Software used to simulate physical systems in video games, such as gravity, collision, and motion, to create more realistic environments.
You will find this term commonly used in Game Development
A theory in economics and computer science that studies strategic interactions among rational decision-makers. It has applications in various fields, including AI.
You will find this term commonly used in AI / General IT
The study of strategic decision making, applied in various computing contexts such as algorithm design, network analysis, and artificial intelligence to predict outcomes in interactions with defined sets of rules.
You will find this term commonly used in AI / Theoretical Computer Science
The application of game-design elements and principles in non-game contexts to improve user engagement and problem-solving.
You will find this term commonly used in Software Development, UI/UX
The process of adjusting the luminance of an image or video to compensate for the nonlinear response of display systems.
You will find this term commonly used in Image Processing, Graphics
A class of machine learning frameworks designed by Ian Goodfellow and his colleagues in 2014. Two neural networks contest with each other in a game.
You will find this term commonly used in AI
A type of bar chart that illustrates a project schedule. It shows the start and finish dates of the various elements and summary elements of a project.
You will find this term commonly used in Project Management
Applications specifically designed to create and manage Gantt charts for project planning and tracking.
You will find this term commonly used in Project Management
In computer science, garbage collection is a form of automatic memory management. The garbage collector attempts to reclaim garbage, or memory occupied by objects that are no longer in use by the program.
You will find this term commonly used in Software Development
Algorithms designed to automatically reclaim memory occupied by objects that are no longer in use by a program, reducing memory leaks and optimizing performance.
You will find this term commonly used in Software Development, Memory Management
A network node that connects two networks using different protocols together. It enables communication between different environments.
You will find this term commonly used in Networking
An IP address that a networked computer uses to send data outside its local network. Typically, this is the address of a router or firewall.
You will find this term commonly used in Networking
The process of setting up network gateways, which connect two different networks, enabling data routing and communication between them.
You will find this term commonly used in Networking, Configuration
A Cisco proprietary protocol that attempts to overcome the limitations of existing redundant router protocols by adding basic load balancing functionality.
You will find this term commonly used in Networking
Protocols used by gateways to communicate with each other and to route packets of data across networks.
You will find this term commonly used in Networking
A protocol used by routers to communicate with each other and determine the best path for data transfer between networks.
You will find this term commonly used in Networking
A common image processing operation, used to reduce image noise and detail by applying a Gaussian function. It's widely used in graphics software.
You will find this term commonly used in AI / General IT
A type of image filter that smooths images by reducing noise and detail using the Gaussian function.
You will find this term commonly used in Image Processing, Computer Vision
A probabilistic model for representing normally distributed subpopulations within an overall population. GMMs are commonly used in data clustering algorithms.
You will find this term commonly used in AI / Data Analysis
A statistical noise having a probability density function equal to that of the normal distribution, also known as Gaussian distribution. Commonly used in signal processing and communication theory.
You will find this term commonly used in AI / Data Analysis
Identity and Access Management for Google Cloud Platform, it provides administrators the ability to manage cloud resources centrally by controlling who can take what action on specific resources.
You will find this term commonly used in Cloud Computing / Security
A serverless execution environment for building and connecting cloud services. With Cloud Functions, you can write simple, single-purpose functions that are attached to events emitted from your cloud infrastructure and services.
You will find this term commonly used in Cloud Computing
A regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.
You will find this term commonly used in Security / Cybersecurity
The stage in a product’s lifecycle when it is available to all customers, has passed all beta and testing phases, and is considered stable and fully functional.
You will find this term commonly used in General IT / Software Development
A protocol that allows communication between Object Request Brokers (ORBs), enabling interoperability in CORBA systems.
You will find this term commonly used in Networking, Distributed Systems
A design method that uses algorithms to generate design options based on constraints and requirements, often leveraging AI and machine learning to explore all possible permutations of a solution efficiently.
You will find this term commonly used in AI / Software Development
A style of computer programming in which algorithms are written in terms of types to-be-specified-later that are then instantiated when needed for specific types provided as parameters.
You will find this term commonly used in Software Development, Programming
One of the categories of top-level domains (TLDs) maintained by the IANA, used in the Domain Name System of the Internet, includes domains like .com, .net, .org, and newer generic domains like .app, .tech.
You will find this term commonly used in Web Development
A search heuristic that is inspired by Charles Darwin's theory of natural evolution. This algorithm reflects the process of natural selection where the fittest individuals are selected for reproduction in order to produce offspring of the next generation.
You will find this term commonly used in AI
A method inspired by natural evolution to solve optimization and search problems by iteratively selecting, combining, and mutating candidate solutions.
You will find this term commonly used in AI, Optimization
A type of Evolutionary Algorithm that aims at constructing programs, which are the best at performing a given computational task.
You will find this term commonly used in AI
Systems that are distributed over wide geographical areas, often to enhance redundancy, fault tolerance, and user proximity.
You will find this term commonly used in Distributed Systems, Networking
A method of encoding geographic locations into a short string of letters and digits, useful in various location-based applications.
You will find this term commonly used in Data Encoding, Location Services
A database that is replicated across multiple geographic locations to reduce latency and increase availability.
You will find this term commonly used in Database Management, High Availability
The process of replicating databases or files across different geographical locations for redundancy and quick access.
You will find this term commonly used in Networking / Database Management
The computational process of transforming a physical address description to a location on the Earth's surface (spatial representation in numerical coordinates).
You will find this term commonly used in Data Analysis / GIS
A feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
You will find this term commonly used in Networking / Security
A routing method that uses geographic positions as parameters for routing decisions, often used in mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANETs).
You will find this term commonly used in Networking
A geographical information system (GIS) is a system designed to capture, store, analyze, and present spatial or geographic data, enabling users to visualize, interpret, and understand patterns and relationships in geographical information.
You will find this term commonly used in Geospatial Analysis, Mapping, Environmental Science
The process or technique of identifying the geographical location of a person or device by means of digital information processed via the Internet.
You will find this term commonly used in Networking / Security
The mathematical modeling of objects' shapes in 2D or 3D spaces, crucial in computer graphics, CAD, and simulation.
You will find this term commonly used in Computer Graphics, Design
Operations that change the position, size, and orientation of shapes in graphics and geometric modeling.
You will find this term commonly used in Computer Graphics, CAD
The gathering, display, and manipulation of imagery, GPS, satellite photography, and historical data, usually represented by points, lines, or polygons on maps, related to positions on Earth’s surface.
You will find this term commonly used in AI / Data Analysis
Information that identifies the geographic location and characteristics of natural or constructed features and boundaries on the Earth, typically captured by satellite imagery or through location tracking technologies.
You will find this term commonly used in Data Analysis / GIS
The process of adding geographical identification metadata to various media such as photographs, videos, websites, or SMS messages. It includes latitude and longitude coordinates, but sometimes altitude, distance, and place names.
You will find this term commonly used in Web Development / Security
The study and interpretation of human gestures using algorithms and sensors, often for HCI or surveillance applications.
You will find this term commonly used in HCI, Security
A type of computer interface that interprets human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand.
You will find this term commonly used in AI / Hardware
The process of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand.
You will find this term commonly used in AI / Human-Computer Interaction
A type of interface that allows users to interact with digital devices through bodily motions, typically using hands and fingers, without touching the device.
You will find this term commonly used in AI / Hardware
A method of navigation on touch-enabled devices where gestures, such as swiping, tapping, and pinching, are used to interact with the device, often replacing traditional button-based controls.
You will find this term commonly used in UI/UX Design
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.