Skip to main content

Tech & AI Glossary

Clear definitions of technical terms, acronyms and abbreviations you encounter in your digital projects.

47 terms found

A
Application Programming Interface

Set of rules and protocols enabling different software applications to communicate with each other. Essential for system integration and data exchange between applications.

App Store Optimization

Set of techniques aiming to improve mobile application visibility and ranking in stores (App Store, Google Play).

Amazon Web Services

World-leading cloud platform offering on-demand computing, storage, databases, and infrastructure services. Used by millions of businesses worldwide.

C
Content Delivery Network

Geographically distributed network of servers for fast web content delivery. Reduces loading times and improves overall performance.

Continuous Integration / Continuous Deployment

DevOps practice automating code testing and deployment. Enables rapid and confident delivery of new features.

Computer Vision

AI branch enabling computers to interpret and analyze images and videos. Applications: object detection, facial recognition, quality control.

Create, Read, Update, Delete

Four basic operations for data manipulation in an application. Fundamental for any data management interface.

Chief Technology Officer

Executive responsible for a company's technology strategy. Defines architecture, manages technical team, and aligns tech with business objectives.

D
Development and Operations

Practices combining software development and IT operations to shorten development cycles and continuously deliver quality code.

Containerization Platform

Technology enabling application and dependency packaging in standardized containers. Ensures portability and reproducibility across environments.

E
Extract, Transform, Load

Data integration process from multiple sources to a target system. Essential for enterprise data consolidation and analysis.

G
Google Cloud Platform

Google's suite of cloud services including computing, storage, Big Data, machine learning, and developer tools.

General Data Protection Regulation

European regulation governing personal data collection and processing. Imposes strict obligations with fines up to 4% of global revenue.

Graph Query Language

Query language for APIs allowing clients to request exactly the data they need. Flexible alternative to REST, developed by Facebook.

I
Infrastructure as Code

Practice of managing infrastructure through versioned code. Enables automated and reliable reproduction, testing, and deployment of infrastructures.

Information Security Management Standard

International standard defining requirements for information security management system (ISMS). Ensures sensitive data protection.

Incremental Static Regeneration

Next.js technique allowing static page updates after build without full rebuild. Combines SSG and SSR benefits.

K
Container Orchestration System

Open-source platform automating deployment, scaling, and management of containerized applications. Industry standard for cloud native.

Know Your Customer

Customer identity verification process, mandatory in financial sectors. Prevents fraud, money laundering, and terrorism financing.

L
Large Language Model

Artificial intelligence model trained on massive amounts of text, capable of understanding and generating natural language. Examples: GPT, Claude, Mistral.

M
Multi-tenant Architecture

Software architecture where a single application instance serves multiple clients (tenants) with complete data isolation. Standard for SaaS platforms.

Minimum Viable Product

Simplified version of a product with just enough features to satisfy early adopters and validate a market hypothesis.

N
Natural Language Processing

AI field dealing with interaction between computers and human language. Enables text analysis, translation, generation, and contextual understanding.

O
Open Authorization

Standard protocol for secure authentication and authorization. Enables SSO (Single Sign-On) and access delegation between applications.

Optical Character Recognition

Technology converting printed or handwritten text images into editable digital text. Essential for document automation.

Object-Relational Mapping

Programming technique converting data between objects in code and database tables. Simplifies data access.

Open Web Application Security Project

Nonprofit organization publishing the most critical web security vulnerabilities. OWASP Top 10 is the global reference for application security.

P
Proof of Concept

Experimental realization to demonstrate feasibility of an idea or technology. Validates approach before full investment.

Progressive Web App

Web application offering native-like experience: offline functionality, push notifications, home screen installation.

R
Retrieval-Augmented Generation

AI technique combining information retrieval from a knowledge base with text generation by LLM. Enables accurate responses based on your data.

Role-Based Access Control

System access restriction method based on user roles. Simplifies permission management in multi-user applications.

Representational State Transfer

Standard architecture for designing web APIs. Uses HTTP methods (GET, POST, PUT, DELETE) to manipulate resources uniformly.

Return on Investment

Measure of investment profitability, expressed as ratio between net gain and initial cost. Essential for evaluating project relevance.

S
Software as a Service

Software distribution model where the application is hosted in the cloud and accessed via the internet through subscription. Eliminates the need for local installation.

Scrum Agile Framework

Agile project management framework structured in short sprints (1-4 weeks). Promotes collaboration, adaptation, and incremental delivery.

Service Organization Control 2

Security certification for cloud service providers. Attests to security controls, availability, confidentiality, and compliance.

Single Page Application

Web application loading a single HTML page and dynamically updating content. Offers smooth experience similar to desktop application.

Development Iteration

Fixed time period (1-4 weeks) during which an agile team delivers a functional product increment. Regular development rhythm.

SQL Injection

Attack technique exploiting security flaws to execute malicious SQL code. Can enable data theft, deletion, or unauthorized modification.

Static Site Generation

Method of generating HTML pages in advance during build time. Offers maximum performance and excellent security.

Server-Side Rendering

Technique of rendering web pages on the server before sending to browser. Improves SEO and perceived performance.

T
Test-Driven Development

Development practice where tests are written before code. Ensures complete test coverage and more robust code.

Multi-cloud IaC Tool

Open-source tool for defining and provisioning cloud infrastructure declaratively. Compatible with AWS, GCP, Azure, and many other providers.

U
User Interface

Visual part of an application with which the user interacts. Includes buttons, menus, forms, and all graphical elements.

User Experience

Set of emotions and perceptions of a user when interacting with a product. Encompasses usability, accessibility, and satisfaction.

W
Automated HTTP Callback

Mechanism allowing an application to automatically send real-time data to another application upon specific events.

X
Cross-Site Scripting

Vulnerability allowing malicious code injection in web pages viewed by other users. Can steal sensitive data or hijack sessions.

Want to learn more?

Check out our other resources to deepen your knowledge.

Ready to start?

Let's discuss your project

Whether you have a clear idea or need strategic guidance, we're here to help you bring your vision to life.

We respond quickly and listen carefully.