The encyclopedia explains the major technical terms used to describe the technologies for the future markets of today, tomorrow and beyond. From A as in app to M as in MEMS right through to Z as in ZigBee.


Someone who gains unauthorised access to IT systems by bypassing their security


Stand-alone devices, modules or cards in which cryptographic keys are generated and stored. They assure the integrity of data.


Hypertext Markup Language

Hybrid Cloud

Combination of private and public Cloud and traditional IT environment.