Tech Terms3

Human Intelligence   
a measure of someone's ability to understand and solve complicated problems.   

Turing Test   
The test that is used to judge whether a computer is intelligent or not.   

Intelligent robots   
Robots that can understand and solve problems as well as understand some form of communication.   

Depth First Search   
Vertical Search from top to bottom   
Breadth First Search   
Horizontal Search from left to right   

Semantic Net[work]   
A labeled, directed graph with nodes representing physical or conceptual objects and labeled arcs representing relations between objects. ...   

Declarative Language   
A language that allows programming by defining the boundary conditions and constraints and letting the computer determine a solution that meets ...   

Expert Systems   
A software system with two basic components: a knowledge base and an inference engine.The system mimics an expert's reasoning process.   

Chatterbot   
A chatterbot is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. ...   
Goal   

Cloud broker
    An entity that creates and maintains relationships with multiple cloud service providers. It acts as a liaison between cloud services customers and cloud service providers, selecting the best provider for each customer and monitoring the services.

Disruptive technology
    A term used in the business world to describe innovations that improve products or services in unexpected ways and change both the way things are done and the market. Cloud computing is often referred to as a disruptive technology

Subgoal   
A subgoal is a goal set up by a problem solver in an attempt to solve another goal.   

ELIZA   
ELIZA is a famous 1966 computer program which responds in a situation with a patient by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts? ...   

Handwriting Recognition   
Handwriting recognition is the ability of a computer to receive intelligible handwritten input. The image of the written text may be sensed "off ...   

Speech Recognition   
A machine or software capable of recognizing spoken language. The machine or software may take the spoken language and translate it into written ...   

blind carbon copy
a copy of a message which all persons on the Bcc: list receive. Recipients cannot see who else has received the message: hence the term "blind".

OpenNebula
An open source toolkit for building public, private and hybrid clouds.

CCMM
Cloud Computing Maturity Model. Defines five stages of evolution for an enterprise data center to migrate to cloud computing. The five stages are: consolidation, virtualization, automation, utility and cloud.

Artificial Neural Networks   
Artificial neural networks are made up of interconnecting artificial neurons (programming constructs that mimic the properties of biological neurons). Artificial neural networks may either be used to gain an understanding of biological neural networks, or for solving artificial intelligence problems without necessarily creating a model of a real biological system.   

Hardware Developmens   
Developments in Hardware over time e.g. Computers and Television   

Vision Systems   
artificial Vision Systems (computer based systems where software performs tasks assimilable to "seeing", usually aimed to industrial quality assurance, part selection, defect detection etc).   

Natural Language Processing   
Natural-language-generation systems convert information from computer databases into normal-sounding human language. Natural-language-understanding systems convert samples of human language into more formal representations that are easier for computer programs to manipulate.   

CDN
Content delivery network — A system consisting of multiple computers that contain copies of data, which are located in different places on the network so clients can access the copy closest to them

Architecture
In the context of IT systems, as opposed to buildings, "architecture" describes the approach to designing and constructing of systems, networks, applications or even information storage.

Black Hat
 A term used most frequently in relation to Information Technology or Information Security referring to a person (especially a hacker who uses their skills and resources for personal gain or malicious intent. Believed to come originally from old Western movies, where the "bad guy" would often wear a black hat!

CISSP
Certified Information Systems Security Professional - an independent, internationally-recognised security certification, confirming that an individual has an understanding of a defined "Common Body of Knowledge" relating to Information Security.

Cold Site
A backup or secondary site (for reasons of Business Continuity or Disaster Recovery) that can be up and running to take over from a failed site (or system) in 1-2 days, usually by powering up secondary systems and restoring from the latest backup taken from the failed site or system.

Adware
Any advertising software which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

Key logger
Sometimes called a keystroke logger, key logger, or system monitor, it is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.

CIDR (Classless InterDomain Routing)
An address allocation method and routing scheme designed for the IP protocol to make more effective use of IP addresses.

Entropy.
A measure often used in data mining algorithms that measures the disorder of a set of data.


Countermeasure
A security measure implemented in order to mitigate an identified risk, or perhaps to maintain a baseline level of security

Binning
The process of breaking up continuous values into bins. Usually done as a preprocessing step for some data mining algorithms. For example breaking up age into bins for every ten years.

Crippleware
Any software (or service) that disables itself (or key functions) after a certain amount of time (perhaps after a 'trial' period), or until a fee is paid (e.g. an upgrade from a "Lite" version to the "Full" version).

CREST
Standing for the Council of Registered Ethical Security Testers, this is one of two organisations in the UK (the other being TIGER that enable professionals in the security testing (or penetration testing) industry to prove their expertise, by paying to take theoretical examinations and practical tests.

CART
Classification and Regression Trees. A type of decision tree algorithm that automates the pruning process through cross validation and other techniques.

Cybercrime
criminal activity taking place through exploitation of electronic mechanisms
   
Cyber Attack
A technical attack against the Confidentiality, Integrity or Availability of systems, networks or telecommunications

Cyber Security
Information Security, with a particular focus on interconnection and integration with untrusted internetworked systems

Cyberwar or Cyberwarfare
A general term describing ongoing offensive and defensive activity in the electronic realm

SHARE

About df

    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment