Tech & AI Glossary
Clear definitions of technical terms, acronyms and abbreviations you encounter in your digital projects.
47 terms found
Set of rules and protocols enabling different software applications to communicate with each other. Essential for system integration and data exchange between applications.
Set of techniques aiming to improve mobile application visibility and ranking in stores (App Store, Google Play).
World-leading cloud platform offering on-demand computing, storage, databases, and infrastructure services. Used by millions of businesses worldwide.
Geographically distributed network of servers for fast web content delivery. Reduces loading times and improves overall performance.
DevOps practice automating code testing and deployment. Enables rapid and confident delivery of new features.
AI branch enabling computers to interpret and analyze images and videos. Applications: object detection, facial recognition, quality control.
Four basic operations for data manipulation in an application. Fundamental for any data management interface.
Executive responsible for a company's technology strategy. Defines architecture, manages technical team, and aligns tech with business objectives.
Practices combining software development and IT operations to shorten development cycles and continuously deliver quality code.
Technology enabling application and dependency packaging in standardized containers. Ensures portability and reproducibility across environments.
Data integration process from multiple sources to a target system. Essential for enterprise data consolidation and analysis.
Google's suite of cloud services including computing, storage, Big Data, machine learning, and developer tools.
European regulation governing personal data collection and processing. Imposes strict obligations with fines up to 4% of global revenue.
Query language for APIs allowing clients to request exactly the data they need. Flexible alternative to REST, developed by Facebook.
Practice of managing infrastructure through versioned code. Enables automated and reliable reproduction, testing, and deployment of infrastructures.
International standard defining requirements for information security management system (ISMS). Ensures sensitive data protection.
Next.js technique allowing static page updates after build without full rebuild. Combines SSG and SSR benefits.
Open-source platform automating deployment, scaling, and management of containerized applications. Industry standard for cloud native.
Customer identity verification process, mandatory in financial sectors. Prevents fraud, money laundering, and terrorism financing.
Artificial intelligence model trained on massive amounts of text, capable of understanding and generating natural language. Examples: GPT, Claude, Mistral.
Software architecture where a single application instance serves multiple clients (tenants) with complete data isolation. Standard for SaaS platforms.
Simplified version of a product with just enough features to satisfy early adopters and validate a market hypothesis.
AI field dealing with interaction between computers and human language. Enables text analysis, translation, generation, and contextual understanding.
Standard protocol for secure authentication and authorization. Enables SSO (Single Sign-On) and access delegation between applications.
Technology converting printed or handwritten text images into editable digital text. Essential for document automation.
Programming technique converting data between objects in code and database tables. Simplifies data access.
Nonprofit organization publishing the most critical web security vulnerabilities. OWASP Top 10 is the global reference for application security.
Experimental realization to demonstrate feasibility of an idea or technology. Validates approach before full investment.
Web application offering native-like experience: offline functionality, push notifications, home screen installation.
AI technique combining information retrieval from a knowledge base with text generation by LLM. Enables accurate responses based on your data.
System access restriction method based on user roles. Simplifies permission management in multi-user applications.
Standard architecture for designing web APIs. Uses HTTP methods (GET, POST, PUT, DELETE) to manipulate resources uniformly.
Measure of investment profitability, expressed as ratio between net gain and initial cost. Essential for evaluating project relevance.
Software distribution model where the application is hosted in the cloud and accessed via the internet through subscription. Eliminates the need for local installation.
Agile project management framework structured in short sprints (1-4 weeks). Promotes collaboration, adaptation, and incremental delivery.
Security certification for cloud service providers. Attests to security controls, availability, confidentiality, and compliance.
Web application loading a single HTML page and dynamically updating content. Offers smooth experience similar to desktop application.
Fixed time period (1-4 weeks) during which an agile team delivers a functional product increment. Regular development rhythm.
Attack technique exploiting security flaws to execute malicious SQL code. Can enable data theft, deletion, or unauthorized modification.
Method of generating HTML pages in advance during build time. Offers maximum performance and excellent security.
Technique of rendering web pages on the server before sending to browser. Improves SEO and perceived performance.
Development practice where tests are written before code. Ensures complete test coverage and more robust code.
Open-source tool for defining and provisioning cloud infrastructure declaratively. Compatible with AWS, GCP, Azure, and many other providers.
Visual part of an application with which the user interacts. Includes buttons, menus, forms, and all graphical elements.
Set of emotions and perceptions of a user when interacting with a product. Encompasses usability, accessibility, and satisfaction.
Mechanism allowing an application to automatically send real-time data to another application upon specific events.
Vulnerability allowing malicious code injection in web pages viewed by other users. Can steal sensitive data or hijack sessions.
Want to learn more?
Check out our other resources to deepen your knowledge.
Let's discuss your project
Whether you have a clear idea or need strategic guidance, we're here to help you bring your vision to life.
We respond quickly and listen carefully.