Accueil
Formations
Book-open
Catalogue
Laptop
Technology
Chart-bar#1
Management
Tools
Engineering
Brush
Creative
Globe
Languages
Inscription
Events
Resources
Info-circle
Glossary
File
Documents
Door-open
Library
Corporate
Contact
S'inscrire
Dashboard
Resources
Glossary
The definitions of the most widely used technology and IT terms.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
A/B Testing
Agile
AI
AI Art
AJAX
Algorithm
Analytics
Animation
Ansible
Apache
Apache Maven
Apache Spark
API
API Gateway
AR
Artificial General Intelligence
Artificial Neural Network
ASIC
ASP.NET
Assembly Language
Audio Editing
Augmented Analytics
AWS
B
Back-End Development
Backdoor
Backup
Bandwidth
Big Data
Big O Notation
Binary
Bit
Bitcoin
Black Hat SEO
Blockchain
Bluetooth
Botnet
Broadband
Browser
Brute Force Attack
C
Cable Modem
Cache
Call-to-Action
CDN
Chatbot
Chef
CI/CD
Ciphertext
Cloud
Cloud Communications
Cloud Computing
Cloud Native
CMS
Code
Compiler
Computational Thinking
Computer Vision
Containerization
Content Creation
Content Marketing
Continuous Delivery
Conversion Funnel
Copywriting
CPA
CPC
CPL
CPM
CPU
CRM
CRO
Cryptocurrency
CTR
Cyber Espionage
Cyber Intelligence
Cybersecurity
Cybersecurity Risk Assessment
D
Data
Data Governance
Data Lake
Data Loss Prevention (DLP)
Data Mining
Data Science
Data Visualization
Data Warehouse
Database
DDoS Attack
Debugging
Deep Learning
Deep Web
DevOps
DevSecOps
Digital Footprint
Digital Marketing
Digital Transformation
Django
DNS
Docker
Domain Driven Design
Drupal
DSL
E
E-commerce
E-learning
Eclipse
Edge Computing
ElasticSearch
Encryption
Ethereum
Ethernet
Expert System
F
Fault Tolerance
Fiber Optics
Fintech
Firewall
Flutter
FreeNAS
Front-End Development
Full-Stack Development
G
Gamification
Geolocation
GIS
Git
Google AdWords
Google Analytics
GPS
Gradle
Graph Theory
Graphic Design
GraphQL
Grey Hat SEO
GUI
H
Hacker
Hadoop
Hard Drive
Hashing
Heatmap
Heroku
Heuristic
Hotspot
HTML
HTTP
HTTPS
I
Identity Theft
Illustration
Image Recognition
Influencer Marketing
Infographic
Information Retrieval
Input
Interactive Media
Interconnect
IoT
IP Address
IP PBX
IP Telephony
Iridium
ISP
J
Java
JavaScript
Jenkins
Joomla
JSON
K
Keras
Kernel
Keylogger
Keyword
KPI
Kubernetes
L
Lambda Architecture
LAN
Landing Page
Lead Magnet
Link Building
Linux
Long-Tail Keyword
LTE
LTV
M
Machine Learning
Machine Vision
Machine-to-Machine
Magento
Malware
Man-in-the-Middle (MitM) Attack
Memory
Meta Description
Meta Tags
Microservices
Microservices Architecture
MLOps
Mobile App
Mobile Optimization
Modem
MongoDB
Motion Graphics
MySQL
N
Natural Language Processing
NetBeans
Network
Network Function Virtualization
Network Topology
Neural Network
Nextcloud
NFC
Node.js
NoSQL
O
Object-oriented Programming
Online Advertising
Open Source
OpenCart
OpenCV
OpenSSH
OpenVPN
Operating System
Organic Search
Output
OwnCloud
P
PageRank
Paid Search
Parallel Computing
Patch
PBX
Penetration Testing
Peripheral
Phishing
PHP
Pixel
Platform
PostgreSQL
PPC
Predictive Analytics
Programming
Protocol
Puppet
Python
PyTorch
Q
Quantum Computing
R
RAM
Ransomware
React
Real-Time Systems
Redis
Reinforcement Learning
Responsive Design
REST
Retargeting
RFID
Robotics
ROI
Rootkit
Router
Ruby on Rails
S
SaaS
Scikit-learn
Scrum
SDK
Search Query
Security
Security Audit
Security Breach
Security Policy
SEM
SEO
SERP
Server
Session Initiation Protocol
SIP Trunking
SMM
Social Media Management
Social Proof
Software
Software Development
Spam
Speech Recognition
Spyware
SQL
SQL Injection
SSL
Supervised Learning
System
System Analysis
System Architecture
System Integration
T
TCP/IP
TensorFlow
Terminal
Theano
Title Tag
Trojan
Two-Factor Authentication (2FA)
U
UI Design
Unified Communications
Unified Modeling Language (UML)
Unsupervised Learning
URL
USB
User
UX Design
V
Viral Marketing
Virtual Reality
Virtualization
Virus
Visual Studio Code
VoIP
VPN
VSAT
Vulnerability
W
WAN
Web
Web Development
Webinar
WebRTC
White Hat SEO
Wi-Fi
WooCommerce
WordPress
Workflow
X
XML
XSS
Y
YAML
Yottabyte
Z
Zero-Day
Zettabyte