
Glossary of technology terms
A
Agile Methodologies
Agile methodologies are a group of software development methodologies that involve breaking a project into phases and focusing on continuous collaboration and improvement. Leveraging agile methodologies allows businesses to enhance teams’ collaboration and communication, streamlining the software development process.
AI Inference
AI Inference is when a trained machine-learning model draws conclusions from data. The majority of real-world AI applications rely on AI inference. Common examples include Large Language Models (LLMs), predictive analytics, and email security.
AI-Agent
An AI agent is a software entity that senses its surroundings, interprets data, and autonomously makes decisions to reach specific objectives. It can learn and adapt, performing tasks ranging from simple automation to complex problem-solving, often mimicking human-like intelligence in its actions.
API Development
API development refers to the process of designing, creating, and maintaining Application Programming Interfaces that enable software systems to communicate with each other. API development allows businesses to achieve seamless communication between different software systems, applications, or devices.
Augmented Analytics
Augmented analytics refers to the use of enabling technologies such as machine learning and Artificial Intelligence (AI) for the purposes of data preparation, analysis, and visualisation. Unlike traditional analytics, augmented analytics doesn’t require users to be significantly experienced with analytics. Augmented analytics enables businesses across all industries to make better data-based decisions.
Automated Testing
Automated testing is the use of software tools to automate the traditionally human-driven process of reviewing and validating a software product. The use of automated testing allows businesses to improve testing accuracy and test coverage while saving time and money.
Automation
Automation is the practice of creating software applications to reduce or eliminate the need for human input. Businesses across a wide range of industries can leverage automation to increase productivity and enhance the customer experience while reducing costs and operational errors.
C
Chatbot
A chatbot is a computer program that simulates human conversation. Some chatbots can only answer simple queries, while more advanced models use technologies such as Generative AI to process more sophisticated requests. Apple’s Siri and Amazon’s Alexa are popular examples of chatbots.
Cloud Data Platform Foundations
Cloud Data Platform Foundations refer to the fundamental principles and components necessary to build and manage a cloud-based data platform. A solid foundation ensures the platform is scalable, cost-efficient, and configured for optimal performance.
Cloud Migration
Cloud migration is the process of moving applications, data, and workloads either partially or entirely to the cloud. Cloud migration enables businesses to enhance cost-efficiency, scalability, security, and performance.
Cloud Security
Cloud security is a set of cybersecurity measures dedicated to securing cloud-based applications, data, and infrastructure. Cloud security enables businesses to manage evolving security threats while remaining compliant with regulatory requirements.
Cloud Strategy
A Cloud strategy is the plan businesses follow to host their IT infrastructure in the cloud. A cloud strategy typically includes the best practices, tools, and services to use during the implementation of a cloud solution. A well-defined cloud strategy helps businesses maximise the benefits of cloud computing while reducing potential risks.
Containerisation
Containerisation is a software deployment process that bundles an application’s code with the necessary components needed to run on any infrastructure. Containerisation enables businesses to create a single software package (container) that can run on all types of devices and operating systems.
D
Data Analytics
Data analytics is the process of analysing raw data to identify patterns and trends. By leveraging data analytics, businesses can make more informed decisions that drive efficiencies and improve business outcomes.
Data Architecture
Data architecture refers to the rules, models, policies, and standards that govern how data is collected, stored, arranged, and integrated within a database or other data system. A well-structured data architecture ensures that data remains accurate, accessible, and secure.
Data Engineering
Data engineering is the process of designing, building, and maintaining systems that enable the collection, storage, and analysis of data. Data engineers create data pipelines and architectures that facilitate the flow of information across an organisation.
Data Governance
Data governance is the set of processes, roles, policies, standards, and metrics that ensure the effective and efficient use of information. Strong data governance helps businesses manage risks, improve compliance, and maintain high-quality data.
Data Lakes
A data lake is a centralised repository that allows businesses to store vast amounts of raw data in its original format. Data lakes support big data analytics, machine learning, and artificial intelligence applications.
Database Management
Database management refers to the practice of maintaining, organising, and securing data within a database. A well-structured database management system (DBMS) ensures data integrity, security, and efficient retrieval.
DevOps
DevOps is a set of practices that combine software development (Dev) and IT operations (Ops) to improve the speed and quality of software delivery. Implementing DevOps enables businesses to enhance collaboration, automate workflows, and reduce deployment time.
Digital Transformation
Digital transformation is the process of integrating digital technologies into all aspects of a business to enhance efficiency, agility, and customer experience. It involves the adoption of cloud computing, artificial intelligence, automation, and data-driven decision-making.
Enterprise Architecture
Enterprise architecture is the strategic framework that defines how an organisation’s IT infrastructure aligns with its business goals. It helps businesses optimise technology investments, improve efficiency, and ensure scalability.
F
FinOps
FinOps (Financial Operations) is a practice that combines financial management and cloud computing to optimise cloud spending. It enables businesses to control costs, improve resource allocation, and align cloud expenses with business objectives.
Function-as-a-Service (FaaS)
FaaS is a cloud computing service model that allows developers to execute code in response to events without managing infrastructure. Popular FaaS platforms include AWS Lambda and Google Cloud Functions.
G
Generative AI
Generative AI refers to artificial intelligence models that create new content, such as text, images, music, and videos. Examples include OpenAI’s ChatGPT and DALL·E, which generate human-like text and images, respectively.
H
Hybrid Cloud
A hybrid cloud is a cloud computing environment that combines on-premises infrastructure with public and private cloud services. This approach provides businesses with greater flexibility, security, and cost efficiency.
Hyper Automation
Hyper automation is the application of advanced technologies such as artificial intelligence (AI), machine learning (ML), and robotic process automation (RPA) to automate business processes at scale. It enables businesses to improve efficiency, reduce operational costs, and enhance decision-making.
I
Internet of Things (IoT)
The Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects connected to the internet, enabling them to collect and exchange data. IoT is used in smart homes, industrial automation, and healthcare.
Intelligent Process Automation (IPA)
Intelligent Process Automation (IPA) combines artificial intelligence (AI) and robotic process automation (RPA) to automate complex business processes. It helps businesses improve efficiency and reduce operational costs.
K
Kubernetes
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerised applications. It is widely used in cloud-native application development.
L
Large Language Models (LLMs)
LLMs are deep learning models trained on vast amounts of text data to generate human-like language. Examples include OpenAI’s GPT-4 and Google’s Gemini.
M
Machine Learning (ML)
Machine learning is a subset of artificial intelligence that enables computers to learn patterns from data and make predictions without being explicitly programmed. ML is used in recommendation systems, fraud detection, and self-driving cars.
Microservices Architecture
Microservices architecture is an approach to software development where applications are built as a collection of small, independent services that communicate via APIs. It improves scalability, flexibility, and maintainability.
N
Natural Language Processing (NLP)
NLP is a branch of artificial intelligence that enables computers to understand, interpret, and generate human language. Applications include chatbots, speech recognition, and text analytics.
Network Security
Network security refers to the practices and technologies used to protect an organisation’s IT infrastructure from cyber threats, such as malware, hacking, and data breaches.
O
Observability
Observability refers to the ability to measure and analyse a system’s performance using logs, metrics, and traces. It helps IT teams monitor and troubleshoot applications efficiently.
Open Source Software
Open source software is software that is freely available for use, modification, and distribution. Examples include Linux, Apache, and Kubernetes.
P
Penetration Testing
Penetration testing, or "pen testing," is a simulated cyberattack used to evaluate a system's security. Ethical hackers attempt to exploit vulnerabilities, mimicking real-world attacks. This process identifies network, application, and system weaknesses, allowing organisations to strengthen their defences.
Platform as a Service (PaaS)
PaaS is a cloud computing service that provides a platform for developers to build, deploy, and manage applications without managing the underlying infrastructure. Examples include AWS, Google App Engine and Microsoft Azure App Services.
Predictive Analytics
Predictive analytics uses statistical algorithms and machine learning techniques to analyse historical data and predict future trends, helping businesses make data-driven decisions.
Process Mining
Process mining is a data-driven approach that analyses business processes to identify inefficiencies and areas for improvement using event logs from IT systems.
Q
Query Optimisation
Query optimisation refers to techniques used in databases to improve the efficiency of data retrieval, reducing response times and improving performance.
R
Robotic Process Automation (RPA)
RPA uses software bots to automate repetitive, rule-based tasks such as data entry, invoice processing, and customer service inquiries, improving efficiency and reducing human error.
Resilient Architecture
Resilient architecture refers to designing IT systems that can withstand failures, cyberattacks, and disruptions while maintaining continuous service availability.
Real-Time Data Processing
Real-time data processing enables organisations to process and analyse data as it is generated, allowing for immediate insights and actions. It is commonly used in financial transactions and IoT applications.
S
Software as a Service (SaaS)
SaaS is a cloud computing model where software applications are hosted and delivered over the internet on a subscription basis. Examples include Google Workspace and Salesforce.
Secure Access Service Edge (SASE)
SASE is a cloud-based cybersecurity framework that integrates network security and wide-area networking (WAN) to protect distributed workforces.
T
Tokenisation
Tokenisation is a security technique that replaces sensitive data, such as credit card numbers, with unique tokens to enhance data protection and compliance.
Tech Debt
Technical debt refers to the cost of maintaining and fixing suboptimal code or outdated systems due to shortcuts taken during software development.
Threat Intelligence
Threat intelligence involves collecting and analysing information about potential cyber threats to proactively protect IT systems from attacks.
U
Unified Communications (UC)
UC refers to the integration of communication tools such as voice, video, messaging, and collaboration platforms to improve workplace productivity and efficiency.
User Experience (UX) Design
UX design focuses on creating intuitive, accessible, and user-friendly digital experiences for software, websites, and applications.
User Interface (UI) Design
UI, is the point of interaction between humans and computers. It encompasses the visual elements, like buttons and menus, and the interactive aspects, such as touch or voice commands. Effective UI prioritises ease of use, clarity, and a positive user experience.
V
Virtual Reality (VR)
VR is a technology that creates immersive, computer-generated environments for gaming, training, and simulations.
Vulnerability Management
Vulnerability management is the process of identifying, assessing, and mitigating security vulnerabilities in IT systems to prevent cyber threats.
W
Workflow Automation
Workflow automation uses technology to streamline and automate business processes, reducing manual work and improving efficiency.
Wearable Technology
Wearable technology includes smart devices such as smartwatches, fitness trackers, and augmented reality glasses that collect and process data in real-time.
X
XaaS (Anything as a Service)
XaaS is a broad term that encompasses various cloud-based service models, including SaaS, PaaS, and IaaS, allowing businesses to consume IT resources on demand.