communication method using quantum mechanics to generate and distribute encryption keys.
Quantum Machine Learning
The intersection of quantum computing and machine learning, using quantum systems to enhance learning algorithms.
Quantum Neural Network
Neural network architectures designed to run on quantum hardware, potentially offering computational advantages.
Quantum Noise
Random fluctuations in quantum systems that introduce errors and limit the accuracy of quantum computations.
Quantum Operating System
System software designed to manage quantum computing resources, schedule operations, and handle error correction.
Quantum Parallelism
The ability of quantum computers to evaluate multiple computational paths simultaneously through superposition.
Quantum Random Number Generator
A device that generates truly random numbers using quantum mechanical processes.
Quantum Register
A collection of qubits that together store quantum information for processing in a quantum circuit.
Quantum Reservoir Computing
A quantum computing approach that uses the complex dynamics of quantum systems as a computational resource.
Quantum Sensing
Using quantum mechanical effects to achieve measurement sensitivities beyond what classical sensors can achieve.
Quantum Simulation
Using quantum computers to model and simulate quantum systems that are intractable for classical computers.
Quantum Software Development Kit
A programming framework providing tools, libraries, and simulators for developing quantum applications.
Quantum Speedup
The factor by which a quantum algorithm outperforms the best known classical algorithm for the same problem.
Quantum Supremacy
The demonstration that a quantum computer can solve a problem that no classical computer can solve in a feasible time.
Quantum Teleportation
The transfer of quantum states between qubits using entanglement and classical communication.
Quantum Tunnelling
A quantum phenomenon where particles pass through energy barriers that would be impossible to overcome classically.
Quantum Volume
A metric for measuring the overall capability and error rates of a quantum computer.
Quantum Walk
The quantum mechanical analogue of a classical random walk, used as a building block for quantum algorithms.
Qubit
The fundamental unit of quantum information, capable of existing in a superposition of both 0 and 1 states simultaneously.
Question Answering
An NLP task where a system automatically answers questions posed in natural language based on given context.
Queue System
A data structure and infrastructure for managing asynchronous task processing and inter-service communication.
Random Forest
An ensemble learning method that constructs multiple decision trees during training and outputs the mode of their predictions.
Ransomware
Malicious software that encrypts a victim's files and demands payment for the decryption key.
Rate Limiting
A technique for controlling the number of requests a client can make to an API within a specified time period.
ReAct Agent Pattern
An agent architecture that interleaves reasoning traces and action steps, enabling language models to plan dynamically and use external tools to solve multi-step problems.
ReAct Framework
Reasoning and Acting — a framework where language model agents alternate between reasoning traces and action execution.
Reactive Agent
An AI agent that responds to environmental stimuli with predefined actions without maintaining an internal model of the world.
Real-Time Analytics
The discipline of analysing data as soon as it becomes available to support immediate decision-making.
Real-World Assets
Physical or traditional financial assets such as real estate, commodities, and securities that are represented as digital tokens on a blockchain for improved liquidity and accessibility.
Recall
The ratio of true positive predictions to all actual positive instances, measuring completeness of positive identification.
Recurrent Neural Network
A neural network architecture where connections between nodes form directed cycles, enabling processing of sequential data.
Red Team
A group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.
Refactoring
Restructuring existing code without changing its external behaviour to improve readability and maintainability.
Region
A geographic area containing one or more data centres where cloud services are hosted.
Regression Analysis
A set of statistical processes for estimating the relationships between dependent and independent variables.
Regularisation
Techniques that add constraints or penalties to a model to prevent overfitting and improve generalisation to new data.
Regulatory Sandbox
A controlled environment where businesses can test innovative products and services under regulatory oversight.
Regulatory Technology
Technology solutions designed to help companies comply with regulations efficiently and cost-effectively.
Reinforcement Learning
A machine learning paradigm where agents learn optimal behaviour through trial and error, receiving rewards or penalties.
Reinforcement Learning from Human Feedback
A training paradigm where AI models are refined using human preference signals, aligning model outputs with human values and quality expectations through reward modelling.
Relation Extraction
Identifying semantic relationships between entities mentioned in text.
Relational Database
A database structured to recognise relations among stored items, organised in tables with rows and columns.
ReLU
Rectified Linear Unit — an activation function that outputs the input directly if positive, otherwise outputs zero.
Representation Learning
The automatic discovery of data representations needed for feature detection or classification from raw data.
Reranking
A two-stage retrieval process where an initial set of candidate documents is rescored by a more powerful model to improve the relevance ordering of search results.
Research Agent
An AI agent that autonomously gathers, synthesises, and analyses information from multiple sources to produce comprehensive research reports on specified topics.
Reserved Instance
A cloud pricing model where users commit to a specific resource configuration for a term in exchange for discounted rates.
Residual Connection
A skip connection that adds a layer's input directly to its output, enabling gradient flow through deep networks and allowing training of architectures with hundreds of layers.
Residual Network
A deep neural network architecture using skip connections that allow gradients to flow directly through layers, enabling very deep networks.
Responsible AI
The practice of designing, developing, and deploying AI systems with good intention and ethical principles.
Responsible AI Governance
The organisational framework of policies, roles, processes, and oversight mechanisms that ensure AI systems are developed and deployed ethically, safely, and in compliance with regulations.
Responsible Disclosure
A security vulnerability reporting practice where researchers privately notify affected organisations and allow reasonable time for remediation before public disclosure of the vulnerability.
Responsible Innovation
An approach to innovation that anticipates and addresses ethical, social, and environmental implications proactively.
Responsive Design
A web design approach where layouts adapt to different screen sizes and devices automatically.
REST API
An API architectural style using HTTP methods and stateless communication for web service interaction.
Restaking
The practice of using already-staked cryptocurrency to simultaneously secure additional protocols or services, extending the economic security of one network to others.
Retrieval-Augmented Generation
A technique combining information retrieval with text generation, allowing AI to access external knowledge before generating responses.
Return on Investment
A performance measure used to evaluate the profitability of an investment relative to its cost.
Revenue Model
The strategy a company uses to generate income from its products or services.
Revenue Operations
The strategic integration of sales, marketing, and customer success operations through shared processes, technology, and data to drive predictable revenue growth.
Reverse ETL
The process of moving transformed data from a central warehouse back into operational tools such as CRM, marketing platforms, and customer support systems to activate insights.
Reverse Proxy
A server that sits in front of web servers and forwards client requests to the appropriate backend server.
Ridge Regression
A regularised regression technique that adds an L2 penalty term to prevent overfitting by constraining coefficient magnitudes.
Right to be Forgotten
A legal concept giving individuals the right to request deletion of their personal data from organisations' records.
Risk Assessment
The systematic process of evaluating potential risks in an organisation's operations, projects, or investments.
Risk Management
The process of identifying, assessing, and controlling threats to an organisation's capital and operations.
RLHF
Reinforcement Learning from Human Feedback — a technique for aligning language models with human preferences through reward modelling.
Robot Operating System
An open-source framework providing tools and libraries for robot software development.
Robotic Process Automation
Software robots that automate repetitive, rule-based digital tasks by mimicking human interactions with software interfaces.
Robotic Process Mining
Combining process mining with robotic process automation to discover and automate business processes.
Robotic Vision
The use of cameras and computer vision algorithms to give robots the ability to see and interpret their environment.
Robotics
The interdisciplinary field involving design, construction, operation, and use of robots for automating tasks.
ROC Curve
A graphical plot illustrating the diagnostic ability of a binary classifier as its discrimination threshold is varied.
Rollback
The process of reverting a system to a previous version or state after a failed deployment or update.
Rolling Update
A deployment strategy that gradually replaces instances of the previous version with the new version.
Rollup
A Layer 2 scaling solution that executes transactions off-chain and posts compressed transaction data to the main chain.
Rotary Positional Encoding
A position encoding method that encodes absolute position with a rotation matrix and naturally incorporates relative position information into attention computations.
Routing Protocol
A protocol that determines the optimal path for data packets to travel across interconnected networks.
Runbook
A documented set of procedures for handling routine operations and troubleshooting common issues.
Runtime Application Self-Protection
Security technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.
Safety-Rated Monitoring
Systems that monitor robot speed, position, and force to ensure safe operation near humans.
Sanctions Screening
The process of checking individuals and entities against government-issued lists of sanctioned parties.
Sandbox
An isolated testing environment that mimics production settings for safely running untrusted programs or code.
SAP
A leading enterprise software company providing ERP, supply chain, HR, and business intelligence solutions for large organisations.
Satellite Internet
Internet connectivity provided by networks of satellites orbiting Earth, serving remote and underserved areas.
SCADA
Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely.
Scaled Agile Framework
A set of organisation and workflow patterns for implementing agile practices at enterprise scale.
Scenario Planning
A strategic planning method creating multiple plausible future scenarios to improve decision-making resilience.
Scrum
An agile framework using fixed-length iterations called sprints for incremental product delivery with defined roles and ceremonies.
SD-WAN
Software-Defined Wide Area Network — a virtualised network architecture that enables centralised management of geographically distributed networks.
Secret Management
The practice of securely storing, accessing, and managing sensitive credentials, API keys, and certificates.
Secrets Management
The secure storage, distribution, rotation, and auditing of sensitive credentials such as API keys, tokens, passwords, and certificates used by applications and services.
Secure Access Service Edge
A cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.
Secure Multi-Party Computation
A cryptographic method enabling multiple parties to jointly compute a function without revealing their individual inputs.
Security Audit
A systematic evaluation of an organisation's information system security by measuring compliance with established criteria.
Security by Design
An approach that integrates security considerations into every stage of the software development lifecycle.
Security Information and Event Management
Technology that aggregates and analyses security data from across an organisation to detect threats.
Security Operations Centre
A centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.
Security Orchestration Automation and Response
Technology that automates security operations by orchestrating tools and processes for incident response.
Security Orchestration, Automation and Response
A technology stack that integrates security tools and automates incident response workflows, enabling faster triage, investigation, and remediation of security alerts.
Security Token
A digital asset on a blockchain that represents ownership of a regulated financial instrument such as equity, debt, or revenue share, subject to securities laws.
Self-Attention
An attention mechanism where each element in a sequence attends to all other elements to compute its representation.
Self-Service Analytics
Tools and platforms enabling non-technical users to access and analyse data independently.
Self-Sovereign Identity
A model where individuals own and control their digital identity without relying on centralised authorities.
Self-Supervised Learning
A learning paradigm where models generate their own supervisory signals from unlabelled data through pretext tasks.
Semantic Layer
An abstraction layer that provides business-friendly definitions and consistent metrics on top of raw data, enabling self-service analytics with standardised terminology.
Semantic Search
Search technology that understands the meaning and intent behind queries rather than just matching keywords.
Semantic Segmentation
Classifying every pixel in an image into a predefined category without distinguishing between individual object instances.
Semantic Similarity
A measure of how closely the meanings of two text passages align, computed through embedding comparison and used in duplicate detection, search, and recommendation systems.
Semantic Web
An extension of the World Wide Web that enables machines to interpret and process web content through standardised semantic metadata.
Semi-Supervised Learning
A learning approach that combines a small amount of labelled data with a large amount of unlabelled data during training.
Sensor
A device that detects and measures physical properties like temperature, motion, or light and converts them into data.
Sentiment Analysis
The computational study of people's opinions, emotions, and attitudes expressed in text.
Seq2Seq Model
A neural network architecture that maps an input sequence to an output sequence, used in translation and summarisation.
Serverless Computing
A cloud execution model where the provider dynamically allocates resources, charging only for actual compute time used.
Serverless Database
A database service that automatically provisions, scales, and manages infrastructure on demand without manual server management.
Service Design
The practice of designing and organising business resources to improve experiences for both users and employees.
Service Discovery
The automatic detection of devices and services on a network, enabling dynamic service-to-service communication.
Service Level Agreement
A commitment between a service provider and client defining the level of service expected during the contract period.
Service Level Indicator
A quantitative measure of some aspect of the level of service being provided.
Service Level Objective
A target value for a service level indicator that defines acceptable service performance.
Service Mesh
An infrastructure layer handling service-to-service communication in microservices, managing traffic, security, and observability.
Service Robot
A robot that performs useful tasks for humans, operating semi or fully autonomously outside of industrial settings.
Service-Oriented Architecture
An architectural pattern where services are provided to components via a network communication protocol.
SHAP Values
A game-theoretic approach to explaining individual model predictions by computing each feature's marginal contribution, based on Shapley values from cooperative game theory.
Shor's Algorithm
A quantum algorithm for integer factorisation that runs exponentially faster than the best known classical algorithms.
Sidechain
A separate blockchain connected to a main chain through a two-way bridge, allowing assets to move between them.
Sigmoid Function
An activation function that maps input values to a range between 0 and 1, useful for binary classification outputs.
Simultaneous Localisation and Mapping
A computational technique where a robot builds a map of an unknown environment while tracking its own location.
Single Sign-On
An authentication scheme allowing users to log in once and gain access to multiple related systems.
Site Reliability Engineering
A discipline applying software engineering principles to infrastructure and operations to create scalable, reliable systems.
Skip Connection
A neural network shortcut that allows the output of one layer to bypass intermediate layers and be added to a later layer's output.
Slot Filling
The task of extracting specific parameter values from user utterances to fulfil a detected intent, such as identifying dates, locations, and names in booking requests.
Smart City
An urban area using IoT sensors and technology to collect data and manage resources, services, and infrastructure efficiently.
Smart Contract
Self-executing programs stored on a blockchain that automatically enforce the terms of an agreement when conditions are met.
Smart Factory
A manufacturing facility using IoT, AI, and automation to create a highly digitised and connected production environment.
Smart Grid
An electrical grid using digital communication and IoT to monitor and manage electricity distribution efficiently.
SMOTE
Synthetic Minority Over-sampling Technique — a method for addressing class imbalance by generating synthetic examples of the minority class.
SOC 2
An auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.
Soft Fork
A backward-compatible upgrade to a blockchain protocol where old nodes still recognise new blocks as valid.
Soft Robotics
A subfield of robotics dealing with constructing robots from highly compliant materials similar to biological organisms.
Softmax Function
An activation function that converts a vector of numbers into a probability distribution, commonly used in multi-class classification.
Software as a Service
Cloud computing model that delivers software applications over the internet on a subscription basis.
Software Bill of Materials
A comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.
Software Engineering
The systematic application of engineering principles to the design, development, testing, and maintenance of software.
Software Supply Chain Security
Practices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.
Software-Defined Networking
An approach to networking that uses software-based controllers to manage network behaviour centrally.
SOLID Principles
Five principles of object-oriented design promoting maintainable, flexible, and understandable code.
Solidity
A programming language designed for writing smart contracts on the Ethereum Virtual Machine.
Soulbound Token
A non-transferable digital token permanently associated with an individual's blockchain address, used to represent credentials, affiliations, and reputation in a verifiable manner.
Sovereign Cloud
Cloud infrastructure operated within national boundaries under local jurisdiction, ensuring data sovereignty, regulatory compliance, and protection from foreign government access.
Space Technology
Technologies developed for space exploration and utilisation including satellites, launch systems, and space stations.
Sparse Attention
An attention mechanism that selectively computes relationships between a subset of input tokens rather than all pairs, reducing quadratic complexity in transformer models.
Spatial Computing
Technology that enables digital content to interact with the physical world, understanding 3D space and context.
Spear Phishing
A targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.
Speculative Decoding
An inference acceleration technique where a small draft model generates candidate token sequences that are verified in parallel by the larger target model.
Speech Recognition
The technology that converts spoken language into text, also known as automatic speech recognition.
Speech Synthesis
The artificial production of human speech from text, also known as text-to-speech.
Speech-to-Text
The automatic transcription of spoken language into written text using acoustic and language models, foundational to voice assistants and meeting transcription systems.
Spot Instance
A cloud computing option that uses spare capacity at significantly reduced prices with the possibility of interruption.
Spot Instances
Spare cloud computing capacity offered at steep discounts compared to on-demand pricing, available when the provider has excess resources but subject to interruption.
SQL Injection
A code injection technique that exploits vulnerabilities in database-driven applications through malicious SQL statements.
SSL/TLS
Secure Sockets Layer/Transport Layer Security — cryptographic protocols providing secure communication over a computer network.
Stablecoin
A cryptocurrency designed to maintain a stable value by pegging it to a reserve asset like a fiat currency.
Stakeholder Management
The process of identifying, analysing, and strategically engaging with individuals who have an interest in a project.
Staking
Locking up cryptocurrency holdings to support blockchain network operations and earn rewards.
State Space Model
A sequence modelling architecture based on continuous-time dynamical systems that processes long sequences with linear complexity, offering an alternative to attention-based transformers.
State Space Search
A method of problem-solving that represents all possible states of a system and searches for a path from initial to goal state.
Statistical Modelling
The process of applying statistical analysis to a dataset, identifying relationships and patterns within the data.
Stochastic Gradient Descent
A variant of gradient descent that updates parameters using a randomly selected subset of training data each iteration.
Strategic Foresight
A systematic approach to thinking about the future to inform present-day decisions and strategy.
Strategy
A plan of action designed to achieve a long-term or overall aim, involving resource allocation and competitive positioning.
Streaming Analytics
Processing and analysing continuous data streams in real time to detect patterns and trigger responses.
Stress Testing
Testing a system beyond normal operational capacity to determine its breaking point and failure behaviour.
Strong AI
A theoretical form of AI that would have consciousness, self-awareness, and the ability to truly understand rather than simulate understanding.
Structured Output
The generation of machine-readable formatted responses such as JSON, XML, or code from language models, enabling reliable integration with downstream software systems.
Style Transfer
Applying the visual style of one image to the content of another image using neural networks.
Subnet
A logical subdivision of an IP network that improves security and performance by segmenting traffic.
Super Resolution
Enhancing the resolution and quality of images beyond their original pixel count using AI techniques.
Superconducting Qubit
A qubit implementation using superconducting circuits that exhibit quantum behaviour at extremely low temperatures.
Superposition
A quantum mechanical property where a qubit exists in multiple states simultaneously until measured.
Supervised Learning
A machine learning paradigm where models are trained on labelled data, learning to map inputs to known outputs.
Supervisor Agent
An agent that oversees and coordinates the work of other agents, making high-level decisions and resolving conflicts.
Supply Chain Attack
A cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.
Supply Chain Blockchain
Using blockchain technology to create transparent, tamper-proof records of product journeys through supply chains.
Supply Chain Management
The coordination and management of all activities involved in sourcing, procurement, conversion, and logistics.
Support Vector Machine
A supervised learning algorithm that finds the optimal hyperplane to separate different classes in high-dimensional space.
Surgical Robot
A robotic system designed to assist surgeons in performing precise, minimally invasive surgical procedures.
Sustainability Strategy
A plan integrating environmental, social, and economic considerations into core business operations.
Swarm Intelligence
The collective behaviour of decentralised, self-organised systems where simple agents following local rules produce emergent intelligent behaviour at the group level.
Swarm Robotics
A field studying the coordination of multiple robots using decentralised control inspired by collective biological behaviour.
Switching Cost
The costs a consumer incurs when switching from one product, service, or supplier to another.
SWOT Analysis
A strategic planning tool evaluating Strengths, Weaknesses, Opportunities, and Threats facing an organisation.
Symbolic AI
An approach to AI that uses human-readable symbols and rules to represent problems and derive solutions through logical reasoning.
Synthetic Biology
Designing and constructing new biological parts, devices, and systems for useful purposes.
Synthetic Data
Artificially generated data that mimics the statistical properties of real-world data for training and testing.
Synthetic Data for Analytics
Artificially generated datasets that preserve the statistical properties of real data while protecting privacy, used for testing, development, and sharing across organisational boundaries.
Synthetic Data Generation
The creation of artificially produced datasets that mimic the statistical properties of real-world data, used for training AI models while preserving privacy.
System Prompt
An initial instruction set provided to a language model that defines its persona, constraints, output format, and behavioural guidelines for a given session or application.
t-SNE
t-Distributed Stochastic Neighbour Embedding — a technique for visualising high-dimensional data in two or three dimensions.
Tabular Deep Learning
The application of deep neural networks to structured tabular datasets, competing with traditional methods like gradient boosting through specialised architectures and regularisation.
Task Decomposition
Breaking down complex tasks into smaller, manageable subtasks that can be distributed among AI agents.
Task Mining
Technology that observes and analyses how employees interact with desktop applications to identify automation opportunities.
TCP/IP
Transmission Control Protocol/Internet Protocol — the fundamental communication protocol suite powering the internet.
Tech Stack Modernisation
The strategic upgrading of an organisation's technology infrastructure from legacy systems to modern architectures, enabling agility, scalability, and integration with AI capabilities.
Technical Architecture
The design and structure of a software system's technical components and their relationships.
Technical Debt
The implied cost of additional rework caused by choosing an easy or limited solution now instead of a better approach.
Technical Documentation
Written materials describing the architecture, design, APIs, and usage of software systems.
Technology Adoption Lifecycle
A model describing the adoption of new technology through five stages: innovators, early adopters, early majority, late majority, laggards.
Technology Debt
The accumulated cost of maintaining and operating outdated technology systems that constrain an organisation's ability to innovate, integrate, and respond to market changes.
Technology Due Diligence
The systematic assessment of a target company's technology stack, architecture, technical debt, security posture, and engineering capabilities during mergers and acquisitions.
Technology Ethics
The moral principles and values guiding the development and use of technology in society.
Technology Radar
A strategic tool that visualises the adoption status of technologies, techniques, and platforms within an organisation, categorising them as adopt, trial, assess, or hold.
Telemetry
The automated collection and transmission of data from remote IoT devices to receiving equipment for monitoring.
Teleoperation
The remote control of a robot or machine by a human operator from a distance.
Temperature
A parameter controlling the randomness of language model outputs — lower values produce more deterministic text.
Tensor Parallelism
A distributed computing strategy that splits individual layer computations across multiple devices by partitioning weight matrices along specific dimensions.
Tensor Processing Unit
Google's custom-designed application-specific integrated circuit for accelerating machine learning workloads.
Terraform
An open-source infrastructure as code tool for building, changing, and versioning infrastructure safely and efficiently.
Test-Driven Development
A development practice where failing tests are written before the code that makes them pass.
Text Classification
The task of assigning predefined categories or labels to text documents based on their content.
Text Embedding
Dense vector representations of text passages that capture semantic meaning for similarity comparison and retrieval.
Text Embedding Model
A neural network trained to convert text passages into fixed-dimensional vectors that capture semantic meaning, enabling similarity search, clustering, and retrieval applications.
Text Generation
The process of producing coherent and contextually relevant text using AI language models.
Text Summarisation
The process of creating a concise and coherent summary of a longer text document while preserving key information.
Text-to-Speech
Technology that converts written text into natural-sounding spoken audio using neural networks, enabling voice interfaces, accessibility tools, and content narration.
Text-to-SQL
The task of automatically converting natural language questions into executable SQL queries, enabling non-technical users to interrogate databases through conversational interfaces.
Third-Party Risk Management
The process of identifying and mitigating risks associated with outsourcing to third-party vendors.
Threat Hunting
The proactive search for cyber threats within an organisation's environment that have evaded automated detection, using hypotheses, threat intelligence, and advanced analytics.
Threat Intelligence
Evidence-based knowledge about existing or emerging threats to an organisation's digital assets and infrastructure.
Threat Modelling
A structured approach for identifying, quantifying, and addressing security threats to a system or application.
Throughput
The actual rate of successful data transfer across a network in a given time period.
Time Series Analysis
Statistical techniques for analysing time-ordered data points to identify trends, cycles, and forecasting patterns.
Time Series Forecasting
Statistical and machine learning methods for predicting future values based on historical sequential data, applied to demand planning, financial forecasting, and resource allocation.
Time-Series Database
A database optimised for handling time-stamped data, commonly used for IoT sensor data and metrics.
TinyML
Machine learning techniques optimised to run on microcontrollers and extremely resource-constrained embedded devices.
TOGAF
The Open Group Architecture Framework — a comprehensive framework for enterprise architecture development and governance.
Token
A digital asset created and managed on a blockchain, representing value, utility, or ownership rights.
Token Limit
The maximum number of tokens a language model can process in a single input-output interaction.
Token Standard
A technical specification defining the interface and behaviour of tokens on a blockchain, such as ERC-20 for fungible tokens and ERC-721 for non-fungible tokens.
Tokenisation
The process of breaking text into smaller units (tokens) such as words, subwords, or characters for processing by language models.
Tokenisation of Assets
Converting rights to real-world assets into digital tokens on a blockchain for fractional ownership and trading.
Tokenised Deposits
Bank deposits represented as digital tokens on a blockchain, enabling programmable settlement, interbank transfers, and integration with decentralised financial infrastructure.
Tokenomics
The economic design and incentive structures governing a cryptocurrency or token ecosystem.
Tool Use
The capability of AI agents to interact with external tools, APIs, and services to extend their functionality.
Tool Use in AI
The capability of AI agents to invoke external tools, APIs, databases, and software applications to accomplish tasks beyond the model's intrinsic knowledge and abilities.
Top-K Sampling
A text generation strategy that restricts the model to sampling from the K most probable next tokens.
Topic Modelling
An unsupervised technique for discovering abstract topics that occur in a collection of documents.
Topological Qubit
A qubit design that encodes information in the topological properties of matter, offering inherent error protection.
Total Addressable Market
The total revenue opportunity available for a product or service if 100% market share were achieved.
Total Cost of Ownership
A financial estimate of all direct and indirect costs associated with a product or system over its entire lifecycle.
Total Experience
A business strategy that creates superior shared experiences by interlinking customer experience, employee experience, user experience, and multi-experience across all touchpoints.
Transfer Learning
A technique where knowledge gained from training on one task is applied to a different but related task.
Transformer
A neural network architecture based entirely on attention mechanisms, eliminating recurrence and enabling parallel processing of sequences.
Trapped Ion Qubit
A qubit implementation using individual ions confined by electromagnetic fields and manipulated by laser beams.
Turing Test
A measure of machine intelligence proposed by Alan Turing, where a machine is deemed intelligent if it can exhibit conversation indistinguishable from a human.
UMAP
Uniform Manifold Approximation and Projection — a dimensionality reduction technique for visualisation and general non-linear reduction.
Underfitting
When a model is too simple to capture the underlying patterns in the data, resulting in poor performance on both training and test data.
Unit Economics
The analysis of revenues and costs associated with a specific business model on a per-unit basis.
Unit Testing
Testing individual components or functions in isolation to verify they produce the expected output.
Unsupervised Learning
A machine learning approach where models discover patterns and structures in data without labelled examples.
Usability
The ease with which users can learn, use, and interact with a product to achieve their goals.
User Experience Design
The process of creating products that provide meaningful, relevant, and enjoyable experiences to users.
User Interface Design
The design of the visual elements and interactive components that users interact with in digital products.
User Journey Map
A visual representation of the steps a user takes to achieve a goal with a product or service.
User Persona
A fictional representation of an ideal user based on research data, used to guide design decisions.
User Research
Systematic investigation of users' needs, behaviours, and motivations through observation and feedback techniques.
Utility Token
A blockchain-based token that provides access to a specific product, service, or platform functionality, rather than representing ownership or investment rights.
Utility-Based Agent
An AI agent that selects actions to maximise a utility function representing the desirability of different outcomes.
Validator
A node in a proof-of-stake blockchain responsible for verifying transactions and proposing new blocks.
Value Chain
The full range of activities a company performs to bring a product from conception to delivery and beyond.
Value Stream Mapping
A lean technique for analysing the flow of materials and information required to bring a product to a customer.
Vanishing Gradient
A problem in deep networks where gradients become extremely small during backpropagation, preventing earlier layers from learning.
Variational Autoencoder
A generative model that learns a probabilistic latent space representation, enabling generation of new data samples.
Variational Quantum Eigensolver
A hybrid quantum-classical algorithm for finding the ground state energy of molecular systems.
Vector Database
A database optimised for storing and querying high-dimensional vector embeddings for similarity search.
Vendor Risk Assessment
Evaluating the potential risks of engaging with a vendor including security, financial, and operational concerns.
Venture Building
The systematic creation of new businesses from scratch within a corporate or studio environment, providing capital, talent, infrastructure, and strategic guidance from inception.
Venture Capital
Financing provided to early-stage, high-potential startup companies in exchange for equity ownership.
Verifiable Credentials
Digitally signed credentials that can be cryptographically verified without contacting the issuer.
Version Control
A system that records changes to files over time so that specific versions can be recalled later.
Vertical Scaling
Increasing the resources (CPU, RAM, storage) of an existing machine to handle more load.
Video Understanding
Analysing and interpreting the content, actions, and events within video sequences using computer vision.
Virtual Machine
A software emulation of a physical computer that runs an operating system and applications independently.
Virtual Reality
A simulated experience using headsets to create an immersive, computer-generated three-dimensional environment.
Vision Transformer
A transformer architecture adapted for image recognition that divides images into patches and processes them as sequences, rivalling convolutional networks in visual tasks.
Visual Question Answering
An AI task that generates natural language answers to questions about the content of images.
Visual SLAM
Simultaneous Localisation and Mapping using visual sensors to build a map while tracking position within it.
VLAN
Virtual Local Area Network — a logical grouping of network devices that communicate as if on the same physical network.
VPN
Virtual Private Network — a technology creating a secure, encrypted connection over a less secure network like the internet.
Vulnerability Assessment
The process of identifying, quantifying, and prioritising security vulnerabilities in systems and applications.
Vulnerability Disclosure
The practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Wallet
Software or hardware that stores cryptographic keys and enables users to manage their blockchain assets.
Warehouse Automation
Using robots and automated systems to manage inventory, pick orders, and optimise warehouse operations.
Waterfall Model
A sequential software development methodology where each phase must be completed before the next begins.
Weak AI
AI designed to handle specific tasks without possessing self-awareness, consciousness, or true understanding of the task domain.
Wearable Technology
Electronic devices worn on the body that collect data, track activities, and provide notifications or feedback.
Web3
The vision of a decentralised internet built on blockchain technology, giving users ownership and control of their data.
Webhook
An HTTP callback that delivers real-time notifications from one application to another when a specified event occurs.
WebSocket
A communication protocol providing full-duplex communication channels over a single persistent TCP connection.
Weight Decay
A regularisation technique that penalises large model weights during training by adding a fraction of the weight magnitude to the loss function, preventing overfitting.
Weight Initialisation
The strategy for setting initial parameter values in a neural network before training begins.
Whistleblower Protection
Legal provisions protecting individuals who report illegal or unethical practices within organisations.
Wi-Fi 6
The sixth generation of Wi-Fi technology offering improved speed, capacity, and performance in dense environments.
Wireframe
A low-fidelity visual guide representing the skeletal framework of a digital interface.
Word Embedding
Dense vector representations of words where semantically similar words are mapped to nearby points in vector space.
Word2Vec
A neural network model that learns distributed word representations by predicting surrounding context words.
Worker Agent
A specialised agent that performs specific tasks as directed by a supervisor or orchestrator agent.
Workflow Automation
Technology that automates the sequence of tasks, approvals, and handoffs within business processes.
World Model
An AI system that builds an internal representation of how the physical or digital world works, enabling prediction, simulation, and planning based on learned dynamics.
Yield Farming
A DeFi strategy where users provide liquidity to protocols in exchange for token rewards and interest.
YOLO
You Only Look Once — a real-time object detection algorithm that processes entire images in a single neural network pass.
Zero Trust Architecture
A security model that requires strict identity verification for every person and device accessing resources regardless of location.
Zero-Day Vulnerability
A software security flaw unknown to the vendor that can be exploited before a patch is available.
Zero-Knowledge Proof
A cryptographic method allowing one party to prove knowledge of information without revealing the information itself.
Zero-Shot Learning
The ability of AI models to perform tasks they were not explicitly trained on, using generalised knowledge and instruction-following capabilities.
Zero-Shot Prompting
Querying a language model to perform a task it was not explicitly trained on, without providing any examples in the prompt.
Zigbee
A low-power wireless communication protocol designed for IoT devices in personal area networks.
zk-Rollup
A Layer 2 scaling solution using zero-knowledge proofs to validate off-chain transactions on the main blockchain.
zk-SNARK
Zero-Knowledge Succinct Non-Interactive Argument of Knowledge — a compact zero-knowledge proof requiring no interaction between prover and verifier.