Loading...
- 10 Gigabit Ethernet
- 1951 USAF resolution test chart
- 2-opt
- 3-opt
- 3-partition problem
- 3D city models
- 3D computer graphics
- 3D food printing
- 3D printing
- 3D printing speed
- 3D reconstruction
- 3D rendering
- 3D scanning
- 3D Slicer
- 4+1 architectural view model
- 4th dimension
- 5G network slicing
- 5G NR
- 6LoWPAN
- 8-bit color
- A* search algorithm
- Aarogya Setu
- ABAP
- ABox
- Abstract data types
- Abstract state machines
- Abstract syntax
- Abstraction
- Access control matrix
- Accession numbers
- Accounting rate of return
- ACIS
- Acknowledgement
- Acoustic models
- ACPI
- Active databases
- Active-pixel sensor
- Activity diagrams
- Actor model
- Actors
- Ad blocking
- Ad hoc network
- Ad hoc on-demand distance vector routing
- Ada Lovelace
- Adaptive algorithm
- Adaptive chosen-ciphertext attack
- Adaptive equalizer
- Adaptive histogram equalization
- Adaptive Huffman coding
- Additive manufacturing file format
- Address space
- Adjacency lists
- Adjacent channel
- ADL
- Admission control
- Adobe Acrobat
- Adobe Illustrator
- Adobe Photoshop
- Adreno
- Adversary
- Adware
- Affine scaling
- Affinity propagation
- Agent architecture
- Agent-based models
- AgentSpeak
- Aggregate functions
- Agile software development
- AI
- AI winter
- Air gap
- Aircrack-ng
- AJAX
- Akka
- Akoma Ntoso
- Algebraic modeling language
- Algol 60
- Algorithmic efficiency
- Algorithmic game theory
- Algorithmic trading
- Aliases
- ALICE
- Allocators
- Amazon Machine Image
- Amazon Mechanical Turk
- Ambient backscatter
- Ambient occlusion
- Amdahl's Law
- AMiner
- AMQP
- Anaconda
- Analog image processing
- Analyse-it
- Analysis paralysis
- Anchor text
- Android Runtime
- Angular
- AngularJS
- Anisotropic diffusion
- Anisotropic filtering
- Annotations
- Anomaly detection
- Anomaly-based intrusion detection system
- Anonymous functions
- Answer set programming
- Ant
- Ant colony optimization algorithms
- Anti-patterns
- Antivirus software
- Anycast
- Anytime A*
- Apache
- Apache Cassandra
- Apache Hadoop
- Apache HBase
- Apache HTTP Server
- Apache Jena
- Apache Kafka
- Apache Lucene
- Apache Pig
- Apache Solr
- Apache Spark
- Apache Storm
- Apache Subversion
- Apache Tomcat
- APL
- App
- Apple
- Apple II
- AppleScript
- Applicability domain
- Application framework
- Application security
- Application server
- Application software
- Approximate computing
- Approximate inference
- Approximate string matching
- Approximation algorithm
- Apriori algorithm
- Apt
- AQM
- Arc routing
- ArchiCAD
- ArchiMate
- Architectural patterns
- Architecture framework
- ARCore
- Argument maps
- Arithmetic coding
- ARM
- Armadillo
- ARP
- ARP cache
- ARPACK
- Arpanet
- Array slicing
- Arrays
- Artificial bee colony algorithm
- AS2
- ASLR
- AspectJ
- Assembly language
- Assertions
- Asset
- Assignment
- Assignment problem
- Association rule learning
- Associative arrays
- Asterisk
- Asynchronous serial communication
- ATM
- Atomic broadcast
- Atomicity
- Attack surface
- Attack tree
- Attack vector
- Attention economy
- Attribute-based encryption
- Attributes
- Audience response
- Audio file format
- Audio video bridging
- Audits
- Auralization
- Authenticated encryption
- Authentication protocol
- Authentication server
- Autoconf
- Autodesk Maya
- Autodesk Revit
- AutoLISP
- Automata theory
- Automated storage and retrieval system
- Automatic parallelization
- Automatic Repeat Request
- Automatic summarization
- Automatic variables
- Automatically tuned linear algebra software
- Autonomy
- Autopoiesis
- Autoscaling
- Avalanche effect
- Average-case complexity
- Avionics full-duplex switched ethernet
- AWS Lambda
- AWT
- B channel
- B-trees
- B+ trees
- BabelNet
- Backbone network
- Backhaul
- Backlinks
- Backtracking
- Backup software
- Backups
- BACnet
- Balanced scorecard
- Barriers
- Bash
- Basic blocks
- Basic feasible solution
- Baud
- Bayer filter
- Bayesian inference using Gibbs sampling
- BB84
- BCC
- BCF
- Bcrypt
- BDD
- Be My Eyes
- BeagleBoard
- Beam search
- Beam tracing
- Beep
- Bees algorithm
- Behavior trees
- Behavioral analytics
- Belief revision
- Benchmark
- Benders decomposition
- BEOL
- Beowulf clusters
- BER
- Best-first search
- BFD
- BFS
- BGP
- Bias tee
- Bibliographic database
- Biclustering
- Bicubic interpolation
- Bidirectional search
- Bifurcation diagram
- Big data
- big M method
- BigBlueButton
- BigQuery
- Bigram
- Bigraphs
- Bigtable
- BIM
- Binary classification
- Binary code
- Binary data
- Binary files
- Binary images
- Binary large object
- Binary search algorithm
- Binary XML
- Bio-inspired computing
- Biogeography-based optimization
- Bisection method
- Bisimulation
- Bit array
- Bit inversion
- Bit rate
- Bit-reversal permutation
- Bitcoin Core
- BITS
- Bitstream
- BitTorrent
- Bivariate data
- Black box
- Blackbox
- Blacklisting
- Blade servers
- Blake
- Blitz++
- Block cipher
- Block size
- Blockchain
- Bloom
- Bloom filters
- Blossom algorithm
- Blowfish
- BlueBorne
- Bluetooth
- Bluetooth stack
- Bond graphs
- Bookmarking
- Bookmarklets
- Boost
- Booting
- Bootloader
- Bootstrap
- Bootstrapping
- Botnets
- Bottleneck
- Boundary representation
- Boundary scan
- Bounding sphere
- Bounding volumes
- BPEL
- BPML
- Bpp
- BQP
- Branch and cut
- Branch and price
- Breach
- Breakpoints
- Brent's method
- Broadcast encryption
- Broadcasting
- Browser engine
- Browser extensions
- Browser wars
- Browsing
- Brute-force attacks
- Brute-force search
- BS
- BSON
- BTS
- Bubble sort
- Bucket sort
- Buffer overflows
- Build automation
- Bump mapping
- Bus network
- Business analytics
- Business informatics
- Business logic
- Business metadata
- Business reference model
- Business simulations
- Business software
- BVH
- Byte pair encoding
- Byzantine fault
- C standard library
- C to HDL
- C++ AMP
- C++11
- C11
- C99
- CAAD
- Cache poisoning
- CAD
- CAD data exchange
- CAE
- Caesar cipher
- Cairo
- CakePHP
- Call setup
- Call site
- Call stack
- Calling conventions
- Calm technology
- CAM
- Camel case
- Camellia
- CAN bus
- Canny edge detector
- CANopen
- CAP
- CAP theorem
- Capacity building
- Capacity management
- Carbon copy
- Cardano
- Carrier-Sense Multiple Access with Collision Avoidance
- Carrier-Sense Multiple Access with Collision Detection
- Cartographic generalization
- CAS
- Cash conversion cycle
- Cataloging
- Categorical variables
- Categorization
- CATIA
- CBC-MAC
- CCMP
- CCN
- CDA
- CDMA
- CEF
- Celeron
- CellML
- Cellular automata
- Censoring
- Centering matrix
- Centralized database
- Certificate
- Certificate revocation
- CFA
- CG
- CGAL
- CGI
- Cgroups
- Chain code
- Chaos
- Chaos theory
- Character
- Chatbots
- Checksum
- Chemical databases
- Chemical imaging
- Chemical space
- Cheminformatics
- Cherenkov luminescence imaging
- Child processes
- Chinese Postman Problem
- Chomsky hierarchy
- Chosen-ciphertext attack
- Chosen-plaintext attack
- Christofides algorithm
- CIF
- CIM
- CINECA
- CIO
- Ciphers
- Ciphertext
- Ciphertext-only attack
- CIR
- Circuit complexity
- Circulation problem
- Citation
- Citizen science
- CityGML
- Clamping
- Clang
- Class diagram
- Class hierarchy
- Class invariants
- Class variable
- Classification rule
- Classification scheme
- Classifiers
- Clean
- Client
- Client certificate
- Client-side
- Clipboard
- CLIPS
- Clique problem
- Clojure
- Closed systems
- Cloth modeling
- Cloudlet
- Cluster analysis
- Clusters
- CLV
- CMMS
- CMS
- CMTS
- Co-fired ceramic
- Co-location
- co-NP
- Cobie
- COBOL
- Cobweb
- Coda
- Code as data
- Code injection
- Code refactoring
- Code reuse
- Code review
- Code words
- Codebook
- Codecs
- Coding
- Cognitive maps
- Cognitive networks
- Coincidence counting
- Cold data
- Cold start
- Collaborative filtering
- Collaborative product development
- Collaborative software
- Collective knowledge
- Collective operations
- Collision attack
- Collision domain
- Collision resistance
- Color
- Color histogram
- Color management
- Color quantization
- Color reproduction
- Color science
- Color space
- Color vision
- Color-coding
- Coloured Petri nets
- Column family
- COM
- Combinatorial optimization
- Command language
- Comments
- Commercialization of the internet
- Commit
- Commodore PET
- Common data model
- Common Lisp
- Common Open Policy Service
- Common subexpression elimination
- Commonsense knowledge
- Communication complexity
- Communication protocols
- Communications security
- Community informatics
- Companding
- Compendium
- Compile time
- Compiler
- Complete-linkage clustering
- Complex adaptive systems
- Complex data type
- Complexity classes
- Component-based software engineering
- Composability
- Compositional data
- Computation offloading
- Computational complexity
- Computational complexity theory
- Computational creativity
- Computational engineering
- Computational geometry
- Computational learning theory
- Computational linguistics
- Computational materials science
- Computational mechanics
- Computational models
- Computational neuroscience
- Computational problem
- Computational resources
- Computational science
- Computational semantics
- Computational social science
- Computational statistics
- Computational thinking
- Computer algebra
- Computer cluster
- Computer configuration
- Computer forensics
- Computer graphics
- Computer languages
- Computer networks
- Computer performance
- Computer program
- Computer programming
- Computer science
- Computer scientists
- Computer security
- Computer simulation
- Computer viruses
- Computer-aided process planning
- Computer-generated holography
- Computer-mediated communication
- Computing
- Computing platform
- COMSOL Multiphysics
- Concatenation
- Concept drift
- Conceptual graphs
- Conceptual schema
- Conceptualization
- Concordances
- Concurrency
- Concurrency control
- Concurrent computing
- Conda
- Conditional
- Confidentiality
- Configuration files
- Configuration items
- Configuration management
- Configurator
- Conflict resolution strategy
- Conformal prediction
- Confusion and diffusion
- Congestion pricing
- Conjunctive query
- Connected dominating set
- Cons
- Consistent hashing
- Const
- Constant bitrate
- Constrained Delaunay triangulation
- Constraint graph
- Constraint logic programming
- Constraint programming
- Constraint satisfaction
- Constructors
- Consumer behaviour
- Consumer privacy
- Contactless payment
- Content management
- Context switch
- Continuation
- Continuous delivery
- Continuous integration
- Continuous liquid interface production
- Contraction hierarchies
- Contrast-to-noise ratio
- Control flow
- Control language
- Control Panel
- Control plane
- Control-flow diagram
- Controlled vocabulary
- Converged infrastructure
- Conversational commerce
- Convolutional codes
- Conway's Law
- CONWIP
- Copy
- Copy protection
- Copy-on-write
- CORBA
- Core router
- Coroutines
- Correctness
- Correlation clustering
- Correlation immunity
- Correlation integral
- Correlation sum
- Correspondence
- Cost efficiency
- Countermeasures
- Covering problems
- Covert channels
- CPL
- CPU time
- Crash
- Cray XK7
- Critical section
- CRL
- Cross compiler
- Cross-Industry Standard Process for Data Mining
- Cross-layer optimization
- Cross-platform software
- Cross-references
- Cross-sectional data
- Cross-site scripting
- Crowd simulation
- Crowdfunding
- Cryptanalysis
- Crypto++
- Cryptocurrency
- Cryptogram
- Cryptographic hash functions
- Cryptographic primitives
- Cryptographic protocols
- Cryptography
- Cryptography standards
- Cryptojacking
- Cryptonote
- Cryptosystem
- Crystallographic databases
- CSCW
- CSD
- CSG
- CSRF
- CSS
- CSV
- CTL
- CTR
- Cuckoo filter
- Cuckoo search
- Cupy
- Cura
- Custom software
- Customer analytics
- Customer edge router
- Customer knowledge
- Cutter location
- Cutting stock problem
- CVSS
- Cyber insurance
- Cyber spying
- Cybercrime
- Cyberinfrastructure
- Cybernetics
- Cyberstalking
- Cyberterrorism
- Cyberwarfare
- Cyc
- Cyclic executive
- Cygwin
- Cypher
- Cython
- D channel
- DAB
- Daemons
- Dalvik
- DAML
- Dap
- Dark data
- Darknet
- Dart
- Darwin Core
- Dask
- Data access
- Data access layer
- Data acquisition
- Data aggregation
- Data analysis
- Data anonymization
- Data architecture
- Data at rest
- Data breach
- Data centers
- Data circuit-terminating equipment
- Data classification
- Data cleansing
- Data collection
- Data communication
- Data consistency
- Data conversion
- Data corruption
- Data cube
- Data curation
- Data degradation
- Data dictionary
- Data dissemination
- Data domain
- Data element
- Data engineering
- Data entry
- Data exchange
- Data exhaust
- Data exploration
- Data extraction
- Data file
- Data governance
- Data grid
- Data hierarchy
- Data hub
- Data in use
- Data independence
- Data infrastructure
- Data integration
- Data integrity
- Data lakes
- Data lineage
- Data link
- Data link layer
- Data literacy
- Data loss
- Data management
- Data management plans
- Data mapping
- Data marts
- Data masking
- Data migration
- Data mining
- Data model
- Data modeling
- Data monetization
- Data parallelism
- Data preparation
- Data preservation
- Data processing
- Data proliferation
- Data Protection Act 1998
- Data publishing
- Data quality
- Data rate
- Data recovery
- Data redundancy
- Data retrieval
- Data science
- Data scraping
- Data scrubbing
- Data security
- Data set
- Data sharing
- Data sonification
- Data sovereignty
- Data store
- Data stream
- Data stream mining
- Data structures
- Data system
- Data theft
- Data transformation
- Data type
- Data validation
- Data valuation
- Data verification
- Data version control
- Data virtualization
- Data warehouse
- Data wrangling
- Data-intensive computing
- Database
- Database administration
- Database administrator
- Database design
- Database engine
- Database index
- Database model
- Database schema
- Database security
- Database server
- Database transaction
- Datafication
- Dataflow
- Dataflow programming
- Datalog
- Dataspaces
- DBLP
- DBSCAN
- DCG
- DCOM
- DDE
- DDoS mitigation
- De-identification
- DEA
- Dead code
- Dead-code elimination
- Deadlock
- Deb
- Deblurring
- Debug
- Debugger
- Debugging
- Decentralized application
- Decision model
- Decision problems
- Decision support system
- Decision-making software
- Declaration
- Declarative programming
- DECnet
- Decompiler
- Decomposition method
- Deductive database
- Default
- Default logic
- Defense in depth
- Defensive programming
- Deflate
- Delaunay triangulation
- Delay-tolerant networking
- Delegation
- DELETE
- Delimiters
- Dell Optiplex
- Delphi
- Delta encoding
- Demand paging
- Demand signal
- Demosaicing
- Denotational semantics
- Depth maps
- DES
- Description logic
- Destructor
- Deterministic algorithms
- Deterministic automaton
- Deterministic encryption
- Device drivers
- Device-to-device
- DFD
- DFS
- DGN
- DHCP
- DHT
- Dictionary attack
- Diff
- Differential cryptanalysis
- Differential privacy
- Differentiated service
- Differentiated services
- Diffusion curve
- Diffusion MRI
- Digital assets
- Digital broadcasting
- Digital cameras
- Digital commons
- Digital contact tracing
- Digital curation
- Digital ecosystem
- Digital footprint
- Digital image
- Digital library
- Digital media
- Digital mockups
- Digital signals
- Digital signature
- Digital signature algorithm
- Digital thread
- Digitization
- Dijkstra's algorithm
- DIKW pyramid
- Dilation
- Direct bonding
- Directory
- Directory Access Protocol
- Directory structure
- Dirty data
- DIS
- Disassembler
- Discoverability
- Discrete manufacturing
- Discriminator
- Disintermediation
- Disjoint-set data structure
- Displacement mapping
- Distance transform
- Distance-vector routing protocol
- Distributed algorithms
- Distributed computing
- Distributed computing environment
- Distributed databases
- Distributed memory
- Distributed objects
- Distributed version control
- Distribution centers
- Distributional semantics
- DLCI
- Dlib
- DMAIC
- DMARC
- DMP
- DMS
- DMZ
- DNC
- DNP3
- DNS
- DNS spoofing
- DO-178C
- Doc
- Docker
- Docking station
- Document automation
- Document classification
- Document clustering
- Document retrieval
- Document-oriented database
- Documentation
- DoDAF
- DOI
- DOM
- Domain analysis
- Domain controller
- Domain engineering
- Domain model
- Domain name
- Domain-driven design
- Domain-specific modeling
- Dominance-based rough set approach
- Dominating set
- DOT
- Double
- Double binds
- Double-ended queue
- Double-spending
- DPLL
- Drive-by download
- Driver scheduling problem
- DRM
- Drupal
- DSMS
- DSR
- DSRC
- DSSS
- DTLS
- DTT
- Dual linear program
- Duality gap
- Dublin Core
- Dunn Index
- Duqu
- Dymola
- Dynamic array
- Dynamic consent
- Dynamic data
- Dynamic dispatch
- Dynamic imaging
- Dynamic loading
- Dynamic network analysis
- Dynamic routing
- Dynamic spectrum management
- E-science
- E-services
- EAI
- EAP
- Earned value management
- Ease
- ebXML
- ECDSA
- ECM
- ECN
- Edge computing
- Edge detection
- Edge dominating set
- Edge enhancement
- Edge-preserving smoothing
- EDI
- Edit distance
- Educational data mining
- Efficient XML interchange
- EGP
- Eigen
- Eigentrust
- Elbow method
- Electron holography
- Electronic business
- Electronic trading
- Electronics industry
- ElGamal encryption
- Email address
- Email box
- Email client
- Email encryption
- Email filtering
- Email marketing
- Email spoofing
- Embarrassingly parallel
- Embedded C
- Embedded C++
- Embedded database
- Embedded SQL
- EMF
- Emoticons
- Empathy
- Empirical software engineering
- Empty string
- Encapsulation
- Encryption
- Encryption software
- End-to-end delay
- End-to-end encryption
- End-user development
- Engineering cybernetics
- Enron Corpus
- Enterprise Architect
- Enterprise architecture
- Enterprise architecture framework
- Enterprise engineering
- Enterprise information integration
- Enterprise information system
- Enterprise integration
- Enterprise interoperability
- Enterprise software
- Entity
- Entropy coding
- Enumerated type
- Envi-met
- Environment variables
- Environmental informatics
- Ephemeral keys
- EPOC
- EPUB
- Eric
- Erlang
- ERP
- ERPS
- Error detection and correction
- Error diffusion
- Error floor
- Error message
- Error tolerance
- ESB
- ESCI
- ESP8266
- EtherCAT
- Ethereum
- Ethernet
- Ethernet flow control
- Ethernet frame
- Ethernet Powerlink
- Ethics of technology
- Eutectic bonding
- Eval
- Evaluation measures
- Evaluation strategy
- Evasion
- Event tree analysis
- Evil twin
- Evince
- Evolutionary algorithms
- Exact algorithm
- Exact cover
- Examples of data mining
- Exascale computing
- Exception handling
- Exec
- Executable
- Execution model
- EXIF
- Experimental data
- Exploit kits
- Exploits
- Exponential search
- Ext2
- Ext3
- Extensibility
- Extract class
- Extranets
- Eye pattern
- FaaS
- Facebook Like button
- Faceted classification
- Failover
- Fair data
- False color
- Fast flux
- Fast packet switching
- Fastest
- Fat tree
- Fault management
- FBX
- FDD
- FDM
- FEAL
- Feature creep
- Feature hashing
- Federal enterprise architecture
- Federation
- Feedback vertex set
- Feistel cipher
- FFT
- FHIR
- Fiducial markers
- File
- File format
- File manager
- File server
- File size
- File system
- File transfer
- Fileless malware
- Filename extensions
- Filenames
- Filter bubbles
- Findability
- Finite-state machines
- FIPS
- FIPS 140
- FIPS 140-2
- Firefox
- Firewalls
- Fish school search
- FITS
- Fixed wireless
- Fixed-function
- FLAC
- Flanging
- Flash animation
- Flash file systems
- Flat-file database
- Fleet management software
- Flexible electronics
- FlexRay
- Flit
- Floating-point arithmetic
- Flood fill
- Flooding algorithm
- Floppy disks
- FLOPS
- Flow control
- Flow network
- Flowcharts
- Fluka
- Focal-plane array
- Focus stacking
- Focused crawler
- Fog computing
- For loop
- Force-directed graph drawing
- Foreign keys
- Fork
- Formal concept analysis
- Formal languages
- Formal methods
- Formal ontology
- Formal specification
- Format
- Formative assessment
- Fortran
- Forward kinematics
- Forward secrecy
- Forwarding information base
- Forwarding plane
- Foveated rendering
- FoxPro
- FPTAS
- FQDN
- Fractal compression
- Fractional-order integrator
- Fragment
- Frame aggregation
- Frame problem
- Frame relay
- Frame synchronization
- Framebuffer
- Free list
- Freeware
- Frenetic
- Frequency analysis
- Fronthaul
- FTP server
- Full-text search
- Function model
- Function object
- Function prototype
- Functional dependency
- Functional design
- Functional programming
- Functional requirements
- Fundamental theorem of linear programming
- Fuzzy clustering
- Fuzzy cognitive map
- Fuzzy hashing
- G-code
- Gain stage
- Galaxy Zoo
- GAMS
- Garbage collection
- Gaussian blur
- GCC
- GCMD
- GDAL
- GeForce
- General-purpose language
- General-purpose modeling
- Generalized assignment problem
- Generic function
- Generic programming
- Genetic algorithms
- Geoda
- Geographic information science
- Geographic routing
- Geoinformatics
- Geometric modeling
- Geometric modeling kernel
- Geometric primitive
- Geometry processing
- Geonames
- Geoserver
- Geospatial metadata
- GeoTIFF
- GFS
- Ghidra
- Gigabit ethernet
- GIMP
- GIMPS
- GIS
- Git
- GlassFish
- Glitches
- Glob
- Global brain
- Global illumination
- Global network
- GloVe
- GLPK
- Glyphs
- GML
- GMPLS
- GNU
- GNU Octave
- Gnuplot
- Gnutella
- Goal node
- Gold plating
- Good regulator
- Goodput
- GoodRelations
- Google App Engine
- Google Cardboard
- Google Chrome
- Google Classroom
- Google Cloud Platform
- Google Docs
- Google Drive
- Google Finance
- Google Flu Trends
- Google Knowledge Graph
- Google News
- Google Now
- Google Patents
- Google Safe Browsing
- Google Scholar
- Google search
- Google Tensor
- Google Translate
- Google Trends
- Gossip protocol
- GPRS
- GPSS
- GPU
- Gradle
- Grafana
- Grand challenges
- Granular computing
- Granulometry
- Graph cut optimization
- Graph databases
- Graph isomorphism problem
- Graph kernel
- Graph modelling language
- Graph query language
- Graph traversal
- Graph-tool
- Graphics
- Graphics card
- Graphics library
- Graphics pipeline
- Graphics software
- Graphviz
- Grasp
- GRASS GIS
- Gray code
- Grayscale
- Greedy randomized adaptive search procedure
- Green Building XML
- Grid computing
- Grid file
- GridFTP
- GROMACS
- Group key
- Grover's algorithm
- gRPC
- GSP algorithm
- GTFS
- Guard interval
- Guards
- GWT
- Gzip
- H channel
- Hackers
- Hacktivism
- Hadamard transform
- HAL
- Hamiltonian path
- Hamiltonian path problem
- Handle System
- Handshake
- Hang
- HAProxy
- Hard copy
- Hardware abstraction
- Hardware acceleration
- Hash chain
- Hash collisions
- Hash function
- Hash list
- Hash tables
- Hash tree
- Hashtag
- Haswell
- HATEOAS
- Havex
- HCI
- HDF
- Headers
- Health data
- Health Insurance Portability and Accountability Act
- Heapsort
- Heartbleed
- Helix QAC
- Heterogeneous network
- HFT
- HGIS
- Hidden node problem
- Hidden subgroup problem
- Hierarchical clustering
- Hierarchical routing
- High memory
- High-level programming language
- High-occupancy toll lane
- High-throughput computing
- Highcharts
- Higher-order functions
- Hill Cipher
- Hill climbing
- HIP
- Histogram equalization
- Hit-or-miss transform
- HLS
- HMAC
- HMMER
- HOL
- Holographic data storage
- Holographic display
- Holographic interferometry
- Home computer
- Home directory
- Home network
- Homomorphic encryption
- Honeypot
- Host-based intrusion detection system
- Hostname
- HPC
- HPCC
- HTML
- HTML element
- HTML forms
- HTML5
- HTTP
- HTTPS
- HttpUnit
- Hugin
- Human error
- Hybrid algorithm
- Hybrid automata
- Hybrid Automatic Repeat Request
- Hybrid cryptosystem
- Hybrid kernel
- HYMAP
- Hyper-threading
- Hyper-V
- HyperCard
- Hyperelliptic curve cryptography
- Hypertext
- Hypervisors
- i-deas
- i2p
- i3
- IBL
- IBM
- IBM 650
- IBM Blue Gene
- iCalendar
- ICAM
- ICE
- iCloud
- ICMP
- ICN
- ICT Development Index
- ID3
- IDDFS
- Ideal lattices
- IDEF
- IDEF1X
- Identification scheme
- Identifiers
- Identity management
- Identity-based encryption
- IDL
- Idle
- IDS
- IEC 62443
- IEEE 1471
- IEEE 754-1985
- IGES
- IGP
- IIS
- IKE
- ILM
- Ilwis
- Image compression
- Image derivatives
- Image editing
- Image gradient
- Image histogram
- Image plane
- Image quality
- Image rectification
- Image resolution
- Image scaling
- Image segmentation
- Image sensor
- Image stabilization
- Image stitching
- Image subtraction
- Image texture
- Image translation
- Image warping
- Image-based modeling and rendering
- ImageJ
- Imaging spectrometers
- Imperative programming
- Imperialist Competitive Algorithm
- Implicit surface
- Impossible differential cryptanalysis
- Impulse C
- Imputation
- In-place algorithm
- Incident management
- Indentation
- Independent sets
- Indexing
- Indirect branch
- Indirection
- Inductive logic programming
- Industrial ethernet
- Inference attack
- Informatics
- Information and communications technology
- Information architecture
- Information assurance
- Information culture
- Information explosion
- Information governance
- Information integration
- Information leakage
- Information literacy
- Information logistics
- Information management
- Information model
- Information overload
- Information pollution
- Information privacy
- Information quality
- Information retrieval
- Information science
- Information security
- Information security awareness
- Information security standards
- Information technology
- Information transfer
- Informatization
- Infosphere
- Infrared astronomy
- Infrared detectors
- Inheritance
- Initialization
- Initialization vector
- Inkjet printing
- InnoDB
- Inorganic crystal structure database
- Inpainting
- INSERT
- Insertion sort
- Insider threat
- Installation
- Installer
- Instance variable
- Instant messaging
- Intangible assets
- Integer overflow
- Integer programming
- Integral imaging
- Integrated encryption scheme
- Intel IPSC
- Intel Paragon
- Intelligence amplification
- IntelliJ IDEA
- Inter-server
- Interaction protocol
- Interactive communication
- Interactive computation
- Interactive design
- Interactivity
- Interconnect
- Intermedia
- Intermediate representation
- Internal rate of return
- International chemical identifier
- Internet backbone
- Internet governance
- Internet privacy
- Internet Protocol Suite
- Internet radio
- Internet security
- Internet standards
- Internet traffic
- Internet video
- Internetworking
- InterPlanetary File System
- Interplanetary internet
- Interpreters
- Interval temporal logic
- Intranets
- Intrinsic function
- Inverse quadratic interpolation
- Inversion of control
- Inverted index
- IOPS
- iOS
- IP
- IP address spoofing
- IP addresses
- IP Flow Information Export
- IP header
- IP multicast
- IPC
- Iperf
- IPsec
- IPv4
- IPv6
- IPv6 addresses
- IPython
- Is
- is-DOS
- Isabelle
- ISBNs
- iSCSI
- Ishikawa diagrams
- ISO 10303
- ISO 15926
- Isomap
- Isosurface
- Issue-based information system
- IT infrastructure
- IT risk management
- Iteration
- Iterative reconstruction
- Iterators
- Ivy Bridge
- Jackknife resampling
- Jamming
- Java
- Java Applets
- Java Card
- Java compiler
- Java Database Connectivity
- Java Media Framework
- JavaBeans
- JavaScript
- JavaScript library
- JBIG
- JBIG2
- JCE
- JDBC driver
- JDK
- Jenkins
- Jinja
- JML
- JNI
- John the Ripper
- Johnson's algorithm
- Join
- Joint Bi-level Image Experts Group
- JOSM
- JPEG
- JPEG 2000
- JPEG XR
- JPEG XT
- jQuery
- jQuery Mobile
- JScript
- JSON
- JSON-LD
- JSONiq
- JT
- JTS Topology Suite
- JUCE
- Julia
- Jumbo frames
- JUnit
- JVM
- K-means clustering
- K-means++
- K-medoids
- Kaldi
- Kali
- Kanban
- Kasumi
- KDC
- KDF
- Keepalive
- Kepler
- Kernel
- Kernel fisher discriminant analysis
- Key authentication
- Key distribution
- Key escrow
- Key exchange
- Key generation
- Key management
- Key schedule
- Key signature
- Key size
- Keygens
- Keyspace
- Keystream
- Kill chain
- Kinematic chains
- Kiva
- KML
- Knapsack problem
- KNIME
- Knitr
- Knowledge base
- Knowledge engineering
- Knowledge graphs
- Knowledge integration
- Knowledge management
- Knowledge organization
- Knowledge organization system
- Knowledge representation and reasoning
- Knowledge society
- Knowledge space
- Knowledge value chain
- Knowledge-based engineering
- Known-plaintext attack
- Kolmogorov complexity
- Koobface
- Kotlin
- Kubernetes
- Label switching
- Labelling
- LabVIEW
- Lambda architecture
- Lambda calculus
- LAMP
- LAN
- Landing page
- Language model
- LAPACK
- LAPACK++
- Latency
- Latent semantic analysis
- Latent space
- Latitude on
- Lattice problem
- Lattice reduction
- Lattice-based cryptography
- Lazy evaluation
- LDAP
- Leader election
- Leading zeros
- Leaflet
- Learning object metadata
- Learning objects
- Learning to rank
- Least frequently used
- Leftover hash lemma
- Level of detail
- Level of measurement
- Levenshtein distance
- Lex
- Lexical analysis
- Lexical resources
- Library
- Library catalog
- Libsvm
- Light stage
- Lightweight protocols
- Like button
- Limits of computation
- Line drawing algorithm
- Line numbers
- Linear bounded automaton
- Linear model of innovation
- Linear programming
- Linear programming relaxation
- Linear search
- Linear temporal logic
- Link aggregation
- Link analysis
- Link layer
- Link prediction
- Link-state routing protocol
- Linked data
- Linked lists
- Linpack
- Linux
- Linux kernel
- Liskov Substitution Principle
- Lisp
- Listserv
- Listwise deletion
- Litecoin
- Literals
- Literate programming
- Literature review
- LLDP
- Lloyd's algorithm
- LLVM
- Load balancing
- Local consistency
- Local differential privacy
- Local search
- Local variable
- Localhost
- Locality-sensitive hashing
- Locate
- Location-allocation
- Logic error
- Logic programming
- Logical clocks
- Logo
- LOINC
- Long double
- Long-range Wi-Fi
- Longest common subsequence
- Longest common substring
- Longest prefix match
- Longitudinal study
- Look-ahead
- Lookup table
- Loop
- Loop invariant
- Loop-invariant code motion
- LoRa
- Loran
- Low-density parity-check codes
- LPWAN
- LSH
- Lua
- LXC
- Lyapunov optimization
- M2M
- Mac
- MAC address
- Machine code
- Machine to machine
- Machine-generated data
- macOS
- macOS Catalina
- Macros
- MagicDraw
- Magnetic storage
- Magnetic tape
- Mail merge
- Mailing lists
- Malware
- Malware analysis
- Man-in-the-middle attacks
- Managed lanes
- Managed security service
- Management cybernetics
- Management plane
- Many-to-many
- Mapbox
- Maplesim
- MapReduce
- MapServer
- Marching squares
- Markdown
- Markup languages
- Mass matrix
- Massive
- Massively parallel
- Master data
- Matching
- Mathematical Markup Language
- Mathematical morphology
- MathML
- MATLAB
- Matplotlib
- Maxima
- Maximum cut
- Maximum weight matching
- McEliece cryptosystem
- MD4
- MD5
- MDA
- MDL
- MDM
- Mealy machines
- Media ecology
- Media-independent handover
- Median cut
- MediaWiki
- Medoids
- Membrane computing
- Memcached
- Memex
- Memoization
- Memory access pattern
- Memory footprint
- Memory management
- Memory model
- Memory pools
- Merge
- Merge sort
- MES
- Message authentication
- Message broker
- Message passing
- Message-oriented middleware
- Messages
- Messaging pattern
- Metadata
- Metadata management
- Metadata registry
- Metadata standard
- Metadesign
- Metaheuristics
- Metasearch engines
- Metric temporal logic
- Microblogging
- MicroPython
- Microservices
- Microsoft Academic
- Microsoft Academic Search
- Microsoft Access
- Microsoft Excel
- Microsoft Project
- Microsoft Robotics Developer Studio
- Microsoft Windows
- MicroStation
- Microvia
- Microworlds
- Middleboxes
- Middleware
- Mindfulness
- MinGW
- Minimum bounding rectangle
- Minimum k-cut
- Minimum spanning tree
- Minimum-cost flow problem
- Mirai
- MIS
- MISRA C
- Missing data
- Misuse detection
- MKL
- MME
- MMSI
- Mnemonics
- Mobile agents
- Mobile app
- Mobile commerce
- Mobile IP
- Mobile malware
- Mobile security
- Mobile social network
- Mobile web
- Mobility model
- Modbus
- Model checking
- Model-based definition
- ModelCenter
- Modelica
- Modeling language
- Models of computation
- Modem
- MOF
- Molecular descriptor
- Monads
- Monero
- MonetDB
- MongoDB
- Monochrome
- Moore machine
- Moore neighborhood
- Morphing
- Motion capture
- Motion JPEG
- Mount
- Moving map display
- Moving object detection
- MPEG-7
- MPI
- MPS
- MQTT
- MRP
- MSS
- MTConnect
- MTS
- MTU
- MUC
- Multi-hop routing
- Multi-objective linear programming
- Multi-source
- Multicast address
- Multimap
- Multipath TCP
- Multiple encryption
- Multiple inheritance
- Multiplexers
- Multiprocessing
- Multistage interconnection networks
- Music information retrieval
- Mutual exclusion
- Mutual recursion
- MyBatis
- MySQL
- N-grams
- N-triples
- N+1 redundancy
- Name servers
- Namecoin
- Named Data Networking
- Named graphs
- Named pipes
- Named-entity recognition
- Nastran
- NAT
- Natural-language programming
- Navisworks
- Nc
- NDP
- Nearest neighbour algorithm
- Negation
- Negation as failure
- Nessus
- Netconf
- Netfilter
- NetLogo
- Network allocation vector
- Network architecture
- Network congestion
- Network delay
- Network forensics
- Network management
- Network management software
- Network mapping
- Network model
- Network monitoring
- Network operating system
- Network performance
- Network science
- Network security
- Network segment
- Network services
- Network simplex algorithm
- Network simulation
- Network socket
- Network throughput
- Network topology
- Network transparency
- Network virtualization
- Neuroimaging Informatics Technology Initiative
- Neutron imaging
- News aggregators
- NewSQL
- Next-generation firewall
- NFV
- Ngspice
- Night vision
- NLP
- Nmap
- No carrier
- Node
- Node-RED
- Non-functional requirements
- Non-fungible token
- Non-local means
- Non-photorealistic rendering
- Normal mapping
- Northbound interface
- NoSQL
- NP
- NP-completeness
- NP-hardness
- NTFS
- NTP
- NTRU
- Null
- Null pointer
- Numba
- Numerical modeling
- Numerical weather prediction
- NumPy
- NuSMV
- Nvidia Jetson
- Nvidia Tesla
- Nyquist
- O-Matrix
- Oak
- Obfuscation
- Object composition
- Object diagram
- Object graph
- Object hierarchy
- Object model
- Object Pascal
- Object storage
- Object-oriented design
- Object-oriented modeling
- Objective-C
- Observational study
- Observations and measurements
- Observer pattern
- Occupational risk assessment
- Ocean general circulation models
- OCL
- OCR-B
- OCSP
- OFDMA
- Office Open XML
- OLAP cube
- OLE automation
- OMNeT++
- Omnichannel
- OMS
- OMT
- One-class classification
- One-time pad
- One-way functions
- Online algorithms
- Online analytical processing
- Online chat
- Online help
- Online machine learning
- Online optimization
- Online transaction processing
- OntoClean
- Ontology
- Ontology alignment
- Ontology components
- Ontology engineering
- Ontology languages
- Ontology merging
- Ontology modularization
- OOP
- Open Database Connectivity
- Open database license
- Open manufacturing
- Open platform
- Open science
- Open systems
- Open Telecom Platform
- Open-source intelligence
- Open-world assumption
- OpenACC
- OpenCL
- OpenCV
- OpenFlow
- OpenFOAM
- OpenGL ES
- OpenGL Shading Language
- OpenGL++
- OpenLayers
- OpenModelica
- OpenMP
- OpenSCAD
- OpenSearch
- OpenSim
- OpenSSL
- OpenVAS
- Operating model
- Operational database
- Operational reporting
- OPM
- Opponent process
- Optics algorithm
- Optimization problems
- Optimized Link State Routing Protocol
- Optimizing compiler
- OptiX
- Oracle
- Oracle Database
- ORB
- Orchestration
- Order of operations
- Order to cash
- Ordinal data
- OS-level virtualization
- OSS
- Otsu's method
- Out-of-band
- Outlook Express
- Outsourcing
- Overflow
- Overhead
- Overlay network
- OWL
- Owl-s
- P systems
- P-complete
- P-cycle protection
- P-space
- P3P
- P4
- Package
- Package diagram
- Packages
- Packet analyzer
- Packet forwarding
- Packet loss
- Packet switching
- Packet Tracer
- Padding
- Page fault
- Page replacement algorithm
- PageRank
- Pairing-based cryptography
- Palette
- PAN
- Paradigm
- Parallax barriers
- Parallel algorithms
- Parallel communication
- Parallel computing
- Parallel database
- Parallel processing
- Parallel programming model
- Parallel rendering
- Parallelization
- Parametric design
- Paraphrasing
- Parasolid
- Paraview
- Parent process
- Parkerian Hexad
- Parry
- Parsing
- Part program
- Partial order reduction
- Particle systems
- Partition problem
- Pascal
- Passive attack
- Passive monitoring
- Passphrase
- Password cracking
- Password strength
- Path protection
- Path tracing
- Pattern language
- Pattern matching
- Paxos
- Pay-per-click
- Pcap
- PDM
- PDU
- PE
- Peer-to-peer
- Peercoin
- Penetration test
- Pentium 4
- PERA
- Perceptual hashing
- Performance per watt
- Performance prediction
- Perl
- Persistence
- Persistent data
- Personal data
- Personal web page
- Personalized search
- Perturbation function
- Petri nets
- PGP
- Phase congruency
- Phishing
- Phong reflection model
- Phong shading
- Photometric stereo
- PHP
- phpMyAdmin
- Physical access
- Physical address
- Physical schema
- Physical unclonable function
- Physical-to-virtual
- Ping
- Ping flood
- Ping sweep
- Pip
- Pixel binning
- PKCS
- PKI
- Plain text
- Plaintext
- Plane wave expansion method
- Planner
- Plant simulation
- Platform-independent model
- Platform-specific model
- Plaxis
- Playfair cipher
- Plug-ins
- PMD
- PNG
- PNML
- PNR
- Point cloud
- Point location
- Point-to-point
- Pointers
- Polar code
- Polar surface area
- Polyalphabetic ciphers
- Polymorphism
- Polynomial hierarchy
- Polyspace
- Port mirroring
- Portals
- POSIX
- Post processor
- Post-quantum cryptography
- Postconditions
- PostGIS
- PostgreSQL
- PostScript
- Potential method
- Power analysis
- Praat
- PRAM
- Precedence graphs
- Precision and recall
- Precomputation
- Preconditions
- Predication
- Predictive modeling
- Prefixes
- Preprocessor
- Prescriptive analytics
- Presence information
- Prewitt operator
- Prim's algorithm
- Primary key
- Primary sources
- Printed electronics
- Printf
- Priority ceiling protocol
- Priority inheritance
- Priority inversion
- Priority queue
- Privacy by design
- Privacy settings
- Private network
- Privilege escalation
- Proactive
- probabilistic Turing machine
- Procedural programming
- Procedural reasoning system
- Process Explorer
- Process isolation
- Process management
- Process state
- Processing delay
- Producer price index
- Product differentiation
- Product lifecycle
- Product requirements document
- Production system
- Profiling
- Profinet
- Program analysis
- Program comprehension
- Program dependence graph
- Program transformation
- Programming language
- Programming model
- Programming paradigm
- Programming style
- Progressive meshes
- Project complexity
- Project portfolio management
- Prolog
- Promela
- Promiscuous mode
- Proof of authority
- Proof of stake
- Proof of work
- PropBank
- Proprietary software
- Protection mechanism
- Protocol
- Protocol buffers
- Provable security
- Provenance
- ProVerif
- Provider edge router
- Provisioning
- Proxy
- Proxy Mobile IPv6
- Proxy re-encryption
- Proxy servers
- Pseudo-polynomial time
- Pseudocode
- Pseudonyms
- Pseudorandom permutation
- PSO
- Pspace-complete
- PTAS
- Pthreads
- PTP
- Public data
- Public interface
- Public-key cryptography
- PUE
- Pure functions
- Push technology
- PVM
- Pwd
- PyMOL
- Pyomo
- PyQt
- Python
- Python Imaging Library
- Python Package Index
- Q-chem
- QBE
- QEMU
- QGIS
- QoS
- Qt
- Quadratic assignment problem
- Quadro
- Quadruple play
- Quagga
- Quality engineering
- Quantile normalization
- Quantum algorithms
- Quantum annealing
- Quantum computing
- Quantum cryptography
- Quantum walk
- Quasi-identifier
- quasi-Newton method
- Query
- Query expansion
- Query language
- Query optimization
- Query plan
- Query rewriting
- Query string
- Queues
- QUIC
- Quicksort
- QuickTime
- QWIP
- R*-tree
- R+ tree
- RabbitMQ
- Race conditions
- RAD
- Radio access technology
- Radio modem
- Radio networks
- Radiosity
- Radix sort
- Rainbow tables
- Raise
- Rake
- Random oracle
- Random search
- Randomized algorithms
- Randomized rounding
- Randomness tests
- Ransomware
- Rapid prototyping
- Rapid tooling
- Rapidly Exploring Random Tree
- Raster graphics
- Rating
- Rational Rhapsody
- Raw data
- Ray casting
- Ray tracing
- RBAC
- RC-5
- RC2
- RC5
- RC6
- RDF query language
- Rdf4j
- RDFa
- RDMA
- Reachability analysis
- Reachability problem
- Read
- Real-time business intelligence
- Real-time data
- Real-time database
- Real-time Java
- Real-Time Transport Protocol
- Reboot
- reCAPTCHA
- Recommender systems
- Record
- Record linkage
- Recording head
- Recursion
- Recursive definition
- Recursive partitioning
- RED
- Redis
- Reduced cost
- Reentrancy
- Reference architecture
- Reference beam
- Reference data
- Referential integrity
- Refinement
- Refurbishment
- Region growing
- Regular expressions
- Regular languages
- Rekeying
- Related-key attack
- Relational database
- Relational model
- Relax NG
- Relay networks
- Relevance feedback
- Reliable multicast
- Relocation
- Ren
- Rename
- Rendering
- Rendering equation
- Replace
- Replay attacks
- Reporting bias
- Repository
- RepRap
- Representer theorem
- Reputation systems
- Requirement diagram
- Requirements elicitation
- Requirements management
- Requirements traceability
- Reservoir sampling
- Result set
- Retransmission
- Retrieve
- Return type
- Reusability
- Reverse proxy
- Reversible computing
- reversible-jump Markov chain Monte Carlo
- Rework
- RFC
- Rhetorical Structure Theory
- Right to be forgotten
- Right to explanation
- Ring network
- Ring signatures
- Risk management framework
- RLE
- RLWE
- Rm
- Rm-odp
- RNN
- Rocchio algorithm
- Rollback
- Root directory
- Root-finding algorithms
- Rootkits
- Rope
- Router
- Routing
- Routing loops
- Routing table
- Row
- RP
- RPL
- RS-232
- RSA
- RSA problem
- RSSI
- RStudio
- RTSP
- Ruby
- Run-time infrastructure
- Runtime library
- RUP
- S-box
- S-expressions
- S3
- Saga GIS
- SageMath
- Samba
- SAML
- Sandbox
- SAP ERP
- SAP NetWeaver
- SatScan
- Scala
- Scalable urban traffic control
- Scale space
- SCAP
- Scapy
- SCATS
- Scenarios
- Scene graph
- Schema
- Schlieren photography
- Sci-Hub
- SciDB
- Science communication
- Scientific programming language
- Scientific visualization
- Scikit-image
- Scipy
- SCM
- Scope
- Scopus
- Scrapy
- Scripting languages
- Scripts
- Scrubbing
- Scrypt
- SCTP
- SD card
- SDEs
- SDN
- SDP
- Search engines
- Searchable symmetric encryption
- Secant method
- Second-order cybernetics
- Secondary data
- Secondary sources
- Secret sharing
- Sector
- Secure communication
- Secure hash algorithms
- Secure multi-party computation
- Secure transmission
- Security awareness
- Security controls
- Security information and event management
- Security level
- Security management
- Security parameter
- Security service
- Sed
- Seed
- Segmentation
- Segmentation fault
- SELECT
- Selection sort
- Selective repeat ARQ
- Self-shadowing
- SEM
- Semantic analysis
- Semantic data model
- Semantic heterogeneity
- Semantic integration
- Semantic interoperability
- Semantic mapping
- Semantic matching
- Semantic networks
- Semantic reasoner
- Semantic role labeling
- Semantic search
- Semantic security
- Semantic Sensor Web
- Semantic similarity
- Semantic technology
- Semantic Web
- Semantic web services
- Semantic Web Stack
- Semi-structured data
- semi-Thue system
- Semiotics
- SEMMA
- Sensor nodes
- Sensor web
- SensorML
- Sentence embedding
- SEO
- Separable filter
- Separation of concerns
- Sequence diagram
- Sequential algorithm
- Sequential logic
- Serialization
- SERP
- Serpent
- Servant
- Server
- Server administrator
- Server farms
- Server room
- Server-side
- Serverless computing
- Service assurance
- Service choreography
- Service discovery
- Service packs
- Service set
- Service-orientation
- Service-oriented modeling
- Servqual
- Session
- Session hijacking
- Session ID
- Session key
- Set cover problem
- SETI@home
- Settings
- SHA-1
- SHA-3
- SHACL
- Shaders
- Shading
- Shading languages
- Shadow IT
- Shape factor
- Shapefiles
- Shard
- Share
- Shared memory
- Shared resource
- Shared secrets
- Shared variables
- Shareware
- Shell scripts
- Shodan
- Shor's algorithm
- Short-circuit evaluation
- Shortcut
- Shortest path problem
- Shutdown
- Side effects
- Side-channel attacks
- Siemens NX
- Signal transition graphs
- Signaling protocol
- Signcryption
- Simhash
- Similarity measure
- Similarity search
- Simple API for XML
- Simplex algorithm
- SimRank
- Simscript
- Simulation language
- Simulink
- Single-linkage clustering
- Siri
- Sisal
- Situation calculus
- Sketchpad
- SKOS
- Skylake
- Slab allocation
- Slack variable
- Sleep
- Sleep mode
- Slicer
- Small data
- Small form-factor pluggable
- Small-c
- SMTP
- SNA
- Sniffer
- SNMP
- Snort
- Snowflake schema
- SOA
- Soar
- Social commerce
- Social informatics
- Social media
- Social networks
- Social semantic web
- Sociotechnical systems
- Soft computing
- Soft state
- Software
- Software aging
- Software architects
- Software architecture
- Software architecture recovery
- Software crisis
- Software deployment
- Software design
- Software development process
- Software diversity
- Software engineering
- Software engineering body of knowledge
- Software feature
- Software framework
- Software pipelining
- Software product line
- Software requirements
- Software testing
- Software verification and validation
- Software visualization
- Software-defined data center
- Solid modeling
- Solidity
- Solution architecture
- Sort
- Sorted array
- Sorting
- Sorting algorithms
- Source code
- Source routing
- SourceForge
- Space complexity
- Spamming
- Spanning Tree Protocol
- Spark
- SPARQL
- Sparse network
- Spatial database
- Spatial decision support system
- Spatial reference system
- Spatialite
- Spatiotemporal database
- Spawn
- Specification and description language
- Specification language
- Specint
- Speck
- Spectral clustering
- Spectral efficiency
- Spectre
- Specularity
- Speedup
- Spell checker
- SPI
- Spiking neural networks
- Spin model checker
- Split
- Spoofing attacks
- Spreading activation
- Spring Boot
- Spring Framework
- Spring Security
- SPSA
- SPSS
- Spyware
- SQL
- SQL injection
- SQLite
- SRT
- SSDP
- SSIS
- SSML
- Stabilization
- Stack
- Stack Overflow
- Stacks
- Stan
- Standard libraries
- Standard library
- Star schema
- Stata
- State diagram
- State machine replication
- State space
- State space search
- Statements
- Static routing
- Statistical classification
- Statistical databases
- Statistical region merging
- Steganography
- Stereo camera
- Stereopsis
- Stereoscopy
- Stereotypes
- STK
- STL
- Stochastic approximation
- Stochastic computing
- Stochastic diffusion search
- Stochastic optimization
- Stochastic Petri nets
- Stochastic programming
- Stop words
- Store and forward
- Stored procedures
- Strategy pattern
- Stream ciphers
- Stream processing
- Streaming data
- Streaming text oriented messaging protocol
- Stretchable electronics
- Stride
- String
- String metrics
- String-searching algorithm
- Strings
- Strong duality
- Struct
- Structured analysis
- Structured cabling
- Structured programming
- structured-light 3D scanner
- Structuring element
- Studio
- STUN
- Stuxnet
- Style sheet
- Subdivision surfaces
- Subgraph isomorphism problem
- Subject access
- Submodular set function
- Subnets
- Subsetting
- Subsumption architecture
- Subsurface scattering
- Sudo
- Suffix array
- Suitability analysis
- SUMO
- Sunway TaihuLight
- Super-resolution imaging
- Supercomputers
- Superframe
- Supplier evaluation
- Supply chain attacks
- Surrogate data
- SUS
- SVG
- Swarm intelligence
- SWI-Prolog
- Swift
- Swimlane
- Swing
- Swoogle
- SWRL
- Sybil attacks
- Symbol rate
- Symbol table
- Symmetric rank-one
- Symmetric-key algorithm
- SymPy
- Syn flood
- Synchronization
- Synchronous circuit
- Synergetics
- Synsets
- Syntactic parsing
- Syntactic sugar
- Syntax
- Syntax error
- Synthetic data
- Syslog
- Systat
- System 1
- System administrators
- System archetypes
- System calls
- System dynamics
- System requirements
- System software
- System time
- Systems management
- Systems Modeling Language
- Systems programming
- Systems theory
- T-splines
- Tabu search
- TAFIM
- Tagging
- Tags
- Tail drop
- Targeted threats
- Task parallelism
- TCB
- Tcl
- TCP
- TCSEC
- TDM
- TEAF
- Technical debt
- Techno-economic assessment
- Tee
- Telnet
- Template matching
- Templates
- Temporal databases
- Temporal logic
- Temporary variable
- Tera Term
- Teragrid
- Test oracle
- Tethering
- TeX
- Texels
- Text corpus
- Text file
- Texture
- Texture mapping
- Texture synthesis
- TFRC
- The Portland Group
- Theoretical computer science
- Thermal imaging cameras
- Thermocompression bonding
- Thermographic camera
- Thermography
- Thesaurus
- Thinning
- Third normal form
- Thrashing
- Thread
- Thread block
- Thread pool
- Threading
- Threat
- Threat model
- Thresholding
- Throughput
- Thumbnails
- Tianhe-2
- TIFF
- Time complexity
- Time protocol
- Time server
- Time slotted channel hopping
- Timed automata
- Timeouts
- Timestamping
- Timing attacks
- TIMIT
- TIN
- TinyURL
- TLS
- TMN
- TOGAF
- Token bucket
- Token ring
- Tokenization
- Tone mapping
- Top500
- Tor
- ToS
- Total cost of ownership
- Tower of Hanoi
- Toy problem
- Tr
- Trace table
- Traceability matrix
- Traceroute
- Tracing
- Traffic analysis
- Traffic classification
- Traffic shaping
- Training simulations
- Transaction data
- Transaction processing
- Transaction processing system
- Transaction time
- Transactional memory
- Transform coding
- Transformation language
- Transition system
- Transmission delay
- Transmission security
- Transmission time
- Transmit
- Trapdoor function
- Travelling salesman problem
- Traversal using relays around NAT
- Treebanks
- Triangle strip
- Triple DES
- Triplestores
- TRL
- Trojan horse
- Tron
- Trust management
- Trust metrics
- Trusted third party
- Trustworthy AI
- TSN
- TTL
- Tunneling protocol
- Turbo codes
- TurboCAD
- Turing
- Turing machine
- Turtle
- Turtle graphics
- Twiddle factor
- Type variable
- Typedef
- UART
- Ubiquitous computing
- Ubiquity
- UDP
- UML
- Unary operations
- Undo
- Unified theory of acceptance and use of technology
- Unintended consequences
- Unistat
- Unsharp masking
- Unstructured data
- Update
- Upper ontology
- URDF
- URI
- URL
- URL shortening
- Use case diagram
- Use cases
- User agents
- User information
- User interface markup language
- User modeling
- User profile
- User story
- User-defined functions
- Utah teapot
- Valid time
- Validator
- Value sensitive design
- Variable neighborhood search
- VAX-11
- VBM
- VBScript
- Vector graphics
- Vector quantization
- Vector space model
- Vendor lock-in
- Vensim
- Vergence-accommodation conflict
- Verilog
- Version control
- Vertex cover
- Vertex normals
- Vertical handover
- Vertical search
- VHDL
- Vi
- Viable System Model
- Video capture
- Video for Windows
- View model
- View synthesis
- Viewing frustum
- Viewshed analysis
- Virtual environment
- Virtual file system
- Virtual functions
- Virtual humans
- Virtual laboratory
- Virtual machines
- Virtual memory
- VirtualBox
- Virtualization
- VirusTotal
- Visit
- Vistrails
- Visual analytics
- Visual artifacts
- Visual Basic
- Visual Basic for Applications
- Visual hierarchy
- Visual hull
- Visual objects
- Visual programming languages
- Visual Studio
- Visualization
- Viterbi algorithm
- Viterbi decoder
- Vivado
- VLAN
- VM
- VMware ESXi
- VMware Workstation
- Voice search
- Void
- Voldemort
- Volta
- Volume rendering
- Volunteer computing
- von Neumann neighborhood
- Voronoi diagrams
- VPN
- VQE
- VR photography
- VRML
- VRRP
- VTK
- Vulnerability assessment
- Vulnerability databases
- Vulnerability scanner
- WAF
- Wafer bonding
- Wait
- Wake-on-LAN
- WAN
- WannaCry ransomware attack
- Ward's method
- WAV
- Wc
- WCET
- WCF
- Weak duality
- Weak key
- Weak reference
- Weather forecasting
- Web
- Web analytics
- web API
- Web applications
- Web browsers
- Web content
- Web content management system
- Web crawlers
- Web indexing
- Web map service
- Web of Science
- Web of trust
- Web Ontology Language
- Web portals
- Web resource
- Web scraping
- Web server
- Web services
- Web standards
- Web testing
- Web traffic
- Web3
- Webcrawler
- WebDAV
- WebGL
- WebKit
- Webmasters
- Webp
- WebRTC
- Website
- Website spoofing
- WebSockets
- WebXR
- WEP
- Wget
- While loop
- Whitelist
- Wi-Fi
- Wi-Fi 6
- Wi-Fi Direct
- Wi-Fi hotspot
- Wi-Fi Protected Access
- Wi-Fi Protected Setup
- Wide-column store
- Wifi sensing
- WiGig
- Wiki
- Wiki software
- Wikimapia
- Wikipedia
- Wild card
- Wildcard characters
- Windows Subsystem for Linux
- Wire wrap
- Wire-frame models
- Wireless access point
- Wireless ad hoc networks
- Wireless broadband
- wireless LAN
- Wireless networks
- Wireless router
- Wireless security
- Wireless sensor networks
- WirelessHART
- Wireshark
- Wizard
- WMS
- WMV
- Word embedding
- Word sense
- Word-sense disambiguation
- Word-sense induction
- WordNet
- WordPress
- Workflow
- Workflow engine
- Workflow Management Coalition
- Workflow management system
- Working directory
- Working set
- Workplace
- Workspace
- World Wide Web
- Worms
- Worst-case complexity
- WPKI
- Wrapper
- Wrapping
- Write
- WS-Addressing
- WS-Policy
- Ws-security
- WSDL
- WSGI
- WSMO
- WUE
- X3D
- x86
- XACML
- XBRL
- Xcode
- Xen
- Xeon
- Xfoil
- XForms
- Xiaoice
- Xilinx ISE
- XML
- XML database
- XML Schema
- XML tree
- XMLHttpRequest
- XMPP
- XPath
- XPDL
- Xplore
- XQuery
- XSL
- XSLT
- YAGO
- YAML
- Yang
- Year 2000 problem
- Yum
- Z-Wave
- Zachman Framework
- Zcash
- Zero-day
- Zero-knowledge proof
- ZeroMQ
- Zeus
- ZFS
- Zotero
- ZPP
- ZRP