- .INI File
- 3-D Spreadsheet
- 3V's
- Abstract Data Type
- Abstract Syntax Notation One
- Acknowledgement Code
- Active Directory
- Activity Stream
- Ad Hoc Query
- Ad Hoc Reporting
- Adaptive Packet Assembly
- Adaptive Route
- Advanced Function Presentation
- Affinity Analysis
- Air Gap
- Algorithm
- Amazon Redshift
- Amazon SimpleDB
- Analog Data
- Analog-to-Digital Converter
- Analytics
- Analytics of Things
- Annotation
- Anomaly Detection
- Anonymous
- ANSI Character Set
- Apache Kudu
- Apache Lucene
- Apache Mahout
- Apache Solr
- AppleTalk Filing Protocol
- Application Client
- Apriori Algorithm
- Arithmetic Expression
- Array Data Structure
- Array Formula
- Asset Performance Management
- Asynchronous Data
- Asynchronous Messaging
- Atomic Operation
- Atomicity Consistency Isolation Durability
- Attached Resource Computer Network
- Attenuation
- Attribute
- Attribute-Value Pair
- Augmented Analytics
- Autodiscovery
- Automated Litigation Support
- Automated Merchandising
- Automatic Backup System
- Automatic Identification and Data Capture
- Auto-Tiering
- Backpressure
- Backup and Recovery
- Backup Bit
- Bad Frame Interpolation
- Bandwidth
- Bar Code
- Barrel Shifter
- Base Address
- Basic Rate Interface
- Bates Number
- Bearer Channel
- Betamax Standard
- Big Data
- Big Data Analytics
- Big Data Analytics Platform
- Big Data Architecture
- Big Data Platform
- Big Data Streaming
- Binary Digit
- Binary File
- Binary File Transfer
- Binary Format
- Binary Number System
- Biometrics
- Bit Bucket
- Bit Error Rate
- Bit Loss
- Bit Rate
- Bit Rot
- Bit Stuffing
- Bitcoin
- Black Box Testing
- Block Error Rate
- Blue Screen of Death
- Bluebugging
- Bluesnarfing
- Bluetooth Brick
- Bogon
- Boltzmann's Constant
- Bootstrap Protocol
- Border Gateway Protocol
- Broadband Wireless Access
- Broadcast Address
- Broadcast Domain
- Broadcasting
- Buffer
- Build
- Bump Mapping
- Burst
- Burst Mode
- Bus
- Business Intelligence 2.0
- Business Service Management
- Cabinet File
- Cache Memory
- Cache on a STick
- Campus Area Network
- Canonical Data Model
- Canonicalization
- Capacity
- Capacity On Demand
- Capture
- Card Skimming
- Carrier
- Carrier Sense Multiple Access With Collision Detection
- Cascading Style Sheets Level 1
- Cassette
- CD-Read Writable
- Cells In Frames
- Cellular Network
- Challenge Handshake Authentication Protocol
- Challenge-Response Authentication
- Change Data Capture
- Change Mode
- Channel Capacity
- Character Large Object
- Character Set
- Characterization
- Checksum
- Chunk
- Circuit-Level Gateway
- Cisco Unified Computing System
- Citizen Data Scientist
- Class of Service
- Clickstream
- Clickstream Analysis
- Client
- Clinical Information Modeling Initiative
- Cloud Computing Security
- Cloud Data Protection
- Cloud Migration
- Cloud Monitoring
- Cloud Storage API
- Cloud Storage Gateway
- Cluster Analysis
- Cluster Table
- Clustering
- Coalition Loyalty Program
- Coaxial Cable
- Cognitive Network
- Cold Buffer
- Cold Data
- Collapsed Backbone
- Collection
- Collision Avoidance
- Color Hex Code
- Common Criteria for Information Technology Security Evaluation
- Communication Controller
- Compact Disc Database
- Competitive Local Exchange Carrier
- Complex Event Processing
- Compressed File
- Computational Complexity
- Computer Incident Response Team
- Computer Output to Laser Disk
- Computer-Aided Manufacturing
- Computer-Assisted Review
- Computer-Based Patient Record
- Concept of Operations
- Connection-Oriented Protocol
- Content Delivery
- Content Package
- Contextual Data
- Contiguous Memory Allocation
- Continuous Data Protection
- Control Unit
- Controlled Cryptographic Item
- Converged Storage
- Cooked Data
- Copper Data Distribution Interface
- Copy Data Virtualization
- Corporate Data Warehouse
- CouchDB
- Covert Channel
- CPU Utilization
- Create, Retrieve, Update and Delete
- Credentials
- Credit Freeze
- Critical Path Method
- Critical Security Parameter
- Cross-Channel Analytics
- Curation
- Customer Data Integration
- Customer Intelligence
- Customer Relationship Management Analytics
- Cut-Through Switching
- Cyberattack
- Cybercriminal
- Cyberforensics
- Cyberlibel
- Cyberlocker
- Cybersecurity
- Cyberspying
- Cyclic Redundancy Check
- Data
- Data
- Data Access
- Data Acquisition Hardware
- Data Administration
- Data Analyst
- Data Analytics
- Data Analytics Platform
- Data Architect
- Data Archiving
- Data as a Platform
- Data as a Service
- Data At Rest Protection
- Data Audit
- Data Availability
- Data Backup
- Data Bank
- Data Bleed
- Data Breach
- Data Brokering
- Data Bus
- Data Card
- Data Catalog
- Data Center
- Data Center Construction
- Data Center Interconnect
- Data Center Management Software
- Data Center Markup Language
- Data Center Operations
- Data Classification
- Data Cleansing
- Data Collection
- Data Collection System
- Data Collision
- Data Consolidation
- Data Conversion
- Data Corruption
- Data Deduplication
- Data Definition Language
- Data Democratization
- Data Dictionary
- Data Distribution Service
- Data Driven
- Data Engineer
- Data Entry
- Data Exhaust
- Data Exploration
- Data Extraction
- Data Federation Technology
- Data Feed
- Data Flow Model
- Data Fusion
- Data Governance
- Data Governance Framework
- Data Gravity
- Data Hiding
- Data In Motion
- Data in Use
- Data Independence
- Data Infrastructure
- Data Infrastructure Hygiene
- Data Integration
- Data Integration Architect
- Data Integrity
- Data Integrity
- Data Intelligence
- Data Key
- Data Link Control
- Data Link Layer
- Data Link Switching
- Data Localization
- Data Logging
- Data Loss
- Data Loss Prevention
- Data Management Association
- Data Management Software
- Data Mapping
- Data Marketplace
- Data Migration
- Data Miner
- Data Mining
- Data Model
- Data Modeling
- Data Ninja
- Data Obfuscation
- Data Organization
- Data Packet
- Data Portability
- Data Preprocessing
- Data Protection
- Data Protection Directive
- Data Protection Scheme
- Data Protection Software
- Data Quality
- Data Quality Assessment
- Data Quality Monitoring
- Data Redundancy
- Data Retrieval
- Data Robot
- Data Sandbox
- Data Science
- Data Science Platform
- Data Scientist
- Data Scraping
- Data Set
- Data Shadow
- Data Smog
- Data Source
- Data Sovereignty
- Data Steward
- Data Streaming
- Data Subject
- Data Subject Request
- Data Theft
- Data Transfer
- Data Transmission
- Data Validation
- Data Vaulting
- Data Verification
- Data Virtualization
- Data Visualization
- Data Visualization Software
- Data Warehouse
- Database
- Database Clustering
- Database Concurrency
- Database Management System
- Database Software
- Datafication
- Datagram
- Data-ism
- DataOps
- DataReader
- Data-Retention Policy
- DataStage
- Datastore
- Decision Scientist
- Decoding
- Deep Learning
- Deep Packet Inspection
- Defense In Depth
- Delimiter
- Demand Signal Repository
- Demographic Data
- Depository
- Derivative Work Right
- Derived Data Type
- Destructive Trojan
- Development Data Platform
- Dial-on-Demand Routing
- Dial-Up Connection
- Dictionary
- Differential Backup
- Digital
- Digital Asset Management
- Digital Dashboard
- Digital Data
- Digital Enhanced Cordless Telecommunications
- Digital Envelope
- Digital Fingerprinting
- Digital Signature
- Digital Sovereignty
- Digital Video Broadcasting - Terrestrial
- Digital Visual Interface
- Digital Watermark
- Digital Watermarking
- Digital-to-Analog Converter
- Digitize
- Dimensionality Reduction
- Direct Attached Storage
- Direct Cable Connection
- Direct Memory Access
- Direct Sequence Spread Spectrum
- Directional Attributes
- Directory System Agent
- Dirty Data
- Dirty Paper Coding
- Disaster Recovery
- Disaster Recovery Center
- Disk Array
- Disk to Tape
- Disk-Based Data Protection
- Disk-to-Disk
- Distance Vector Multicast Routing Protocol
- Distributed Application
- Distributed Data Protection
- Distributed File System
- Distributed Search
- DMCA 1201
- Document and Media Exploitation
- Document Versioning
- Domain Migration
- Double Data Rate
- Double-Ended Queue
- Driver Development Kit
- Dual Band
- Dual-Homed Host
- Dual-Ring Topology
- Dublin Core
- Dumb Network
- DumpSec
- Dynamic Link Library
- eDonkey Network
- E-Government Metadata Standard
- Eight-to-Fourteen Modulation
- Electronic Data Capture
- Electronic Data Interchange
- Electronic Discovery
- Electronic Discovery Reference Model
- Electronic Image Stabilization
- Electronic Medical Record
- Electronic Paper Display
- Electronic Signatures in Global National Commerce Act
- Electronically Stored Information
- Email Appending
- Embedded SQL
- Encode
- Encoder/Decoder
- Encryption
- Encryption Algorithm
- Encryption Backdoor
- Enhanced Interior Gateway Routing Protocol
- Ensemble Learning
- Enterprise Archive File
- Enterprise Bean
- Enterprise Data Governance
- Enterprise Data Integration
- Enterprise Data Management
- Enterprise Data Model
- Enterprise Data Security
- Enterprise Data Warehouse
- Enterprise Digital Assistant
- Enterprise File Synchronization and Sharing
- Enterprise Information Architecture
- Enterprise Knowledge Management
- Entity Data Model
- Entity-Relationship Diagram
- Enumerated Type
- Erasure Coding
- Erbium-Doped Fiber Amplifier
- Error Control
- Error Correction Code
- EtherLoop
- Even Parity
- Exadata
- Executive Support System
- Expansion Bus
- Expansion Port
- Exploratory Data Analysis
- Extract Transform Load
- Extraction
- Facial Recognition Software
- Facility Management
- Facsimile Machine
- False Positive
- Fast Infoset
- Fast Packet Switching
- Femtosecond
- Fever Chart
- Fiber Bragg Grating
- Fiber Channel over Internet Protocol
- Fiber Connection
- Fiber Distributed Data Interface
- Fiber Laser
- Fiber Pigtail
- Fiber-Optic Service
- Field Symbol
- File
- File Format
- File Integrity
- File Integrity Monitoring
- File Sharing
- File Transfer
- File Transfer Protocol
- FileMaker Pro
- Financial Information Exchange
- Firewall
- First Come, First Served
- Flag
- Flat File System
- Flooding
- Forward Error Correction
- Forward Secret HTTPS
- Fragmentation
- Frame
- Frame Check Sequence
- Frame Synchronization
- Freedom of Information
- Frequency Hopping Spread Spectrum
- Full-Disk Encryption
- Fully Qualified Domain Name
- Function Approximation
- Functional Specification
- Fuzzy Matching
- G.727
- Gantt Chart
- Garbage In, Garbage Out
- Gaussian Mixture Model
- Geocoding
- Geographic Information Science
- Geographic Information System
- Geospatial Mashups
- Gigabit
- Gigaflop
- GLib
- Google Takeout
- Granular Data
- Green Data Center
- Grokster
- Ground Truth
- Handover
- Hard Drive Encryption
- Hard Drive Shredder
- Harvard Mark I
- Hash Function
- Hashing
- Hashtag
- Hayes-Compatible Modem
- Header
- Heat Map
- Heat Map View
- Help Desk
- Herman Hollerith
- Heuristic
- Hidden Markov Model
- Hierarchical Storage Management
- High Density
- High-Performance Computing
- High-Speed Packet Access
- Hi-MD
- Histogram
- Hollerith Machine
- Home Data Center
- HomePNA
- Host Name
- Hosts File
- Hot Data
- Hot Standby Router Protocol
- HTTP Proxy
- Hungarian Notation
- I/O Request
- Identity and Access Management
- IEC Connector
- IEEE 1394 Interface
- IEEE 802.11d
- Image Scanner
- Incompatible Timesharing System
- In-Database Analytics
- Indexed Sequential Access Method
- Indexing
- InfiniBand
- Information Architecture
- Information Capabilities Framework
- Information Design
- Information Graphic
- Information Hiding
- Information Life Cycle Management
- Information Privacy
- Information Processing
- Information Security
- Information Security Audit
- Information Systems Security
- Information Warfare
- Infrared
- Initialization Vector
- Insert
- Insider Attack
- Intelligent Information Management
- Intelligent Network
- Inter Process Communication
- Interactive Data Language
- Interestingness Discovery
- Interior Gateway Protocol
- Intermediate Document
- Internationalization
- Internet Bot
- Internet Connection Sharing
- Internet Message Access Protocol
- Internet Privacy
- Internet Protocol
- Internet Protocol Version 4 Packet Header
- Internet Transit
- IP Datacasting
- Java Bytecode
- Java Data Objects
- Jitter Test
- Job Chaining
- JSON Query Language
- JSON-LD
- Kaizen
- Key
- Key Escrow
- Key Process Input Variable
- Key Process Output Variable
- Kilobyte
- K-Means Clustering
- K-Nearest Neighbor
- Knowledge Discovery in Databases
- Knowledge Engineer
- La Fonera
- Labeled Data
- LAN Switching
- Late Binding
- Latecomer
- LaTeX
- Layer 2
- Layer 4
- Learning Vector Quantization
- Least Cost Routing
- Lifetime Clinical Record
- Light Intensity Modulated Direct Overwrite
- Linear Tape Open
- Link Aggregation Control Protocol
- Link Analysis
- Little-Endian
- Load File
- Load Partitioning
- Local Area Network (LAN) Emulation
- Local Area Network Emulation
- Local Interpretable Model-Agnostic Explanations
- Log File
- Logic Programming
- Logical Data Model
- Logical Link Control
- Logical Topology
- Logistic Regression
- Longitudinal Redundancy Check
- Loop Variable
- Lossy
- Luhn Formula
- LulzSec (Lulsec)
- Machine Learning Workflow
- Machine-Generated Data
- Magic Cookie
- Mailbox Data
- Makefile
- Management Information Base
- Mandatory Access Control
- Market Basket Analysis
- Mashboard
- Mass Storage
- Master Data
- Master Data Governance
- Master Data Management Software
- Maximum Transmission Unit
- Measured Service
- Measured Telephone Service
- Media Gateway
- Medium Dependent Interface
- Megabit
- Megabits Per Second
- Megabyte
- Megabytes Per Second
- Memory Cache
- Mercury LoadRunner
- Merge
- Message Passing
- Message Switching
- Message-Driven Processing
- Metacomputing
- Metadata
- Metadirectory
- Microdata
- Microsoft Access
- Microsoft Enterprise Library
- Microsoft Foundation Class Library
- Midrange
- Mobile Data Center
- Mobile Deep Packet Inspection
- Mobile IP
- Mobile Search
- Mobile Virtual Network Enabler
- Modulation Fallback
- Monad
- MongoDB
- Moniker
- Most Significant Bit
- Mount
- Multi Channel Television Sound
- Multidimensional Database
- Multidimensional Database Management System
- Multidimensional Expressions
- Multihoming
- Multimedia Home Platform
- Multiplexing
- Multithreading
- Multi-User Domain Object Oriented
- Naive Bayes
- Named-Entity Recognition
- Nanochip
- Narrowband
- National Cyber Security Division
- National Information Assurance Partnership
- National Vulnerability Database
- Network Architecture
- Network Bottleneck
- Network Database
- Network Interface Card
- Network Latency
- Network Layer
- Network Security
- Network Transparency
- NewSQL
- Nibble
- Nickel-Metal Hydride Battery
- NiFi
- NIST 800-53
- Noise
- Nonce
- Normalization
- Nroff
- Null Modem
- Obfuscation
- Obfuscator
- Object Data Model
- Object-Oriented Database Management System
- Object-Relational Database Management System
- Octet
- One-to-Many Relationship
- One-to-One Relationship
- Online Data Storage
- Open Data Definition
- Open Document Management API
- Open-Source Big Data Analytics
- Operation Shady Rat
- Optical Fiber
- Optical Fiber Amplifier
- Optical Fiber Cable
- Optical Mark Recognition
- Optical Scanner
- Orphaned VM File
- Outlier Detection
- Packet Analyzer
- Packet Loss
- Packet Switched Network
- Packet Switching
- Pad Character
- Parallel Data Analysis
- Parallel Method Invocation
- Parallel Query
- Parity Check
- Passive Biometrics
- Passive Reconnaissance
- Password Cracking
- Payment Card Industry Data Security Standard
- Pebibit
- Peer Discovery
- Penetration Testing
- Perfect Forward Secrecy
- Persistence
- Persistent Cookie
- Personal Health Information
- Personal Identification Number
- Personally Identifiable Information
- Petabit
- Petabyte
- Petabyte Age
- Physical Data Model
- Physical Layer
- Picocell
- Pinout
- Pipeline
- Pipeline Burst Cache
- Point-to-Point Protocol
- Polymer Memory
- Polymorphic Virus
- Port 80
- Port Scanning
- Portal Application
- Post-Processing Deduplication
- Predictive Data Mining
- Predictive Dialer
- Presentation Layer
- Primitive Data Type
- Principal Component Analysis
- Privacy International
- Private
- Private Key
- Product Information Management
- Product Lifecycle Management
- Programmable Read-Only Memory
- Progressive Download
- Project Management
- Protected Health Information
- Protocol
- Public Key Cryptography
- Pulse Amplitude Modulation
- Pulse Code Modulation
- Pulsing Zombie
- Punchdown Block
- Quality of Service
- QualityStage
- Quantum Computer
- Quantum Computing
- Query
- Query Analysis
- Query Optimizer
- Quick Response Code
- RAID 3
- RAID 4
- RAID Data Recovery
- Rail Fence Cipher
- Random Forest
- Range
- Raw Data
- Real Time Big Data Analytics
- Real-Time Analytics Platform
- Real-Time Analytics Tools
- Real-Time Big Data
- Real-Time Communications
- Real-Time Customer Analytics
- Real-Time Data
- Real-Time Data Monitoring
- Real-Time Data Processing
- Real-Time Data Streaming
- Real-Time Log Analysis
- Real-Time Predictive Analytics
- Record
- Recovery Point Objective
- Red Screen of Death
- Redaction
- Redaction Tools
- Redundant Array of Independent Disks
- Reed-Solomon Codes
- Relational Database
- Remote Access Trojan
- Remote Copy
- Remote Data Backup
- Remote Sensing
- Removable Media
- Repeating Group
- Replication
- Request for Proposal
- Restore Point
- Retainable Evaluator Execution Framework
- Reward Path
- Right Holder
- Risk Analysis
- Root Node
- Routing
- Routing Information Protocol
- Routing Metric
- Routing Protocol
- Safe Harbor
- Sales Analytics
- Sandy Bridge
- SAP HANA
- SAP Integration Repository
- Scalable Processor Architecture
- Scalar
- Schema Matching
- Schema on Write
- Screen Scraping
- Search Algorithm
- Section 508
- Secure Data Storage
- Secure Delete
- Secure File Transfer Protocol
- Secure Neighbor Discovery Protocol
- Secure Server
- Security Token
- Seed
- Segment Routing
- Self-Organizing Map
- Self-Service Analytics
- Semantic Data Model
- Semantic Network
- Semi-Structured Data
- Sensitive Compartmented Information
- Serial Copy Management System
- Serial Presence Detect
- Serial Storage Architecture
- Server Colocation
- Service Bureau
- Service Data Objects
- Service-Oriented Analysis and Design
- Service-Oriented Architecture
- Service-Oriented Architecture Repository
- Shadow IT
- Shared Resources
- Shared Secret
- Shared Storage
- SIGCOMM
- Signal
- Silo
- Silver Satin
- Simple Knowledge Organization System
- Single Chip Cloud Computer
- Single Inline Package
- Single Source Proof Of Concept
- Sliding Window
- Small Computer System Interface
- Small Data
- Smart Tag
- SMS Gateway
- Social Master Data Management
- Soft Copy
- Solid State Drive
- Sorting Algorithm
- Spaghetti Diagram
- Spark Streaming
- Spatial Data
- Spatial Data Mining
- Spatial Database
- Spatial Division Multiple Access
- Splay Tree
- SQLite
- Stack
- Stack Smashing
- Standby
- Star Topology
- Static Data
- Static Members
- Static Visualization Toolkit
- Statistical Mean
- Stealth Virus
- Stemmer
- Storage
- Storage Area Network
- Storage as a Service
- Storage at the Edge
- Storage Capacity
- Storage Robot
- Store-and-Forward Manager
- Stream Control Transmission Protocol Endpoint
- Stream Processing
- Streaming Analytics
- Stress Testing
- String
- Structured Data
- Structured Query Language
- Structured System Analysis and Design Method
- Subnetwork Access Protocol
- Subsidiary Rights
- Superblock
- Supernet
- Support Vector Machine
- Surveillance Capitalism
- Switched Multimegabit Data Service
- Symbolic Link
- SYN Attack
- Synchronous Transmission
- Synthetic Data
- System Checkpoint
- System Global Area
- Systems Management
- Tab Delimited
- Tablet
- Tabular Data Control
- Tag Switching (Label Switching)
- Target Deduplication
- Telematics
- Telephone Company
- Template
- Terabit
- Terabyte
- Ternary Tree
- Test Set
- Text Data Mining
- Third Normal Form
- Throughput
- Thunderbolt
- Ticket-Granting Ticket
- Tier 1 Data Center
- Tier 2 Data Center
- Tier 3 Data Center
- Tier 4 Data Center
- Tiered Storage
- Time Division Duplex
- Time Division Multiplexing
- Time to Live
- Token
- Token Ring Network
- Tool Kit
- Training Data
- Transaction Monitoring
- Transaction Process System
- Transactional Data
- Transactions Per Second
- Transcoding
- Transfer Rate
- Transmission Control Protocol/Internet Protocol
- Transmission Sequence Number
- Transparency
- Transparent Data Encryption
- True Positives
- Tunneling Virus
- Tuple (Database)
- Typographic Hierarchy
- Unicode
- Universally Unique Identifier
- UNIX 95
- Unix-to-Unix Copy
- Unix-to-Unix Encode
- Unknown Host
- Unlabeled Data
- Unstructured Data
- Unstructured Data Analysis
- UPDATE
- Upgrade
- URL Shortening
- Utility Right
- V.22
- V.42
- Validity Check
- Variable
- Variety
- Vector
- Velocity
- Versioning File System
- Vertical Blanking Interval
- Vertical Redundancy Check
- Very High Density
- Very High Speed Digital Subscriber Line
- Video on Demand
- View
- View (MVC)
- Vigenere Cipher
- Virtual Circuit Identifier
- Virtual Data Room
- Virtual Master Data Management
- Virtual Tape Library
- Virtual Teletype
- Virtual World
- Visual Basic
- Vocabulary Management Solution
- Voice Over Internet Protocol (VoIP) Packet Loss
- Voice Over Wireless Fidelity
- Volume
- Volume Boot Record
- Von Neumann Bottleneck
- Vulnerability Management System
- Vulnerability Scanning
- VxWorks
- Warchalking
- Warm Data
- Wavelet
- Web Application Security
- Web Intermediary
- Web Mining
- Web Page
- Web Service
- Weighted Fair Queueing
- Werner Buchholz
- WetPC
- Whaling
- Wide Area Network
- Wildcard Character
- Windows Imaging Format
- Windows Management Instrumentation (WMI) Database
- Windows Minidump
- Wireless Spectrum
- Wireshark
- Work Flow
- Write-Once, Read-Many
- Write-Through Cache
- XMODEM
- XON/XOFF
- XSS Hole
- Yagi Antenna
- Zero-Bit Insertion
- Zero-Day Threat
- ZIP File
- ZMODEM