Technology Wiki

1,221 Terms.
One Reference.

A comprehensive glossary spanning artificial intelligence, blockchain, quantum computing, enterprise systems, cybersecurity, and 17 more technology domains.

1221 terms
A
148

A/B Testing

A controlled experiment comparing two variants to determine which performs better against a defined metric.

Machine Learning·Training Techniques

A/B Testing

Comparing two versions of a design to determine which performs better against a specific objective.

UX & Product Design·Testing & Analytics

A/B Testing

A controlled experiment methodology that compares two versions of a product, feature, or experience to determine which performs better against a defined metric.

Data Science & Analytics·Applied Analytics

Abductive Reasoning

A form of logical inference that seeks the simplest and most likely explanation for a set of observations.

Artificial Intelligence·Reasoning & Planning

Abstractive Summarisation

A text summarisation approach that generates novel sentences to capture the essential meaning of a document, rather than simply extracting and rearranging existing sentences.

Natural Language Processing·Text Analysis

Acceptable Use Policy

A document defining the permitted use of an organisation's IT resources and networks.

Governance, Risk & Compliance·Governance

Access Control Policy

A set of rules defining who can access specific resources and what actions they can perform.

Governance, Risk & Compliance·Security Governance

Accessibility

Designing products and services that can be used by people with a wide range of abilities and disabilities.

UX & Product Design·Testing & Analytics

Account Abstraction

A blockchain architecture improvement that allows smart contracts to act as user accounts, enabling features like social recovery, gas sponsorship, and batched transactions.

Blockchain & DLT·Smart Contracts & DApps

Action Recognition

Identifying and classifying human actions or activities from video sequences.

Computer Vision·Recognition & Detection

Action Space

The complete set of possible actions available to an AI agent in a given environment, defining the boundaries of what the agent can do to accomplish its objectives.

Agentic AI·Agent Fundamentals

Activation Function

A mathematical function applied to neural network outputs to introduce non-linearity, enabling the learning of complex patterns.

Deep Learning·Training & Optimisation

Active Learning

A machine learning approach where the algorithm interactively queries a user or oracle to label new data points.

Machine Learning·MLOps & Production

Actuator

A device that converts energy into motion to control a mechanism or system based on received commands.

IoT & Edge Computing·Devices & Sensors

Adam Optimiser

An adaptive learning rate optimisation algorithm combining momentum and RMSProp for efficient deep learning training.

Machine Learning·Training Techniques

Adapter Layers

Small trainable modules inserted between frozen transformer layers that enable task-specific adaptation without modifying the original model weights.

Deep Learning·Language Models

Adiabatic Quantum Computing

A form of quantum computing based on the adiabatic theorem, gradually evolving a system from an initial to a problem-encoding Hamiltonian.

Quantum Computing·Fundamentals

Advanced Materials

Materials engineered with novel properties for superior performance in specific applications.

Emerging Technologies·Next-Gen Computing

Adversary Simulation

Advanced red team exercises that replicate the tactics, techniques, and procedures of specific threat actors to evaluate an organisation's detection and response capabilities.

Cybersecurity·Offensive Security

Affective Computing

Computing that relates to, arises from, or influences emotions, recognising and responding to human affect.

Emerging Technologies·Next-Gen Computing

Affordance

A design property suggesting how an object should be used, making actions discoverable without instructions.

UX & Product Design·Research & Strategy

Agent Autonomy Level

The degree of independence an AI agent has in making and executing decisions without human approval.

Agentic AI·Agent Fundamentals

Agent Benchmarking

Standardised evaluation of AI agent capabilities across tasks like tool use, planning, reasoning, and task completion.

Agentic AI·Agent Reasoning & Planning

Agent Chaining

The sequential composition of multiple AI agents where each agent's output becomes the input for the next, creating automated pipelines for complex multi-stage processes.

Agentic AI·Agent Fundamentals

Agent Collaboration

The process of multiple AI agents working together, sharing information and coordinating actions to achieve common goals.

Agentic AI·Multi-Agent Systems

Agent Communication Language

Standardised protocols and languages used for inter-agent communication in multi-agent systems.

Agentic AI·Multi-Agent Systems

Agent Competition

A multi-agent scenario where agents pursue conflicting objectives, leading to adversarial or game-theoretic interactions.

Agentic AI·Multi-Agent Systems

Agent Context

The accumulated information, history, and environmental state that informs an AI agent's decision-making.

Agentic AI·Agent Fundamentals

Agent Evaluation

Methods and metrics for assessing the performance, reliability, and safety of autonomous AI agents.

Agentic AI·Safety & Governance

Agent Guardrailing

Safety constraints imposed on AI agents that limit their action space, prevent dangerous operations, enforce budgets, and require approval for irreversible decisions.

Agentic AI·Safety & Governance

Agent Guardrails

Safety constraints and boundaries that limit agent behaviour to prevent harmful, unintended, or out-of-scope actions.

Agentic AI·Safety & Governance

Agent Handoff

The transfer of a task or conversation from one specialised AI agent to another based on skill requirements, escalation rules, or domain boundaries.

Agentic AI·Agent Fundamentals

Agent Hierarchy

An organisational structure where agents are arranged in levels, with higher-level agents delegating tasks to lower-level ones.

Agentic AI·Agent Fundamentals

Agent Lifecycle Management

The processes of developing, deploying, monitoring, updating, and retiring AI agents throughout their operational life.

Agentic AI·Agent Fundamentals

Agent Loop

The iterative cycle of perception, reasoning, planning, and action execution that drives autonomous agent behaviour.

Agentic AI·Agent Reasoning & Planning

Agent Memory

The storage mechanism enabling AI agents to retain and recall information from previous interactions and experiences.

Agentic AI·Agent Reasoning & Planning

Agent Memory Bank

A persistent knowledge store that enables AI agents to accumulate and recall information across sessions, supporting long-term learning and personalised interactions.

Agentic AI·Agent Reasoning & Planning

Agent Negotiation

The process by which AI agents reach agreements through offers, counteroffers, and compromise strategies.

Agentic AI·Multi-Agent Systems

Agent Observability

The ability to monitor, trace, and understand the internal states, decisions, and actions of AI agents in production.

Agentic AI·Agent Fundamentals

Agent Orchestration

The coordination and management of multiple AI agents working together to accomplish complex workflows.

Agentic AI·Enterprise Applications

Agent Persona

The defined role, personality, and behavioural characteristics assigned to an AI agent for consistent interaction.

Agentic AI·Agent Fundamentals

Agent Planning

The ability of an AI agent to formulate a sequence of actions to achieve a goal from its current state.

Agentic AI·Agent Fundamentals

Agent Reasoning Loop

The iterative cycle of observation, thought, action, and reflection that AI agents execute to break down complex goals into achievable subtasks and verify progress.

Agentic AI·Agent Reasoning & Planning

Agent Reflection

The ability of an AI agent to evaluate its own outputs and reasoning, identifying errors and improving responses.

Agentic AI·Agent Reasoning & Planning

Agent Sandbox

An isolated environment where AI agents can safely execute actions and experiment without affecting production systems.

Agentic AI·Agent Fundamentals

Agent Skill

A specific capability or function that an AI agent can perform, such as web search, code execution, or data analysis.

Agentic AI·Tools & Integration

Agent Supervisor

A meta-agent that coordinates, monitors, and manages a team of sub-agents, allocating tasks and synthesising results to fulfil complex multi-domain objectives.

Agentic AI·Agent Fundamentals

Agent Swarm

A large collection of AI agents operating collaboratively using emergent behaviour patterns to solve complex tasks.

Agentic AI·Multi-Agent Systems

Agent Telemetry

The automated collection and transmission of performance data from AI agents for monitoring and analysis.

Agentic AI·Agent Fundamentals

Agent Tool Registry

A catalogue of available tools and APIs that agents can discover and invoke, with descriptions, schemas, and authentication details enabling dynamic capability acquisition.

Agentic AI·Agent Fundamentals

Agentic AI

AI systems that can autonomously plan, reason, and take actions to achieve goals with minimal human intervention.

Agentic AI·Agent Fundamentals

Agentic Hyperscaler

An organisation that has achieved autonomous scaling of operations through pervasive deployment of AI agents across all functions.

Emerging Technologies·AI Frontiers

Agentic RAG

An advanced retrieval-augmented generation pattern where an agent dynamically decides what information to retrieve, from which sources, and how to refine queries iteratively.

Agentic AI·Agent Reasoning & Planning

Agentic Transformation

The strategic process of redesigning business operations around autonomous AI agents to achieve hyperscale efficiency.

Agentic AI·Agent Fundamentals

Agentic Workflow

A business process that is partially or fully executed by autonomous AI agents rather than human workers.

Agentic AI·Enterprise Applications

Agile Methodology

An iterative approach to software development emphasising flexibility, collaboration, and rapid delivery of working software.

Software Engineering·Paradigms & Patterns

Agricultural Robot

A robot designed for agricultural applications including planting, harvesting, monitoring, and soil analysis.

Robotics & Automation·Industrial Robotics

AI Accelerator

Specialised hardware designed to speed up AI computations, including GPUs, TPUs, and custom AI chips.

Artificial Intelligence·Infrastructure & Operations

AI Adoption Maturity Model

A framework that describes the progressive stages of organisational AI capability from experimental pilots through scaled deployment to enterprise-wide autonomous operations.

Business & Strategy·AI Strategy

AI Agent

An autonomous software entity that perceives its environment, makes decisions, and takes actions to achieve specified objectives.

Agentic AI·Agent Fundamentals

AI Agent Orchestration

The coordination and management of multiple AI agents working together to accomplish complex tasks, routing subtasks between specialised agents based on capability and context.

Artificial Intelligence·Infrastructure & Operations

AI Alignment

The research field focused on ensuring AI systems act in accordance with human values, intentions, and ethical principles.

Artificial Intelligence·Safety & Governance

AI Audit

An independent assessment of an AI system's compliance with regulatory requirements, ethical standards, and organisational policies, examining data, models, outputs, and governance.

Governance, Risk & Compliance·Compliance & Regulation

AI Benchmark

Standardised tests and datasets used to evaluate and compare the performance of AI models across specific tasks.

Artificial Intelligence·Evaluation & Metrics

AI Bias

Systematic errors in AI outputs that arise from biased training data, flawed assumptions, or prejudicial algorithm design.

Artificial Intelligence·Training & Inference

AI Centre of Excellence

A cross-functional team within an organisation that defines AI strategy, develops best practices, builds shared capabilities, and accelerates AI adoption across business units.

Business & Strategy·AI Strategy

AI Chip

A semiconductor designed specifically for AI and machine learning computations, optimised for parallel processing and matrix operations.

Artificial Intelligence·Infrastructure & Operations

AI Companion

A persistent AI entity that forms an ongoing relationship with a user, accumulating shared history, adapting to preferences, and providing personalised assistance over time.

Emerging Technologies·Next-Gen Computing

AI Copilot

An AI assistant embedded in software applications that helps users complete tasks through suggestions and automation.

Emerging Technologies·AI Frontiers

AI Democratisation

The movement to make AI tools, knowledge, and resources accessible to non-experts and organisations of all sizes.

Artificial Intelligence·Infrastructure & Operations

AI Ethics

The branch of ethics examining moral issues surrounding the development, deployment, and impact of artificial intelligence on society.

Artificial Intelligence·Foundations & Theory

AI Ethics Board

An advisory body within an organisation composed of diverse stakeholders who review, guide, and provide oversight on the ethical implications of AI projects and deployments.

Business & Strategy·AI Strategy

AI Explainability

The ability to describe AI decision-making processes in human-understandable terms, enabling trust and regulatory compliance.

Artificial Intelligence·Safety & Governance

AI Fairness

The principle of ensuring AI systems make equitable decisions without discriminating against any group based on protected attributes.

Artificial Intelligence·Safety & Governance

AI Feature Store

A centralised platform for storing, managing, and serving machine learning features consistently across training and inference.

Artificial Intelligence·Training & Inference

AI Governance

The frameworks, policies, and regulations that guide the responsible development and deployment of AI technologies.

Artificial Intelligence·Safety & Governance

AI Guardrails

Safety mechanisms and constraints implemented around AI systems to prevent harmful, biased, or policy-violating outputs while preserving useful functionality.

Artificial Intelligence·Safety & Governance

AI Hallucination

When an AI model generates plausible-sounding but factually incorrect or fabricated information with high confidence.

Artificial Intelligence·Safety & Governance

AI Impact Assessment

A systematic evaluation of the potential effects and risks of an AI system before and during its deployment.

Governance, Risk & Compliance·Risk Management

AI Inference

The process of using a trained AI model to make predictions or decisions on new, unseen data.

Artificial Intelligence·Training & Inference

AI Infrastructure

The specialised hardware, software, and networking stack required to train and serve AI models at scale, including GPU clusters, high-bandwidth interconnects, and model serving frameworks.

Cloud Computing·Service Models

AI Interpretability

The degree to which humans can understand the internal mechanics and reasoning of an AI model's predictions and decisions.

Artificial Intelligence·Safety & Governance

AI Memory Systems

Architectures that enable AI agents to store, retrieve, and reason over information from past interactions, providing continuity and personalisation across conversations.

Artificial Intelligence·Infrastructure & Operations

AI Model Card

A documentation framework that provides standardised information about an AI model's intended use, performance characteristics, limitations, and ethical considerations.

Artificial Intelligence·Safety & Governance

AI Model Registry

A centralised repository for storing, versioning, and managing trained AI models across an organisation.

Artificial Intelligence·Infrastructure & Operations

AI Orchestration

The coordination and management of multiple AI models, services, and workflows to achieve complex end-to-end automation.

Artificial Intelligence·Infrastructure & Operations

AI Orchestration Layer

Middleware that manages routing, fallback, load balancing, and model selection across multiple AI providers to optimise cost, latency, and output quality.

Artificial Intelligence·Infrastructure & Operations

AI Pipeline

A sequence of data processing and model execution steps that automate the flow from raw data to AI-driven outputs.

Artificial Intelligence·Infrastructure & Operations

AI Readiness Assessment

A structured evaluation of an organisation's data maturity, technical infrastructure, talent, culture, and governance preparedness for successful AI adoption and deployment.

Business & Strategy·AI Strategy

AI Red Teaming

The systematic adversarial testing of AI systems to identify vulnerabilities, failure modes, harmful outputs, and safety risks before deployment.

Artificial Intelligence·Safety & Governance

AI Regulation

The developing body of laws and policies governing the development, deployment, and use of artificial intelligence systems.

Governance, Risk & Compliance·Governance

AI Risk Management Framework

A structured approach to identifying, assessing, and mitigating risks associated with AI systems, as defined by standards such as NIST AI RMF and ISO/IEC 42001.

Governance, Risk & Compliance·Governance

AI Robustness

The ability of an AI system to maintain performance under varying conditions, adversarial attacks, or noisy input data.

Artificial Intelligence·Safety & Governance

AI Safety

The interdisciplinary field dedicated to making AI systems safe, robust, and beneficial while minimizing risks of unintended consequences.

Artificial Intelligence·Safety & Governance

AI Security

The discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.

Cybersecurity·Offensive Security

AI Tokenomics

The economic model governing the pricing and allocation of computational resources for AI inference, including per-token billing, rate limiting, and credit systems.

Artificial Intelligence·Infrastructure & Operations

AI Training

The process of teaching an AI model to recognise patterns by exposing it to large datasets and adjusting its parameters.

Artificial Intelligence·Training & Inference

AI Transformation

The strategic reimagining of an organisation's operations, products, and business models through the systematic integration of artificial intelligence across all functions and processes.

Business & Strategy·AI Strategy

AI Transparency

The practice of making AI systems' operations, data usage, and decision processes openly visible to stakeholders.

Artificial Intelligence·Safety & Governance

AI Watermarking

Techniques for embedding imperceptible statistical patterns in AI-generated content to enable reliable detection and provenance tracking of synthetic outputs.

Artificial Intelligence·Safety & Governance

AI-Augmented Workforce

An organisational model where human workers are empowered by AI tools that handle routine tasks, surface insights, and enhance decision-making, amplifying human capabilities.

Digital Transformation·Strategy

AI-Generated Content

Text, images, audio, video, and code created by artificial intelligence systems, raising questions about authenticity, intellectual property, and the future of creative work.

Emerging Technologies·Bio & Materials

AI-Powered Threat Detection

Security systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.

Cybersecurity·Offensive Security

Alerting

Automated notifications triggered when system metrics or conditions exceed predefined thresholds.

DevOps & Infrastructure·Observability

Algorithmic Accountability

The principle that organisations should be answerable for the outcomes and impacts of their algorithmic systems.

Governance, Risk & Compliance·Governance

Algorithmic Impact Assessment

A systematic evaluation of the potential social, economic, and civil rights impacts of an automated decision-making system before and after deployment.

Governance, Risk & Compliance·Governance

Algorithmic Transparency

Making the logic, data, and decisions of algorithms visible and understandable to affected parties.

Emerging Technologies·Next-Gen Computing

Ambient Intelligence

Electronic environments that are sensitive and responsive to the presence of people, adapting to their needs.

Emerging Technologies·Extended Reality

Anomaly Detection

Identifying data points, events, or observations that deviate significantly from the expected pattern in a dataset.

Machine Learning·Anomaly & Pattern Detection

Ansible

An open-source automation tool for configuration management, application deployment, and task automation.

DevOps & Infrastructure·Infrastructure as Code

Anti-Money Laundering

Laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.

Governance, Risk & Compliance·Governance

API

Application Programming Interface — a set of protocols and tools for building and integrating software applications.

Cloud Computing·Architecture Patterns

API Design

The process of defining interfaces for software components to communicate with each other effectively.

Software Engineering·Architecture

API Economy

The commercial exchange of business capabilities through application programming interfaces.

Digital Transformation·Strategy

API Gateway

A server that acts as a single entry point for API calls, handling request routing, composition, and protocol translation.

Enterprise Systems & ERP·Core ERP

Appchain

A purpose-built blockchain designed for a single application or use case, offering customised consensus, throughput, and governance optimised for specific requirements.

Blockchain & DLT·Foundations

Application Modernisation

Updating existing applications to newer computing approaches including cloud, containers, and microservices.

Digital Transformation·Strategy

Artifact Repository

A centralised storage system for managing binary artifacts produced during the software build process.

DevOps & Infrastructure·CI/CD

Artificial General Intelligence

A hypothetical form of AI that possesses the ability to understand, learn, and apply knowledge across any intellectual task a human can perform.

Artificial Intelligence·Foundations & Theory

Artificial Intelligence

The simulation of human intelligence processes by computer systems, including learning, reasoning, and self-correction.

Artificial Intelligence·Foundations & Theory

Artificial Narrow Intelligence

AI systems designed and trained for a specific task or narrow range of tasks, such as image recognition or language translation.

Artificial Intelligence·Foundations & Theory

Artificial Superintelligence

A theoretical level of AI that surpasses human cognitive abilities across all domains, including creativity and social intelligence.

Artificial Intelligence·Foundations & Theory

Aspect-Based Sentiment Analysis

A fine-grained sentiment analysis approach that identifies opinions directed at specific aspects or features of an entity, such as a product's price, quality, or design.

Natural Language Processing·Text Analysis

Association Rule Learning

A method for discovering interesting relationships and patterns between variables in large datasets.

Machine Learning·Unsupervised Learning

Asynchronous Programming

A programming paradigm where operations can proceed without waiting for other operations to complete.

Software Engineering·Paradigms & Patterns

Atomic Swap

A peer-to-peer exchange of cryptocurrencies across different blockchain networks using cryptographic hash time-locked contracts, eliminating the need for trusted intermediaries.

Blockchain & DLT·Foundations

Attack Surface

The total number of points where an unauthorised user can try to enter or extract data from a system.

Cybersecurity·Offensive Security

Attack Surface Management

The continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.

Cybersecurity·Offensive Security

Attack Vector

The specific path, method, or scenario used by an attacker to gain unauthorised access to a system.

Cybersecurity·Offensive Security

Attention Head

An individual attention computation within a multi-head attention layer that learns to focus on different aspects of the input, with outputs concatenated for richer representations.

Deep Learning·Training & Optimisation

Attention Mechanism

A neural network component that learns to focus on relevant parts of the input when producing each element of the output.

Deep Learning·Architectures

AUC Score

Area Under the ROC Curve, a single metric summarising a classifier's ability to distinguish between classes.

Artificial Intelligence·Evaluation & Metrics

Audit Trail

A chronological record of system activities enabling the reconstruction and examination of a sequence of events.

Governance, Risk & Compliance·Security Governance

Augmented Analytics

The use of machine learning and natural language processing to automate data preparation, insight discovery, and explanation, making analytics accessible to business users.

Data Science & Analytics·Statistics & Methods

Augmented Reality

Technology overlaying digital information onto the real world through devices like smartphones or smart glasses.

Emerging Technologies·Extended Reality

Auto-Scaling

Automatically adjusting compute resources based on current demand to maintain performance and optimise costs.

Cloud Computing·Infrastructure

Autoencoder

A neural network trained to encode input data into a compressed representation and then decode it back to reconstruct the original.

Deep Learning·Architectures

Automated Machine Learning

The end-to-end automation of the machine learning pipeline including feature engineering, model selection, hyperparameter tuning, and deployment, making ML accessible to non-experts.

Machine Learning·MLOps & Production

Automated Market Maker

A decentralised exchange protocol that uses algorithmic pricing instead of traditional order books.

Blockchain & DLT·Foundations

AutoML

Automated machine learning that automates the end-to-end process of applying machine learning to real-world problems.

Artificial Intelligence·Training & Inference

Autonomous Agent

An AI agent capable of operating independently, making decisions and taking actions without continuous human oversight.

Agentic AI·Agent Fundamentals

Autonomous Mobile Robot

A robot that can navigate and perform tasks in its environment without human guidance.

Robotics & Automation·Autonomous Systems

Autonomous Navigation

The ability of a robot or vehicle to move through an environment independently using sensors and algorithms.

Robotics & Automation·Autonomous Systems

Autonomous Operations

The use of AI, robotics, and automation to run business processes and industrial operations with minimal human intervention, achieving continuous optimisation.

Digital Transformation·Process Transformation

Autonomous Perception

The AI subsystem in autonomous vehicles that interprets sensor data to understand the surrounding environment.

Computer Vision·Recognition & Detection

Autonomous Vehicle

A vehicle capable of navigating and operating without human input, using sensors, AI, and advanced control systems to perceive surroundings and make driving decisions.

Emerging Technologies·Next-Gen Computing

Autonomous Workflow

A multi-step business process executed entirely by AI agents with minimal human intervention, spanning planning, execution, monitoring, and error recovery phases.

Agentic AI·Enterprise Applications

Availability Zone

An isolated location within a cloud region with independent power, cooling, and networking for high availability.

Cloud Computing·Infrastructure
B
49

Backpropagation

The algorithm for computing gradients of the loss function with respect to network weights, enabling neural network training.

Machine Learning·Training Techniques

Backward Chaining

An inference strategy that starts with a goal and works backward through rules to determine what facts must be true.

Artificial Intelligence·Reasoning & Planning

Bagging

Bootstrap Aggregating — an ensemble method that trains multiple models on random subsets of data and averages their predictions.

Machine Learning·Advanced Methods

Bandit Algorithm

An online learning algorithm that balances exploration of new options with exploitation of known good options to maximise reward.

Machine Learning·Advanced Methods

Bandwidth

The maximum rate of data transfer across a network path, typically measured in bits per second.

Networking & Communications·Protocols & Standards

Batch Learning

Training a machine learning model on the entire dataset at once before deployment, as opposed to incremental updates.

Machine Learning·MLOps & Production

Batch Normalisation

A technique that normalises layer inputs during training to stabilise and accelerate deep neural network learning.

Deep Learning·Architectures

Bayesian Reasoning

A statistical approach to AI that uses Bayes' theorem to update probability estimates as new evidence becomes available.

Artificial Intelligence·Reasoning & Planning

Bayesian Statistics

A statistical approach that incorporates prior knowledge and updates probability estimates as new data is observed.

Data Science & Analytics·Statistics & Methods

BDI Architecture

Belief-Desire-Intention — an agent architecture where agents reason about beliefs, desires, and intentions to decide actions.

Agentic AI·Agent Fundamentals

Behaviour-Driven Development

A development approach where application behaviour is described in a natural language format before implementation.

Software Engineering·Development Practices

BERT

Bidirectional Encoder Representations from Transformers — a language model that understands context by reading text in both directions.

Natural Language Processing·Semantics & Representation

BGP

Border Gateway Protocol — the routing protocol that manages how packets are routed across the internet between autonomous systems.

Networking & Communications·Protocols & Standards

Bias-Variance Tradeoff

The balance between a model's ability to minimise bias (error from assumptions) and variance (sensitivity to training data fluctuations).

Machine Learning·Training Techniques

Big Data

Extremely large and complex datasets that require advanced computational tools and techniques to store, process, and analyse.

Data Science & Analytics·Statistics & Methods

Biocomputing

Using biological materials and systems to perform computational operations and information processing.

Emerging Technologies·Next-Gen Computing

Biometric Authentication

Using unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.

Cybersecurity·Identity & Access

Blameless Culture

An organisational approach where incident reviews focus on systemic improvements rather than individual blame.

DevOps & Infrastructure·CI/CD

BLE

Bluetooth Low Energy — a wireless protocol designed for short-range, low-power IoT device communication.

IoT & Edge Computing·Platforms & Protocols

BLEU Score

A metric for evaluating the quality of machine-generated text by comparing it to reference translations or texts.

Artificial Intelligence·Evaluation & Metrics

Bloch Sphere

A geometrical representation of the state space of a single qubit as a point on the surface of a sphere.

Quantum Computing·Fundamentals

Block Storage

A data storage technology that manages data as individual blocks, each acting as an independent hard drive.

Cloud Computing·Infrastructure

Blockchain

A distributed, immutable digital ledger that records transactions across a network of computers without a central authority.

Blockchain & DLT·Foundations

Blockchain Forensics

The analysis of blockchain transaction data to trace asset flows, identify illicit activity, and support regulatory compliance using graph analysis and clustering techniques.

Blockchain & DLT·Foundations

Blockchain Interoperability

The ability of different blockchain networks to communicate, share data, and transfer assets seamlessly, enabling cross-chain applications and unified digital asset ecosystems.

Blockchain & DLT·Protocols & Networks

Blockchain Oracle

A service that provides smart contracts with verified external data from off-chain sources such as market prices, weather conditions, and real-world events.

Blockchain & DLT·Smart Contracts & DApps

Blue Ocean Strategy

A business theory that suggests companies create new market spaces rather than competing in existing ones.

Business & Strategy·Corporate Strategy

Blue Team

A group of security professionals who defend against both real attackers and simulated attacks from red teams.

Cybersecurity·Offensive Security

Blue-Green Deployment

A deployment strategy using two identical production environments to achieve zero-downtime releases.

Software Engineering·Paradigms & Patterns

Blue-Green Infrastructure

Maintaining two identical production environments to enable instant switching between versions.

DevOps & Infrastructure·CI/CD

Boosting

An ensemble technique that sequentially trains models, each focusing on correcting the errors of previous models.

Machine Learning·Supervised Learning

Bounding Box

A rectangular region drawn around an object in an image to indicate its location for object detection tasks.

Computer Vision·Recognition & Detection

Brain-Computer Interface

A direct communication pathway between the brain's electrical activity and an external computing device.

Emerging Technologies·Extended Reality

Breach and Attack Simulation

Automated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.

Cybersecurity·Offensive Security

Browser Agent

An AI agent that autonomously navigates web pages, fills forms, extracts information, and completes online tasks by controlling a browser through programmatic or visual interfaces.

Agentic AI·Agent Fundamentals

Buffer Overflow

A programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.

Cybersecurity·Offensive Security

Bug Bounty

A programme where organisations pay individuals for discovering and reporting software vulnerabilities.

Cybersecurity·Offensive Security

Build Automation

The process of automating the compilation, testing, and packaging of software applications.

DevOps & Infrastructure·CI/CD

Build vs Buy Analysis

A strategic decision framework for evaluating whether to develop technology capabilities internally or procure them from external vendors, weighing cost, time, differentiation, and risk.

Business & Strategy·Innovation & Ventures

Business Agility

An organisation's ability to rapidly adapt to market and environmental changes in productive and cost-effective ways.

Business & Strategy·Operations & Models

Business Analytics

The practice of iterative exploration of organisational data to drive business planning and decision-making.

Data Science & Analytics·Statistics & Methods

Business Case

A justification for a proposed project or undertaking based on its expected commercial benefit.

Business & Strategy·Operations & Models

Business Continuity Planning

The process of creating systems of prevention and recovery to deal with potential threats to an organisation.

Enterprise Systems & ERP·Core ERP

Business Ethics

The application of ethical principles and moral standards to business activities, decisions, and relationships.

Governance, Risk & Compliance·Governance

Business Intelligence

Technologies, practices, and strategies for collecting, integrating, and analysing business data to support decision-making.

Enterprise Systems & ERP·Business Intelligence

Business Model Innovation

The process of creating, refining, or transforming a company's business model to capture new value.

Digital Transformation·Process Transformation

Business Process Management

The discipline of modelling, automating, executing, and optimising organisational business processes.

Enterprise Systems & ERP·Process Automation

Byte-Pair Encoding

A subword tokenisation algorithm that iteratively merges the most frequent character pairs to build a vocabulary.

Natural Language Processing·Parsing & Structure

Byzantine Fault Tolerance

The ability of a distributed system to reach consensus despite some nodes acting maliciously or failing.

Blockchain & DLT·Foundations
C
123

Caching

Storing frequently accessed data in a fast-access storage layer to reduce latency and improve performance.

Software Engineering·Architecture

Canary Deployment

A deployment strategy where changes are gradually rolled out to a small subset of users before full deployment.

Software Engineering·Paradigms & Patterns

Capacity Planning

The process of determining the production capacity needed to meet changing demands for an organisation's products.

DevOps & Infrastructure·Site Reliability

Capsule Network

A neural network architecture that groups neurons into capsules to better capture spatial hierarchies and part-whole relationships.

Deep Learning·Architectures

Carbon Capture

Technologies for capturing carbon dioxide emissions from sources or the atmosphere and storing or utilising them.

Emerging Technologies·Sustainability Tech

Catastrophic Forgetting

The tendency of neural networks to completely lose previously learned knowledge when trained on new tasks, a fundamental challenge in continual and multi-task learning.

Machine Learning·Anomaly & Pattern Detection

Causal Inference

The process of determining cause-and-effect relationships from data, going beyond correlation to establish causation.

Artificial Intelligence·Training & Inference

CCPA

California Consumer Privacy Act — a US state law enhancing privacy rights and consumer protection for California residents.

Governance, Risk & Compliance·Privacy & Data Protection

Central Bank Digital Currency

A digital form of fiat currency issued and regulated by a country's central bank on blockchain infrastructure.

Blockchain & DLT·DeFi & Finance

Certificate Authority

An entity that issues digital certificates, verifying the identity of organisations and encrypting communications.

Cybersecurity·Network Security

Chain of Agents

A workflow pattern where multiple specialised agents are sequentially connected, with each agent's output feeding the next.

Agentic AI·Enterprise Applications

Chain-of-Thought Prompting

A prompting technique that encourages language models to break down reasoning into intermediate steps before providing an answer.

Artificial Intelligence·Prompting & Interaction

Chainlink

A decentralised oracle network that connects smart contracts with external data sources, APIs, and payment systems.

Blockchain & DLT·Smart Contracts & DApps

Change Management

A structured approach to transitioning individuals, teams, and organisations from a current state to a desired future state.

Enterprise Systems & ERP·Core ERP

Change Readiness

An organisation's preparedness and capability to embrace and implement significant changes.

Digital Transformation·Strategy

Chaos Engineering

The discipline of experimenting on distributed systems to build confidence in their ability to withstand turbulent conditions.

DevOps & Infrastructure·Site Reliability

Chatbot

A software application that simulates human conversation through text or voice interactions using NLP.

Natural Language Processing·Generation & Translation

ChatOps

A collaboration model connecting tools, processes, and automation with team chat platforms for operations management.

DevOps & Infrastructure·CI/CD

Chef

A configuration management tool using Ruby-based scripts to automate infrastructure setup and maintenance.

DevOps & Infrastructure·Infrastructure as Code

Chinese Room Argument

A thought experiment by John Searle arguing that executing a program cannot give a computer genuine understanding or consciousness.

Artificial Intelligence·Foundations & Theory

Chunking Strategy

The method of dividing long documents into smaller segments for embedding and retrieval, balancing context preservation with optimal chunk sizes for vector search accuracy.

Natural Language Processing·Core NLP

Churn Analysis

The process of analysing customer attrition to understand why customers stop using a product or service.

Data Science & Analytics·Applied Analytics

CI/CD Pipeline

An automated workflow that builds, tests, and deploys software changes from development to production.

DevOps & Infrastructure·CI/CD

Circuit Breaker Pattern

A design pattern that prevents cascading failures by stopping calls to a failing service temporarily.

Software Engineering·Architecture

Cirq

Google's open-source framework for writing, manipulating, and running quantum circuits on quantum hardware and simulators.

Quantum Computing·Hardware & Implementation

Citizen Developer

A non-IT employee who creates business applications using low-code or no-code platforms sanctioned by IT departments.

Enterprise Systems & ERP·Process Automation

Citizen Development

A practice that empowers non-technical business users to create applications and automations using low-code and no-code platforms with appropriate governance guardrails.

Digital Transformation·Process Transformation

Class Imbalance

A situation where the distribution of classes in a dataset is significantly skewed, with some classes vastly outnumbering others.

Machine Learning·Feature Engineering & Selection

Clean Architecture

A software design philosophy separating concerns into layers with dependencies pointing inward toward business rules.

Software Engineering·Paradigms & Patterns

Cloud Bursting

A configuration where an application runs in a private cloud and bursts into a public cloud when demand spikes.

Cloud Computing·Strategy & Economics

Cloud Computing

The delivery of computing services — servers, storage, databases, networking, software — over the internet on demand.

Cloud Computing·Service Models

Cloud Cost Optimisation

Strategies and practices for minimising cloud computing expenses while maintaining performance and functionality.

Cloud Computing·Service Models

Cloud Database

A database service built, deployed, and accessed through a cloud platform, offering scalability and managed operations.

Cloud Computing·Strategy & Economics

Cloud Governance

The policies, procedures, and tools for managing cloud resource usage, security, compliance, and costs.

Cloud Computing·Strategy & Economics

Cloud Migration

The process of moving data, applications, and workloads from on-premises infrastructure to cloud environments.

Cloud Computing·Deployment & Operations

Cloud Orchestration

The automated arrangement, coordination, and management of complex cloud computing systems and services.

Cloud Computing·Service Models

Cloud Repatriation

The process of moving workloads back from public cloud environments to on-premises or private cloud infrastructure.

Cloud Computing·Strategy & Economics

Cloud Security

The set of policies, technologies, and controls deployed to protect cloud-based systems, data, and infrastructure.

Cloud Computing·Strategy & Economics

Cloud Security Posture Management

Automated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.

Cybersecurity·Security Governance

Cloud Workload Protection

Security solutions designed to protect server workloads running in cloud environments, providing vulnerability management, runtime protection, and compliance monitoring.

Cloud Computing·Strategy & Economics

Cloud-Native

An approach to building applications that fully exploit cloud computing advantages like elasticity, resilience, and automation.

Cloud Computing·Service Models

Cloud-Native Application Protection

An integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.

Cybersecurity·Offensive Security

Cloud-Native Database

A database designed from the ground up to operate in cloud environments with automatic scaling and high availability.

Cloud Computing·Strategy & Economics

Cloud-Native Development

An approach to building applications that fully exploit cloud computing advantages including microservices, containers, dynamic orchestration, and continuous delivery.

Cloud Computing·Service Models

Clustering

Unsupervised learning technique that groups similar data points together based on inherent patterns without predefined labels.

Machine Learning·Unsupervised Learning

CoAP

Constrained Application Protocol — a specialised web transfer protocol for use with constrained devices in IoT networks.

IoT & Edge Computing·Platforms & Protocols

COBIT

Control Objectives for Information and Related Technologies — a framework for IT governance and management.

Governance, Risk & Compliance·Governance

Code Generation

The automated production of source code from natural language specifications or partial code context, powered by large language models trained on programming repositories.

Natural Language Processing·Semantics & Representation

Code Review

A systematic examination of source code by developers other than the author to identify bugs and improve quality.

Software Engineering·Development Practices

Coding Agent

An AI agent specialised in writing, debugging, refactoring, and testing software code, capable of operating across multiple files and understanding project-level context.

Agentic AI·Agent Fundamentals

Cognitive Architecture

A theoretical framework that models the structure and processes of the human mind for building intelligent agents.

Agentic AI·Agent Fundamentals

Cognitive Computing

Computing systems that simulate human thought processes using self-learning algorithms, data mining, pattern recognition, and natural language processing.

Artificial Intelligence·Foundations & Theory

Cognitive Load

The total amount of mental effort required to process and understand information in a user interface.

UX & Product Design·Research & Strategy

Cohort Analysis

A behavioural analytics technique that groups users with shared characteristics to track metrics over time.

Data Science & Analytics·Applied Analytics

Cold Wallet

An offline cryptocurrency storage solution disconnected from the internet for maximum security.

Blockchain & DLT·Foundations

Collaborative Filtering

A recommendation technique that makes predictions based on the collective preferences and behaviour of many users.

Machine Learning·Unsupervised Learning

Collaborative Robot

A robot designed to work alongside humans in a shared workspace, equipped with safety features.

Robotics & Automation·Industrial Robotics

Commonsense Reasoning

The AI capability to make inferences based on everyday knowledge that humans typically take for granted.

Artificial Intelligence·Foundations & Theory

Competitive Advantage

A condition or circumstance that puts a company in a superior business position relative to competitors.

Business & Strategy·Corporate Strategy

Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to an organisation's business.

Governance, Risk & Compliance·Compliance & Regulation

Compliance as Code

The practice of expressing regulatory and security compliance requirements as machine-readable policies that can be automatically validated against infrastructure and application configurations.

Governance, Risk & Compliance·Compliance & Regulation

Compliance Framework

A structured set of guidelines and best practices for meeting regulatory requirements and industry standards.

Cybersecurity·Security Governance

Component Library

A collection of pre-built, reusable UI components that maintain consistency across applications.

UX & Product Design·Design & Prototyping

Composable Architecture

A technology design approach that assembles applications from modular, independent building blocks through APIs, enabling rapid adaptation to changing business requirements.

Digital Transformation·Strategy

Composable Enterprise

An organisation design principle where business capabilities are assembled from modular, interchangeable components.

Digital Transformation·Technology Modernisation

Computer Network

A collection of interconnected computing devices that share resources and communicate using standardised protocols.

Networking & Communications·Protocols & Standards

Computer Numerical Control

The automated control of machining tools using a computer and coded programmed instructions.

Robotics & Automation·Industrial Robotics

Computer Use Agent

An AI agent that interacts with graphical user interfaces by perceiving screen content and executing mouse clicks, keyboard inputs, and navigation actions like a human operator.

Agentic AI·Agent Fundamentals

Computer Vision

The field of AI that enables computers to interpret and understand visual information from images and video.

Computer Vision·Recognition & Detection

Concept Drift

Changes in the underlying patterns that a model was trained to capture, requiring model adaptation.

Data Science & Analytics·Statistics & Methods

Concurrency

The ability of a system to handle multiple tasks simultaneously by interleaving their execution.

Software Engineering·Architecture

Condition Monitoring

Continuously tracking equipment parameters to detect changes that indicate developing faults.

IoT & Edge Computing·Devices & Sensors

Confidential Computing

Technology that protects data during processing by performing computations in hardware-based trusted execution environments.

Emerging Technologies·Next-Gen Computing

Configuration Management

The practice of systematically managing and maintaining the consistency of system configurations.

DevOps & Infrastructure·Infrastructure as Code

Configure, Price, Quote

Enterprise software that automates the configuration of complex products, accurate pricing calculations, and professional quote generation for sales teams.

Enterprise Systems & ERP·CRM & Customer

Confusion Matrix

A table used to evaluate classification model performance by comparing predicted classifications against actual classifications.

Artificial Intelligence·Evaluation & Metrics

Connected Enterprise

An organisation with seamlessly integrated systems, processes, and data flows across all business functions.

Digital Transformation·Process Transformation

Connected Vehicle

A vehicle equipped with internet connectivity and sensors enabling communication with other vehicles and infrastructure.

IoT & Edge Computing·Applications

Connected Worker

Technology solutions that equip frontline workers with digital tools, wearables, and AI assistance to improve safety, productivity, and access to information in operational environments.

Digital Transformation·Strategy

Connectionism

An approach to AI modelling cognitive processes using artificial neural networks inspired by biological neural structures.

Artificial Intelligence·Foundations & Theory

Consensus Mechanism

The method by which a distributed network agrees on the current state of the ledger and validates transactions.

Blockchain & DLT·Foundations

Constitutional AI

An approach to AI alignment where models are trained to follow a set of principles or constitution.

Natural Language Processing·Core NLP

Constraint Satisfaction

A computational approach where problems are defined as a set of variables, domains, and constraints that must all be simultaneously satisfied.

Artificial Intelligence·Reasoning & Planning

Container

A lightweight, portable software package that bundles application code with all its dependencies for consistent execution.

Cloud Computing·Infrastructure

Container Orchestration

The automated management of containerised application deployment, scaling, networking, and availability across clusters of machines, with Kubernetes as the dominant platform.

Cloud Computing·Infrastructure

Container Registry

A repository for storing, managing, and distributing container images.

DevOps & Infrastructure·Containers & Orchestration

Content Delivery Network

A distributed network of servers that delivers web content to users based on their geographic location.

Cloud Computing·Architecture Patterns

Content-Based Filtering

A recommendation approach that suggests items similar to those a user has previously liked, based on item attributes.

Machine Learning·Unsupervised Learning

Context Window

The maximum amount of text a language model can consider at once when generating a response.

Natural Language Processing·Semantics & Representation

Contextual Embedding

Word representations that change based on surrounding context, capturing polysemy and contextual meaning.

Natural Language Processing·Semantics & Representation

Continual Learning

A machine learning paradigm where models learn from a continuous stream of data, accumulating knowledge over time without forgetting previously learned information.

Machine Learning·MLOps & Production

Continuous Compliance

An automated approach to maintaining regulatory compliance through real-time monitoring, policy enforcement, and evidence collection integrated into development and operations pipelines.

Governance, Risk & Compliance·Compliance & Regulation

Continuous Delivery

A software practice where code changes can be released to production at any time through automated pipelines.

Software Engineering·Development Practices

Continuous Deployment

An extension of continuous integration where code changes are automatically deployed to production after passing tests.

Software Engineering·Development Practices

Continuous Integration

A development practice where code changes are automatically built and tested when merged to a shared repository.

Software Engineering·Development Practices

Contrastive Learning

A self-supervised learning approach that trains models by comparing similar and dissimilar pairs of data representations.

Deep Learning·Architectures

Control Framework

A structured set of controls and processes designed to manage risk and ensure compliance with regulations.

Governance, Risk & Compliance·Compliance & Regulation

Conversational AI

AI systems designed to engage in natural, context-aware dialogue with humans across multiple turns.

Natural Language Processing·Generation & Translation

Conversion Rate Optimisation

The practice of increasing the percentage of users who complete a desired action on a website.

UX & Product Design·Testing & Analytics

Convolutional Layer

A neural network layer that applies learnable filters across input data to detect local patterns and features.

Deep Learning·Architectures

Convolutional Neural Network

A deep learning architecture designed for processing structured grid data like images, using convolutional filters to detect features.

Deep Learning·Architectures

Core Competency

A unique capability or advantage that distinguishes a company from its competitors and creates sustainable value.

Business & Strategy·Corporate Strategy

Coreference Resolution

The task of identifying all expressions in text that refer to the same real-world entity.

Natural Language Processing·Parsing & Structure

Corporate Governance

The system of rules, practices, and processes by which a company is directed and controlled.

Business & Strategy·Corporate Strategy

Corporate Innovation Lab

A dedicated unit within a corporation focused on exploring and developing new technologies and business models.

Business & Strategy·Innovation & Ventures

Corporate Venture Capital

Investment of corporate funds directly into external startup companies to gain strategic benefits such as access to innovation, market intelligence, and potential acquisitions.

Business & Strategy·Innovation & Ventures

Correlation Analysis

Statistical analysis measuring the strength and direction of the relationship between two or more variables.

Data Science & Analytics·Statistics & Methods

Cross-Chain Bridge

Infrastructure enabling the transfer of assets and data between different blockchain networks.

Blockchain & DLT·Protocols & Networks

Cross-Lingual Transfer

The application of models trained in one language to perform tasks in another language, leveraging shared multilingual representations learned during pre-training.

Natural Language Processing·Core NLP

Cross-Site Scripting

A web security vulnerability allowing attackers to inject malicious scripts into web pages viewed by other users.

Cybersecurity·Offensive Security

Cross-Validation

A resampling technique that partitions data into subsets, training on some and validating on others to assess model generalisation.

Machine Learning·Training Techniques

Cryptographic Hash

A one-way function producing a fixed-length output that is computationally infeasible to reverse or find collisions for.

Blockchain & DLT·Foundations

Curriculum Learning

A training strategy that presents examples to a model in a meaningful order, typically from easy to hard.

Machine Learning·Advanced Methods

Customer Analytics

The practice of collecting and analysing customer data to understand behaviour, preferences, and lifetime value.

Data Science & Analytics·Applied Analytics

Customer Data Platform

A software system that creates a unified customer database accessible to other systems for marketing and analytics.

Digital Transformation·Data-Driven Organisation

Customer Experience

The sum of all interactions and perceptions a customer has with a brand throughout their entire journey.

Digital Transformation·Customer Experience

Customer Lifetime Value

The total revenue a business can expect from a single customer account throughout their relationship.

Business & Strategy·Growth & Revenue

Customer Relationship Management

Technology for managing a company's interactions, relationships, and data with current and potential customers.

Enterprise Systems & ERP·CRM & Customer

Cyber Insurance

Insurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.

Cybersecurity·Security Governance

Cyber Kill Chain

A model describing the stages of a cyberattack from reconnaissance through data exfiltration.

Cybersecurity·Offensive Security

Cyber Resilience

An organisation's ability to continuously deliver intended outcomes despite adverse cyber events, encompassing prevention, detection, response, and recovery capabilities.

Cybersecurity·Offensive Security

Cyber Threat Intelligence

Evidence-based knowledge about adversary capabilities, infrastructure, motives, and tactics that informs security decisions and enables proactive defence against cyber attacks.

Cybersecurity·Offensive Security

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks, unauthorised access, and data breaches.

Cybersecurity·Offensive Security
D
118

Dark Pattern

A deceptive user interface design that tricks users into doing things they didn't intend to do.

UX & Product Design·Research & Strategy

Dashboard

A visual interface displaying key metrics and data points for monitoring performance and making informed decisions.

Data Science & Analytics·Visualisation

Data Analysis Agent

An AI agent that interprets datasets, generates visualisations, performs statistical analysis, and produces actionable insights through autonomous exploratory data investigation.

Agentic AI·Agent Fundamentals

Data Annotation

The process of labelling data with informative tags to make it usable for training supervised machine learning models.

Data Science & Analytics·Statistics & Methods

Data Augmentation

Techniques that artificially increase the size and diversity of training data through transformations like rotation, flipping, and cropping.

Machine Learning·Feature Engineering & Selection

Data Availability

The guarantee that all data required to verify blockchain transactions is accessible to network participants, a critical requirement for the security of rollup-based scaling solutions.

Blockchain & DLT·Foundations

Data Catalogue

A metadata management tool that helps organisations find, understand, and manage their data assets.

Data Science & Analytics·Data Governance

Data Contract

A formal agreement between data producers and consumers that defines the structure, semantics, quality standards, and service levels of a shared data interface.

Data Science & Analytics·Statistics & Methods

Data Democratisation

Making data accessible to all members of an organisation regardless of their technical expertise.

Data Science & Analytics·Statistics & Methods

Data Drift

Changes in the statistical properties of data over time that can degrade machine learning model performance.

Data Science & Analytics·Data Governance

Data Engineering

The practice of designing, building, and maintaining data infrastructure, pipelines, and architectures.

Data Science & Analytics·Statistics & Methods

Data Fabric

An architecture that provides a unified, intelligent layer for integrating data management across cloud and on-premises environments.

Enterprise Systems & ERP·Core ERP

Data Governance

The framework of policies, processes, and standards for managing data assets to ensure quality, security, and compliance.

Data Science & Analytics·Data Governance

Data Integration

The process of combining data from different sources to provide users with a unified, consistent view.

Enterprise Systems & ERP·Integration & Middleware

Data Labelling

The process of annotating raw data with informative tags or classifications for supervised machine learning training.

Computer Vision·Recognition & Detection

Data Lake

A centralised repository for storing vast amounts of raw data in its native format until needed for analysis.

Enterprise Systems & ERP·Core ERP

Data Lakehouse

A hybrid data architecture combining the flexibility of data lakes with the structured querying capabilities of data warehouses.

Enterprise Systems & ERP·Business Intelligence

Data Lineage

The documentation of data's origins, movements, and transformations throughout its lifecycle.

Data Science & Analytics·Data Engineering

Data Loss Prevention

Technology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.

Cybersecurity·Data Protection

Data Mart

A subset of a data warehouse focused on a particular business area, department, or subject.

Data Science & Analytics·Data Engineering

Data Mesh

A decentralised data architecture approach where domain teams own and manage their own data products.

Enterprise Systems & ERP·Core ERP

Data Monetisation

The process of generating measurable economic benefits from data assets, either by improving internal operations or creating external revenue streams through data products and services.

Business & Strategy·Operations & Models

Data Observability

The ability to understand, diagnose, and resolve data quality issues across the data stack by monitoring freshness, distribution, volume, schema, and lineage of data assets.

Data Science & Analytics·Data Engineering

Data Parallelism

A distributed training strategy that replicates the model across multiple devices and divides training data into batches processed simultaneously, synchronising gradients after each step.

Deep Learning·Architectures

Data Pipeline

An automated set of processes that moves and transforms data from source systems to target destinations.

Data Science & Analytics·Data Engineering

Data Privacy

The proper handling of personal data including collection, storage, processing, and sharing in compliance with regulations.

Governance, Risk & Compliance·Compliance & Regulation

Data Product

A reusable, well-documented, and managed dataset or analytical asset created to serve specific business needs, treated with the same rigour as software products.

Data Science & Analytics·Statistics & Methods

Data Profiling

The process of examining, analysing, and creating summaries of data to assess quality and structure.

Data Science & Analytics·Statistics & Methods

Data Protection Impact Assessment

A process required under GDPR for assessing the risks of personal data processing activities and identifying measures to mitigate those risks before implementation.

Governance, Risk & Compliance·Privacy & Data Protection

Data Protection Officer

An individual responsible for overseeing an organisation's data protection strategy and regulatory compliance.

Governance, Risk & Compliance·Compliance & Regulation

Data Quality

The measure of data's fitness for its intended purpose based on accuracy, completeness, consistency, and timeliness.

Data Science & Analytics·Data Engineering

Data Science

An interdisciplinary field using scientific methods, algorithms, and systems to extract knowledge and insights from structured and unstructured data.

Data Science & Analytics·Statistics & Methods

Data Silo

An isolated repository of data controlled by one department, inaccessible to other parts of the organisation.

Data Science & Analytics·Statistics & Methods

Data Sovereignty

The concept that data is subject to the laws and governance structures of the country where it is collected or processed.

Governance, Risk & Compliance·Governance

Data Storytelling

The practice of building narratives around data insights using visualisations and narrative techniques.

Data Science & Analytics·Visualisation

Data Visualisation

The graphical representation of data and information using visual elements like charts, graphs, and maps.

Data Science & Analytics·Visualisation

Data Warehouse

A centralised repository of integrated data from multiple sources, designed for query and analysis.

Enterprise Systems & ERP·Business Intelligence

Data Wrangling

The process of cleaning, structuring, and enriching raw data into a desired format for analysis.

Data Science & Analytics·Statistics & Methods

Data-Driven Culture

An organisational culture where decisions at all levels are informed by data analysis and empirical evidence rather than intuition, supported by accessible analytics and data literacy.

Digital Transformation·Data-Driven Organisation

Data-Driven Organisation

An enterprise where strategic decisions are made based on data analysis and interpretation rather than intuition alone.

Digital Transformation·Data-Driven Organisation

Database Design

The process of defining the structure, storage, and retrieval of data in a database system.

Software Engineering·Paradigms & Patterns

DBSCAN

Density-Based Spatial Clustering of Applications with Noise — a clustering algorithm that finds arbitrarily shaped clusters based on density.

Machine Learning·Unsupervised Learning

Decentralised Application

An application that runs on a decentralised peer-to-peer network rather than a single centralised server.

Blockchain & DLT·Foundations

Decentralised Autonomous Organisation

An organisation governed by smart contracts and token holder votes rather than centralised management.

Blockchain & DLT·Smart Contracts & DApps

Decentralised Finance

Financial services built on blockchain technology that operate without traditional intermediaries like banks or brokerages.

Blockchain & DLT·Foundations

Decentralised Identity

A self-sovereign identity framework where individuals control their own digital identity credentials without centralised authorities.

Blockchain & DLT·Identity & Privacy

Decentralised Physical Infrastructure

Networks that use blockchain token incentives to coordinate the deployment and operation of physical infrastructure such as wireless networks, energy grids, and compute resources.

Blockchain & DLT·Foundations

Decentralised Storage

Distributed file storage systems where data is spread across multiple nodes rather than centralised servers.

Blockchain & DLT·Foundations

Deception Technology

Security solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.

Cybersecurity·Identity & Access

Decision Intelligence

A discipline that augments human decision-making with data analytics, AI, and behavioural science to improve the speed, quality, and outcomes of business decisions.

Enterprise Systems & ERP·Business Intelligence

Decision Tree

A tree-structured model where internal nodes represent feature tests, branches represent outcomes, and leaves represent predictions.

Machine Learning·Supervised Learning

Decoherence

The loss of quantum coherence when a quantum system interacts with its environment, causing errors in computation.

Quantum Computing·Fundamentals

Deep Learning

A subset of machine learning using neural networks with multiple layers to learn hierarchical representations of data.

Deep Learning·Architectures

Deep Reinforcement Learning

Combining deep neural networks with reinforcement learning to enable agents to learn complex decision-making from raw sensory input.

Machine Learning·Reinforcement Learning

Deepfake

AI-generated synthetic media where a person's likeness is convincingly replaced or manipulated in images or videos.

Emerging Technologies·Bio & Materials

Degrees of Freedom

The number of independent parameters that define a robot's configuration and range of motion.

Robotics & Automation·Industrial Robotics

Delegated Proof of Stake

A consensus mechanism where token holders vote for delegates who validate transactions on their behalf.

Blockchain & DLT·Foundations

Deliberative Agent

An AI agent that maintains an internal model of its world and reasons about actions before executing them.

Agentic AI·Agent Fundamentals

Denial of Service Attack

An attack designed to make a machine or network resource unavailable by overwhelming it with traffic.

Cybersecurity·Offensive Security

Dependency Injection

A design pattern where dependencies are provided to a component rather than created within it.

Software Engineering·Paradigms & Patterns

Dependency Parsing

The syntactic analysis of a sentence to establish relationships between head words and words that modify them.

Natural Language Processing·Parsing & Structure

Depth Estimation

Predicting the distance of surfaces in a scene from the camera viewpoint using visual information.

Computer Vision·Recognition & Detection

Descriptive Analytics

The analysis of historical data to understand what has happened in the past and identify patterns.

Data Science & Analytics·Applied Analytics

Design Pattern

A reusable solution to a commonly occurring problem within a given context in software design.

Software Engineering·Paradigms & Patterns

Design Sprint

A five-day process for answering critical business questions through design, prototyping, and user testing.

UX & Product Design·Product Management

Design System

A collection of reusable components, guidelines, and standards for building consistent digital products.

UX & Product Design·Design & Prototyping

Design Thinking

A human-centred problem-solving methodology that emphasises empathy, ideation, prototyping, and testing.

Digital Transformation·Strategy

Device Authentication

Verifying the identity of IoT devices before allowing them to connect to a network or service.

IoT & Edge Computing·Devices & Sensors

Device Provisioning

The process of configuring and enrolling IoT devices into a management platform for secure operation.

IoT & Edge Computing·Devices & Sensors

DevOps

A set of practices combining software development and IT operations to shorten the development lifecycle and deliver continuous value.

DevOps & Infrastructure·CI/CD

DevSecOps

An approach integrating security practices within the DevOps process, making security a shared responsibility.

Cybersecurity·Security Governance

DHCP

Dynamic Host Configuration Protocol — automatically assigns IP addresses and network configuration to devices.

Networking & Communications·Protocols & Standards

Diagnostic Analytics

Analysis techniques focused on understanding why something happened by examining data patterns and correlations.

Data Science & Analytics·Statistics & Methods

Dialogue Management

The component of conversational systems that tracks conversation state, determines the next system action, and maintains coherent multi-turn interactions with users.

Natural Language Processing·Generation & Translation

Dialogue System

A computer system designed to converse with humans, encompassing task-oriented and open-domain conversation.

Natural Language Processing·Generation & Translation

Diffusion Model

A generative model that learns to reverse a gradual noising process, generating high-quality samples from random noise.

Deep Learning·Generative Models

Digital Adoption Platform

Software that overlays on enterprise applications to guide users through features and processes in real time.

Enterprise Systems & ERP·Core ERP

Digital Biology

The convergence of biological sciences with computational methods and AI to accelerate drug discovery, protein design, genomic analysis, and synthetic biology applications.

Emerging Technologies·Bio & Materials

Digital Bond

A fixed-income security issued and managed on blockchain infrastructure, automating coupon payments, settlement, and transfer of ownership through smart contracts.

Blockchain & DLT·Smart Contracts & DApps

Digital Dexterity

The ability and desire of individuals and organisations to leverage existing and emerging technologies for better business outcomes, encompassing both skill and mindset.

Digital Transformation·Strategy

Digital Disruption

The change that occurs when new digital technologies fundamentally alter the way business is conducted.

Digital Transformation·Strategy

Digital Ecosystem

A network of interconnected organisations, technologies, and processes that create and distribute value digitally.

Digital Transformation·Process Transformation

Digital Ethics

The application of moral principles to the creation, use, and governance of digital technologies, addressing questions of privacy, equity, transparency, and societal impact.

Digital Transformation·Strategy

Digital Factory

A comprehensive network of digital models and simulation tools replicating the entire production process.

Robotics & Automation·Industrial Robotics

Digital Forensics

The process of collecting, preserving, and analysing electronic evidence for investigating security incidents.

Cybersecurity·Defensive Security

Digital Identity

The online representation of an individual comprising their attributes, credentials, and digital footprint.

Emerging Technologies·Next-Gen Computing

Digital Literacy

The ability to effectively and critically navigate, evaluate, and create information using digital technologies.

Digital Transformation·Strategy

Digital Maturity

An assessment of an organisation's ability to adapt and respond to digital trends and competitive threats.

Digital Transformation·Strategy

Digital Maturity Model

A framework that assesses an organisation's current level of digital capability across dimensions such as strategy, culture, technology, data, and operations.

Digital Transformation·Strategy

Digital Operating Model

The blueprint for how an organisation delivers value through digital capabilities, processes, and technology.

Digital Transformation·Strategy

Digital Operational Resilience

An organisation's ability to build, assure, and review its technological integrity to ensure it can withstand all types of ICT-related disruptions and threats.

Governance, Risk & Compliance·Governance

Digital Product

A product that exists in digital form, delivered and consumed electronically, often as software or digital content.

Digital Transformation·Strategy

Digital Product Management

The discipline of guiding digital products through their lifecycle from ideation to retirement, balancing user needs, business objectives, and technical constraints.

Digital Transformation·Strategy

Digital Signature

A cryptographic mechanism that verifies the authenticity and integrity of digital messages or documents.

Blockchain & DLT·Foundations

Digital Strategy

A plan that uses digital initiatives to create new competitive advantages and support business transformation goals.

Digital Transformation·Strategy

Digital Supply Chain

A technology-enabled supply chain that uses AI, IoT, blockchain, and analytics to create end-to-end visibility, predict disruptions, and optimise logistics in real time.

Digital Transformation·Data-Driven Organisation

Digital Thread

An integrated data framework that connects information across the entire product lifecycle from design through manufacturing to service, enabling traceability and analytics.

Enterprise Systems & ERP·Business Intelligence

Digital Transformation

The fundamental integration of digital technology into all areas of a business, changing how it operates and delivers value.

Digital Transformation·Strategy

Digital Twin

A virtual replica of a physical system, process, or product that simulates its real-world counterpart for analysis and optimisation.

Enterprise Systems & ERP·Core ERP

Digital Twin

A virtual model of a physical device or system that simulates its behaviour for monitoring and optimisation.

IoT & Edge Computing·Applications

Digital Twin Organisation

A dynamic virtual model of an entire organisation used to simulate, predict, and optimise business performance.

Digital Transformation·Strategy

Digital Venturing

Creating new digital businesses or ventures within or alongside an established organisation.

Business & Strategy·Innovation & Ventures

Digital Workplace

A virtual equivalent of a physical workplace enabled by digital tools for collaboration, communication, and productivity.

Digital Transformation·Strategy

Dimensionality Reduction

Techniques that reduce the number of input variables in a dataset while preserving essential information and structure.

Machine Learning·Unsupervised Learning

Direct Preference Optimisation

A simplified alternative to RLHF that directly optimises language model policies using preference data without requiring a separate reward model.

Artificial Intelligence·Training & Inference

Disaster Recovery

The policies, tools, and procedures for recovering technology infrastructure and systems after a natural or human-induced disaster.

Enterprise Systems & ERP·Core ERP

Disaster Recovery as a Service

A cloud computing model that enables the replication and recovery of infrastructure and data in the cloud.

Cloud Computing·Deployment & Operations

Disruptive Innovation

Innovation that creates a new market and value network, eventually disrupting existing markets and displacing established firms.

Business & Strategy·Corporate Strategy

Distributed Ledger Technology

A digital system for recording, sharing, and synchronising data across multiple sites without a central administrator.

Blockchain & DLT·Foundations

Distributed Tracing

A method of tracking requests as they flow through distributed systems to diagnose latency and failure points.

DevOps & Infrastructure·Observability

DNA Data Storage

Using synthetic DNA molecules to encode and store digital data with extreme density and longevity.

Emerging Technologies·Next-Gen Computing

DNS

Domain Name System — the hierarchical system that translates human-readable domain names into numerical IP addresses.

Networking & Communications·Protocols & Standards

Docker

A platform for developing, shipping, and running applications in isolated containers with consistent environments.

Cloud Computing·Infrastructure

Document Understanding

AI systems that extract structured information from unstructured documents by combining optical character recognition, layout analysis, and natural language comprehension.

Natural Language Processing·Core NLP

Domain-Driven Design

A software design approach focusing on modelling the business domain and aligning code with business logic.

Software Engineering·Paradigms & Patterns

Drone

An unmanned aerial vehicle operated remotely or autonomously for applications like surveillance, delivery, and mapping.

Robotics & Automation·Autonomous Systems

Dropout

A regularisation technique that randomly deactivates neurons during training to prevent co-adaptation and reduce overfitting.

Deep Learning·Training & Optimisation

Due Diligence

A comprehensive appraisal of a business or investment undertaken to establish its assets, liabilities, and commercial potential.

Business & Strategy·Corporate Strategy
E
51

Ecosystem Strategy

A strategic approach that leverages partnerships and collaborative networks to create collective value.

Business & Strategy·Corporate Strategy

Edge AI

Artificial intelligence algorithms processed locally on edge devices rather than in centralised cloud data centres.

Artificial Intelligence·Foundations & Theory

Edge Analytics

Performing data analysis at the network edge, close to data sources, for real-time insights and reduced latency.

IoT & Edge Computing·Edge Computing

Edge Computing

Processing data near the source of data generation rather than in a centralised cloud data centre.

Cloud Computing·Architecture Patterns

Edge Device

A computing device at the boundary of a network that processes data locally before sending it to the cloud.

IoT & Edge Computing·Devices & Sensors

Elastic Net

A regularisation technique combining L1 and L2 penalties, balancing feature selection and coefficient shrinkage.

Machine Learning·Training Techniques

Elasticity

The ability of a system to automatically scale resources up or down based on current demand.

DevOps & Infrastructure·CI/CD

ELT

Extract, Load, Transform — a modern data pipeline approach where raw data is loaded first and transformed within the target system.

Enterprise Systems & ERP·CRM & Customer

Embedded System

A dedicated computer system designed for specific functions within a larger mechanical or electrical system.

IoT & Edge Computing·Devices & Sensors

Embedding

A learned dense vector representation of discrete data (like words or categories) in a continuous vector space.

Deep Learning·Architectures

Embodied AI

Artificial intelligence that operates within physical robots or virtual bodies, learning from sensory experiences and physical interaction with its environment.

Emerging Technologies·Next-Gen Computing

Emergent Behaviour

Complex patterns and capabilities that arise from the interactions of simpler agent components or rules.

Agentic AI·Multi-Agent Systems

Emergent Capabilities

Abilities that appear in large language models at certain scale thresholds that were not present in smaller versions, such as in-context learning and complex reasoning.

Artificial Intelligence·Prompting & Interaction

Employee Experience Platform

A unified digital platform improving employee engagement, productivity, and satisfaction across the work lifecycle.

Digital Transformation·Technology Modernisation

Encoder-Decoder Architecture

A neural network design where an encoder processes input into a fixed representation and a decoder generates output from it.

Deep Learning·Architectures

Encryption

The process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.

Cybersecurity·Data Protection

End Effector

The device at the end of a robotic arm designed to interact with the environment, such as grippers or tools.

Robotics & Automation·Industrial Robotics

End-to-End Encryption

A communication system where only the communicating users can read the messages, with encryption at both endpoints.

Cybersecurity·Data Protection

End-to-End Testing

Testing the complete application workflow from start to finish to ensure the system meets requirements.

Software Engineering·Quality & Testing

Endpoint Detection and Response

Security technology that monitors endpoint devices to detect, investigate, and respond to cyber threats.

Cybersecurity·Defensive Security

Energy Harvesting

Technology that captures and converts ambient energy from the environment into usable electrical power.

Emerging Technologies·Sustainability Tech

Ensemble Learning

Combining multiple machine learning models to produce better predictive performance than any single model.

Machine Learning·MLOps & Production

Ensemble Methods

Machine learning techniques that combine multiple models to produce better predictive performance than any single model, including bagging, boosting, and stacking approaches.

Machine Learning·MLOps & Production

Enterprise AI Platform

An integrated software platform that provides organisations with tools for building, deploying, and managing AI applications at enterprise scale with governance, security, and compliance controls.

Enterprise Systems & ERP·Core ERP

Enterprise Architecture

A strategic framework for aligning an organisation's IT infrastructure and processes with its business objectives.

Enterprise Systems & ERP·Core ERP

Enterprise Digital Twin

A comprehensive digital replica of an entire organisation's operations, processes, and assets that enables simulation, optimisation, and predictive analysis at enterprise scale.

Digital Transformation·Process Transformation

Enterprise Integration

The practice of connecting different enterprise systems, applications, and data sources to work together seamlessly.

Enterprise Systems & ERP·Integration & Middleware

Enterprise Resource Planning

Integrated management software that connects core business processes including finance, HR, manufacturing, supply chain, and procurement.

Enterprise Systems & ERP·Core ERP

Enterprise Service Bus

Middleware architecture that enables communication between different enterprise applications through a central messaging backbone.

Enterprise Systems & ERP·Integration & Middleware

Epoch

One complete pass through the entire training dataset during the machine learning model training process.

Machine Learning·MLOps & Production

ERC-20

A technical standard for implementing fungible tokens on the Ethereum blockchain.

Blockchain & DLT·Tokens & Assets

ERC-721

A technical standard for non-fungible tokens on the Ethereum blockchain, ensuring each token is unique.

Blockchain & DLT·Tokens & Assets

Error Budget

The maximum amount of time a service can be unavailable within a given period based on its SLO.

DevOps & Infrastructure·Observability

ESG

Environmental, Social, and Governance — a set of standards for measuring a company's ethical impact and sustainability.

Business & Strategy·Operations & Models

Ethereum Virtual Machine

The runtime environment for executing smart contracts on the Ethereum blockchain network.

Blockchain & DLT·Smart Contracts & DApps

Ethical AI Framework

A set of principles, guidelines, and processes that an organisation adopts to ensure its AI systems are developed and deployed in a manner that is fair, transparent, and accountable.

Governance, Risk & Compliance·Governance

ETL

Extract, Transform, Load — the process of extracting data from sources, transforming it to fit needs, and loading it into a target system.

Enterprise Systems & ERP·Integration & Middleware

ETL Pipeline

An automated workflow that extracts data from sources, transforms it according to business rules, and loads it into a target system.

Data Science & Analytics·Data Engineering

EU AI Act

The European Union's comprehensive legislation establishing rules for the development and use of AI systems based on risk levels.

Governance, Risk & Compliance·Compliance & Regulation

Event Loop

A programming construct that waits for and dispatches events or messages in a program.

Software Engineering·Paradigms & Patterns

Event-Driven Architecture

An architecture pattern where the flow of the system is determined by events — significant changes in state.

Cloud Computing·Architecture Patterns

Experience Level Agreement

A service management metric that measures the quality of user experience rather than just technical uptime, encompassing performance, usability, and satisfaction outcomes.

Digital Transformation·Strategy

Experiment Tracking

The systematic recording of machine learning experiment parameters, metrics, artifacts, and code versions to enable reproducibility and comparison across training runs.

Machine Learning·MLOps & Production

Expert System

An AI program that emulates the decision-making ability of a human expert by using a knowledge base and inference rules.

Artificial Intelligence·Infrastructure & Operations

Explainable AI

AI techniques that make model decisions transparent and understandable to humans.

Emerging Technologies·Next-Gen Computing

Exploding Gradient

A problem where gradients grow exponentially during backpropagation, causing unstable weight updates and training failure.

Deep Learning·Architectures

Exploratory Data Analysis

An approach to analysing datasets to summarise their main characteristics, often using statistical graphics and visualisation.

Data Science & Analytics·Statistics & Methods

Extended Detection and Response

A unified security platform that integrates multiple security tools and data sources for comprehensive threat detection.

Cybersecurity·Offensive Security

Extended Detection and Response

A unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.

Cybersecurity·Defensive Security

Extended Reality

An umbrella term encompassing augmented reality, virtual reality, mixed reality, and all immersive technologies.

Emerging Technologies·Extended Reality

Extractive Summarisation

A summarisation technique that identifies and selects the most important sentences from a source document to compose a condensed version without generating new text.

Natural Language Processing·Generation & Translation
F
36

F1 Score

A harmonic mean of precision and recall, providing a single metric that balances both false positives and false negatives.

Artificial Intelligence·Evaluation & Metrics

Facial Recognition

Technology that identifies or verifies individuals by analysing facial features and patterns in images or video.

Computer Vision·Recognition & Detection

Fault-Tolerant Quantum Computing

Quantum computing systems that can continue to operate correctly even in the presence of errors.

Quantum Computing·Fundamentals

Feature Engineering

The process of using domain knowledge to create, select, and transform input variables to improve model performance.

Machine Learning·Feature Engineering & Selection

Feature Extraction

The process of identifying and extracting relevant visual features from images for downstream analysis.

Computer Vision·Segmentation & Analysis

Feature Flag

A software development technique allowing features to be enabled or disabled at runtime without deploying new code.

Software Engineering·Development Practices

Feature Importance

A technique for determining which input variables have the most significant impact on model predictions.

Data Science & Analytics·Statistics & Methods

Feature Selection

The process of identifying and selecting the most relevant input variables for a machine learning model.

Machine Learning·MLOps & Production

Feature Store

A centralised repository for storing, managing, and serving machine learning features, ensuring consistency between training and inference environments across an organisation.

Machine Learning·MLOps & Production

Federated Learning

A machine learning approach where models are trained across decentralised devices without sharing raw data, preserving privacy.

Artificial Intelligence·Training & Inference

Few-Shot Learning

A machine learning approach where models learn to perform tasks from only a small number of labelled examples, often achieved through in-context learning in large language models.

Artificial Intelligence·Prompting & Interaction

Few-Shot Prompting

A technique where a language model is given a small number of examples within the prompt to guide its response pattern.

Artificial Intelligence·Prompting & Interaction

Fine-Tuning

The process of taking a pretrained model and further training it on a smaller, task-specific dataset.

Deep Learning·Architectures

Fine-Tuning

The process of adapting a pre-trained model to a specific task by continuing training on a smaller task-specific dataset, transferring learned representations to new domains.

Deep Learning·Language Models

FinOps

A cultural practice combining technology, finance, and business to manage cloud costs through data-driven decision making.

Cloud Computing·Strategy & Economics

Firewall

A network security device that monitors and filters incoming and outgoing network traffic based on security rules.

Cybersecurity·Network Security

Firmware

Permanent software programmed into a hardware device's read-only memory that controls its basic functions.

IoT & Edge Computing·Devices & Sensors

First-Mover Advantage

The competitive advantage gained by being the first company to enter a new market or develop a new product.

Business & Strategy·Corporate Strategy

Fitts's Law

A predictive model of human movement stating that time to reach a target depends on distance and size.

UX & Product Design·Research & Strategy

Flash Attention

An IO-aware attention algorithm that reduces memory reads and writes by tiling the attention computation, enabling faster training of long-context transformer models.

Deep Learning·Architectures

Flash Loan

An uncollateralised loan in DeFi that must be borrowed and repaid within a single blockchain transaction.

Blockchain & DLT·DeFi & Finance

Flywheel Effect

A concept where small consistent efforts compound over time to create self-sustaining momentum in business growth.

Business & Strategy·Corporate Strategy

Fog Computing

A distributed computing paradigm extending cloud capabilities to the edge of the network for IoT processing.

IoT & Edge Computing·Edge Computing

Force Sensing

The capability of a robot to detect and measure physical forces applied to it during interaction with objects.

Robotics & Automation·Industrial Robotics

Fork

A divergence in a blockchain's protocol or chain, creating two separate paths — can be hard (incompatible) or soft (backward-compatible).

Blockchain & DLT·Foundations

Forward Chaining

An inference strategy that starts with known facts and applies rules to derive new conclusions until a goal is reached.

Artificial Intelligence·Reasoning & Planning

Foundation Model

A large AI model trained on broad data that can be adapted to a wide range of downstream tasks.

Emerging Technologies·AI Frontiers

Frame Problem

The challenge in AI of representing the effects of actions without having to explicitly state everything that remains unchanged.

Artificial Intelligence·Foundations & Theory

Full Node

A blockchain node that downloads and validates every block and transaction against the complete set of consensus rules.

Blockchain & DLT·Foundations

Fully Connected Layer

A neural network layer where every neuron is connected to every neuron in the adjacent layers.

Deep Learning·Architectures

Function as a Service

A serverless cloud computing model where individual functions are executed in response to events.

Cloud Computing·Service Models

Function Calling

A mechanism allowing language models to invoke external functions or APIs based on natural language instructions.

Agentic AI·Tools & Integration

Fungible Token

A blockchain token where each unit is identical and interchangeable with any other unit of the same token.

Blockchain & DLT·Tokens & Assets

Funnel Analysis

Tracking and analysing the sequential steps users take toward a desired action to identify drop-off points.

Data Science & Analytics·Applied Analytics

Fusion Energy

Energy produced by fusing light atomic nuclei, potentially providing nearly limitless clean energy.

Emerging Technologies·Next-Gen Computing

Fuzzy Logic

A form of logic that handles approximate reasoning, allowing variables to have degrees of truth rather than strict binary true/false values.

Artificial Intelligence·Reasoning & Planning
G
31

Garbage Collection

Automatic memory management that reclaims memory occupied by objects no longer referenced by the program.

Software Engineering·Paradigms & Patterns

Gas Fee

The transaction fee paid to blockchain network validators for processing and confirming transactions.

Blockchain & DLT·Foundations

Gasless Transaction

A blockchain transaction where the end user does not pay network fees directly, with costs covered by a third party or subsidised through meta-transaction relay services.

Blockchain & DLT·Foundations

Gated Recurrent Unit

A simplified variant of LSTM that combines the forget and input gates into a single update gate.

Deep Learning·Architectures

GDPR

General Data Protection Regulation — EU legislation governing the collection and processing of personal data of EU residents.

Governance, Risk & Compliance·Privacy & Data Protection

Generative Adversarial Network

A framework where two neural networks compete — a generator creates synthetic data while a discriminator evaluates its authenticity.

Deep Learning·Generative Models

Generative AI

AI systems that can create new content including text, images, music, code, and video from learned patterns.

Emerging Technologies·AI Frontiers

Geospatial Analytics

The analysis of geographic and spatial data to discover patterns, relationships, and trends tied to location.

Data Science & Analytics·Visualisation

Git

A distributed version control system for tracking changes in source code during software development.

Software Engineering·Development Practices

GitOps

An operational framework using Git repositories as the single source of truth for declarative infrastructure and applications.

DevOps & Infrastructure·Infrastructure as Code

GloVe

Global Vectors for Word Representation — an unsupervised learning algorithm for obtaining word vector representations from aggregated word co-occurrence statistics.

Natural Language Processing·Semantics & Representation

Go-to-Market Strategy

A plan that specifies how a company will reach target customers and achieve competitive advantage with a new product.

Business & Strategy·Corporate Strategy

Goal-Oriented Agent

An AI agent that formulates and pursues explicit goals, planning actions to achieve desired outcomes.

Agentic AI·Agent Fundamentals

Governance

The system of policies, rules, and processes by which activities are directed, controlled, and managed.

Governance, Risk & Compliance·Governance

Governance Token

A cryptocurrency token that grants holders voting rights on protocol decisions and changes.

Blockchain & DLT·Governance & DAOs

GPT

Generative Pre-trained Transformer — a family of autoregressive language models that generate text by predicting the next token.

Natural Language Processing·Semantics & Representation

GPU Cloud Computing

Cloud infrastructure providing on-demand access to graphics processing units optimised for AI training and inference, enabling organisations to scale compute without capital investment.

Cloud Computing·Service Models

Graceful Degradation

A design approach where a system continues to operate with reduced functionality when components fail.

DevOps & Infrastructure·CI/CD

Gradient Boosting

An ensemble technique that builds models sequentially, with each new model correcting residual errors of the combined ensemble.

Machine Learning·Supervised Learning

Gradient Checkpointing

A memory optimisation that trades computation for memory by recomputing intermediate activations during the backward pass instead of storing them all during the forward pass.

Deep Learning·Architectures

Gradient Clipping

A technique that caps gradient values during training to prevent the exploding gradient problem.

Deep Learning·Training & Optimisation

Gradient Descent

An optimisation algorithm that iteratively adjusts parameters in the direction of steepest descent of the loss function.

Machine Learning·Training Techniques

Grafana

An open-source analytics and visualisation platform for monitoring metrics from multiple data sources.

DevOps & Infrastructure·Observability

Graph Analytics

Analysing relationships and connections between entities represented as nodes and edges in a graph structure.

Data Science & Analytics·Applied Analytics

Graph Neural Network

A neural network designed to operate on graph-structured data, learning representations of nodes, edges, and entire graphs.

Deep Learning·Architectures

Graphene

A single layer of carbon atoms arranged in a hexagonal lattice with extraordinary electrical, thermal, and mechanical properties.

Emerging Technologies·Sustainability Tech

GraphQL

A query language for APIs that lets clients request exactly the data they need in a single request.

Cloud Computing·Architecture Patterns

Green Cloud Computing

Cloud computing practices that minimise environmental impact through renewable energy usage, efficient cooling, workload consolidation, and carbon-aware scheduling of compute tasks.

Cloud Computing·Service Models

Grounding

Connecting language model outputs to real-world knowledge, facts, or data sources to improve factual accuracy.

Natural Language Processing·Semantics & Representation

Grover's Algorithm

A quantum search algorithm that provides quadratic speedup for searching unsorted databases.

Quantum Computing·Algorithms

gRPC

A high-performance remote procedure call framework developed by Google using Protocol Buffers for serialisation.

Cloud Computing·Architecture Patterns
H
30

Hallucination Detection

Techniques for identifying when AI language models generate plausible but factually incorrect or unsupported content.

Natural Language Processing·Semantics & Representation

Haptic Feedback

Technology that creates touch-based sensations, allowing users to feel virtual objects or robot interactions.

Robotics & Automation·Humanoid & Social

Hard Fork

A radical change to a blockchain's protocol that makes previously invalid blocks or transactions valid, requiring all nodes to upgrade.

Blockchain & DLT·Foundations

Hash Function

A mathematical function that converts input data of any size into a fixed-size output, used extensively in blockchain security.

Blockchain & DLT·Foundations

Headless Commerce

An e-commerce architecture that decouples the front-end presentation layer from back-end commerce logic through APIs, enabling flexible omnichannel customer experiences.

Enterprise Systems & ERP·Core ERP

Health Check

An automated test that verifies a service or system component is functioning correctly.

DevOps & Infrastructure·CI/CD

Helm

A package manager for Kubernetes that simplifies the deployment and management of applications using charts.

DevOps & Infrastructure·Containers & Orchestration

Heuristic Evaluation

A usability inspection method where evaluators examine an interface against established design principles.

UX & Product Design·Testing & Analytics

Heuristic Search

Problem-solving techniques that use practical rules of thumb to find satisfactory solutions when exhaustive search is impractical.

Artificial Intelligence·Reasoning & Planning

Hierarchical Clustering

A clustering method that builds a tree-like hierarchy of clusters through successive merging or splitting of groups.

Machine Learning·Unsupervised Learning

High Availability

A system design approach that ensures a certain degree of operational continuity during a given measurement period.

DevOps & Infrastructure·Site Reliability

Homomorphic Encryption

An encryption method allowing computations on encrypted data without decrypting it first.

Emerging Technologies·Next-Gen Computing

Honeypot

A decoy system designed to attract attackers and study their methods while protecting real systems.

Cybersecurity·Defensive Security

Horizontal Scaling

Adding more machines or nodes to a system to handle increased load.

DevOps & Infrastructure·CI/CD

Hot Wallet

A cryptocurrency wallet connected to the internet for convenient but less secure asset management.

Blockchain & DLT·Foundations

HTTP

Hypertext Transfer Protocol — the application-layer protocol for transmitting hypermedia documents on the World Wide Web.

Networking & Communications·Protocols & Standards

HTTPS

HTTP Secure — an encrypted version of HTTP using TLS for secure communication over the internet.

Networking & Communications·Protocols & Standards

Human Capital Management

Software and strategies for recruiting, managing, developing, and optimising an organisation's workforce.

Enterprise Systems & ERP·Human Capital

Human-Computer Interaction

The study of how people interact with computers and designing technologies for effective human use.

UX & Product Design·Research & Strategy

Human-in-the-Loop

A system design where human oversight and approval are required at critical decision points in automated processes.

Agentic AI·Safety & Governance

Human-on-the-Loop

A system where humans monitor AI operations and can intervene when necessary, but don't approve every action.

Agentic AI·Agent Fundamentals

Humanoid Robot

A robot designed to resemble the human body in shape and movement capabilities.

Robotics & Automation·Humanoid & Social

Hybrid Cloud

An IT architecture combining on-premises infrastructure with public and private cloud services.

Cloud Computing·Strategy & Economics

Hybrid Quantum-Classical Computing

Computing architectures that combine quantum processors with classical computers to leverage the strengths of both.

Quantum Computing·Fundamentals

Hydrogen Economy

An economic system where hydrogen serves as the primary energy carrier for power generation and transportation.

Emerging Technologies·Bio & Materials

Hyperautomation

An approach combining multiple automation technologies (RPA, AI, ML, process mining) to automate as many processes as possible.

Enterprise Systems & ERP·Process Automation

Hyperledger

An open-source collaborative project hosting enterprise-grade blockchain frameworks and tools.

Blockchain & DLT·Foundations

Hyperparameter Tuning

The process of optimising the external configuration settings of a machine learning model that are not learned during training.

Artificial Intelligence·Training & Inference

Hypervisor

Software that creates and manages virtual machines, allowing multiple operating systems to share a single hardware host.

Cloud Computing·Infrastructure

Hypothesis Testing

A statistical method for making decisions about population parameters based on sample data evidence.

Data Science & Analytics·Statistics & Methods
I
55

Idempotency

The property where an operation produces the same result regardless of how many times it is executed.

Software Engineering·Architecture

Identity and Access Management

A framework for managing digital identities and controlling user access to resources and systems.

Cloud Computing·Strategy & Economics

Identity Threat Detection and Response

Security solutions focused on detecting and responding to identity-based attacks such as credential theft, privilege escalation, and compromised service accounts.

Cybersecurity·Identity & Access

Image Augmentation

Applying transformations like rotation, flipping, and colour adjustment to training images to improve model robustness.

Computer Vision·Recognition & Detection

Image Captioning

Automatically generating natural language descriptions of the content depicted in images.

Computer Vision·Recognition & Detection

Image Classification

The task of assigning a label or category to an entire image based on its visual content.

Computer Vision·Recognition & Detection

Image Generation

Creating new images from scratch using generative AI models like GANs, diffusion models, or VAEs.

Computer Vision·Generation & Enhancement

Image Registration

The process of aligning two or more images of the same scene taken at different times, viewpoints, or by different sensors.

Computer Vision·Recognition & Detection

Image Segmentation

Partitioning an image into multiple segments or regions, assigning each pixel to a specific class or object.

Computer Vision·Segmentation & Analysis

Immutability

The property of blockchain data that prevents alteration or deletion once recorded on the ledger.

Blockchain & DLT·Foundations

Immutable Infrastructure

An approach where infrastructure components are never modified after deployment but replaced entirely with updated versions.

DevOps & Infrastructure·Infrastructure as Code

In-Context Learning

The ability of large language models to learn new tasks from examples provided within the input prompt without parameter updates.

Artificial Intelligence·Prompting & Interaction

Incident Management

The processes and tools for detecting, responding to, resolving, and learning from service disruptions.

DevOps & Infrastructure·Site Reliability

Incident Reporting

The formal process of documenting and communicating security incidents, breaches, or compliance violations.

Governance, Risk & Compliance·Compliance & Regulation

Incident Response Plan

A documented set of procedures for detecting, responding to, and recovering from cybersecurity incidents.

Cybersecurity·Defensive Security

Industrial IoT

The application of IoT technology in industrial settings for monitoring, automation, and optimisation of operations.

IoT & Edge Computing·Applications

Industrial Robot

A programmable mechanical device used in manufacturing for tasks like welding, painting, assembly, and material handling.

Robotics & Automation·Industrial Robotics

Industry 4.0

The fourth industrial revolution characterised by smart automation, IoT, cloud computing, and AI in manufacturing.

IoT & Edge Computing·Devices & Sensors

Industry 5.0

The next evolution of industrial production that emphasises human-machine collaboration, sustainability, and resilience, moving beyond the automation focus of Industry 4.0.

Digital Transformation·Process Transformation

Inference Engine

The component of an AI system that applies logical rules to a knowledge base to derive new information or make decisions.

Artificial Intelligence·Infrastructure & Operations

Information Architecture

The structural design of shared information environments, organising content for findability and usability.

UX & Product Design·Research & Strategy

Information Classification

The process of categorising data based on its sensitivity level and the impact of unauthorised disclosure.

Governance, Risk & Compliance·Governance

Information Extraction

The process of automatically extracting structured information from unstructured or semi-structured text sources.

Natural Language Processing·Parsing & Structure

Information Governance

The overarching strategy for managing an organisation's information assets, balancing the need for data availability with security, privacy, compliance, and lifecycle management.

Governance, Risk & Compliance·Governance

Information Security

The practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.

Cybersecurity·Security Governance

Infrastructure as a Service

Cloud computing model providing virtualised computing resources like servers, storage, and networking over the internet.

Cloud Computing·Service Models

Infrastructure as Code

Managing and provisioning computing infrastructure through machine-readable configuration files rather than manual processes.

Cloud Computing·Deployment & Operations

Innovation Management

The systematic process of managing an organisation's innovation procedure from ideation to implementation.

Business & Strategy·Innovation & Ventures

Instance Segmentation

Detecting and delineating each distinct object instance in an image at the pixel level.

Computer Vision·Segmentation & Analysis

Instruction Following

The capability of language models to accurately interpret and execute natural language instructions, a core skill developed through instruction tuning and alignment training.

Natural Language Processing·Semantics & Representation

Instruction Tuning

Training a language model to follow natural language instructions by fine-tuning on instruction-response pairs.

Natural Language Processing·Semantics & Representation

Integration Testing

Testing the interaction between different software modules or components to verify they work together correctly.

Software Engineering·Quality & Testing

Intelligent Automation

The combination of RPA with AI capabilities like machine learning and NLP to automate complex cognitive tasks.

Enterprise Systems & ERP·Process Automation

Intelligent Automation ROI

The measurement framework for evaluating the financial returns of AI and automation investments, considering cost savings, productivity gains, error reduction, and revenue impact.

Business & Strategy·AI Strategy

Intelligent Enterprise

An organisation that applies advanced technologies like AI and analytics to automate processes and enhance decision-making.

Digital Transformation·Data-Driven Organisation

Intelligent Process Automation

The combination of robotic process automation with artificial intelligence capabilities such as natural language processing and machine learning to automate complex business processes.

Enterprise Systems & ERP·Process Automation

Intent Detection

The classification of user utterances into predefined categories representing the user's goal or purpose, a fundamental component of conversational AI and chatbot systems.

Natural Language Processing·Generation & Translation

Intent-Based Transactions

A blockchain interaction model where users specify desired outcomes rather than exact execution steps, with solvers competing to fulfil the intent optimally.

Blockchain & DLT·Foundations

Internal Audit

An independent assurance function that evaluates the effectiveness of an organisation's internal controls and governance.

Governance, Risk & Compliance·Governance

Internal Developer Portal

A centralised web interface that provides developers with self-service access to infrastructure, services, documentation, and templates within their organisation.

Cloud Computing·Deployment & Operations

Internet of Things

The network of physical devices embedded with sensors, software, and connectivity that exchange data over the internet.

IoT & Edge Computing·Devices & Sensors

Interoperability

The ability of different blockchain networks to communicate, share data, and transfer value between each other.

Blockchain & DLT·Protocols & Networks

Intrapreneurship

The practice of entrepreneurial behaviour within an established organisation to drive innovation.

Business & Strategy·Innovation & Ventures

Intrusion Detection System

A system that monitors network traffic or system activities for malicious activity or policy violations.

Cybersecurity·Defensive Security

Intrusion Prevention System

A network security technology that examines network traffic to detect and prevent vulnerability exploits.

Cybersecurity·Offensive Security

Inverse Kinematics

Computing the joint parameters needed to place a robot's end effector at a desired position and orientation.

Robotics & Automation·Industrial Robotics

IoT Gateway

A device that connects IoT sensors and devices to cloud platforms, handling protocol translation and data filtering.

IoT & Edge Computing·Platforms & Protocols

IoT Platform

A middleware solution connecting IoT devices with applications, providing device management, data processing, and integration.

IoT & Edge Computing·Platforms & Protocols

IoT Security

The practices and technologies for protecting IoT devices, networks, and data from unauthorised access and attacks.

IoT & Edge Computing·Devices & Sensors

IP Address

A unique numerical label assigned to each device connected to a computer network for identification and routing.

Networking & Communications·Protocols & Standards

IPFS

InterPlanetary File System — a peer-to-peer distributed file system for storing and sharing data in a decentralised manner.

Blockchain & DLT·Foundations

IPv6

The most recent version of the Internet Protocol, providing a vastly larger address space than IPv4.

Networking & Communications·Protocols & Standards

ISO 27001

An international standard for information security management systems specifying requirements for establishing and maintaining security.

Cybersecurity·Security Governance

ISO/IEC 42001

The international standard for AI management systems that specifies requirements for establishing, implementing, maintaining, and improving AI governance within organisations.

Governance, Risk & Compliance·Governance

IT Modernisation

The process of updating legacy IT systems to modern technologies and architectures for improved performance.

Digital Transformation·Process Transformation
K
11

K-Means Clustering

A partitioning algorithm that divides data into k clusters by minimising the distance between points and their cluster centroids.

Machine Learning·Unsupervised Learning

K-Nearest Neighbours

A simple algorithm that classifies data points based on the majority class of their k closest neighbours in feature space.

Machine Learning·Supervised Learning

Kanban

A visual workflow management method that limits work in progress and optimises the flow of tasks through a system.

Software Engineering·Paradigms & Patterns

Key Performance Indicator

A measurable value that demonstrates how effectively an organisation is achieving key business objectives.

Enterprise Systems & ERP·Core ERP

Key-Value Cache

An optimisation in autoregressive transformer inference that stores previously computed key and value tensors to avoid redundant computation during sequential token generation.

Deep Learning·Architectures

Kinematics

The study of motion without considering forces, used in robotics for calculating joint positions and movements.

Robotics & Automation·Industrial Robotics

Know Your Customer

The process of verifying the identity, suitability, and risks of customers in financial transactions.

Governance, Risk & Compliance·Risk Management

Knowledge Distillation

A model compression technique where a smaller student model learns to mimic the behaviour of a larger teacher model.

Deep Learning·Architectures

Knowledge Graph

A structured representation of real-world entities and the relationships between them, used by AI for reasoning and inference.

Artificial Intelligence·Infrastructure & Operations

Knowledge Representation

The field of AI dedicated to representing information about the world in a form that computer systems can use for reasoning.

Artificial Intelligence·Foundations & Theory

Kubernetes

An open-source container orchestration platform for automating deployment, scaling, and management of containerised applications.

Cloud Computing·Infrastructure
L
31

Label Noise

Errors or inconsistencies in the annotations of training data that can degrade model performance and lead to unreliable predictions if not properly addressed.

Machine Learning·Feature Engineering & Selection

Land and Expand

A sales strategy where a vendor establishes an initial foothold with a small deployment and systematically grows the account through demonstrated value and expanded use cases.

Business & Strategy·Growth & Revenue

Language Model

A probabilistic model that assigns probabilities to sequences of words, enabling prediction of the next word in a sequence.

Natural Language Processing·Semantics & Representation

Large Language Model

A neural network trained on massive text corpora that can generate, understand, and reason about natural language.

Natural Language Processing·Semantics & Representation

Lasso Regression

A regularised regression technique that adds an L1 penalty, enabling feature selection by driving some coefficients to zero.

Machine Learning·Feature Engineering & Selection

Latent Dirichlet Allocation

A generative probabilistic model for discovering topics in a collection of documents.

Natural Language Processing·Core NLP

Layer 1

The base blockchain protocol layer that handles consensus, data availability, and transaction settlement.

Blockchain & DLT·Foundations

Layer 2

Scaling solutions built on top of a base blockchain that process transactions off-chain while inheriting security from the main chain.

Blockchain & DLT·Foundations

Layer 2 Scaling

Solutions built on top of a base blockchain that process transactions off the main chain to improve throughput and reduce fees while inheriting the security of the underlying network.

Blockchain & DLT·Foundations

Layer Normalisation

A normalisation technique that normalises across the features of each individual sample rather than across the batch.

Deep Learning·Training & Optimisation

Lean Methodology

A systematic approach to minimising waste within a system while maximising value delivery to customers.

Digital Transformation·Process Transformation

Learning Rate

A hyperparameter that controls how much model parameters are adjusted with respect to the loss gradient during training.

Machine Learning·Training Techniques

Legacy System

Outdated computing software or hardware that remains in use despite the availability of more modern alternatives.

Enterprise Systems & ERP·Core ERP

LiDAR

Light Detection and Ranging — a remote sensing method using laser light to measure distances and map environments.

Emerging Technologies·Next-Gen Computing

Light Node

A blockchain node that only downloads block headers and relies on full nodes for complete transaction verification.

Blockchain & DLT·Foundations

Lighthouse Project

A high-visibility pilot initiative designed to demonstrate the value of a new technology or approach, building organisational confidence and momentum for broader adoption.

Business & Strategy·Innovation & Ventures

Lights-Out Manufacturing

A fully automated manufacturing process that requires no human presence on the factory floor.

Robotics & Automation·Industrial Robotics

Linear Regression

A statistical method modelling the relationship between a dependent variable and one or more independent variables using a linear equation.

Machine Learning·Supervised Learning

Liquid Staking

A mechanism that allows users to stake cryptocurrency while receiving a liquid derivative token representing their staked position, maintaining capital flexibility during the lock-up period.

Blockchain & DLT·DeFi & Finance

Liquidity Pool

A collection of funds locked in a smart contract that provides liquidity for decentralised trading and lending.

Blockchain & DLT·DeFi & Finance

Load Balancer

A device or software that distributes network traffic across multiple servers to ensure no single server is overwhelmed.

Cloud Computing·Infrastructure

Load Testing

Testing a system's behaviour under expected and peak load conditions to ensure adequate performance.

Software Engineering·Quality & Testing

Lock-In

A situation where a customer is dependent on a vendor for products and services and cannot easily switch.

Business & Strategy·Corporate Strategy

Logging

The practice of recording events, errors, and system activities for debugging, auditing, and analysis.

DevOps & Infrastructure·Observability

Logistic Regression

A classification algorithm that models the probability of a binary outcome using a logistic function.

Machine Learning·Supervised Learning

Long Short-Term Memory

A recurrent neural network architecture designed to learn long-term dependencies by using gating mechanisms to control information flow.

Deep Learning·Architectures

Long-Context Modelling

Techniques and architectures that enable language models to process and reason over extremely long input sequences, from tens of thousands to millions of tokens.

Natural Language Processing·Semantics & Representation

LoRA

Low-Rank Adaptation — a parameter-efficient fine-tuning technique that adds trainable low-rank matrices to frozen pretrained weights.

Deep Learning·Language Models

LoRaWAN

Long Range Wide Area Network — a low-power protocol designed for wirelessly connecting IoT devices over long distances.

IoT & Edge Computing·Platforms & Protocols

Loss Function

A mathematical function that measures the difference between predicted outputs and actual target values during model training.

Machine Learning·Training Techniques

Low-Code Platform

Development platforms that require minimal hand-coding, using visual interfaces and pre-built components to build applications.

Enterprise Systems & ERP·Process Automation
M
67

Machine Learning

A subset of AI that enables systems to automatically learn and improve from experience without being explicitly programmed.

Machine Learning·MLOps & Production

Machine Translation

The use of AI to automatically translate text or speech from one natural language to another.

Natural Language Processing·Generation & Translation

Malware

Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems.

Cybersecurity·Offensive Security

Mamba Architecture

A selective state space model that achieves transformer-level performance with linear-time complexity by incorporating input-dependent selection mechanisms into the recurrence.

Deep Learning·Architectures

Man-in-the-Middle Attack

An attack where the attacker secretly relays and potentially alters communication between two parties.

Cybersecurity·Offensive Security

Managed Service

A cloud service where the provider handles infrastructure management, maintenance, updates, and monitoring.

Cloud Computing·Service Models

Managed Services Model

An outsourcing arrangement where a service provider assumes responsibility for the ongoing management, operation, and optimisation of defined business or technology functions.

Business & Strategy·Operations & Models

Market Basket Analysis

A data mining technique discovering associations between items frequently purchased together.

Data Science & Analytics·Statistics & Methods

Market Segmentation

Dividing a market into distinct groups of consumers with similar needs, characteristics, or behaviours.

Business & Strategy·Growth & Revenue

Markov Decision Process

A mathematical framework for modelling sequential decision-making where outcomes are partly random and partly controlled.

Machine Learning·Reinforcement Learning

Master Data Management

The processes, governance, policies, and technologies for ensuring the uniformity, accuracy, and accountability of master data.

Enterprise Systems & ERP·Business Intelligence

Matrix Factorisation

A technique that decomposes a matrix into constituent matrices, widely used in recommendation systems and dimensionality reduction.

Machine Learning·Unsupervised Learning

Maximal Extractable Value

The maximum profit that can be extracted from block production by reordering, inserting, or censoring transactions, a fundamental economic phenomenon in blockchain networks.

Blockchain & DLT·Foundations

Mean Time Between Failures

The average time between system failures, measuring reliability and availability.

DevOps & Infrastructure·CI/CD

Mean Time to Recovery

The average time it takes to restore a system to normal operation after a failure or incident.

DevOps & Infrastructure·CI/CD

Medical Imaging AI

Application of computer vision and deep learning to analyse medical images for diagnosis, screening, and treatment planning.

Computer Vision·Recognition & Detection

Memory Leak

A type of resource leak where a program fails to release memory that is no longer needed.

Software Engineering·Paradigms & Patterns

Mergers and Acquisitions

The consolidation of companies through various types of financial transactions including mergers, acquisitions, and takeovers.

Business & Strategy·Corporate Strategy

Merkle Tree

A hash-based data structure that efficiently verifies the integrity and consistency of large sets of data.

Blockchain & DLT·Foundations

Mesh Network

A network topology where each node relays data for the network, providing self-healing and redundant paths.

Networking & Communications·Protocols & Standards

Message Queue

A communication method where messages are stored in a queue until the receiving application can process them.

Cloud Computing·Architecture Patterns

Meta-Learning

Learning to learn — algorithms that improve their learning process by leveraging experience from multiple learning episodes.

Machine Learning·Advanced Methods

Metaverse

A persistent, shared virtual world where users interact through avatars using VR, AR, and other immersive technologies.

Emerging Technologies·Extended Reality

Metrics

Quantitative measurements collected over time to track system performance, health, and business outcomes.

DevOps & Infrastructure·Observability

Micro-Interaction

Small, contained product moments that revolve around a single task, enhancing the user experience.

UX & Product Design·Research & Strategy

Microservices

An architectural style structuring an application as a collection of loosely coupled, independently deployable services.

Cloud Computing·Architecture Patterns

Microsoft Dynamics 365

Microsoft's suite of enterprise resource planning and customer relationship management cloud applications.

Enterprise Systems & ERP·Core ERP

Middleware

Software that bridges operating systems and applications, providing common services and capabilities to applications outside the OS.

Enterprise Systems & ERP·Integration & Middleware

Mini-Batch

A subset of the training data used to compute a gradient update during stochastic gradient descent.

Machine Learning·Training Techniques

Minimum Viable Product

The simplest version of a product that can be released to validate assumptions and gather user feedback.

Digital Transformation·Strategy

Mining

The process of using computational power to validate transactions and add new blocks to a proof-of-work blockchain.

Blockchain & DLT·Foundations

MITRE ATT&CK

A globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.

Cybersecurity·Offensive Security

Mixed Precision Training

Training neural networks using both 16-bit and 32-bit floating-point arithmetic to speed up computation while maintaining accuracy.

Deep Learning·Training & Optimisation

Mixed Reality

Technology blending physical and digital worlds where real and virtual objects co-exist and interact in real time.

Emerging Technologies·Extended Reality

Mixture of Experts

An architecture where different specialised sub-networks (experts) are selectively activated based on the input.

Deep Learning·Architectures

MLOps

The practice of collaboration between data science and operations to automate and manage the machine learning lifecycle.

Data Science & Analytics·Statistics & Methods

Model Calibration

The process of adjusting a model's predicted probabilities so they accurately reflect the true likelihood of outcomes, essential for risk-sensitive decision-making.

Machine Learning·MLOps & Production

Model Collapse

A degradation phenomenon where AI models trained on AI-generated data progressively lose diversity and accuracy, converging toward a narrow distribution of outputs.

Artificial Intelligence·Models & Architecture

Model Distillation

A technique where a smaller, simpler model is trained to replicate the behaviour of a larger, more complex model.

Artificial Intelligence·Models & Architecture

Model Merging

Techniques for combining the weights and capabilities of multiple fine-tuned models into a single model without additional training, creating versatile multi-capability systems.

Artificial Intelligence·Training & Inference

Model Monitoring

Continuous observation of deployed machine learning models to detect performance degradation, data drift, anomalous predictions, and infrastructure issues in production.

Machine Learning·MLOps & Production

Model Parallelism

A distributed training approach that partitions a model across multiple devices, enabling training of models too large to fit in a single accelerator's memory.

Deep Learning·Architectures

Model Pruning

The process of removing redundant or less important parameters from a neural network to reduce its size and computational cost.

Artificial Intelligence·Models & Architecture

Model Quantisation

The process of reducing the numerical precision of a model's weights and activations from floating-point to lower-bit representations, decreasing memory usage and inference latency.

Artificial Intelligence·Models & Architecture

Model Registry

A versioned catalogue of trained machine learning models with metadata, lineage, and approval workflows, enabling reproducible deployment and governance at enterprise scale.

Machine Learning·MLOps & Production

Model Risk Management

The governance framework for identifying, measuring, and mitigating risks arising from AI and analytical models.

Governance, Risk & Compliance·Governance

Model Serialisation

The process of converting a trained model into a format that can be stored, transferred, and later reconstructed for inference.

Machine Learning·MLOps & Production

Model Serving

The infrastructure and processes for deploying trained machine learning models to production environments for real-time predictions.

Machine Learning·MLOps & Production

Model-Based Agent

An AI agent that maintains an internal representation of the world to inform its decision-making process.

Agentic AI·Agent Fundamentals

Modular Blockchain

A blockchain architecture that separates execution, consensus, settlement, and data availability into independent layers, enabling specialisation and improved scalability.

Blockchain & DLT·Foundations

Monitoring

The continuous observation of system performance, availability, and health using automated tools and dashboards.

DevOps & Infrastructure·Observability

Monolithic Architecture

A software architecture where all components are tightly integrated into a single deployable unit.

Cloud Computing·Architecture Patterns

Monorepo

A version control strategy where multiple projects or packages are stored in a single repository.

Software Engineering·Development Practices

Monte Carlo Simulation

A computational technique using repeated random sampling to obtain numerical results for problems with many coupled variables.

Data Science & Analytics·Statistics & Methods

Motion Planning

The process of determining a sequence of valid configurations to move a robot from start to goal.

Robotics & Automation·Software & AI

MQTT

Message Queuing Telemetry Transport — a lightweight messaging protocol designed for IoT devices with limited bandwidth.

IoT & Edge Computing·Platforms & Protocols

mTLS

Mutual Transport Layer Security — a protocol where both client and server authenticate each other using certificates.

Networking & Communications·Protocols & Standards

Multi-Agent System

A system composed of multiple interacting AI agents that collaborate, negotiate, or compete to solve complex problems.

Agentic AI·Multi-Agent Systems

Multi-Cloud

A strategy using services from multiple cloud providers to avoid vendor lock-in and optimise capabilities.

Cloud Computing·Strategy & Economics

Multi-Cloud Strategy

An approach that distributes workloads across multiple cloud providers to avoid vendor lock-in, optimise costs, meet regulatory requirements, and improve resilience.

Cloud Computing·Strategy & Economics

Multi-Factor Authentication

An authentication method requiring two or more verification factors to gain access to a resource.

Cybersecurity·Identity & Access

Multi-Head Attention

An attention mechanism that runs multiple attention operations in parallel, capturing different types of relationships.

Deep Learning·Training & Optimisation

Multi-Signature Wallet

A wallet requiring multiple private key signatures to authorise a transaction, enhancing security.

Blockchain & DLT·Foundations

Multi-Task Learning

A machine learning approach where a model is simultaneously trained on multiple related tasks to improve generalisation.

Machine Learning·MLOps & Production

Multi-Tenancy

A software architecture where a single instance serves multiple customers, with each tenant's data isolated and invisible to others.

Cloud Computing·Strategy & Economics

Multilingual Model

A language model trained on text from dozens or hundreds of languages simultaneously, enabling cross-lingual understanding and generation without language-specific fine-tuning.

Natural Language Processing·Semantics & Representation

Multimodal AI

AI systems capable of processing and generating multiple types of data including text, images, audio, and video.

Emerging Technologies·AI Frontiers
N
34

Naive Bayes

A probabilistic classifier based on applying Bayes' theorem with the assumption of independence between features.

Machine Learning·Supervised Learning

Named Entity Recognition

An NLP task that identifies and classifies named entities in text into categories like person, organisation, and location.

Natural Language Processing·Parsing & Structure

Nanotechnology

The manipulation of matter on an atomic and molecular scale for applications in medicine, electronics, and materials.

Emerging Technologies·Bio & Materials

NAT

Network Address Translation — a method of mapping one IP address space into another by modifying packet headers.

Networking & Communications·Protocols & Standards

Natural Language Analytics

Using NLP techniques to extract insights and sentiment from unstructured text data at scale.

Data Science & Analytics·Statistics & Methods

Natural Language Generation

The subfield of NLP concerned with producing natural language text from structured data or representations.

Natural Language Processing·Core NLP

Natural Language Processing

The field of AI focused on enabling computers to understand, interpret, and generate human language.

Natural Language Processing·Core NLP

Natural Language Querying

The ability for users to ask questions about data in plain language and receive answers, with AI translating natural language into database queries and visualisations.

Data Science & Analytics·Visualisation

Natural Language Understanding

The subfield of NLP focused on machine reading comprehension and extracting meaning from text.

Natural Language Processing·Core NLP

NB-IoT

Narrowband IoT — a cellular technology standard for low-power, wide-area IoT applications.

IoT & Edge Computing·Devices & Sensors

Net Revenue Retention

A metric measuring the percentage of recurring revenue retained from existing customers over a period, including expansion revenue and accounting for churn and contraction.

Business & Strategy·Growth & Revenue

Network Analysis

The study of graphs representing relationships between discrete objects to understand network structure and dynamics.

Data Science & Analytics·Statistics & Methods

Network Automation

Using software to automatically configure, manage, test, deploy, and operate network devices and services.

Networking & Communications·Protocols & Standards

Network Effect

The phenomenon where a product or service becomes more valuable as more people use it.

Business & Strategy·Growth & Revenue

Network Function Virtualisation

Replacing dedicated network hardware with software running on commodity servers.

Networking & Communications·Cloud Networking

Network Latency

The time delay between sending and receiving data across a network, measured in milliseconds.

Networking & Communications·Protocols & Standards

Network Monitoring

The practice of continuously observing a computer network for slow or failing components.

Networking & Communications·Protocols & Standards

Network Orchestration

The automated coordination and management of network resources, services, and policies across infrastructure.

Networking & Communications·Protocols & Standards

Network Resilience

The ability of a network to maintain acceptable service levels despite faults, challenges, and threats.

Networking & Communications·Protocols & Standards

Network Segmentation

Dividing a computer network into smaller subnetworks to improve security and performance.

Networking & Communications·Network Security

Network Topology

The arrangement of elements such as nodes, links, and devices in a computer network.

Networking & Communications·Protocols & Standards

Neural Architecture Search

An automated technique for designing optimal neural network architectures using search algorithms.

Artificial Intelligence·Models & Architecture

Neural Network

A computing system inspired by biological neural networks, consisting of interconnected nodes that process information in layers.

Deep Learning·Architectures

Neural Processing Unit

A specialised processor designed to accelerate neural network computations in edge devices and mobile platforms.

Artificial Intelligence·Models & Architecture

Neural Scaling Laws

Empirical relationships describing how AI model performance improves predictably with increases in model size, training data volume, and computational resources.

Artificial Intelligence·Models & Architecture

Neuromorphic Computing

Computing architectures inspired by the structure and function of biological neural networks.

Emerging Technologies·Next-Gen Computing

Next-Generation Firewall

An advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.

Cybersecurity·Defensive Security

NISQ

Noisy Intermediate-Scale Quantum — the current era of quantum computing with limited, error-prone qubits.

Quantum Computing·Fundamentals

NIST Cybersecurity Framework

A set of voluntary guidelines for managing and reducing cybersecurity risk developed by the US National Institute of Standards.

Cybersecurity·Security Governance

No-Code Platform

Development platforms that enable non-technical users to build applications entirely through visual interfaces without writing code.

Enterprise Systems & ERP·Process Automation

Node

A computer connected to a blockchain network that maintains a copy of the ledger and participates in consensus.

Blockchain & DLT·Foundations

Non-Fungible Token

A unique digital asset on a blockchain that represents ownership of a specific item, artwork, or piece of content.

Blockchain & DLT·Tokens & Assets

North Star Metric

A single metric that best captures the core value a product delivers to customers, guiding company strategy.

Digital Transformation·Strategy

NoSQL Database

A non-relational database designed for specific data models offering flexible schemas for modern applications.

Software Engineering·Paradigms & Patterns
O
26

OAuth

An open standard for token-based authentication and authorisation on the internet.

Cloud Computing·Strategy & Economics

Object Detection

Identifying and locating specific objects within an image by drawing bounding boxes around them.

Computer Vision·Recognition & Detection

Object Storage

A data storage architecture managing data as objects rather than file hierarchies or block addresses.

Cloud Computing·Infrastructure

Object-Relational Mapping

A technique that maps objects in code to relational database tables, abstracting direct SQL interaction.

Software Engineering·Paradigms & Patterns

Observability

The ability to understand a system's internal state from its external outputs, encompassing metrics, logs, and traces.

DevOps & Infrastructure·Observability

OKR

Objectives and Key Results — a goal-setting framework that defines objectives and tracks measurable outcomes.

Digital Transformation·Strategy

OLAP

Online Analytical Processing — a category of software tools enabling analysis of data stored in databases for business intelligence.

Data Science & Analytics·Statistics & Methods

Omnichannel

A multichannel approach providing seamless customer experiences across all touchpoints and communication channels.

Digital Transformation·Customer Experience

On-Chain Governance

A decentralised decision-making process where protocol changes are proposed, debated, and voted on through blockchain-based mechanisms by token holders or validators.

Blockchain & DLT·Foundations

Online Learning

A machine learning method where models are incrementally updated as new data arrives, rather than being trained in batch.

Machine Learning·MLOps & Production

Ontology

A formal representation of knowledge as a set of concepts, categories, and relationships within a specific domain.

Artificial Intelligence·Foundations & Theory

OPC-UA

Open Platform Communications Unified Architecture — a machine-to-machine communication protocol for industrial automation.

IoT & Edge Computing·Devices & Sensors

Open Innovation

A business model where organisations use external ideas and paths to market alongside internal capabilities.

Business & Strategy·Innovation & Ventures

Operating Model

The way an organisation delivers value, encompassing people, processes, technology, and governance structures.

Business & Strategy·Operations & Models

Operating Model Design

The structured approach to defining how an organisation configures its people, processes, technology, and governance to execute strategy and deliver value to customers.

Business & Strategy·Operations & Models

Operational Risk

The risk of loss resulting from inadequate or failed internal processes, people, systems, or external events.

Governance, Risk & Compliance·Risk Management

Optical Character Recognition

Technology that converts images of text into machine-readable text data.

Computer Vision·Recognition & Detection

Optical Flow

The pattern of apparent motion of objects in a visual scene caused by relative movement between an observer and the scene.

Computer Vision·Recognition & Detection

Oracle

A service that provides external real-world data to blockchain smart contracts that cannot access off-chain information directly.

Blockchain & DLT·Smart Contracts & DApps

Oracle ERP Cloud

Oracle's cloud-based enterprise resource planning suite covering financials, procurement, project management, and risk.

Enterprise Systems & ERP·Core ERP

Order Management System

Software that manages the complete order lifecycle from capture through fulfilment and returns across all sales channels, optimising inventory allocation and customer satisfaction.

Enterprise Systems & ERP·Core ERP

OTA Update

Over-the-Air update — remotely delivering software, firmware, or configuration updates to IoT devices wirelessly.

IoT & Edge Computing·Devices & Sensors

Outcome-Based Model

A business approach focused on delivering measurable results and outcomes rather than outputs or activities.

Digital Transformation·Strategy

Outcome-Driven Innovation

An innovation methodology that identifies unmet customer needs by studying the outcomes customers are trying to achieve, rather than asking customers what solutions they want.

Digital Transformation·Strategy

Outlier Detection

Identifying data points that differ significantly from other observations in a dataset.

Data Science & Analytics·Statistics & Methods

Overfitting

When a model learns the training data too well, including noise, resulting in poor performance on unseen data.

Machine Learning·Training Techniques
P
69

Package Manager

A tool that automates the process of installing, upgrading, configuring, and removing software packages.

Software Engineering·Paradigms & Patterns

Packet Sniffing

The process of capturing and analysing data packets travelling across a network for monitoring or troubleshooting.

Networking & Communications·Protocols & Standards

Panoptic Segmentation

A unified approach combining semantic and instance segmentation to provide complete scene understanding.

Computer Vision·Segmentation & Analysis

Parallelism

The simultaneous execution of multiple computations across multiple processors or cores.

Software Engineering·Architecture

Parameter-Efficient Fine-Tuning

Methods for adapting large pretrained models to new tasks by only updating a small fraction of their parameters.

Deep Learning·Language Models

Part-of-Speech Tagging

The process of assigning grammatical categories (noun, verb, adjective) to each word in a text.

Natural Language Processing·Parsing & Structure

Path Planning

The computational problem of finding a route between two points while avoiding obstacles.

Robotics & Automation·Autonomous Systems

Penetration Testing

A simulated cyberattack against a system to evaluate the security of its defences and identify exploitable vulnerabilities.

Cybersecurity·Offensive Security

Performance Testing

Evaluating a system's speed, responsiveness, and stability under various load conditions.

Software Engineering·Quality & Testing

Permissioned Blockchain

A blockchain network where participation is restricted to authorised entities, common in enterprise applications.

Blockchain & DLT·Foundations

Permissionless Blockchain

A blockchain network open to anyone to participate as a node, validator, or user without requiring approval.

Blockchain & DLT·Foundations

Perplexity

A measurement of how well a probability model predicts a sample, commonly used to evaluate language model performance.

Artificial Intelligence·Evaluation & Metrics

Personalisation

Tailoring products, services, and experiences to individual users based on their preferences and behaviour data.

Digital Transformation·Customer Experience

Phishing

A social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information.

Cybersecurity·Offensive Security

Phishing-Resistant Authentication

Authentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.

Cybersecurity·Identity & Access

Photonic Computing

Using photons (light particles) instead of electrons for data processing, potentially offering massive speed improvements.

Emerging Technologies·Next-Gen Computing

Photonic Quantum Computing

Quantum computing using photons as qubits, manipulated through optical components.

Quantum Computing·Fundamentals

Pipeline Parallelism

A form of model parallelism that splits neural network layers across devices and pipelines micro-batches through stages, maximising hardware utilisation during training.

Deep Learning·Architectures

Plan-and-Execute Pattern

An agentic architecture where a planning module decomposes goals into ordered tasks and a separate executor carries them out, enabling complex multi-step problem solving.

Agentic AI·Agent Reasoning & Planning

Planning Algorithm

An AI algorithm that generates a sequence of actions to achieve a specified goal from an initial state.

Artificial Intelligence·Reasoning & Planning

Platform as a Service

Cloud computing model that provides a platform for developers to build, deploy, and manage applications without managing infrastructure.

Cloud Computing·Service Models

Platform Business Model

A business model that creates value by facilitating exchanges between two or more interdependent groups, leveraging network effects and data to scale efficiently.

Business & Strategy·Operations & Models

Platform Economy

An economic model where value is created through facilitating exchanges between producers and consumers via digital platforms.

Digital Transformation·Technology Modernisation

Platform Engineering

The practice of building and maintaining internal developer platforms that provide self-service capabilities, standardised tooling, and golden paths for software delivery teams.

Cloud Computing·Deployment & Operations

Platform Strategy

A business approach centred on creating value by facilitating interactions between multiple user groups.

Business & Strategy·Operations & Models

Playbook

A comprehensive guide containing strategies, procedures, and best practices for managing specific operational scenarios.

DevOps & Infrastructure·CI/CD

PLC

Programmable Logic Controller — an industrial digital computer adapted for controlling manufacturing processes and machinery.

IoT & Edge Computing·Devices & Sensors

Point Cloud

A set of data points in 3D space, typically generated by LiDAR or depth sensors, representing surface geometry.

Computer Vision·3D & Spatial

Polynomial Regression

A form of regression analysis where the relationship between variables is modelled as an nth degree polynomial.

Machine Learning·Supervised Learning

Pooling Layer

A neural network layer that reduces spatial dimensions by aggregating values, commonly using max or average operations.

Deep Learning·Architectures

Porter's Five Forces

A framework for analysing competitive forces in an industry: rivalry, new entrants, substitutes, buyer power, and supplier power.

Business & Strategy·Corporate Strategy

Pose Estimation

The computer vision task of detecting the position and orientation of a person's body joints in images or video.

Computer Vision·3D & Spatial

Positional Encoding

A technique that injects information about the position of tokens in a sequence into transformer architectures.

Deep Learning·Training & Optimisation

Post-Mortem Analysis

A structured review conducted after an incident to identify root causes and prevent recurrence.

DevOps & Infrastructure·CI/CD

Post-Quantum Cryptography

Cryptographic algorithms designed to be secure against both classical and quantum computer attacks.

Quantum Computing·Applications

Pre-Training

The initial phase of training a deep learning model on a large unlabelled corpus using self-supervised objectives, establishing general-purpose representations for downstream adaptation.

Deep Learning·Language Models

Precision

The ratio of true positive predictions to all positive predictions, measuring accuracy of positive classifications.

Artificial Intelligence·Evaluation & Metrics

Predictive Analytics

Using historical data, statistical algorithms, and machine learning to forecast future outcomes and trends.

Data Science & Analytics·Applied Analytics

Predictive Maintenance

Using IoT sensor data and analytics to predict when equipment will fail and schedule maintenance proactively.

IoT & Edge Computing·Applications

Prefix Tuning

A parameter-efficient method that prepends trainable continuous vectors to the input of each transformer layer, guiding model behaviour without altering base parameters.

Deep Learning·Language Models

Prescriptive Analytics

Advanced analytics that recommends specific actions to achieve desired outcomes based on predictive analysis.

Data Science & Analytics·Applied Analytics

Pretraining

Training a model on a large general dataset before fine-tuning it on a specific downstream task.

Deep Learning·Architectures

Principal Component Analysis

A dimensionality reduction technique that transforms data into orthogonal components ordered by the amount of variance they explain.

Machine Learning·Unsupervised Learning

Privacy by Design

An approach to systems engineering that takes privacy into account throughout the entire engineering process.

Governance, Risk & Compliance·Privacy & Data Protection

Privacy-Enhancing Technology

Technologies that protect personal data and privacy while allowing useful data processing and analysis.

Emerging Technologies·Next-Gen Computing

Privacy-Preserving Analytics

Techniques such as differential privacy, federated learning, and secure computation that enable data analysis while protecting individual privacy and complying with regulations.

Data Science & Analytics·Statistics & Methods

Private Cloud

Cloud computing resources used exclusively by a single organisation, either on-premises or hosted by a third party.

Cloud Computing·Service Models

Private Equity

Investment funds that directly invest in private companies or conduct buyouts of public companies.

Business & Strategy·Operations & Models

Privileged Access Management

Security solutions that control and monitor access for users with elevated permissions to critical systems.

Cybersecurity·Identity & Access

Process Mining

Analysing event logs from information systems to discover, monitor, and improve real business processes.

Enterprise Systems & ERP·Process Automation

Product Information Management

A centralised system for managing all product-related data, content, and digital assets needed to market and sell products across multiple channels and markets.

Enterprise Systems & ERP·Core ERP

Product-Led Growth

A business strategy where the product itself drives customer acquisition, expansion, and retention.

Digital Transformation·Strategy

Product-Market Fit

The degree to which a product satisfies strong market demand and meets the needs of its target customers.

Business & Strategy·Growth & Revenue

Programmable Matter

Materials engineered to change their physical properties such as shape, density, or conductivity in response to external stimuli or programmatic instructions.

Emerging Technologies·Bio & Materials

Programmable Money

Digital currency embedded with executable logic that can enforce spending conditions, automate payments, and integrate with smart contracts for conditional financial operations.

Blockchain & DLT·Smart Contracts & DApps

Progressive Disclosure

A design technique that sequences information across screens to reduce complexity and cognitive load.

UX & Product Design·Research & Strategy

Prometheus

An open-source monitoring and alerting toolkit designed for reliability and scalability in cloud-native environments.

DevOps & Infrastructure·Observability

Prompt Engineering

The practice of designing and optimising input prompts to elicit desired outputs from large language models.

Artificial Intelligence·Prompting & Interaction

Prompt Injection

A security vulnerability where malicious inputs manipulate a language model into ignoring its instructions or producing unintended outputs.

Natural Language Processing·Semantics & Representation

Proof of Stake

A consensus mechanism where validators are selected based on the amount of cryptocurrency they hold and stake.

Blockchain & DLT·Foundations

Proof of Work

A consensus mechanism requiring computational effort to validate transactions and create new blocks, used by Bitcoin.

Blockchain & DLT·Foundations

Propensity Modelling

Statistical models that predict the likelihood of a specific customer behaviour such as purchasing, churning, or responding to an offer, guiding targeted business actions.

Data Science & Analytics·Statistics & Methods

Prototype

An early model of a product built to test concepts and validate design decisions before full development.

UX & Product Design·Design & Prototyping

Proxy Server

An intermediary server that forwards requests between clients and other servers, providing security and caching.

Networking & Communications·Infrastructure

Pub/Sub

A messaging pattern where publishers send messages to topics and subscribers receive messages from topics of interest.

Cloud Computing·Architecture Patterns

Public Cloud

Cloud computing resources shared among multiple organisations and available to the general public over the internet.

Cloud Computing·Service Models

Public Key Cryptography

An encryption system using mathematically linked key pairs — a public key for encryption and a private key for decryption.

Blockchain & DLT·Foundations

Puppet

A configuration management tool that automates the provisioning and management of infrastructure.

DevOps & Infrastructure·Infrastructure as Code

Purple Team

A collaborative security approach combining red team attack knowledge with blue team defensive capabilities.

Cybersecurity·Offensive Security
Q
38

Qiskit

IBM's open-source quantum computing framework for creating and running quantum programs.

Quantum Computing·Fundamentals

Quality of Service

Network management techniques that prioritise certain types of traffic to ensure consistent performance.

Networking & Communications·Protocols & Standards

Quantisation

Reducing the precision of neural network weights and activations from floating-point to lower-bit representations for efficiency.

Artificial Intelligence·Evaluation & Metrics

Quantum Advantage

The practical ability of a quantum computer to solve real-world problems faster or better than classical computers.

Quantum Computing·Hardware & Implementation

Quantum Algorithm

An algorithm designed to run on a quantum computer, potentially solving certain problems faster than classical algorithms.

Quantum Computing·Algorithms

Quantum Annealing

A quantum computing approach that finds the lowest energy state of a system, useful for optimisation problems.

Quantum Computing·Algorithms

Quantum Approximate Optimisation Algorithm

A hybrid algorithm designed to solve combinatorial optimisation problems on near-term quantum hardware.

Quantum Computing·Hardware & Implementation

Quantum Chemistry

The application of quantum mechanics and quantum computing to simulate chemical systems and molecular interactions.

Quantum Computing·Applications

Quantum Circuit

A sequence of quantum gates applied to qubits to perform a quantum computation.

Quantum Computing·Fundamentals

Quantum Cloud Computing

Accessing quantum computing resources remotely through cloud-based platforms and APIs.

Quantum Computing·Fundamentals

Quantum Compiler

Software that translates high-level quantum algorithms into sequences of quantum gates executable on specific hardware.

Quantum Computing·Algorithms

Quantum Computing

A computing paradigm that uses quantum mechanical phenomena like superposition and entanglement to process information exponentially faster for certain problems.

Quantum Computing·Fundamentals

Quantum Entanglement

A phenomenon where two or more qubits become correlated such that the quantum state of one instantly influences the other regardless of distance.

Quantum Computing·Fundamentals

Quantum Error Correction

Techniques for protecting quantum information from errors due to decoherence and other quantum noise sources.

Quantum Computing·Fundamentals

Quantum Gate

A basic quantum circuit operation that manipulates one or more qubits, analogous to logic gates in classical computing.

Quantum Computing·Fundamentals

Quantum Interference

The phenomenon where quantum probability amplitudes combine, allowing quantum algorithms to amplify correct answers and cancel wrong ones.

Quantum Computing·Algorithms

Quantum Internet

A proposed network infrastructure that uses quantum signals for ultra-secure communication and distributed quantum computing.

Quantum Computing·Applications

Quantum Key Distribution

A secure communication method using quantum mechanics to generate and distribute encryption keys.

Quantum Computing·Applications

Quantum Machine Learning

The intersection of quantum computing and machine learning, using quantum systems to enhance learning algorithms.

Quantum Computing·Applications

Quantum Neural Network

Neural network architectures designed to run on quantum hardware, potentially offering computational advantages.

Quantum Computing·Hardware & Implementation

Quantum Noise

Random fluctuations in quantum systems that introduce errors and limit the accuracy of quantum computations.

Quantum Computing·Fundamentals

Quantum Operating System

System software designed to manage quantum computing resources, schedule operations, and handle error correction.

Quantum Computing·Fundamentals

Quantum Parallelism

The ability of quantum computers to evaluate multiple computational paths simultaneously through superposition.

Quantum Computing·Fundamentals

Quantum Random Number Generator

A device that generates truly random numbers using quantum mechanical processes.

Quantum Computing·Fundamentals

Quantum Register

A collection of qubits that together store quantum information for processing in a quantum circuit.

Quantum Computing·Fundamentals

Quantum Reservoir Computing

A quantum computing approach that uses the complex dynamics of quantum systems as a computational resource.

Quantum Computing·Fundamentals

Quantum Sensing

Using quantum mechanical effects to achieve measurement sensitivities beyond what classical sensors can achieve.

Quantum Computing·Applications

Quantum Simulation

Using quantum computers to model and simulate quantum systems that are intractable for classical computers.

Quantum Computing·Applications

Quantum Software Development Kit

A programming framework providing tools, libraries, and simulators for developing quantum applications.

Quantum Computing·Software & Frameworks

Quantum Speedup

The factor by which a quantum algorithm outperforms the best known classical algorithm for the same problem.

Quantum Computing·Algorithms

Quantum Supremacy

The demonstration that a quantum computer can solve a problem that no classical computer can solve in a feasible time.

Quantum Computing·Hardware & Implementation

Quantum Teleportation

The transfer of quantum states between qubits using entanglement and classical communication.

Quantum Computing·Fundamentals

Quantum Tunnelling

A quantum phenomenon where particles pass through energy barriers that would be impossible to overcome classically.

Quantum Computing·Fundamentals

Quantum Volume

A metric for measuring the overall capability and error rates of a quantum computer.

Quantum Computing·Fundamentals

Quantum Walk

The quantum mechanical analogue of a classical random walk, used as a building block for quantum algorithms.

Quantum Computing·Algorithms

Qubit

The fundamental unit of quantum information, capable of existing in a superposition of both 0 and 1 states simultaneously.

Quantum Computing·Fundamentals

Question Answering

An NLP task where a system automatically answers questions posed in natural language based on given context.

Natural Language Processing·Generation & Translation

Queue System

A data structure and infrastructure for managing asynchronous task processing and inter-service communication.

Software Engineering·Paradigms & Patterns
R
59

Random Forest

An ensemble learning method that constructs multiple decision trees during training and outputs the mode of their predictions.

Machine Learning·Supervised Learning

Ransomware

Malicious software that encrypts a victim's files and demands payment for the decryption key.

Cybersecurity·Offensive Security

Rate Limiting

A technique for controlling the number of requests a client can make to an API within a specified time period.

Software Engineering·Architecture

ReAct Agent Pattern

An agent architecture that interleaves reasoning traces and action steps, enabling language models to plan dynamically and use external tools to solve multi-step problems.

Agentic AI·Agent Fundamentals

ReAct Framework

Reasoning and Acting — a framework where language model agents alternate between reasoning traces and action execution.

Agentic AI·Agent Reasoning & Planning

Reactive Agent

An AI agent that responds to environmental stimuli with predefined actions without maintaining an internal model of the world.

Agentic AI·Agent Fundamentals

Real-Time Analytics

The discipline of analysing data as soon as it becomes available to support immediate decision-making.

Data Science & Analytics·Applied Analytics

Real-World Assets

Physical or traditional financial assets such as real estate, commodities, and securities that are represented as digital tokens on a blockchain for improved liquidity and accessibility.

Blockchain & DLT·Tokens & Assets

Recall

The ratio of true positive predictions to all actual positive instances, measuring completeness of positive identification.

Artificial Intelligence·Evaluation & Metrics

Recurrent Neural Network

A neural network architecture where connections between nodes form directed cycles, enabling processing of sequential data.

Deep Learning·Architectures

Red Team

A group of security professionals who simulate real-world attacks to test an organisation's defensive capabilities.

Cybersecurity·Offensive Security

Refactoring

Restructuring existing code without changing its external behaviour to improve readability and maintainability.

Software Engineering·Development Practices

Region

A geographic area containing one or more data centres where cloud services are hosted.

Cloud Computing·Infrastructure

Regression Analysis

A set of statistical processes for estimating the relationships between dependent and independent variables.

Data Science & Analytics·Statistics & Methods

Regularisation

Techniques that add constraints or penalties to a model to prevent overfitting and improve generalisation to new data.

Machine Learning·Training Techniques

Regulatory Sandbox

A controlled environment where businesses can test innovative products and services under regulatory oversight.

Governance, Risk & Compliance·Compliance & Regulation

Regulatory Technology

Technology solutions designed to help companies comply with regulations efficiently and cost-effectively.

Governance, Risk & Compliance·Compliance & Regulation

Reinforcement Learning

A machine learning paradigm where agents learn optimal behaviour through trial and error, receiving rewards or penalties.

Machine Learning·MLOps & Production

Reinforcement Learning from Human Feedback

A training paradigm where AI models are refined using human preference signals, aligning model outputs with human values and quality expectations through reward modelling.

Artificial Intelligence·Training & Inference

Relation Extraction

Identifying semantic relationships between entities mentioned in text.

Natural Language Processing·Parsing & Structure

Relational Database

A database structured to recognise relations among stored items, organised in tables with rows and columns.

Software Engineering·Paradigms & Patterns

ReLU

Rectified Linear Unit — an activation function that outputs the input directly if positive, otherwise outputs zero.

Deep Learning·Training & Optimisation

Representation Learning

The automatic discovery of data representations needed for feature detection or classification from raw data.

Deep Learning·Architectures

Reranking

A two-stage retrieval process where an initial set of candidate documents is rescored by a more powerful model to improve the relevance ordering of search results.

Natural Language Processing·Core NLP

Research Agent

An AI agent that autonomously gathers, synthesises, and analyses information from multiple sources to produce comprehensive research reports on specified topics.

Agentic AI·Agent Fundamentals

Reserved Instance

A cloud pricing model where users commit to a specific resource configuration for a term in exchange for discounted rates.

Cloud Computing·Strategy & Economics

Residual Connection

A skip connection that adds a layer's input directly to its output, enabling gradient flow through deep networks and allowing training of architectures with hundreds of layers.

Deep Learning·Training & Optimisation

Residual Network

A deep neural network architecture using skip connections that allow gradients to flow directly through layers, enabling very deep networks.

Deep Learning·Training & Optimisation

Responsible AI

The practice of designing, developing, and deploying AI systems with good intention and ethical principles.

Governance, Risk & Compliance·Governance

Responsible AI Governance

The organisational framework of policies, roles, processes, and oversight mechanisms that ensure AI systems are developed and deployed ethically, safely, and in compliance with regulations.

Business & Strategy·AI Strategy

Responsible Disclosure

A security vulnerability reporting practice where researchers privately notify affected organisations and allow reasonable time for remediation before public disclosure of the vulnerability.

Governance, Risk & Compliance·Security Governance

Responsible Innovation

An approach to innovation that anticipates and addresses ethical, social, and environmental implications proactively.

Emerging Technologies·Next-Gen Computing

Responsive Design

A web design approach where layouts adapt to different screen sizes and devices automatically.

UX & Product Design·Design & Prototyping

REST API

An API architectural style using HTTP methods and stateless communication for web service interaction.

Cloud Computing·Architecture Patterns

Restaking

The practice of using already-staked cryptocurrency to simultaneously secure additional protocols or services, extending the economic security of one network to others.

Blockchain & DLT·DeFi & Finance

Retrieval-Augmented Generation

A technique combining information retrieval with text generation, allowing AI to access external knowledge before generating responses.

Artificial Intelligence·Infrastructure & Operations

Return on Investment

A performance measure used to evaluate the profitability of an investment relative to its cost.

Enterprise Systems & ERP·Core ERP

Revenue Model

The strategy a company uses to generate income from its products or services.

Business & Strategy·Growth & Revenue

Revenue Operations

The strategic integration of sales, marketing, and customer success operations through shared processes, technology, and data to drive predictable revenue growth.

Enterprise Systems & ERP·Integration & Middleware

Reverse ETL

The process of moving transformed data from a central warehouse back into operational tools such as CRM, marketing platforms, and customer support systems to activate insights.

Data Science & Analytics·Data Engineering

Reverse Proxy

A server that sits in front of web servers and forwards client requests to the appropriate backend server.

Networking & Communications·Infrastructure

Ridge Regression

A regularised regression technique that adds an L2 penalty term to prevent overfitting by constraining coefficient magnitudes.

Machine Learning·Training Techniques

Right to be Forgotten

A legal concept giving individuals the right to request deletion of their personal data from organisations' records.

Governance, Risk & Compliance·Governance

Risk Assessment

The systematic process of evaluating potential risks in an organisation's operations, projects, or investments.

Governance, Risk & Compliance·Risk Management

Risk Management

The process of identifying, assessing, and controlling threats to an organisation's capital and operations.

Governance, Risk & Compliance·Risk Management

RLHF

Reinforcement Learning from Human Feedback — a technique for aligning language models with human preferences through reward modelling.

Natural Language Processing·Semantics & Representation

Robot Operating System

An open-source framework providing tools and libraries for robot software development.

Robotics & Automation·Software & AI

Robotic Process Automation

Software robots that automate repetitive, rule-based digital tasks by mimicking human interactions with software interfaces.

Enterprise Systems & ERP·Process Automation

Robotic Process Mining

Combining process mining with robotic process automation to discover and automate business processes.

Robotics & Automation·Software & AI

Robotic Vision

The use of cameras and computer vision algorithms to give robots the ability to see and interpret their environment.

Robotics & Automation·Software & AI

Robotics

The interdisciplinary field involving design, construction, operation, and use of robots for automating tasks.

Robotics & Automation·Industrial Robotics

ROC Curve

A graphical plot illustrating the diagnostic ability of a binary classifier as its discrimination threshold is varied.

Artificial Intelligence·Evaluation & Metrics

Rollback

The process of reverting a system to a previous version or state after a failed deployment or update.

DevOps & Infrastructure·CI/CD

Rolling Update

A deployment strategy that gradually replaces instances of the previous version with the new version.

DevOps & Infrastructure·CI/CD

Rollup

A Layer 2 scaling solution that executes transactions off-chain and posts compressed transaction data to the main chain.

Blockchain & DLT·Protocols & Networks

Rotary Positional Encoding

A position encoding method that encodes absolute position with a rotation matrix and naturally incorporates relative position information into attention computations.

Deep Learning·Training & Optimisation

Routing Protocol

A protocol that determines the optimal path for data packets to travel across interconnected networks.

Networking & Communications·Protocols & Standards

Runbook

A documented set of procedures for handling routine operations and troubleshooting common issues.

DevOps & Infrastructure·Site Reliability

Runtime Application Self-Protection

Security technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.

Cybersecurity·Offensive Security
S
119

Safety-Rated Monitoring

Systems that monitor robot speed, position, and force to ensure safe operation near humans.

Robotics & Automation·Industrial Robotics

Sanctions Screening

The process of checking individuals and entities against government-issued lists of sanctioned parties.

Governance, Risk & Compliance·Compliance & Regulation

Sandbox

An isolated testing environment that mimics production settings for safely running untrusted programs or code.

Cybersecurity·Offensive Security

SAP

A leading enterprise software company providing ERP, supply chain, HR, and business intelligence solutions for large organisations.

Enterprise Systems & ERP·Business Intelligence

Satellite Internet

Internet connectivity provided by networks of satellites orbiting Earth, serving remote and underserved areas.

Emerging Technologies·Next-Gen Computing

SCADA

Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely.

IoT & Edge Computing·Devices & Sensors

Scaled Agile Framework

A set of organisation and workflow patterns for implementing agile practices at enterprise scale.

Digital Transformation·Process Transformation

Scenario Planning

A strategic planning method creating multiple plausible future scenarios to improve decision-making resilience.

Business & Strategy·Corporate Strategy

Scrum

An agile framework using fixed-length iterations called sprints for incremental product delivery with defined roles and ceremonies.

Software Engineering·Paradigms & Patterns

SD-WAN

Software-Defined Wide Area Network — a virtualised network architecture that enables centralised management of geographically distributed networks.

Networking & Communications·Infrastructure

Secret Management

The practice of securely storing, accessing, and managing sensitive credentials, API keys, and certificates.

DevOps & Infrastructure·CI/CD

Secrets Management

The secure storage, distribution, rotation, and auditing of sensitive credentials such as API keys, tokens, passwords, and certificates used by applications and services.

Cybersecurity·Identity & Access

Secure Access Service Edge

A cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.

Cybersecurity·Network Security

Secure Multi-Party Computation

A cryptographic method enabling multiple parties to jointly compute a function without revealing their individual inputs.

Emerging Technologies·Next-Gen Computing

Security Audit

A systematic evaluation of an organisation's information system security by measuring compliance with established criteria.

Cybersecurity·Security Governance

Security by Design

An approach that integrates security considerations into every stage of the software development lifecycle.

Cybersecurity·Security Governance

Security Information and Event Management

Technology that aggregates and analyses security data from across an organisation to detect threats.

Cybersecurity·Offensive Security

Security Operations Centre

A centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.

Cybersecurity·Defensive Security

Security Orchestration Automation and Response

Technology that automates security operations by orchestrating tools and processes for incident response.

Cybersecurity·Defensive Security

Security Orchestration, Automation and Response

A technology stack that integrates security tools and automates incident response workflows, enabling faster triage, investigation, and remediation of security alerts.

Cybersecurity·Defensive Security

Security Token

A digital asset on a blockchain that represents ownership of a regulated financial instrument such as equity, debt, or revenue share, subject to securities laws.

Blockchain & DLT·Tokens & Assets

Self-Attention

An attention mechanism where each element in a sequence attends to all other elements to compute its representation.

Deep Learning·Training & Optimisation

Self-Service Analytics

Tools and platforms enabling non-technical users to access and analyse data independently.

Data Science & Analytics·Statistics & Methods

Self-Sovereign Identity

A model where individuals own and control their digital identity without relying on centralised authorities.

Emerging Technologies·Next-Gen Computing

Self-Supervised Learning

A learning paradigm where models generate their own supervisory signals from unlabelled data through pretext tasks.

Machine Learning·Advanced Methods

Semantic Layer

An abstraction layer that provides business-friendly definitions and consistent metrics on top of raw data, enabling self-service analytics with standardised terminology.

Data Science & Analytics·Statistics & Methods

Semantic Search

Search technology that understands the meaning and intent behind queries rather than just matching keywords.

Natural Language Processing·Core NLP

Semantic Segmentation

Classifying every pixel in an image into a predefined category without distinguishing between individual object instances.

Computer Vision·Segmentation & Analysis

Semantic Similarity

A measure of how closely the meanings of two text passages align, computed through embedding comparison and used in duplicate detection, search, and recommendation systems.

Natural Language Processing·Semantics & Representation

Semantic Web

An extension of the World Wide Web that enables machines to interpret and process web content through standardised semantic metadata.

Artificial Intelligence·Foundations & Theory

Semi-Supervised Learning

A learning approach that combines a small amount of labelled data with a large amount of unlabelled data during training.

Machine Learning·Advanced Methods

Sensor

A device that detects and measures physical properties like temperature, motion, or light and converts them into data.

IoT & Edge Computing·Devices & Sensors

Sentiment Analysis

The computational study of people's opinions, emotions, and attitudes expressed in text.

Natural Language Processing·Text Analysis

Seq2Seq Model

A neural network architecture that maps an input sequence to an output sequence, used in translation and summarisation.

Natural Language Processing·Core NLP

Serverless Computing

A cloud execution model where the provider dynamically allocates resources, charging only for actual compute time used.

Cloud Computing·Service Models

Serverless Database

A database service that automatically provisions, scales, and manages infrastructure on demand without manual server management.

Cloud Computing·Strategy & Economics

Service Design

The practice of designing and organising business resources to improve experiences for both users and employees.

UX & Product Design·Research & Strategy

Service Discovery

The automatic detection of devices and services on a network, enabling dynamic service-to-service communication.

DevOps & Infrastructure·CI/CD

Service Level Agreement

A commitment between a service provider and client defining the level of service expected during the contract period.

Enterprise Systems & ERP·Core ERP

Service Level Indicator

A quantitative measure of some aspect of the level of service being provided.

DevOps & Infrastructure·CI/CD

Service Level Objective

A target value for a service level indicator that defines acceptable service performance.

DevOps & Infrastructure·CI/CD

Service Mesh

An infrastructure layer handling service-to-service communication in microservices, managing traffic, security, and observability.

Cloud Computing·Architecture Patterns

Service Robot

A robot that performs useful tasks for humans, operating semi or fully autonomously outside of industrial settings.

Robotics & Automation·Humanoid & Social

Service-Oriented Architecture

An architectural pattern where services are provided to components via a network communication protocol.

Enterprise Systems & ERP·Core ERP

SHAP Values

A game-theoretic approach to explaining individual model predictions by computing each feature's marginal contribution, based on Shapley values from cooperative game theory.

Machine Learning·MLOps & Production

Shor's Algorithm

A quantum algorithm for integer factorisation that runs exponentially faster than the best known classical algorithms.

Quantum Computing·Algorithms

Sidechain

A separate blockchain connected to a main chain through a two-way bridge, allowing assets to move between them.

Blockchain & DLT·Protocols & Networks

Sigmoid Function

An activation function that maps input values to a range between 0 and 1, useful for binary classification outputs.

Deep Learning·Training & Optimisation

Simultaneous Localisation and Mapping

A computational technique where a robot builds a map of an unknown environment while tracking its own location.

Robotics & Automation·Industrial Robotics

Single Sign-On

An authentication scheme allowing users to log in once and gain access to multiple related systems.

Cloud Computing·Strategy & Economics

Site Reliability Engineering

A discipline applying software engineering principles to infrastructure and operations to create scalable, reliable systems.

DevOps & Infrastructure·Site Reliability

Skip Connection

A neural network shortcut that allows the output of one layer to bypass intermediate layers and be added to a later layer's output.

Deep Learning·Architectures

Slot Filling

The task of extracting specific parameter values from user utterances to fulfil a detected intent, such as identifying dates, locations, and names in booking requests.

Natural Language Processing·Core NLP

Smart City

An urban area using IoT sensors and technology to collect data and manage resources, services, and infrastructure efficiently.

IoT & Edge Computing·Applications

Smart Contract

Self-executing programs stored on a blockchain that automatically enforce the terms of an agreement when conditions are met.

Blockchain & DLT·Smart Contracts & DApps

Smart Factory

A manufacturing facility using IoT, AI, and automation to create a highly digitised and connected production environment.

IoT & Edge Computing·Applications

Smart Grid

An electrical grid using digital communication and IoT to monitor and manage electricity distribution efficiently.

IoT & Edge Computing·Devices & Sensors

SMOTE

Synthetic Minority Over-sampling Technique — a method for addressing class imbalance by generating synthetic examples of the minority class.

Machine Learning·Feature Engineering & Selection

SOC 2

An auditing framework that evaluates the security, availability, processing integrity, confidentiality, and privacy of service organisations.

Cybersecurity·Security Governance

Soft Fork

A backward-compatible upgrade to a blockchain protocol where old nodes still recognise new blocks as valid.

Blockchain & DLT·Foundations

Soft Robotics

A subfield of robotics dealing with constructing robots from highly compliant materials similar to biological organisms.

Robotics & Automation·Industrial Robotics

Softmax Function

An activation function that converts a vector of numbers into a probability distribution, commonly used in multi-class classification.

Deep Learning·Training & Optimisation

Software as a Service

Cloud computing model that delivers software applications over the internet on a subscription basis.

Cloud Computing·Service Models

Software Bill of Materials

A comprehensive inventory of all software components, libraries, and dependencies used in an application, enabling vulnerability tracking and supply chain risk management.

Cybersecurity·Offensive Security

Software Engineering

The systematic application of engineering principles to the design, development, testing, and maintenance of software.

Software Engineering·Paradigms & Patterns

Software Supply Chain Security

Practices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.

Cybersecurity·Security Governance

Software-Defined Networking

An approach to networking that uses software-based controllers to manage network behaviour centrally.

Networking & Communications·Protocols & Standards

SOLID Principles

Five principles of object-oriented design promoting maintainable, flexible, and understandable code.

Software Engineering·Paradigms & Patterns

Solidity

A programming language designed for writing smart contracts on the Ethereum Virtual Machine.

Blockchain & DLT·Smart Contracts & DApps

Soulbound Token

A non-transferable digital token permanently associated with an individual's blockchain address, used to represent credentials, affiliations, and reputation in a verifiable manner.

Blockchain & DLT·Identity & Privacy

Sovereign Cloud

Cloud infrastructure operated within national boundaries under local jurisdiction, ensuring data sovereignty, regulatory compliance, and protection from foreign government access.

Cloud Computing·Strategy & Economics

Space Technology

Technologies developed for space exploration and utilisation including satellites, launch systems, and space stations.

Emerging Technologies·Next-Gen Computing

Sparse Attention

An attention mechanism that selectively computes relationships between a subset of input tokens rather than all pairs, reducing quadratic complexity in transformer models.

Artificial Intelligence·Models & Architecture

Spatial Computing

Technology that enables digital content to interact with the physical world, understanding 3D space and context.

Emerging Technologies·Extended Reality

Spear Phishing

A targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.

Cybersecurity·Offensive Security

Speculative Decoding

An inference acceleration technique where a small draft model generates candidate token sequences that are verified in parallel by the larger target model.

Artificial Intelligence·Models & Architecture

Speech Recognition

The technology that converts spoken language into text, also known as automatic speech recognition.

Natural Language Processing·Speech & Audio

Speech Synthesis

The artificial production of human speech from text, also known as text-to-speech.

Natural Language Processing·Speech & Audio

Speech-to-Text

The automatic transcription of spoken language into written text using acoustic and language models, foundational to voice assistants and meeting transcription systems.

Natural Language Processing·Speech & Audio

Spot Instance

A cloud computing option that uses spare capacity at significantly reduced prices with the possibility of interruption.

Cloud Computing·Service Models

Spot Instances

Spare cloud computing capacity offered at steep discounts compared to on-demand pricing, available when the provider has excess resources but subject to interruption.

Cloud Computing·Service Models

SQL Injection

A code injection technique that exploits vulnerabilities in database-driven applications through malicious SQL statements.

Cybersecurity·Offensive Security

SSL/TLS

Secure Sockets Layer/Transport Layer Security — cryptographic protocols providing secure communication over a computer network.

Networking & Communications·Protocols & Standards

Stablecoin

A cryptocurrency designed to maintain a stable value by pegging it to a reserve asset like a fiat currency.

Blockchain & DLT·DeFi & Finance

Stakeholder Management

The process of identifying, analysing, and strategically engaging with individuals who have an interest in a project.

Business & Strategy·Operations & Models

Staking

Locking up cryptocurrency holdings to support blockchain network operations and earn rewards.

Blockchain & DLT·Foundations

State Space Model

A sequence modelling architecture based on continuous-time dynamical systems that processes long sequences with linear complexity, offering an alternative to attention-based transformers.

Deep Learning·Architectures

State Space Search

A method of problem-solving that represents all possible states of a system and searches for a path from initial to goal state.

Artificial Intelligence·Reasoning & Planning

Statistical Modelling

The process of applying statistical analysis to a dataset, identifying relationships and patterns within the data.

Data Science & Analytics·Statistics & Methods

Stochastic Gradient Descent

A variant of gradient descent that updates parameters using a randomly selected subset of training data each iteration.

Machine Learning·Training Techniques

Strategic Foresight

A systematic approach to thinking about the future to inform present-day decisions and strategy.

Business & Strategy·Corporate Strategy

Strategy

A plan of action designed to achieve a long-term or overall aim, involving resource allocation and competitive positioning.

Business & Strategy·Corporate Strategy

Streaming Analytics

Processing and analysing continuous data streams in real time to detect patterns and trigger responses.

Data Science & Analytics·Data Engineering

Stress Testing

Testing a system beyond normal operational capacity to determine its breaking point and failure behaviour.

Software Engineering·Paradigms & Patterns

Strong AI

A theoretical form of AI that would have consciousness, self-awareness, and the ability to truly understand rather than simulate understanding.

Artificial Intelligence·Foundations & Theory

Structured Output

The generation of machine-readable formatted responses such as JSON, XML, or code from language models, enabling reliable integration with downstream software systems.

Natural Language Processing·Semantics & Representation

Style Transfer

Applying the visual style of one image to the content of another image using neural networks.

Computer Vision·Generation & Enhancement

Subnet

A logical subdivision of an IP network that improves security and performance by segmenting traffic.

Networking & Communications·Protocols & Standards

Super Resolution

Enhancing the resolution and quality of images beyond their original pixel count using AI techniques.

Computer Vision·Recognition & Detection

Superconducting Qubit

A qubit implementation using superconducting circuits that exhibit quantum behaviour at extremely low temperatures.

Quantum Computing·Hardware & Implementation

Superposition

A quantum mechanical property where a qubit exists in multiple states simultaneously until measured.

Quantum Computing·Fundamentals

Supervised Learning

A machine learning paradigm where models are trained on labelled data, learning to map inputs to known outputs.

Machine Learning·MLOps & Production

Supervisor Agent

An agent that oversees and coordinates the work of other agents, making high-level decisions and resolving conflicts.

Agentic AI·Agent Fundamentals

Supply Chain Attack

A cyberattack targeting the less-secure elements of a supply chain to compromise a primary target.

Cybersecurity·Offensive Security

Supply Chain Blockchain

Using blockchain technology to create transparent, tamper-proof records of product journeys through supply chains.

Blockchain & DLT·Foundations

Supply Chain Management

The coordination and management of all activities involved in sourcing, procurement, conversion, and logistics.

Enterprise Systems & ERP·Core ERP

Support Vector Machine

A supervised learning algorithm that finds the optimal hyperplane to separate different classes in high-dimensional space.

Machine Learning·Supervised Learning

Surgical Robot

A robotic system designed to assist surgeons in performing precise, minimally invasive surgical procedures.

Robotics & Automation·Industrial Robotics

Sustainability Strategy

A plan integrating environmental, social, and economic considerations into core business operations.

Business & Strategy·Operations & Models

Swarm Intelligence

The collective behaviour of decentralised, self-organised systems where simple agents following local rules produce emergent intelligent behaviour at the group level.

Emerging Technologies·Web3 & Decentralisation

Swarm Robotics

A field studying the coordination of multiple robots using decentralised control inspired by collective biological behaviour.

Robotics & Automation·Autonomous Systems

Switching Cost

The costs a consumer incurs when switching from one product, service, or supplier to another.

Business & Strategy·Corporate Strategy

SWOT Analysis

A strategic planning tool evaluating Strengths, Weaknesses, Opportunities, and Threats facing an organisation.

Business & Strategy·Corporate Strategy

Symbolic AI

An approach to AI that uses human-readable symbols and rules to represent problems and derive solutions through logical reasoning.

Artificial Intelligence·Foundations & Theory

Synthetic Biology

Designing and constructing new biological parts, devices, and systems for useful purposes.

Emerging Technologies·Bio & Materials

Synthetic Data

Artificially generated data that mimics the statistical properties of real-world data for training and testing.

Data Science & Analytics·Statistics & Methods

Synthetic Data for Analytics

Artificially generated datasets that preserve the statistical properties of real data while protecting privacy, used for testing, development, and sharing across organisational boundaries.

Data Science & Analytics·Statistics & Methods

Synthetic Data Generation

The creation of artificially produced datasets that mimic the statistical properties of real-world data, used for training AI models while preserving privacy.

Artificial Intelligence·Infrastructure & Operations

System Prompt

An initial instruction set provided to a language model that defines its persona, constraints, output format, and behavioural guidelines for a given session or application.

Artificial Intelligence·Prompting & Interaction
T
57

t-SNE

t-Distributed Stochastic Neighbour Embedding — a technique for visualising high-dimensional data in two or three dimensions.

Machine Learning·Unsupervised Learning

Tabular Deep Learning

The application of deep neural networks to structured tabular datasets, competing with traditional methods like gradient boosting through specialised architectures and regularisation.

Machine Learning·Supervised Learning

Task Decomposition

Breaking down complex tasks into smaller, manageable subtasks that can be distributed among AI agents.

Agentic AI·Agent Reasoning & Planning

Task Mining

Technology that observes and analyses how employees interact with desktop applications to identify automation opportunities.

Enterprise Systems & ERP·Core ERP

TCP/IP

Transmission Control Protocol/Internet Protocol — the fundamental communication protocol suite powering the internet.

Networking & Communications·Protocols & Standards

Tech Stack Modernisation

The strategic upgrading of an organisation's technology infrastructure from legacy systems to modern architectures, enabling agility, scalability, and integration with AI capabilities.

Business & Strategy·AI Strategy

Technical Architecture

The design and structure of a software system's technical components and their relationships.

Software Engineering·Paradigms & Patterns

Technical Debt

The implied cost of additional rework caused by choosing an easy or limited solution now instead of a better approach.

Enterprise Systems & ERP·Core ERP

Technical Documentation

Written materials describing the architecture, design, APIs, and usage of software systems.

Software Engineering·Paradigms & Patterns

Technology Adoption Lifecycle

A model describing the adoption of new technology through five stages: innovators, early adopters, early majority, late majority, laggards.

Digital Transformation·Strategy

Technology Debt

The accumulated cost of maintaining and operating outdated technology systems that constrain an organisation's ability to innovate, integrate, and respond to market changes.

Digital Transformation·Strategy

Technology Due Diligence

The systematic assessment of a target company's technology stack, architecture, technical debt, security posture, and engineering capabilities during mergers and acquisitions.

Business & Strategy·Corporate Strategy

Technology Ethics

The moral principles and values guiding the development and use of technology in society.

Emerging Technologies·Next-Gen Computing

Technology Radar

A strategic tool that visualises the adoption status of technologies, techniques, and platforms within an organisation, categorising them as adopt, trial, assess, or hold.

Digital Transformation·Technology Modernisation

Telemetry

The automated collection and transmission of data from remote IoT devices to receiving equipment for monitoring.

IoT & Edge Computing·Devices & Sensors

Teleoperation

The remote control of a robot or machine by a human operator from a distance.

Robotics & Automation·Industrial Robotics

Temperature

A parameter controlling the randomness of language model outputs — lower values produce more deterministic text.

Natural Language Processing·Semantics & Representation

Tensor Parallelism

A distributed computing strategy that splits individual layer computations across multiple devices by partitioning weight matrices along specific dimensions.

Deep Learning·Architectures

Tensor Processing Unit

Google's custom-designed application-specific integrated circuit for accelerating machine learning workloads.

Artificial Intelligence·Models & Architecture

Terraform

An open-source infrastructure as code tool for building, changing, and versioning infrastructure safely and efficiently.

Cloud Computing·Deployment & Operations

Test-Driven Development

A development practice where failing tests are written before the code that makes them pass.

Software Engineering·Development Practices

Text Classification

The task of assigning predefined categories or labels to text documents based on their content.

Natural Language Processing·Text Analysis

Text Embedding

Dense vector representations of text passages that capture semantic meaning for similarity comparison and retrieval.

Natural Language Processing·Core NLP

Text Embedding Model

A neural network trained to convert text passages into fixed-dimensional vectors that capture semantic meaning, enabling similarity search, clustering, and retrieval applications.

Natural Language Processing·Core NLP

Text Generation

The process of producing coherent and contextually relevant text using AI language models.

Natural Language Processing·Generation & Translation

Text Summarisation

The process of creating a concise and coherent summary of a longer text document while preserving key information.

Natural Language Processing·Text Analysis

Text-to-Speech

Technology that converts written text into natural-sounding spoken audio using neural networks, enabling voice interfaces, accessibility tools, and content narration.

Natural Language Processing·Speech & Audio

Text-to-SQL

The task of automatically converting natural language questions into executable SQL queries, enabling non-technical users to interrogate databases through conversational interfaces.

Natural Language Processing·Generation & Translation

Third-Party Risk Management

The process of identifying and mitigating risks associated with outsourcing to third-party vendors.

Governance, Risk & Compliance·Risk Management

Threat Hunting

The proactive search for cyber threats within an organisation's environment that have evaded automated detection, using hypotheses, threat intelligence, and advanced analytics.

Cybersecurity·Defensive Security

Threat Intelligence

Evidence-based knowledge about existing or emerging threats to an organisation's digital assets and infrastructure.

Cybersecurity·Offensive Security

Threat Modelling

A structured approach for identifying, quantifying, and addressing security threats to a system or application.

Cybersecurity·Security Governance

Throughput

The actual rate of successful data transfer across a network in a given time period.

Networking & Communications·Protocols & Standards

Time Series Analysis

Statistical techniques for analysing time-ordered data points to identify trends, cycles, and forecasting patterns.

Data Science & Analytics·Statistics & Methods

Time Series Forecasting

Statistical and machine learning methods for predicting future values based on historical sequential data, applied to demand planning, financial forecasting, and resource allocation.

Data Science & Analytics·Statistics & Methods

Time-Series Database

A database optimised for handling time-stamped data, commonly used for IoT sensor data and metrics.

IoT & Edge Computing·Devices & Sensors

TinyML

Machine learning techniques optimised to run on microcontrollers and extremely resource-constrained embedded devices.

Artificial Intelligence·Evaluation & Metrics

TOGAF

The Open Group Architecture Framework — a comprehensive framework for enterprise architecture development and governance.

Enterprise Systems & ERP·Core ERP

Token

A digital asset created and managed on a blockchain, representing value, utility, or ownership rights.

Blockchain & DLT·Tokens & Assets

Token Limit

The maximum number of tokens a language model can process in a single input-output interaction.

Natural Language Processing·Semantics & Representation

Token Standard

A technical specification defining the interface and behaviour of tokens on a blockchain, such as ERC-20 for fungible tokens and ERC-721 for non-fungible tokens.

Blockchain & DLT·Tokens & Assets

Tokenisation

The process of breaking text into smaller units (tokens) such as words, subwords, or characters for processing by language models.

Natural Language Processing·Semantics & Representation

Tokenisation of Assets

Converting rights to real-world assets into digital tokens on a blockchain for fractional ownership and trading.

Blockchain & DLT·Tokens & Assets

Tokenised Deposits

Bank deposits represented as digital tokens on a blockchain, enabling programmable settlement, interbank transfers, and integration with decentralised financial infrastructure.

Blockchain & DLT·Foundations

Tokenomics

The economic design and incentive structures governing a cryptocurrency or token ecosystem.

Blockchain & DLT·Tokens & Assets

Tool Use

The capability of AI agents to interact with external tools, APIs, and services to extend their functionality.

Agentic AI·Agent Fundamentals

Tool Use in AI

The capability of AI agents to invoke external tools, APIs, databases, and software applications to accomplish tasks beyond the model's intrinsic knowledge and abilities.

Artificial Intelligence·Prompting & Interaction

Top-K Sampling

A text generation strategy that restricts the model to sampling from the K most probable next tokens.

Natural Language Processing·Generation & Translation

Topic Modelling

An unsupervised technique for discovering abstract topics that occur in a collection of documents.

Natural Language Processing·Text Analysis

Topological Qubit

A qubit design that encodes information in the topological properties of matter, offering inherent error protection.

Quantum Computing·Hardware & Implementation

Total Addressable Market

The total revenue opportunity available for a product or service if 100% market share were achieved.

Business & Strategy·Growth & Revenue

Total Cost of Ownership

A financial estimate of all direct and indirect costs associated with a product or system over its entire lifecycle.

Enterprise Systems & ERP·Core ERP

Total Experience

A business strategy that creates superior shared experiences by interlinking customer experience, employee experience, user experience, and multi-experience across all touchpoints.

Enterprise Systems & ERP·Core ERP

Transfer Learning

A technique where knowledge gained from training on one task is applied to a different but related task.

Machine Learning·Advanced Methods

Transformer

A neural network architecture based entirely on attention mechanisms, eliminating recurrence and enabling parallel processing of sequences.

Deep Learning·Architectures

Trapped Ion Qubit

A qubit implementation using individual ions confined by electromagnetic fields and manipulated by laser beams.

Quantum Computing·Hardware & Implementation

Turing Test

A measure of machine intelligence proposed by Alan Turing, where a machine is deemed intelligent if it can exhibit conversation indistinguishable from a human.

Artificial Intelligence·Foundations & Theory
U
13

UMAP

Uniform Manifold Approximation and Projection — a dimensionality reduction technique for visualisation and general non-linear reduction.

Machine Learning·Unsupervised Learning

Underfitting

When a model is too simple to capture the underlying patterns in the data, resulting in poor performance on both training and test data.

Machine Learning·Training Techniques

Unit Economics

The analysis of revenues and costs associated with a specific business model on a per-unit basis.

Business & Strategy·Growth & Revenue

Unit Testing

Testing individual components or functions in isolation to verify they produce the expected output.

Software Engineering·Quality & Testing

Unsupervised Learning

A machine learning approach where models discover patterns and structures in data without labelled examples.

Machine Learning·MLOps & Production

Usability

The ease with which users can learn, use, and interact with a product to achieve their goals.

UX & Product Design·Research & Strategy

User Experience Design

The process of creating products that provide meaningful, relevant, and enjoyable experiences to users.

UX & Product Design·Research & Strategy

User Interface Design

The design of the visual elements and interactive components that users interact with in digital products.

UX & Product Design·Research & Strategy

User Journey Map

A visual representation of the steps a user takes to achieve a goal with a product or service.

UX & Product Design·Research & Strategy

User Persona

A fictional representation of an ideal user based on research data, used to guide design decisions.

UX & Product Design·Research & Strategy

User Research

Systematic investigation of users' needs, behaviours, and motivations through observation and feedback techniques.

UX & Product Design·Research & Strategy

Utility Token

A blockchain-based token that provides access to a specific product, service, or platform functionality, rather than representing ownership or investment rights.

Blockchain & DLT·Foundations

Utility-Based Agent

An AI agent that selects actions to maximise a utility function representing the desirability of different outcomes.

Agentic AI·Agent Fundamentals
V
23

Validator

A node in a proof-of-stake blockchain responsible for verifying transactions and proposing new blocks.

Blockchain & DLT·Foundations

Value Chain

The full range of activities a company performs to bring a product from conception to delivery and beyond.

Business & Strategy·Growth & Revenue

Value Stream Mapping

A lean technique for analysing the flow of materials and information required to bring a product to a customer.

Digital Transformation·Process Transformation

Vanishing Gradient

A problem in deep networks where gradients become extremely small during backpropagation, preventing earlier layers from learning.

Deep Learning·Architectures

Variational Autoencoder

A generative model that learns a probabilistic latent space representation, enabling generation of new data samples.

Deep Learning·Architectures

Variational Quantum Eigensolver

A hybrid quantum-classical algorithm for finding the ground state energy of molecular systems.

Quantum Computing·Algorithms

Vector Database

A database optimised for storing and querying high-dimensional vector embeddings for similarity search.

Natural Language Processing·Core NLP

Vendor Risk Assessment

Evaluating the potential risks of engaging with a vendor including security, financial, and operational concerns.

Governance, Risk & Compliance·Risk Management

Venture Building

The systematic creation of new businesses from scratch within a corporate or studio environment, providing capital, talent, infrastructure, and strategic guidance from inception.

Business & Strategy·Innovation & Ventures

Venture Capital

Financing provided to early-stage, high-potential startup companies in exchange for equity ownership.

Business & Strategy·Innovation & Ventures

Verifiable Credentials

Digitally signed credentials that can be cryptographically verified without contacting the issuer.

Emerging Technologies·Next-Gen Computing

Version Control

A system that records changes to files over time so that specific versions can be recalled later.

Software Engineering·Development Practices

Vertical Scaling

Increasing the resources (CPU, RAM, storage) of an existing machine to handle more load.

DevOps & Infrastructure·CI/CD

Video Understanding

Analysing and interpreting the content, actions, and events within video sequences using computer vision.

Computer Vision·Recognition & Detection

Virtual Machine

A software emulation of a physical computer that runs an operating system and applications independently.

Cloud Computing·Infrastructure

Virtual Reality

A simulated experience using headsets to create an immersive, computer-generated three-dimensional environment.

Emerging Technologies·Extended Reality

Vision Transformer

A transformer architecture adapted for image recognition that divides images into patches and processes them as sequences, rivalling convolutional networks in visual tasks.

Deep Learning·Architectures

Visual Question Answering

An AI task that generates natural language answers to questions about the content of images.

Computer Vision·Recognition & Detection

Visual SLAM

Simultaneous Localisation and Mapping using visual sensors to build a map while tracking position within it.

Computer Vision·3D & Spatial

VLAN

Virtual Local Area Network — a logical grouping of network devices that communicate as if on the same physical network.

Networking & Communications·Infrastructure

VPN

Virtual Private Network — a technology creating a secure, encrypted connection over a less secure network like the internet.

Networking & Communications·Infrastructure

Vulnerability Assessment

The process of identifying, quantifying, and prioritising security vulnerabilities in systems and applications.

Cybersecurity·Offensive Security

Vulnerability Disclosure

The practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.

Cybersecurity·Offensive Security
W
18

Wallet

Software or hardware that stores cryptographic keys and enables users to manage their blockchain assets.

Blockchain & DLT·Foundations

Warehouse Automation

Using robots and automated systems to manage inventory, pick orders, and optimise warehouse operations.

Robotics & Automation·Industrial Robotics

Waterfall Model

A sequential software development methodology where each phase must be completed before the next begins.

Software Engineering·Paradigms & Patterns

Weak AI

AI designed to handle specific tasks without possessing self-awareness, consciousness, or true understanding of the task domain.

Artificial Intelligence·Foundations & Theory

Wearable Technology

Electronic devices worn on the body that collect data, track activities, and provide notifications or feedback.

IoT & Edge Computing·Devices & Sensors

Web3

The vision of a decentralised internet built on blockchain technology, giving users ownership and control of their data.

Blockchain & DLT·Foundations

Webhook

An HTTP callback that delivers real-time notifications from one application to another when a specified event occurs.

Software Engineering·Paradigms & Patterns

WebSocket

A communication protocol providing full-duplex communication channels over a single persistent TCP connection.

Software Engineering·Paradigms & Patterns

Weight Decay

A regularisation technique that penalises large model weights during training by adding a fraction of the weight magnitude to the loss function, preventing overfitting.

Deep Learning·Architectures

Weight Initialisation

The strategy for setting initial parameter values in a neural network before training begins.

Deep Learning·Architectures

Whistleblower Protection

Legal provisions protecting individuals who report illegal or unethical practices within organisations.

Governance, Risk & Compliance·Governance

Wi-Fi 6

The sixth generation of Wi-Fi technology offering improved speed, capacity, and performance in dense environments.

Networking & Communications·Protocols & Standards

Wireframe

A low-fidelity visual guide representing the skeletal framework of a digital interface.

UX & Product Design·Design & Prototyping

Word Embedding

Dense vector representations of words where semantically similar words are mapped to nearby points in vector space.

Deep Learning·Language Models

Word2Vec

A neural network model that learns distributed word representations by predicting surrounding context words.

Natural Language Processing·Semantics & Representation

Worker Agent

A specialised agent that performs specific tasks as directed by a supervisor or orchestrator agent.

Agentic AI·Enterprise Applications

Workflow Automation

Technology that automates the sequence of tasks, approvals, and handoffs within business processes.

Enterprise Systems & ERP·Process Automation

World Model

An AI system that builds an internal representation of how the physical or digital world works, enabling prediction, simulation, and planning based on learned dynamics.

Emerging Technologies·Next-Gen Computing