The language of silicon dreams and stack overflows.
Data about data—the informational equivalent of a file's biography, telling you who created it, when, how, and probably judging your file naming conventions. It's the invisible post-it notes attached to every digital thing, containing all those details you never think about until a lawyer asks for it in discovery. Think of it as your file's résumé, except it can't lie about its graduation date.
Short for ampere, amplifier, or ampoule, because why use complete words when you can confuse three different professions at once? Electricians measure current with it, musicians crank it up to eleven with it, and medical professionals fill syringes from it. Context is everything, or you'll end up asking a sound engineer to inject you with 120 volts.
The automated measurement and recognition of biological characteristics, or as privacy advocates call it, 'turning your face and fingerprints into passwords you can't change.' Modern tech companies use biometrics to unlock your phone, track employees, and occasionally misidentify people in hilariously problematic ways. It's the future of security, assuming you're comfortable with your unique biological features being stored in some database somewhere.
In version control systems like Git, the act of moving or combining a sequence of commits to a new base commit, which sounds simple until you're knee-deep in merge conflicts at 2 AM. It's the 'rewriting history' option that makes your commit timeline look clean and professional while hiding the messy reality of your development process. Use with caution, or risk the wrath of teammates whose commits you just obliterated.
The person with elevated privileges and system access who can fix things when they break and break things when they're fixing them. In IT, administrators are responsible for keeping networks, servers, and databases running, which means they're perpetually blamed when anything goes wrong. They possess the sacred power to reset your password and the burden of being everyone's first call during outages.
The combination of username and password required to access a system, or the increasingly frustrating ritual of trying to remember which email address you used and whether you capitalized anything. The login process is supposed to be security, but mostly it's an exercise in password recovery and two-factor authentication anxiety. Every app wants its own login, because apparently password managers aren't full enough yet.
The magical process of teaching machines to do your job so you can focus on explaining to management why you're still necessary. It's the art of replacing human error with systematic, scalable, computerized error. Essentially, it's converting manual tasks into automatic ones using technology, theoretically freeing humans for "higher-level thinking" (read: more meetings).
In programming, the mystical process where human-readable code gets transformed into machine-executable instructions by a compiler—essentially translation services for computers. It's the moment of truth where you discover whether your 500 lines of code are genius or contain 47 syntax errors. The computer science equivalent of baking: you mix ingredients (code), apply heat (compiler), and hope you don't get a brick.
An aerodynamic shell or structure designed to reduce drag and smooth airflow over vehicles, aircraft, or spacecraft—basically cosmetic surgery for engineering that actually improves performance. It's the sleek covering that makes things go faster by tricking the air into flowing smoothly instead of creating turbulent chaos. Function meets form when making things slippery becomes a science.
In tech and AI contexts, the principle that algorithms and systems should treat all users equitably without bias or discrimination—a surprisingly difficult goal when training data reflects humanity's historical prejudices. It's the ethical ideal that your credit score algorithm shouldn't care about your zip code, even though it probably does. The tech industry's attempt to make machines better at equality than humans are.
Software designed to detect, prevent, and remove malicious programs from your computer, essentially a digital immune system that's perpetually fighting the latest cyber diseases. It's the software you install, immediately forget about, then wonder why it's slowing down your computer during important presentations. The security industry's most successful ongoing subscription model, selling protection from threats they help make scary.
An architecture where multiple client programs request services and resources from a centralized server, like a restaurant where customers (clients) order from a kitchen (server) instead of cooking themselves. It's the backbone of most modern computing, from email to web browsing, where the heavy lifting happens on powerful servers while clients just display results. The IT equivalent of specialization and division of labor, now with more latency issues.
The process of confirming that something is accurate, authentic, or meets specified requirements—essentially checking your work before submitting. In tech, it's ensuring code does what it's supposed to do; in business, it's confirming data accuracy; in social media, it's that blue checkmark proving you're actually famous. The adult equivalent of "double-check your answers" from school tests.
A hardware or software signal that rudely tells the processor to drop everything it's doing and handle something 'more important' right now, like your keyboard input or network packet. It's the computing equivalent of someone barging into your office during deep work. Without interrupts, modern computing wouldn't work; with them, your CPU has the attention span of a caffeinated squirrel.
The state of being asleep or inactive, like that project you swear you'll finish someday or the code repository that hasn't been touched since 2019. In tech, it's when systems or processes are intentionally paused but theoretically could wake up, unlike your motivation on Monday mornings. Think hibernation mode, but for software, biological entities, or your gym membership.
In tech, it's the code you embed to monitor, measure, and log what your application is actually doing behind the scenes, because trust but verify. Think of it as installing security cameras in your software to catch bugs in the act. In music, it's arranging notes for different instruments, but let's be honest, you're here for the tech definition.
The arcane text that developers write to make computers do things, composed of strict syntax that will break if you miss a single semicolon. It's simultaneously the most logical and most frustrating thing humans have ever created. Also refers to laws, secret messages, and moral standards, but in tech circles, it's always about those sweet, sweet lines of JavaScript that definitely don't have any bugs.
The particular way you've arranged all the settings, parts, or options of a system—basically the 'build' of your tech setup. In IT, it's the difference between a computer that purrs and one that sounds like an angry lawnmower. Getting the configuration right is half science, half voodoo, and entirely critical for things to actually work.
The art of watching people or places continuously, either for legitimate security purposes or because you've seen too many spy movies. Can range from security cameras protecting your local 7-Eleven to elaborate intelligence operations that would make James Bond jealous. In healthcare, it's less creepy and more about tracking disease patterns instead of people.
An imaginary line connecting points on Earth where your compass points at the exact same wonky angle away from true north. Geographers and navigators love these lines because magnetic declination is messy, and apparently someone needed to map out all the places where compasses are equally confused. It's like a contour map for magnetic chaos.
Software that's basically the digital equivalent of food poisoning—it gets into your system and wreaks havoc while you wonder what you clicked to deserve this. Hackers design these delightful programs to steal your data, hijack your computer, or just generally ruin your day. It's the reason IT departments send those annoying "don't click suspicious links" emails that everyone ignores.
A speedy little storage spot where your computer or browser stashes frequently used stuff so it doesn't have to fetch it from the slow-ass hard drive or internet every single time. Think of it as your system's equivalent of keeping snacks in your desk drawer instead of walking to the vending machine. Clear it when things get weird, hoard it when you want speed.
The art of converting a chunky pixel-based image into smooth mathematical curves that can scale infinitely without looking like garbage. Programmers also use it to transform code that plods through data one item at a time into turbocharged operations that process multiple values simultaneously. It's basically giving your graphics or calculations a performance-enhancing upgrade.
In software development, the sacred primary repository where the "official" version of code lives, before ambitious developers fork it into a thousand experimental directions. In aviation, it's the actual airline doing the flying, as opposed to their sketchy regional partners. The verb form means injecting drugs directly into your veins, but let's focus on the tech definition.