The process of managing, planning, scheduling, and controlling a software build through different stages and environments, including testing and deploying software releases.
You will find this term commonly used in DevOps, Software Deployment
The ability of an application to handle increased loads by adapting its resource usage without compromising performance, typically through scaling out (adding more resources) or scaling up (upgrading existing resources).
You will find this term commonly used in Cloud Computing, Software Development
Application Security encompasses measures taken to improve the security of an application often by finding, fixing, and preventing security vulnerabilities.
You will find this term commonly used in Security, Cybersecurity
A structured set of guidelines and best practices designed to help developers build more secure software applications, addressing common security threats and vulnerabilities from the outset of the development process.
You will find this term commonly used in Cybersecurity, Software Development
AST involves methods and tools used to find security vulnerabilities in applications, either in the development phase or after deployment, to ensure the application's resistance to attacks.
You will find this term commonly used in Security, Software Development
The practice of dividing application components into separate segments or microservices, often to improve scalability, manageability, and security by isolating critical functions and reducing the attack surface.
You will find this term commonly used in Microservices, Application Design
A contract or agreement between a service provider and a customer that specifies the services to be provided, service level targets, and responsibilities of both parties, particularly for software applications and cloud services.
You will find this term commonly used in IT Service Management, Contracts
A framework for designing software applications with a focus on separating functions into individual services that can be independently developed, deployed, and managed.
You will find this term commonly used in Software Architecture, Cloud Computing
ASE is a hosting environment within a cloud service that provides a fully isolated and dedicated environment for securely running applications at scale, often including features for load balancing, auto-scaling, and integrated security.
You will find this term commonly used in Cloud Computing, IT Infrastructure
The practice of managing and optimizing the delivery of software applications and services to ensure performance, availability, and user satisfaction.
You will find this term commonly used in IT Service Management, Operations
The process of creating a visual representation of the relationships and dependencies between applications, services, and underlying infrastructure components, facilitating understanding, and management of IT services.
You will find this term commonly used in IT Service Management, Operations
An ASP is a business providing computer-based services to customers over a network, such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).
You will find this term commonly used in Cloud Computing, Services
A business model that delivers software applications and related services over the internet, allowing customers to access and use software without installing it locally, typically on a subscription basis.
You will find this term commonly used in Cloud Computing, Software as a Service
An Application Stack refers to a set of software subsystems or components needed to create a complete platform such that no additional software is needed to support applications.
You will find this term commonly used in Software Development, IT Infrastructure
The process of breaking down a monolithic application stack into its component parts, often as part of a strategy to adopt microservices or to improve system modularity and scalability.
You will find this term commonly used in Software Architecture, Microservices
A methodology used to identify, assess, and mitigate security threats and vulnerabilities in application design and architecture, typically during the early stages of development.
You will find this term commonly used in Security, Software Development
Application Virtualization allows applications to run in environments that do not suit the native app by abstracting the underlying hardware or software. This enables compatibility and mobility.
You will find this term commonly used in General IT, Cloud Computing
The systematic examination of applications for vulnerabilities, including security flaws, weaknesses, and potential threats, to identify and mitigate risks before they can be exploited by attackers.
You will find this term commonly used in Cybersecurity, Application Security
A semiconductor device used for a specific application that is produced for multiple users and sold to more than one company.
You will find this term commonly used in Electronics, Hardware
A general, reusable solution to a commonly occurring problem within a given context in software architecture, providing a template for how to solve a problem that can be used in many different situations.
You will find this term commonly used in Software Architecture, Design
Architecture Description refers to the process and documentation of the fundamental structures and behaviors of a system or ecosystem, enabling understanding and analysis of its system architecture.
You will find this term commonly used in General IT, Development
ARKit is a development framework by Apple that allows developers to create augmented reality (AR) experiences for iPhone and iPad, providing tools for visual inertial odometry, environmental understanding, and 3D asset rendering.
You will find this term commonly used in AI, Mobile Development
ARP is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address, used in IPv4 networks.
You will find this term commonly used in Networking
ARP Spoofing, or ARP Poisoning, is a technique used in cyber attacks to send fake ARP messages over a local area network, enabling attackers to intercept, modify, or stop data in transit by linking their MAC address with the IP address of another host.
You will find this term commonly used in Security, Cybersecurity
ARPA, now DARPA (Defense Advanced Research Projects Agency), is a research and development agency of the U.S. Department of Defense responsible for the development of emerging technologies for use by the military.
You will find this term commonly used in General IT
Array Programming involves programming languages and techniques optimized for the manipulation of arrays or matrices, simplifying tasks in scientific computing, data analysis, and machine learning.
You will find this term commonly used in Software Development, Data Science
The hypothetical intelligence of a machine that has the capacity to understand or learn any intellectual task that a human being can, often considered the holy grail of artificial intelligence research.
You will find this term commonly used in AI, Machine Learning
A computing system inspired by the biological neural networks that constitute animal brains, capable of learning tasks by considering examples without being programmed with task-specific rules.
You will find this term commonly used in AI, Machine Learning
A term often used interchangeably with virtual reality or augmented reality, referring to technologies that create immersive, computer-generated environments or enhance real-world environments with digital overlays.
You will find this term commonly used in Virtual Reality, Augmented Reality
As-a-Service, or XaaS, refers to the delivery of anything as a service, encompassing SaaS (Software as a Service), IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and other cloud-based services.
You will find this term commonly used in Cloud Computing
An ASIC is a microchip designed for a specific application, ranging from audio processing to managing a cellphone call, offering higher performance and lower power consumption than general-purpose processors.
You will find this term commonly used in Hardware, Networking
ASIC Design involves creating a custom integrated circuit for a specific use rather than for general-purpose use, optimizing performance and reducing power consumption.
You will find this term commonly used in Hardware
Asset Discovery is the process of identifying the assets within an organization's network, including hardware and software components, to manage, secure, and optimize the assets effectively.
You will find this term commonly used in IT Management, Security
The collection, processing, and analysis of data related to IT assets to provide insights into usage, performance, and lifecycle management, supporting strategic decision-making and operational efficiency.
You will find this term commonly used in IT Asset Management, Business Intelligence
The process of optimizing the life cycle of physical assets from acquisition to disposal, aiming to maximize value while minimizing costs and risks associated with asset ownership and operation.
You will find this term commonly used in IT Asset Management, Operations
Software solutions designed to manage and optimize the lifecycle of IT assets, from procurement to disposal, including tracking, maintenance, and financial management of hardware and software assets.
You will find this term commonly used in IT Asset Management, Software
Asset Management Software is a tool that helps organizations track, manage, and optimize their assets, including hardware, software, and intellectual property, throughout the asset lifecycle.
You will find this term commonly used in IT Management
The practice of using data analysis, monitoring, and optimization techniques to improve the reliability and availability of physical assets, reducing operational costs and extending asset lifespans.
You will find this term commonly used in IT Management, Operations
The practice of attaching identification tags or labels to assets, including hardware and software, to facilitate tracking, management, and accountability within an organization.
You will find this term commonly used in IT Asset Management, Security
Systems and technologies used for monitoring and managing the location, status, and condition of assets over time, often involving RFID, GPS, or barcode technology, to optimize asset utilization and prevent loss.
You will find this term commonly used in IT Asset Management, Operations
ADSL is a type of DSL broadband communications technology used for connecting to the internet, allowing more data to be sent over existing copper telephone lines compared to traditional modem lines.
You will find this term commonly used in Telecommunications, Networking
Asymmetric Encryption, or public key cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner, for secure communication.
You will find this term commonly used in Security, Cybersecurity
Cryptographic algorithms that use two different keys for encryption and decryption, one public key for encrypting messages and one private key for decrypting them, facilitating secure communication over insecure channels.
You will find this term commonly used in Cryptography, Security
Asymmetric Key Algorithms use a pair of distinct yet related cryptographic keys for encryption and decryption; one key encrypts the data, and the other key decrypts it, facilitating secure communication over insecure channels.
You will find this term commonly used in Security, Cryptography
A computing architecture where each processor is assigned a specific task or tasks, allowing for more efficient processing by leveraging the strengths of different types of processors within the same system.
You will find this term commonly used in Computer Architecture, Parallel Computing
Asynchronous API refers to an API that does not require the calling code to block or wait for a response, but rather, uses callbacks, promises, or other mechanisms to notify when the response is available.
You will find this term commonly used in Web Development, Programming
An Asynchronous Circuit is a type of electronic circuit that operates without a global clock, meaning that the operations within the circuit are completed upon the completion of the previous operations and not synchronized by a timing signal.
You will find this term commonly used in Electronics, Computer Engineering
Asynchronous JavaScript refers to the use of the async and await syntax in JavaScript, allowing for asynchronous, non-blocking operations that enable web applications to perform tasks like API calls without freezing the user interface.
You will find this term commonly used in Web Development
The execution of tasks or jobs in a non-blocking manner, allowing a system to initiate a task and then proceed with other tasks before the first task completes, often used to improve application performance and responsiveness.
You will find this term commonly used in Software Engineering, Performance Optimization
Asynchronous Learning refers to education, training, or learning that does not occur in the same place or at the same time, allowing participants to engage with learning materials at their own pace.
You will find this term commonly used in General IT, Education
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.