Enable javascript in your browser for better experience. Need to know to enable it? Go here.

Glossary

A

Addictive tech

 

Some applications are specifically designed to be addictive, driven by fierce competition for eyeballs and engagement. While this might be good for companies in the business of selling advertisements to audiences, there is an increasing awareness of the societal and environmental harms of addictive tech.

 

 

Adversarial machine learning

 

These are attacks on (or using) machine learning systems. Attackers may tamper with training data or identify specific inputs that a model classifies poorly to deliberately create undesired outcomes.

 

 

Affective (emotional) computing

 

A collective term for systems and devices that can recognize, interpret, process, simulate and respond to human emotions.

 

 

Agent-based simulation

 

The use of simulated independent agents, each working towards their own goals, to model a real world situation. Such simulatioms can help us understand complex phenomena such as the spread of diseases or protein folding.

 

 

AGI research

 

An Artificial General Intelligence (AGI) has broad capabilities across a range of intellectual tasks, and is often compared to human-level intelligence. This contrasts with today's "narrow" AI which can be remarkable, but only for very specific tasks.

AI agents

 

Functionality built into applications which combines the functionality of publicly available generative AI models with specific knowledge from outside the model, such as product information.

 

 

AI as a service

 

“Ready-to-go” AI solutions offered as a service on cloud platforms. They often don't require specialized AI or ML skills to be used.

 

 

AI in security

 

AI is increasingly being deployed both defensively, to respond to threats more dynamically, and offensively, to probe for weaknesses in a system.

 

 

AI marketplaces

 

Marketplaces such as AWS Marketplace, Google TensorFlow Hub and MS Azure Marketplace enable independent developers and companies to sell their models to a global market. They also allow consumers to quickly leverage those models to create value quickly.

 

 

AI safety and regulation

 

Government regulation and guidance on the use of AI, intended to ensure responsible use and consequences of AI systems. This includes monitoring, compliance and good practice.

AI-assisted software development

 

The use of AI to speed up or improve software development. Examples include code completion in IDEs, AI-created automated tests, AI that can detect bugs or even AI code generation tools.

 

 

AI-generated media

 

Images, audio or video that have been manipulated by AI. Also known as synthetic media.

 

 

AI, IoT and XR combined solutions

 

A new breed of solutions in which multiple technologies are combined and act together. Drones, robotics and autonomous vehicles are all examples of devices that require machine learning, processing streams of data and layers of intelligence to solve problems.

 

 

AI/ML on edge

 

The ability to run AI and machine learning algorithms at the edge of a network, often on resource-constrained devices.

 

 

Alternative currencies

 

Currencies other than money, such as cryptocurrencies or reputation-based currency. Increasingly, this includes vendor-specific reward-based currencies such as Starbucks Stars or Amazon Coins.

Augmented reality

 

Where the physical world is combined with the digital. A limited form of AR is now ubiquitous, delivered via Apple and Android mobile devices, capable of overlaying virtual objects to a camera view of the world. More advanced AR is delivered via a dedicated headset such as Apple Vision Pro, Microsoft’s Hololens or Meta's Quest 3.

 

 

Automated compliance

 

The use of technology to make all the data required to satisfy compliance reports, checks and balances readily available. In many cases, the automation simplifies reporting by sifting through data; however, AI is now beginning to replace manual decision making.

 

 

Automated workforce

 

The use of technology to perform repeatable or predictable workflows. Automated workforce doesn’t mean completely replacing humans; in some cases human-machine "teaming" may produce better results than either working alone.

 

 

AutoML

 

An approach to partly automate the work of data scientists and machine learning engineers by automatically selecting and training machine learning models for specific tasks.

 

 

Autonomous robots

 

Smaller and cheaper than their industrial counterparts, robots with on-board AI are able to sense their environment, navigate, learn to complete tasks and even fix themselves and other things.

 

Autonomous vehicles

 

Self-driving cars, trucks and public transport. While the headline focus may be on self-driving cars, autonomous vehicles also have high potential for specialized industrial and business applications such as mining and factory floors.

B

Brain-computer interfaces

 

A device that reads and analyzes signals from the brain and turns them into an input mechanism for a computer. The human and the device, after a period of training, work together to encode and decode human intentions.

C

Causal inference for ML

 

Techniques to draw cause and effect relationships between the input data and the outcomes of a machine learning model, which allows a model to be more generalizable and require less training data to perform effectively.

 

 

Code of ethics for software

 

A set of guidelines organizations can use to manage risk and mitigate the potential negative consequences of given technologies (such as AI bias).

 

 

Collaboration ecosystems

 

When individuals or organizations share common goals, they will probably want to work together. To do so, they need a set of tools and resources they can use to unlock value effectively — a good example is a remote environment for development teams. It allows people to solve problems together.

 

 

Consumer XR

 

Extended reality intended for consumers rather than professional or enterprise users.

D

Data clean room

 

Secure environments for organizations to share and combine data with each other without having to physically share their own data.

 

 

Data contract

 

A formal agreement between two parties – producer and consumer – to use a dataset or data product.

 

 

Data marketplaces

 

A system that enables the finding, buying, sharing and selling of data within and outside an organization.

 

 

Data mesh

 

A data platform organized around business domains where data is treated as a product, with each data product owned by a team. To enable speed and drive standardization, infrastructure teams provide tools that allow data product teams to self-serve.

 

 

Data product specification

 

A precise technical description of a data product that enables its provisioning, configuration, and governance.

Decentralized data platforms

 

Use of multiple data stores instead of singular, monolithic centralized stores. A good example is data mesh (see above).

 

 

Decentralized identity

 

Also known as self-sovereign identity, decentralized identity (DiD) is an open-standards-based identity architecture that uses self-owned and independent digital IDs and verifiable credentials to transmit trusted data. Although not dependent on blockchains, many current examples are deployed on them as well as other forms of distributed ledger technology, and private/public key cryptography, it seeks to protect the privacy of and secure online interactions.

 

Decentralized personal data stores

 

A data architecture style where individuals control their own data in a decentralized manner, allowing access on a per-usage bases (for example, Solid PODs).

 

 

Decentralized security

 

Rather than using traditional security perimeters that are a single point of failure, techniques such as zero-trust networks decentralize security checks across the network.

 

 

Decision science

 

Combines AI tools and techniques with behavioral and management sciences for the purpose of upskilling and amplifying decision making and decision makers across a variety of complex problems from scenario planning to operations research.

Developer experience platforms

 

Platforms which provide the tooling to make it as effective as possible for developers to create, test and deploy software.

 

 

DevSecOps

 

An abbreviated portmanteau for development, security and operations. This is an approach that includes security as a first-class concern, together with development and operations.

 

 

Differential privacy

 

A privacy technique that introduces noise in a dataset in such a way as to provide individual privacy while still allowing insights to be drawn or machine learning models to be built on top of the data.

 

 

Digital carbon management

 

Measuring organizational green house gas (GHG) emissions and efforts to mitigate those emissions. Establishing a carbon footprint and a program to determine it is an essential component on the journey towards net zero and is the first building block towards any sustainability strategy.

 

 

Digital ecosystems

 

Disparate participants, systems and even organizations that cooperate, collaborate and compete to create an emergent ecosystem where the whole is greater than the sum of the parts. Examples include the travel industry, online marketplaces and new “super apps” such as Gojek and WeChat.

Digital humans

 

AI-powered virtual assistants and non-playable characters that recreate human interaction within the metaverse.

 

 

Digital twin

 

A virtual model of a process, product or service that allows both simulation and data analysis. 3D visualization can be used together with live data, so you can understand what is happening to pieces of equipment you can’t actually see.

 

 

Distributed energy resources

 

A category of electrical power generation that are “behind-the-meter.” DERs generate power for the grid, and reward energy credits to the DER owner. An example is solar panels installed on a home.

E

Easing access to Generative AI

 

Making AI easier to use by lowering the barrier to entry with shared context and other data that those who aren't familiar with prompt engineering may struggle with.

 

 

Edge computing

 

Bringing data storage and processing closer to the devices where it is stored, rather than relying on a central location that may be thousands of miles away. Benefits include reduced latency for real-time systems and improved data privacy.

 

 

Encrypted computation

 

The ability to perform calculations on encrypted data, without first decrypting it. Useful to maintain data privacy while allowing data storage and manipulation to be outsourced. This includes technologies like secure multi-party computation and homomorphic encryption.

 

 

Enterprise XR

 

An umbrella term for virtual and augmented reality and related technologies which are now being used in the enterprise. Advantages can include cost reductions, efficiency or safety improvements.

 

 

Ethical frameworks

 

Decision-making frameworks that attempt to bring transparency and clarity into the way decisions are made, especially around the use of AI and potential bias in data.

Evolutionary architectures

 

In contrast to traditional up-front, heavyweight enterprise architectural designs, evolutionary architecture accepts that we cannot predict the future and instead provides a mechanism for guided, incremental change to systems architecture.

 

 

Explainable AI

 

A set of tools and approaches to understand the rationale used by an ML model to reach a conclusion. These tools generally apply to models that are otherwise opaque in their reasoning.

F

Federated learning

 

An approach that downloads a machine learning model and then computes or trains a specific, modified model using local data on another device. The approach helps multiple organizations to collaborate on model creation without explicitly exchanging protected data.

 

Fine grained data access controls

 

More granular access controls for data, such as policy-based (PBAC) or attribute-based (ABAC) that can apply more contextual elements when deciding who has access to data.

 

FinOps

 

The practice of bringing financial accountability to the variable spending model of cloud computing. It involves a collaborative approach among teams such as finance, operations and development to manage and optimize cloud costs effectively.

G

GenAI tools in IDEs

 

The integration of generative artificial intelligence (GenAI) capabilities into integrated development environments (IDEs), the software applications that programmers use to write code.

 

 

Generative AI

 

AI that creates text, image, audio and video from simple human language prompts.

 

 

Gesture recognition


Machine understanding and interpretation of human gestures such as waving, making an “up” or “down” motion, hand positioning and so on.

 

 

Green cloud

 

Data centers fed by renewable energy, running software and systems designed and optimized for efficient processing while also minimizing energy consumption.

 

 

Green software engineering

 

Choosing technologies, programming languages, algorithms and software architectures that are efficient and use less energy.

Green UX

 

Design of user interfaces and prompts that help people understand the environmental consequences of the choices they make. Examples include an airline website displaying carbon emissions for flights or a mapping tool showing the carbon output for driving a particular route.

I

Increased regulation

 

The steady increase of regulation, especially around data, privacy, security and greenhouse gas emissions.

 

 

Industrial XR

 

Using virtual environments to test and model desired physical outcomes in an industrial context.

 

 

Integrated data and AI platforms

 

Platforms designed specifically for machine learning, providing end-to-end capabilities such as data management, feature engineering, model training, model evaluation, model governance, explainability, AutoML, model versioning, promotion between environments, model serving, model deployment and model monitoring.

 

 

Intelligent machine to machine collaboration

 

Technologies enabling the direct interaction of devices and information sharing between them, usually in an autonomous fashion. This enables to decision making and action with little or no human intervention.

 

 

International law for crypto assets

 

Crypto assets are traded across the world. Similar to the move for international laws for AI, crypto assets also need international law for cross border trading. This might include costs, categories of assets and what constitutes legal trading.

K

Knowledge graphs

 

A way to represent knowledge and semantic relationships between entities using a graph data structure.

M

MLOps

 

A movement to bring DevOps practices to the field of machine learning. MLOps fosters a culture where people, regardless of title or background, work together to imagine, develop, deploy, operate, monitor and improve machine learning systems in a continuous way. Continuous Delivery for Machine Learning (CD4ML) is Thoughtworks' approach to implement MLOps end-to-end.

 

Multimodal AI

 

AI model interactions that span different modes of communication. For example, a chatbot that understands and responds in both written and spoken language.

N

Natural language processing

 

Artificial intelligence and other modern technologies that help computers understand the intent and meaning of spoken or written language. Used for everything from dictation software to analyzing documents for meaning.

 

 

Next-generation cryptography

 

Forms of cryptography created in response to technological or societal challenges. Examples include quantum-resistant encryption algorithms, confidential computing with specialized hardware secure enclaves, homomorphic encryption allowing computation to occur on the data while it is still encrypted, and energy efficient cryptography.

O

Online machine learning

 

A technique where algorithms continuously learn based on the sequential arrival of data, and can explore a problem space in real time. Contrasts with traditional machine learning where model training uses only historical data and cannot respond to dynamic or previously-unseen situations.

 

 

Operationalize AI

 

Making AI a normal part of business operations including appropriate security and governance.

P

Personal information economy

 

A business model that aims to extract business value from the possession and use of large amounts of personal information. Examples range from the primitive use of cookies to the targeted profiling of people via their online behavior. This has historically been the domain of companies or intermediate ad-based services trying to retain and target customers, but, since GDPR and similar privacy laws, we are seeing a shift towards people controlling what data they wish to expose in exchange for a service.

 

 

Personalized healthcare

 

Understanding an individual patient’s genetic profile to identify potential issues before they happen and provide more effective treatments in response to existing conditions.

 

 

Platforms as products

 

A way of creating and supporting platforms with a focus on providing customer (user) value instead of treating platform building as a time-boxed project.

 

 

Privacy first

 

Privacy first is a significant shift in business, organization and product strategy, where privacy operates as a core business value and offering. This shift moves away from the prior movement where "users are the product", into a new realm, where building trust and transparency comes first.

 

 

Privacy-aware communication

 

Communications software that directly advertises its security stance and features, such as end-to-end encryption.

Privacy-enhancing technologies (PETs)

 

A collection of technologies and techniques for preserving user privacy, such as anonymization, encrypted computing and differential privacy.

 

 

Privacy-respecting computation

 

New techniques that allow stronger guarantees for privacy, even when personal data is used in computations. Part of the broader category of privacy-enhancing technologies (PETs).

 

 

Production immune systems

 

Systems that monitor metrics across complex distributed systems and take corrective action if a problem is detected. They are often used for security, but increasingly also for resilience and recovery in the face of an outage.

Q

Quantum computing

 

The use of probabilistic states of photons, rather than binary ones and zeros, to run algorithms. Although proven to work in specific problem spaces, quantum computing has yet to scale to broadly useful applications.

 

 

Quantum machine learning

 

Machine learning algorithms adapted and executed on a quantum computing engine, generally used to analyze classical (non-quantum) data.

R

RAG (Retrieval augmented generation)

 

A method in artificial intelligence where the system enhances its response generation by fetching relevant information from a large database or knowledge source. This approach combines the creative aspects of generative AI models with the precision of data retrieval, enabling more accurate and contextually relevant responses in various business applications.

 

 

Re-decentralization

 

Systems, both human and machine, originally designed to be decentralized have become more centralized over time. Re-decentralization refers to the conscious effort of moving those systems back to a decentralized model.

 

 

Responsible tech facilitation

 

Tools and techniques are emerging that support incorporating responsible tech into software delivery processes, primarily focusing on actively seeking to incorporate under-represented perspectives; some examples include Tarot Cards of Tech, Consequence Scanning, and Agile Threat Modeling.

 

 

Retina resolution XR

 

Ultra-high resolution XR with photorealistic rendering over a wide field of view. Currently only available via extremely expensive headsets. An example is Varjo XR-3.

 

 

Robotic process automation and low code

 

Robotic process automation (RPA) aims to allow scripts or bots to interact with UIs instead of needing a human operator. Low-code seeks to democratize programming, by allowing non-programmers to create software systems.

S

Satellite networks

 

High-speed, low-latency broadband for places where traditional fiber or wireless network providers won’t spend the money to connect. Examples include Starlink from SpaceX, Kuiper from Amazon, OneWeb and Telesat.

 

 

Secure software delivery

 

Security applied to the entire process of software creation, which in modern architectures includes the delivery pipeline used to build, test and deploy applications and infrastructure.

 

 

Smart cities

 

An urban area that uses different types of IoT sensors to collect data coupled with platforms to integrate and act on the data, advising or commanding digitally enabled systems to perform some response. Insights gained from the data are used to manage assets, resources and services efficiently; in return, that data is used to improve the operations across the city.

 

 

Smart energy management systems

 

Ubiquitous availability of energy usage data via measurement equipment, APIs and tools gives a range of energy players (generators, distributors, suppliers, vendors) and customers a greater ability to understand and analyze their energy usage.

 

 

Smart homes

 

Featuring smart hubs, homes are now becoming 'smart', allowing people to control almost all household systems. Analytics can even guide or manage heat and energy supply and learn from individual habits or those in a neighbourhood.

Smart systems and ecosystems

 

Networks of networks that use AI and ML to enhance a system to become more than the sum of its parts. For example, in a smart city, networks of cars and roadside sensors help speed the flow and safety of traffic.

 

 

Software-defined vehicles

 

Automobiles where the core functionalities, features and user experience are primarily governed by software, rather than traditional mechanical and electrical systems. This approach enables increased flexibility, customization and continuous enhancement through remote updates, significantly transforming the vehicle's capabilities and, in turn, the automotive industry's business models.

 

 

Spatial audio

 

Advanced signal processing, originally from Apple, that allows sounds to be placed virtually in 3D space. Spatial audio also tracks headphones and screen position to allow for accurate sound placement.

T

Technology and sovereign power

 

Rising forces are leading to internet balkanization — the splintering of the internet — many led by nation states. Privacy legislation accelerates this process, as it enforces data rights, data sovereignty, and strongly impacts how companies deploy and distribute systems and data on the Internet.

 

 

Technology for circular economy

 

A closed economic system where raw materials and products are constantly shared so as to lose their value as little as possible. Technology that supports this includes reusable services, traceability, IoT and data mining.

 

 

Touchless interactions

 

The ability to interact with devices without touching, driven at least partially as a result of the COVID-19 pandemic. Specific technologies include hand tracking and voice and gesture recognition.

 

 

Trustworthy data

 

An emerging set of techniques to certify the provenance of data and to govern its use across an organization. This could prove transformative in the effort to track and enhance progress towards sustainability targets.

U

Ubiquitous connectivity 

 

Providing connectivity to everyone and everything, everywhere, all the time. Some predict ubiquitous connectivity will super-charge innovation in resource-limited parts of the planet, while critics see it as expensive and unnecessary.

 

 

Understandable consent

 

Most terms of service (TOS) or end-user license agreements (EULAs) are impenetrable legalese that make it difficult for people without a law background to understand. Understandable consent seeks to reverse this pattern, with easy-to-understand terms and clear descriptions of how customers' data will be used.

V

Vector databases

 

Specialized storage systems designed to efficiently handle and index high-dimensional data vectors, commonly used in machine learning and AI applications.

 

X

XR-enabled hybrid working

 

A collaboration strategy where, using XR, everyone on a hybrid local/remote team interacts with the same shared artifacts, such as whiteboards and other information radiators. This brings the remote collaborators closer to the in-person team.

Z

Zero knowledge proofs

 

A method that allows one party to prove to another that a statement is true without revealing how it knows it is true.

Read Looking Glass 2024