Drive to Reimagine

30 tech terms you HAVEN'T heard before

Jeremy DSouza
.
Jul 14
.
9-10 mins

Table of contents

Automate your business at $5/day with Engati

REQUEST A DEMO
30 tech terms

Here’s a list of 30 tech terms you’ve never heard of before (but you’ll wish you did). Ready to dive in?


Technological Singularity

The technological singularity is the theoretical point in the future after which the growth of technology would become uncontrollable and irreversible, causing unpredictable changes to human life and civilizations. The ‘Intelligence Explosion’ is the most popular Singularity theory, according to which an upgradable intelligent agent will eventually get into a "runaway reaction" or a loop of self-improvement cycles, with every iteration being more intelligent than the previous one and evolving at an increasingly rapid pace. This would theoretically cause an ‘explosion’ in intelligence, leading to artificial superintelligence that would go far beyond all human intelligence.

BIRCH

The BIRCH algorithm is used for hierarchical clustering on extremely large datasets. It is an unsupervised data mining algorithm that can even be tweaked to speed up k-means clustering and Gaussian mixture modeling with the expectation-maximization algorithm. 

One of the most significant advantages of BIRCH is that it can be used to incoming, multi-dimensional metric data points in an incremental and dynamic manner to create the best clustering for a specific set of resources (memory and time constraints). 

Situation calculus

Situation calculus is a logic formalism that represents and reasons about dynamical domains. The whole idea is that reachable states could be defined according to the actions that need to be taken for the purpose of reaching those states. You could basically consider situational calculus to be the feature-based representation of actions. 

Decompiler

Decompilers are programs that use executable files as inputs and then try to create high-level source files which can be recompiled. Quite often, decompilers won’t be able to reconstruct the original source code in a perfect manner and will end up creating obfuscated code. But they’re still vital in reverse engineering computer software.

Most decompilers are used to recreate create source code from binary executables, some decompilers even have the capability to transform specific binary data files into human-readable and editable sources.

Machine vision

Machine vision is all about computers having the ability to see things. They make use of video cameras, analog-to-digital conversion (ADC), and digital signal processing (DSP) for this purpose and the data is then sent to a computer or robot controller. 

Sensitivity and resolution are very important specifications in these systems. Sensitivity refers to how well the machine can see in dim light or to detect weak impulses at invisible wavelengths. Resolution is all about the computer’s ability to differentiate between objects. 


Sparse matrix

A sparse matrix is a matrix in which there is a greater number of elements that have zero values than the number of elements that have non-zero values. They are great for computing large-scale applications that dense matrices just can’t handle. 

The types of sparse matrices include:

  • csc_matrix: Compressed Sparse Column format
  • csr_matrix: Compressed Sparse Row format
  • bsr_matrix: Block Sparse Row format
  • lil_matrix: List of Lists format
  • dok_matrix: Dictionary of Keys format
  • coo_matrix: COOrdinate format (aka IJV, triplet format)
  • dia_matrix: DIAgonal format


Symbolic interactionism

Symbolic interactionism is a sociological theory that also has applications in the Natural Language Processing (NLP) sub-domain of artificial intelligence. The symbolic approach to NLP focuses on human-developed rules and lexicons. 

The theory is formed using practical considerations and hints towards specific effects of communication and interaction in people to make images and normal implications, for the purpose of deduction and correspondence with others.

Stepwise function

The stepwise function is also known as the staircase function in mathematics. It is a piecewise constant function, that has only a finite number of pieces. These functions manage an application’s components and logic, making it possible for you to write less code and instead focus on developing and updating your application in a faster manner. 

In a stepwise function, there is a constant value on specified intervals, but there is a different constant for every interval. The constant value on each interval creates the series of horizontal lines, and the fact that the constant is different for each interval causes the jumps in between every horizontal line segment. This causes the graph of a step function to resemble a set of stairs.


DATR

DATR is a language that is used for lexical knowledge representation. It has been implemented in a wide range of programming languages, and several implementations are available on the internet, including an RFC-compliant implementation at the Bielefeld website. It is still being used for the purpose of encoding inheritance networks in several linguistic and non-linguistic domains and is currently under discussion to be a standardized notation that will be used for the representation of lexical information.

Federated learning

Federated learning, aka collaborative learning, is a machine learning technique that involves training an algorithm across several decentralized edge devices or servers holding local data samples, without exchanging them. 

This type of learning makes it possible for multiple actors to develop a common, robust machine learning model without sharing data, which makes it possible to tackle critical issues like data privacy, data security, data access rights, and access to heterogeneous data. It makes continual learning possible on end-user devices while making sure that the end user data does not leave end-user devices.


Principle of Rationality

The Principle of Rationality (Rationality Principle) suggestions that agents act in the most appropriate manner according to the objective situation. It is an idealization conception of human behavior that aided Karl R. Popper (who coined the term) in driving his model of situational analysis.

In artificial intelligence, rational agents are essentially agents whose actions are logical with respect to the information or situation that the agent processed and the goals of the agent (the objective that the agent was designed to achieve).

Rationality is judged on the basis of:

  • The existence of a performance measure that defines the success criterion.
  • The agent having prior knowledge about its environment.
  • The best possible actions for an agent to perform.
  • The sequence of percepts


Intelligence amplification

Intelligence amplification is all about using information technology to augment human intelligence. While AI seeks to give computers human-like intelligence to perform autonomous workflows and act as standalone systems that have the ability to process information and even make decisions, the goal of intelligence amplification (IA) is to complement and amplify human intelligence.

Instead of trying to reinvent the wheel, IA just tries to build on and supplement human intelligence that has been evolving for millions of years. Intelligence amplification is also known as cognitive augmentation or machine augmented intelligence.

Reification

Reification refers to a process in which an abstract idea about a a computer application gets turned into an object, explicit data model or another object created in a programming language. The process of reification allows things that were previously implicit, unexpressed, and possibly even inexpressible to be formulated in an explicit manner and made available for conceptual (logical or computational) manipulation. It is a very popular conceptual analysis and knowledge representation technique.

Hyper-heuristic

Hyper-heuristics are search heuristics that automate the process of selecting, combining, generating, and adapting several simpler heuristics. They are used to solve complex computational search problems that could not be handled by the simpler heuristics on their own.

They are essentially high-level automated search techniques that explore the search space of low-level heuristics or heuristic components to deal with complicated computational search problems. Hyper-heuristics aim to lower the amount of domain knowledge needed in search methods.

Thompson sampling

Thompson sampling is an algorithm that makes use of exploration and exploitation to choose actions that would maximize the rewards earned. This technique is also known as Probability Matching or Posterior Sampling.

The results of the exploration could be rewards or penalties, and they help in figuring out which actions will be carried out to improve future performance.


Computational number theory

Computational number theory is a branch of number theory that is also referred to as algorithmic number theory. It concentrates on detecting and making use of efficient computational techniques and algorithms to solve several problems in number theory as well as arithmetic geometry. It is widely used for primality testing as well as the prime factorization of large integers. It is also popularly used in elliptic curve cryptography, RSA, and post-quantum cryptography.

Admissible heuristic

An admissible heuristic is a heuristic employed to estimate the cost involved in reaching the goal state in a search algorithm. They never overestimate the cost of reaching the goal state. Making use of admissible heuristics also results in optimal solutions, they always find the cheapest path solution.

In order for the heuristic to be admissible to a search problem, it must be lower than or equal to the actual cost of reaching the goal.


Voice User Interface

A voice user interface is a means for a user to interact with and make use of a computer system by using voice commands along with or instead of a touchscreen, trackpad, keyboard, or a mouse. It involves using speech recognition to understand voice commands and answer questions and type text to speech to play a reply.

 

Batch processing

Batch processing is a technique of running high-volume, repetitive data jobs. This method makes it possible to process data when computing resources are available, and with little or no user interaction.

When batch processing is carried out, users collect and store data, and then process the data during an event known as a “batch window.” This increases the efficiency by establishing processing priorities and completing data jobs at a time that makes the most sense.

Abductive Logic Programming (ALP)

Abductive logic programming (ALP) is a high-level knowledge-representation framework. You can use it to solve problems declaratively on the basis of abductive reasoning. 

Abductive reasoning is based on building and testing hypotheses by making use of the best information available. A person’s daily decision making tasks involve making use of abductive reasoning because the person is working with whatever information is available, even if that information is incomplete information.


Kubernetes

Kubernetes is a platform that enables you to manage containerized workloads and services more effectively while facilitating declarative configuration and automation. It supports data center outsourcing to public cloud service providers but is also employed for web hosting at scale. 

In 2014, Google turned it into an open-source project. It’s essentially a compilation of 15+ years of Google’s experience in running production workloads at scale. 


Dynamic time warping

Dynamic time warping is an algorithm in time series analysis that is used to measure the similarity between two temporal sequences, which could vary in speed. Essentially, any data that can be turned into a linear sequence can be analyzed using dynamic time warping. It is very widely used in automatic speech recognition to deal with varying speaking speeds.

Variational autoencoder

Variational autoencoders are autoencoders whose training is regularized to avoid overfitting and ensure that the latent space has good properties that enable generative process. These are generative systems and serve a purpose similar to that of a generative adversarial network.

Variational autoencoders tackle latent space irregularity by causing the encoder to return a distribution over the latent space rather than a single point and by introducing a regularization term to the loss function over that returned distribution to ensure that the latent space is organized in a better manner.


Brute-force search

Brute-force search involves generating a list of all the possible candidates for a solution and then testing the validity of every single candidate. Since it does not require any domain knowledge whatsoever, it is the most common search algorithm. It is also known as exhaustive search or generate and test.


Algorithmic probability

Algorithmic probability is a mathematical method of assigning a prior probability to a given observation. It is also known as Solomonoff probability. The types of algorithmic probability techniques include:

  • An Algorithmic Probability Loss Function
  • Categorical Algorithmic Probability Classification
  • Approximating the Algorithmic Similarity Function


Spatial-temporal Reasoning

Spatial–temporal reasoning is a branch of artificial intelligence that builds on concepts from  computer science, cognitive science, and cognitive psychology. It’s theoretical aim is  representing and reasoning spatial-temporal knowledge in the mind. On the computing side, it aims to develop high-level control systems of automata to navigate and understand time and space.

Lexical-Functional Grammar

Lexical-functional grammar (LFG) is a constraint-based grammar framework in theoretical linguistics. It’s one of the hottest topics in Natural Language Processing (NLP) right now. LFG is essentially the constraint-based philosophy of grammar. The two basic forms of lexical functional grammar are C-structure and F-structure.

Transduction

Transduction in n logic, statistical inference, and machine learning refers to reasoning that is derived from observed, particular (training) cases to specific (test) cases. It is used in the domain of statistical learning to refer to predicting particular examples when specific examples from a domain are provided. Transduction is also known as transductive inference.

Rete Algorithm

The Rete algorithm is a pattern matching algorithm that is used to implement rule-based systems. It was created to apply several rules to or patterns to several objects, or facts, in a knowledge base in an efficient manner. This algorithm is used to figure out which of the system’s rules need to be fired based on its data store, its facts.

Theory of computation

The Theory of computation focuses on the logic of computation with respect to simple machines, referred to as automata. It is a theoretical branch of Computer Science and Mathematics. The whole point of this theory is to develop mathematical and logical models that run efficiently to the point of halting.  

It forms the basis for:

  • Writing efficient algorithms that run in computing devices.
  • Programming language research and their development.
  • Efficient compiler design and construction.

POEM Model

The POEM is a marketing methodology used by digital marketing experts to formulate the marketing strategy, and it stands for Paid, Owned, Earned Media

Cyclomatic Complexity
The cyclomatic complexity of a section of code is the quantitative measurement of the number of linearly independent paths that are in it.

Forward Chaining
Forward chaining is a form of reasoning while using an inference engine. It is also called forward deduction or forward reasoning.

Autonomic computing
Autonomic computing refers to the self-managing characteristics of distributed computing resources while hiding intrinsic complexity to operators.

Artificial Intelligence Markup Language
Artificial Intelligence Markup Language makes it possible to create human interfaces keeping the implementation simple & easy to understand & maintain

Leaky Bucket Theory
The leaky bucket theory is an analogy used to understand the concept and correlation of customer relationship management and how to increase retention

Shared WhatsApp Team Inbox
A shared inbox on WhatsApp is a shared team inbox that allows your entire team to respond to customers or other users from a single interface.

Agent Interface
The agent interface helps the users to collaborate in the same work environment and enable the agent to control all activities inside a software.

Engagement Rate
In the digital world, engagement rate is a metric used to measure the level of engagement generated from created content or a brand campaign.

Conversion Paths
A conversion path is a journey through which a company attracts and leads customers to their website and then converts them into customers.

API Rate Limiter
The primary principle of API rate limiter controls the number of access developers allow for everyone to use API and in what capacity.

Basket building
Basket building is the eCommerce marketing strategy that focuses on encouraging shoppers to build up their online shopping cart with more items.

Palletization
Palletization involves stacking huge quantities of identical items onto a pallet to ship them. This keeps the goods safe and simplifies handling.

Business Process Outsourcing
Business process outsourcing (BPO) involves outsourcing the business operations and responsibilities to a third-party service provider.

Global chatbot statistics for 2022 — Exciting updates
Global Chatbot Statistics for 2022 is here and is packed with many exciting updates. There’s a lot of info for businesses to take advantage of. Read more

Fulfillment Center
A fulfillment center/house or 3PLs are service hubs that take care of all logistics processes needed to get a product from the seller to the customer.

Communications Platform as a Service (CPaaS)
Communications platform as a service or CPaaS, is a cloud-based platform that helps developers to implement real-time communication features.

Gradient Clipping
Gradient Clipping handles one of the most difficult challenges in backpropagation in neural networks during the gradient training process in AI.

Omnichannel marketing
Omnichannel marketing is all about driving marketing campaigns across several channels while making sure to create positive and seamless experiences.

Absorption costing
Absorption costing incorporates all the manufacturing costs - direct materials, direct labor, and variable & fixed manufacturing overheads.

Abandoned checkout
An abandoned checkout is a situation in which your customers add products to their cart, proceed to the checkout step, and then quit the purchase.

Direct-to-consumer (D2C)
Direct-to-consumer (D2C) is an e-commerce strategy where a brand manufactures, markets, and distributes its products to consumers without middlemen.

Escalation Management
Escalation management involves transferring calls to top-level representatives who have more experience than the agent who initially answers the call.

Sharding
Sharding is a technique of splitting or partitioning a single and large logical dataset into multiple/smaller databases and storing them.

WhatsApp CRM Integration
WhatsApp CRM integration ensures direct two-way communication with your prospects and customers on WhatsApp to increase sales and customer support.

Customer dissatisfaction
Are you struggling with customer dissatisfaction? Here are the factors that cause it, along with ways for you to detect dissatisfaction and deal with it.

WhatsApp Business Solution Provider
A WhatsApp Business solution provider (BSP) is a value-added service provider that lets companies scale up customer engagements with the WhatsApp API.

Attribution models
Attribution models are rules or sets of rules that guide the assignment of credit for conversions to the various touchpoints in your conversion paths.

Clean Coding
Clean coding refers to writing codes in a systematic format that is clear and easy to understand, edit or change by other coders or developers.

Headless commerce
Headless commerce is an eCommerce solution to store, manage & deliver content without a frontend delivery layer. The frontend & backend are decoupled.

Merchandising
Merchandising is the efforts that retailers make to display and sell products to their customers, both in their physical store and online stores.

Conversion funnel
A conversion funnel enables you to visualize and understand the flow through which a potential customer lands on your site and takes a desired action.

Social Media Optimization (SMO)
Social Media Optimization, referred to as SMO, is a digital marketing concept used to increase the effectiveness of overall social media efforts.

Computational statistics
Computational statistics or statistical computing focuses on the bond between statistics and computer science to transform raw data into knowledge.

Demand forecasting

Demand forecasting is all about making forecasts and predictions about sales and customer demand during a particular period of time in the future.

Shopify Analytics

Shopify Analytics is the in-built data dashboard that Shopify offers to store owners to help them understand how their business is performing.

Semantic Reasoner

A semantic reasoner aka rules engine, reasoning engine, or a reasoner, can infer logical consequences from a set of axiom / asserted facts

Low-code platforms

Low-code platforms let you build apps with little coding. They use visual interfaces with drag & drop features instead of extensive coding languages.

WISMO
WISMO stands for "where is my order" post purchase queries asked by customers on various platforms to stay updated on the status of their orders.

Backhaul

Backhauling is about planning roundtrip hauls so that the trucks carry goods on part or all of the return trips instead of just driving empty-miles.

Cohort Analysis

Cohort Analysis refers to studying user groups based on shared characteristics to understand their actions & behavioral patterns over a defined period

Digital commerce
Digital commerce involves buying and selling goods & services through digital channels like the internet, mobile networks, & commerce infrastructure. 

Split Testing

Split testing involves splitting your traffic between the existing variations of a marketing collateral to compare and test these variations.

Distributed cache 

Distributed caching is a widely used technique for caching storage data that has been configured across several nodes and servers in the same network

Incoterms

Incoterms is an abbreviated version of the phrase “International Commercial Terms”. It is trademarked by the International Chamber of Commerce.

Behavioral targeting

Behavioral targeting involves sending targeted messages to your prospects on the basis of the way in which they interact with your business.

Consistent Hashing

Consistent Hashing is a data distribution system that operates independently of the number of servers with the help of Virtual Nodes on a hash ring. 

WhatsApp Automation

WhatsApp Automation refers to the use of API or AI-driven technologies to automate the entire conversation, engagement, and message flow on the App. 

Digital ecosystem

A digital ecosystem is a group of interconnected information technology resources that work as a unit. Interoperability is a critical requirement here

Online Storefront

An online storefront is an eCommerce solution to host a website for a business or is the online representation of your business in the online space. 

Sigmoid function

A sigmoid function is a mathematical function that can take any real value and map it to between 0 to 1 so that it is shaped like the letter S.

Bill of material

The bill of material is a blueprint for manufacturing or repairing a product. It contains a list of every item needed to manufacture a product. 

Multi channel commerce

The bill of material is a blueprint for manufacturing or repairing a product. It contains a list of every item needed to manufacture a product. 

Showrooming

Showrooming is the act of looking at a product, touching it, and evaluating it in a store, before going online to buy it at a cheaper price elsewhere.

Audience profiling

Audience profiling is all about breaking your market down into segments and proceeding to build buyer personas that reflect your ideal customers.

Learning management system (LMS)

A learning management system (LMS) is a software that is used for planning, implementing, and assessing a specific learning process.

Waterfall Methodology

The waterfall methodology/model is a project management technique that focuses on a linear progression from inception to the end of a project.

WhatsApp Broadcast

WhatsApp Broadcast allows individuals or businesses to send messages to a list of recipients or contacts in one go without creating a group.

Imbalanced Dataset

Imbalanced Datasets 'also called an unbalanced dataset' refer to datasets where the observations or target class is skewed or has uneven distribution.

Sell through rate

Sell-through rate is an eCommerce metric that shows how much inventory was sold in comparison with the amount of inventory that was purchased.

TensorFlow Playground

TensorFlow Playground users to test artificial intelligence (AI) algorithms through the use of Google’s TensorFlow machine learning libraries.

Load Balancing

Load balancing is a networking solution that efficiently distributes incoming network traffic across multiple backend servers in a server pool. 

Product Bundling 

Product bundling is a marketing technique that involves grouping up related or complementary products into a single unit and selling them together.

Generative adversarial networks (GANs)
Generative adversarial networks are algorithmic architectures that use 2 neural networks to generate new, synthetic instances of data.

Identity resolution
Identity resolution is the process of matching identifiers across devices and touchpoints to a single profile to build a holistic view of the customer

How does HBase scale?

Learn about the components of HBase and understand how to scale it up and get it to handle millions of datapoints, returning results in a few milliseconds.

CRUD operations
CRUD operations are the foundation for all computer programming languages & technologies. CRUD refers to 4 functions - create, read, update & delete.

Principal component analysis
Principal Component Analysis enables you to reduce dimensionality by summarizing the info from large data tables using smaller sets of summary indices

Redis, Kafka or RabbitMQ: Which MicroServices Message Broker is the best?
Trying to pick a microservices message broker? Confused between Redis, Apache Kafka, and RabbitMQ? All three options are great choices for different usecases.

Showrooming
Showrooming is the act of looking at a product, touching it, and evaluating it in a store, before going online to buy it at a cheaper price elsewhere.

12 changes Elon would make if he bought these companies - Meme Edition
Elon's bought Twitter to add an Edit button, stop content moderation, and make the algorithm open-source. Here are 12 other companies he should buy and change.


Want to learn more about tech, AI, CX, and eCommerce concepts? Check out the Engati Glossary!


Jeremy DSouza

Jeremy is a marketer at Engati with an interest in marketing psychology and consumer neuroscience. Over the last year he has interviewed many of the world's brightest CX, AI, Marketing, and Tech thought leaders for Engati CX.

Close Icon
Request a Demo!
Get started on Engati with the help of a personalised demo.
Thanks for the information.
We will be shortly getting in touch with you.
Oops! something went wrong!
For any query reach out to us on contact@engati.com
Close Icon
Congratulations! Your demo is recorded.

Select an option on how Engati can help you.

I am looking for a conversational AI engagement solution for the web and other channels.

I would like for a conversational AI engagement solution for WhatsApp as the primary channel

I am an e-commerce store with Shopify. I am looking for a conversational AI engagement solution for my business

I am looking to partner with Engati to build conversational AI solutions for other businesses

continue
Finish
Close Icon
You're a step away from building your Al chatbot

How many customers do you expect to engage in a month?

Less Than 2000

2000-5000

More than 5000

Finish
Close Icon
Thanks for the information.

We will be shortly getting in touch with you.

Close Icon

Contact Us

Please fill in your details and we will contact you shortly.

Thanks for the information.
We will be shortly getting in touch with you.
Oops! Looks like there is a problem.
Never mind, drop us a mail at contact@engati.com