Software tools designed to support the process of restructuring existing computer code without changing its external behavior. These tools help identify areas for improvement, automate repetitive tasks, and ensure that the refactoring process does not introduce new bugs.
You will find this term commonly used in Software Development
A phase in the software development process where the developers (colleagues or external reviewers) examine the source code to find and fix mistakes overlooked in the initial development phase, improving the overall quality of software. Reviews are done in various forms such as pair programming, informal walkthroughs, and formal inspections.
You will find this term commonly used in Software Development
The process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. This practice is used to ensure the security and integrity of code distributed over the Internet.
You will find this term commonly used in Security, Software Development
A digital certificate used by developers and organizations to sign scripts, executables, and software programs to verify the authenticity of the software and to ensure that it has not been altered or compromised after it was signed.
You will find this term commonly used in Security, Software Development
A term used in software development to refer to a symptom in the source code that possibly indicates a deeper problem. Code smells are not bugs; they do not prevent the program from functioning, but they suggest weaknesses that might slow down development or increase the risk of bugs or failures in the future.
You will find this term commonly used in Software Development
Tools that automatically identify potential weaknesses or "smells" in code that may indicate deeper problems or suggest the need for refactoring. These tools help maintain code quality and prevent technical debt.
You will find this term commonly used in Software Development, Quality Assurance
The practice of managing changes to source code over time using version control systems. Versioning allows developers to keep track of changes, collaborate on projects without conflicts, and revert to earlier versions of the code if necessary.
You will find this term commonly used in Software Development, IT Management
The automated process of inspecting code for known security vulnerabilities and defects. Scanners can analyze source code, byte code, or binaries for patterns that may indicate security issues.
You will find this term commonly used in Software Development, Security
Devices or computer programs capable of encoding or decoding a digital data stream or signal. Codecs are used in videoconferencing, streaming media, and video editing applications to compress or decompress digital media files, making them easier to store or transmit over network environments.
You will find this term commonly used in Multimedia, Networking
A method used by recommendation systems to predict a user's preferences based on the preferences of other users. Collaborative filtering algorithms are widely used in e-commerce and streaming services to suggest products, movies, or music to users.
You will find this term commonly used in AI, Machine Learning
A field of optimization in applied mathematics and computer science that deals with problems where the objective is to find the best solution from a finite set of solutions. Problems in combinatorial optimization are typically characterized by their need for discrete, rather than continuous, decision variables. It has applications in numerous fields, including logistics, manufacturing, finance, and telecommunications.
You will find this term commonly used in Computer Science, Mathematics
A form of attack in which the goal is to execute arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible largely due to insufficient input validation. This can lead to full control of the host OS and to further network exploitation.
You will find this term commonly used in Security
A text-based user interface used to interact with software and operating systems by typing commands into a terminal or console window. CLI is favored by many advanced users and administrators for its precision, scriptability, and low resource usage compared to graphical user interfaces (GUIs).
You will find this term commonly used in General IT, Software Development
Software tools that are operated and controlled through a text-based interface, where users input commands in the form of text lines. Command line tools are powerful for automation, scripting, and performing complex tasks more efficiently than might be possible with a graphical interface.
You will find this term commonly used in Software Development, IT Management
Servers that are used by attackers to maintain communications with compromised systems within a target network. These servers can issue commands to control malware or other malicious code that has infiltrated a network or device, and can be used to steal data, deploy additional malware, or otherwise control compromised systems remotely.
You will find this term commonly used in Security, Cybersecurity
A special program that translates a programming language's source code into machine code, bytecode, or another programming language. The translation process allows the written code to be executed by a computer. Compilers are crucial for the development of software applications, enabling programmers to write in high-level, human-readable code.
You will find this term commonly used in Software Development
Instructions in the source code that provide guidance to the compiler to preprocess or compile the code in a specific way. These directives can control aspects of the compilation process, such as optimization levels, inclusion of header files, or conditional compilation.
You will find this term commonly used in Software Development
The process of modifying a compiler to improve the performance of the output code it generates in terms of execution speed, memory usage, or other metrics. Optimization can occur at various stages of the compilation process and involves a variety of techniques aimed at optimizing the performance of the resulting software without changing its logical behavior.
You will find this term commonly used in Software Development
Offers a wide range of IT certifications covering topics from basic IT fundamentals to cybersecurity, networking, and cloud computing.
You will find this term commonly used in General IT, Cybersecurity, Networking
An entry-level certification that covers various IT operational roles and technical support.
You will find this term commonly used in General IT, Technical Support
Advanced-level cybersecurity certification focusing on enterprise security, risk management, and incident response.
You will find this term commonly used in Cybersecurity
Focuses on fundamental cloud concepts, including adoption, operations, governance, and security in a cloud environment.
You will find this term commonly used in Cloud Computing
Validates the skills needed to maintain and optimize cloud infrastructure services.
You will find this term commonly used in Cloud Computing
Focuses on behavioral analytics to improve the overall state of IT security through identifying and combating malware and advanced persistent threats (APTs), making cybersecurity practices more proactive.
You will find this term commonly used in Cybersecurity
Validates the essential knowledge and skills needed to confidently design, configure, manage, and troubleshoot any wired and wireless networks.
You will find this term commonly used in Networking
Focuses on the skills required for penetration testing and vulnerability assessment and management, including how to plan, scope, and manage weaknesses, not just exploit them.
You will find this term commonly used in Cybersecurity, Ethical Hacking
Covers essential project management concepts beyond just IT projects, focusing on managing projects with a comprehensive approach.
You will find this term commonly used in Project Management
Provides the foundational knowledge required for any cybersecurity role and prepares for intermediate-level cybersecurity jobs.
You will find this term commonly used in Cybersecurity
Covers server hardware and software knowledge, emphasizing the skills to build, maintain, troubleshoot, and support server hardware and software.
You will find this term commonly used in Server Administration
The application of computational methods and tools to anthropological research, including the analysis of cultural patterns, linguistic evolution, and social networks. Computational anthropology enables the quantitative analysis of large datasets to uncover insights into human behavior and cultural dynamics.
You will find this term commonly used in Anthropology, Computational Sciences
A discipline that applies computational methods to the study of chemical processes within and related to living organisms. Computational biochemistry involves simulating molecular dynamics, understanding enzyme mechanisms, and predicting molecular structures, contributing to advancements in drug discovery and biotechnology.
You will find this term commonly used in Biochemistry, Computational Science
A field that applies computational techniques to solve biological and biomedical problems. It involves the development and application of data-analytical and theoretical methods, mathematical modeling, and computational simulation techniques to the study of biological, behavioral, and social systems.
You will find this term commonly used in Bioinformatics, Science
Algorithms specifically designed to solve problems and analyze data in the field of computational biology, including sequence alignment, gene prediction, structure prediction, and phylogenetic analysis. These algorithms enable the processing and interpretation of biological data at a scale and speed that traditional experimental methods cannot achieve.
You will find this term commonly used in Bioinformatics, Computational Biology
A field that uses the principles of physics and computational models to understand biological systems at the molecular level. It involves the simulation and analysis of biological molecules, such as proteins and DNA, to study their structure, dynamics, and interactions.
You will find this term commonly used in Biophysics, Computer Science
The branch of chemistry that uses computer simulation to assist in solving chemical problems. It involves the use of computational methods to calculate the structures and properties of molecules and materials. Computational chemistry is used to predict the outcome of chemical reactions, understand the behavior of materials at the molecular level, and design new molecules for specific purposes, such as pharmaceuticals.
You will find this term commonly used in Science, Computer Science
Mathematical models and simulations used in computational chemistry to predict the structure, dynamics, and properties of molecules and materials. These models enable researchers to explore chemical processes at the molecular level, facilitating the design of new compounds and the understanding of chemical reactions without the need for costly and time-consuming laboratory experiments.
You will find this term commonly used in Chemistry, Computer Science
A branch of the theory of computation in theoretical computer science that focuses on classifying computational problems according to their inherent difficulty, and relating those classes to each other. It is a measure of the amount of resources (time, space, etc.) required for the execution of algorithms. Understanding computational complexity helps in determining the practical limits of computing and optimizing algorithms for better performance.
You will find this term commonly used in Computer Science
An interdisciplinary field that applies computational methods and tools to economic problems. It involves the simulation and modeling of economic systems, the analysis of complex data sets, and the development of algorithms for solving economic problems. Computational economics supports decision-making in policy, investment, and strategic planning.
You will find this term commonly used in Economics, Computer Science
A branch of fluid mechanics that uses numerical analysis and algorithms to solve and analyze problems involving fluid flows. CFD is used in a wide range of applications, including engineering, meteorology, oceanography, and medicine, to simulate fluid behavior in complex scenarios.
You will find this term commonly used in Engineering, Computer Science
The use of computational and numerical methods to analyze and solve problems involving fluid flows. CFD analysis is employed in engineering, meteorology, oceanography, and other fields to simulate fluid behavior in complex systems, assisting in the design and optimization of products and processes.
You will find this term commonly used in Engineering, Simulation
The use of numerical analysis and data structures to solve and analyze problems involving fluid flows. CFD simulations are utilized in engineering, physics, and other fields to model the behavior of fluids in various scenarios, such as airflow over an aircraft wing, water flow through a pipe, or weather patterns.
You will find this term commonly used in Engineering, Simulation
The use of computational and statistical analysis to decode biological information encoded in genomes. This field involves the analysis of genome sequences to understand the structure, function, and evolution of genes and genomes.
You will find this term commonly used in Bioinformatics, Genomics
The branch of computer science dedicated to the study of algorithms which can be stated in terms of geometry. It involves the design and analysis of algorithms for solving geometric problems, with applications in various fields such as computer graphics, computer-aided design (CAD), and geographic information systems (GIS).
You will find this term commonly used in Computer Science, Mathematics
The study of computer systems for processing and understanding human languages. It involves the development of algorithms and models that can analyze, understand, and generate languages. Applications include speech recognition, natural language processing, and machine translation.
You will find this term commonly used in AI, Machine Learning
An interdisciplinary field focusing on the development of algorithms and models that enable computers to understand and interpret human (natural) languages. Research in computational linguistics involves natural language processing (NLP), machine learning, and syntax and semantics analysis to improve language-related applications like speech recognition, translation, and sentiment analysis.
You will find this term commonly used in Computational Linguistics, AI
An interdisciplinary field that uses computational methods to investigate and design new materials. By simulating material properties at the atomic or molecular level, scientists can predict how materials will behave in different environments and under various conditions.
You will find this term commonly used in Science, Engineering
An interdisciplinary field that uses mathematical models, theoretical analysis, and computer simulations to understand the functions of the nervous system and the underlying mechanisms of neural behavior.
You will find this term commonly used in Neuroscience, Computer Science
Software and computational methods used to model, simulate, and analyze the structure and function of the nervous system. These tools help in understanding brain function, neural dynamics, and neurological disorders by enabling detailed simulations of neural activity and brain networks.
You will find this term commonly used in Neuroscience, Computational Tools
The use of computer algorithms and software to enhance or extend the capabilities of digital photography. Computational photography techniques can include high dynamic range imaging (HDR), panoramic stitching, depth mapping, light field photography, and more, enabling new forms of imaging beyond traditional photography.
You will find this term commonly used in Computer Science, Photography
The use of computational methods and numerical analysis to solve and simulate problems in physics. Applications of computational physics include simulations of astrophysical phenomena, particle physics models, and quantum computing simulations, facilitating research and discovery in areas where traditional experimental approaches may not be feasible.
You will find this term commonly used in Physics, Computational Science
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.