A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Key concept of object-oriented programming that refers to handle complexity by hiding unnecessary details from the user.
Application Programming Interface (API)
Mechanism that enables an application or service to access a resource within another application or service.
Application software
Program designed to do a specific task other than an operation for the computer itself, like user-oriented tasks. Example: text editor, media player, etc.
Typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment.
Firmware used to provide runtime services for OS and programs and to perform hardware initialization during the booting process.
Field that treats ways to extract, store, analyze and process for creating value for an organization, meeting the 5 V's: volume, velocity, variety, veracity and value.
Pattern of bits indicating which bits in a second pattern are to be modified. E.g.: a binary IP address mask is a bitmask.
List of data organized by immutable blocks, managed by a peer-to-peer network, as a distributed ledger.
Certificate Authority (CA)
Entity that stores, signs and issues digital certificates.
Process of predicting the class of given data points. E.g.: given a picture of a dog, the algorithm predicts that the picture is a dog.
Client Relationship Management (CRM)
Technology for managing all your company's relationships and interactions with customers and potential customers.
General agreement. In decentralized systems, it brings nodes back in sync. To reach consensus, mechanisms such as proof-of-work, proof-of-stake and more are used.
Convolutional Neural Network (CNN)
Type of neural network processing grid-like data (images, time-series, spectrograms, ...) for recognition and classification.
Centralized repository of raw data collected from various sources for further processing.
Centralized repository of data collected from various sources within an organization, designed to support business decisions.
Decentralization
Process of distributing or dispersing functions, powers, people or things away from a central location or authority.
Delegate call (Solidity)
Type of function call in Solidity that allows to execute code of another contract while preserving the current context (storage, caller, value, etc.). Often used to implement proxy contracts.
Digital certificate
Electronic document used to prove the validity of a public key.
Double-spending
Potential flaw in a digital cash scheme in which the same single digital token can be spent more than once. It can lead to inflation by creating a new amount of copied currency that did not previously exist.
Ethereum Improvement Proposals (EIP)
Standards specifying potential new features or processes for Ethereum.
Key concept of object-oriented programming that refers to bundle data and methods into a single unit frequently in the form of class.
Computer software that provides the low-level control for a device's specific hardware.
Multidimensional data that can be represented as a grid of values, such as images with pixels, audio spectrograms with time and frequency, etc.
General increase in the price level of goods and services in the economy. It is caused by a decrease in the purchasing power of money. This decrease can be caused by an increase in the amount of money in circulation (printing money).
Key concept of object-oriented programming that refers to deriving a class from other classes.
Request for the processor to interrupt currently executing code, by saving its state, then to execute an interrupt handler (or Interrupt Service Routine, or ISR), to execute another process.
Interrupt Service Routine (ISR or interrupt handler)
Special block of code used for implementing device drivers or transitions between protected modes of operation, such as system calls.
Program at the core of a computer's OS which has complete control over the system, for managing interactions between hardware and software components.
Refers to how easy it is to trade assets without impacting their price.
Pile of cryptocurrencies locked in a smart contract.
Liquidity provider
Person who funds a liquidity pool with assets.
Practice of collaboration between data scientists and operation professionals (DevOps) to help manage the production machine learning lifecycle.
32-bit number that miners need to find, for finding the next block hash and getting rewarded.
Computational framework inspired by the human brain, composed of interconnected nodes (neurons) that process and relay information from one layer to the next. Its structure allows it to effectively learn and adapt to complex data patterns.
Object-oriented programming
Paradigm in which programs are structured around objects or data fields rather than functions or logic.
Operating system (OS)
System software that manages computer hardware, software resources, and provides common services for computer programs.
Open Source Intelligence (OSINT)
Collection and analysis of data gathered from open sources to produce actionable intelligence.
Open Web Application Security Project (OWASP)
Online community that produces freely available articles, methodologies, documentation, tools, and technologies in the field of web application security.
Penetration test (pentest)
Authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
Describes the concept that you can access objects of different types through the same interface.
Proof of Concept (PoC)
Key step in the development of a new product or service, where we demonstrate its sustainability.
Cryptographic element that is the publicity shared half of an encryption code and that can be used only to encode messages.
Subfield of classification, for identifying a specific instance of an object within a class. E.g.: given a picture of a dog, the algorithm predicts that the picture is a dog of a specific breed.
Quickly accessible memory location in a CPU that stores data for arithmetic operations.
Representational State Transfer (REST)
Architectural style for developing web services.
API that conforms to the design principles of the REST architectural style.
Refers to the difference between the expected price of a trade and the price at which the trade is executed.
Refers to exchanging one crypto asset to another.
System software
Program that manages memory, files, processor, ... It also provides interfaces between application software and hardware.
Upkeep (Chainlink)
Smart contract registered on the Keepers Registry, so the Keepers Network can automate it.
Unique sequence of characters that identifies a logical or physical resource used by web technologies.
URI subset that indicates where a resource is located
URI subset that permanently designates a resource.
Act of putting money into DeFi applications as a liquidity provider, to earn interest, fees or other rewards.
Zero-Day (0-Day)
Unpatched security vulnerability that is unknown to the software, hardware or firmware developer.