Analytical systems
AI and data vocabulary becomes valuable when it is anchored in financial use cases: forecasting, anomaly detection, ranking, recommendation, and execution support. This hub ties general technical terms to those financial outcomes.
Multilingual fintech glossary for academic and production-grade learning.
Connect machine intelligence, analytics, and financial interpretation with a shared working vocabulary.
AI and data vocabulary becomes valuable when it is anchored in financial use cases: forecasting, anomaly detection, ranking, recommendation, and execution support. This hub ties general technical terms to those financial outcomes.
Terms such as machine learning, NLP, and predictive analytics are often used loosely in fintech marketing. This hub separates the actual technical meaning of each term from broad branding language.
Financial AI is only as strong as the data and market framing behind it. This topic therefore sits next to market microstructure and crypto infrastructure, where the quality and timing of data shape the validity of analytics.
Google Search Central
Google Search Central: Helpful, reliable, people-first content
Defines trust, helpfulness, and people-first expectations for YMYL-adjacent content.
Google Search Central
Google Search Central: Title links best practices
Supports title hygiene and metadata governance.
Coinbase
Coinbase Learn: Crypto glossary
Reference source for crypto infrastructure terminology.
Inflation
A sustained increase in the general price level.
Opportunity Cost
The loss of potential gain from other alternatives when one alternative is chosen.
Operational Risk
Risk of loss from failed internal processes or systems.
Premium
Amount paid for an insurance policy.
Deductible
Amount paid out of pocket before insurance covers.
Claim
Formal request for payment under insurance policy.
Capital Gains
Profit from selling an asset for more than purchase price.
Stop Loss
Order to sell when price falls to a certain level.
Hostile Takeover
Acquisition of a company against management wishes.
Due Diligence
Comprehensive appraisal of a business.
CDS
Credit Default Swap; insurance against default.
Money Laundering
Concealing origins of illegally obtained money.
Capital Gain
Profit from selling an asset.
Default
Failure to repay a loan.
Supply Chain
Network between company and suppliers.
Retail
Selling goods to consumers.
Appraisal
Assessment of property value.
Capital Gains Tax
Tax on profit from asset sale.
Audit Trail
Records showing history of transactions.
Benchmarking
Comparing performance against best practices.
Fixed Cost
Cost that remains constant.
Crowdfunding
Raising money from many people online.
Rally
Sustained price increase.
Maturity
Date when bond principal is repaid.
Retained Earnings
Profit kept for business.
Supply
Amount of goods available.
Annuity
Fixed sum paid yearly.
Profit
Financial gain.
Crowdsourcing
Obtaining services from crowd.
Free Cash Flow
Cash available for investors.
Payout Ratio
Percentage of earnings paid as dividends.
Fundamental Analysis
Evaluating value based on data.
Return on Investment
Gain relative to cost.
Laissez Faire
Free market with no intervention.
Forfaiting
Purchase of exporter receivables.
Predatory Lending
Unfair loan terms.
Co-pay
Fixed fee paid by patient.
Trailing Stop
Stop loss moving with price.
Clawback
Reclaiming money given.
PCI DSS
Payment Card Industry Data Security Standard.
DApp
Decentralized Application running on a blockchain.
FUD
Fear, Uncertainty, and Doubt.
Airdrop
Free distribution of cryptocurrency.
Flash Loan
Uncollateralized loan repaid in same transaction.
Sharding
Splitting blockchain aimed at scalability.
Sybil Attack
Creating fake identities to gain influence.
Hard Fork
Radical change to blockchain rules.
Block Explorer
Tool to view blockchain data.
Testnet
Alternative blockchain for testing.
Mainnet
The primary blockchain network.
Cross-Chain
Interoperability between blockchains.
Bridge
Connection to transfer assets between chains.
Distributed Ledger
Database shared across network.
Fork
Split in the blockchain network.
GDPR
General Data Protection Regulation.
Webhook
Automated data delivery.
Genesis Block
First block of a blockchain.
Chatbot
AI software for chat.
Air Gap
Offline security measure.
Sidechain
Blockchain linked to main chain.
Layer 1
Base blockchain protocol.
Block Height
Number of blocks in chain.
Reentrancy Attack
Calling a function recursively to drain funds.
Modular Blockchain
Separating execution from consensus.
Data Availability
Guarantee that data is published.
Restaking
Staking the same ETH again.
Oracles
Real world data for blockchain.
Privacy Coin
Crypto hiding transaction details.
Verkle Trees
Data structure for stateless clients.
Blobspace
Data storage for rollups.
Layer 3
App-specific chains on L2.
Base Layer
L1 blockchain.
Layer 0
Network infrastructure underlying Layer 1 blockchains.
BEP-20
Token standard on Binance Smart Chain.
Decentralized Identifier (DID)
Self-sovereign digital identity on blockchain.
Crypto Bridge
Protocol connecting two different blockchains.
Cardano
Proof-of-Stake blockchain platform.
Solana
High-performance blockchain using Proof of History.
Polkadot
Protocol connecting different blockchains.
Cosmos
Internet of Blockchains.
Transaction Fee
Fee paid to process a transaction.
Algorithmic Stablecoin
Stablecoin maintaining peg via algorithms.
Epoch
Time period in blockchain protocols.
Hard Cap
Maximum money a project wants to raise.
Whitepaper
Document explaining a crypto project.
Circulating Supply
Number of tokens currently available.
Shorting
Betting against an asset.
Snapshot
Off-chain voting platform.
Shilling
Promoting a coin for personal gain.
Supply Chain Finance
Financing the supply chain processes.
Database
Organized collection of data.
SQL
Structured Query Language.
Primary Key
Unique identifier for a record in a table.
Foreign Key
Field linking to the primary key of another table.
Algorithm
Set of rules to solve a problem.
Cloud Computing
Delivery of computing services over the internet.
Big Data
Large, complex datasets.
Machine Learning
AI that learns from data.
AI
Simulation of human intelligence by machines.
Backend
Server-side of an application.
Frontend
Client-side of an application.
Full Stack
Development of both frontend and backend.
Agile
Iterative software development methodology.
Scrum
Framework implementing Agile.
ERP
Enterprise Resource Planning software.
CRM
Customer Relationship Management system.
SaaS
Software as a Service; cloud-based software.
UI
User Interface; visual part of app.
UX
User Experience; how user feels using app.
Deep Learning
ML using neural networks with multiple layers.
Natural Language Processing
AI field for understanding human language.
Data Mining
Discovering patterns in large datasets.
Predictive Analytics
Using data to predict future outcomes.
Neural Network
Computing system inspired by biological brain.
Data Visualization
Graphical representation of information and data.
Business Intelligence
Technologies for analyzing business data.
Phishing
Fraudulent attempt to obtain sensitive information.
Data Breach
Security incident exposing confidential information.
Ransomware
Malware that encrypts data and demands payment.
Kubernetes
Open-source container orchestration platform.
Docker
Platform for developing and running containerized apps.
CI/CD
Continuous Integration/Continuous Deployment.
Microservices
Architecture where apps are built as small, independent services.
Serverless
Cloud model where provider manages server infrastructure.
IaaS
Infrastructure as a Service.
PaaS
Platform as a Service.
Load Balancer
Distributes network traffic across multiple servers.
CDN
Content Delivery Network for fast content distribution.
DevOps
Practices combining software development and IT operations.
Scalability
Ability to handle growing amount of work.
Bandwidth
Maximum data transfer rate.
Malware
Malicious software.
Bug
Error in software.
Debugging
Process of finding bugs.
Framework
Platform for developing software.
Library
Collection of pre-written code.
Repository
Storage for code project.
Commit
Saving changes to code.
Merge
Combining code branches.
Deployment
Making software available for use.
Production
Live environment for users.
Staging
Environment mimicking production for testing.
Monolith
Single-tiered software application.
Virtual Machine (VM)
Emulation of a computer system.
Container
Package of software with all dependencies.
E-commerce
Buying and selling online.
Monetization
Process of earning revenue from an asset.
Freemium
Free basic services, paid premium features.
Churn Rate
Rate at which customers stop subscribing.
Retention
Keeping customers over time.
User Acquisition
Gaining new users.
CAC
Customer Acquisition Cost.
LTV
Lifetime Value of a customer.
Conversion Rate
Percentage of users taking desired action.
A/B Testing
Comparing two versions to see which performs better.
Artificial Intelligence
Intelligence demonstrated by machines.
REST
Representational State Transfer.
JSON
JavaScript Object Notation.
NoSQL
Non-relational database management systems.
Server
Computer program/device providing functionality to clients.
Client
Computer hardware/software accessing a server.
Kanban
Visual method for managing work.
Sprint
Short period to complete specific tasks.
User Story
Description of a feature from user perspective.
MVP
Minimum Viable Product.
Innovation
New method, idea, or product.
Digital Transformation
Integration of digital technology into business.
Automation
Use of equipment to reduce human intervention.
Heuristic
Mental shortcut for decision making.
Peer-to-Peer (P2P)
Direct interaction between two parties.
Open Source
Software with source code available to public.
Proprietary
Software owned by an individual or company.
License
Permission to use software.
Cookie
Small data stored on user's computer.
Cache
Temporary storage for fast data access.
Bugs Bounty
Reward for finding bugs.
Dark Web
Encrypted network not indexed by search engines.
VPN
Virtual Private Network.
Metaverse
Virtual reality space in which users interact.
Web 3.0
Next generation of internet (decentralized).
Protocol
Set of rules for data exchange.
QR Code
Quick Response code.
IoT
Internet of Things.
5G
Fifth generation technology standard for cellular networks.
Peer Review
Evaluation by others in the same field.
Quantum Computing
Computing using quantum states.
Augmented Reality (AR)
Interactive experience of real-world environment.
Virtual Reality (VR)
Simulated experience being completely different from real world.
Edge Computing
Computing near the source of data.
Biotech
Tech based on biology.
Green Tech
Tech that is environmentally friendly.
NLP
Natural Language Processing.
LLM
Large Language Model.
Supervised Learning
Training with labeled data.
Unsupervised Learning
finding patterns in unlabeled data.
Reinforcement Learning
Learning by trial and error.
Computer Vision
Computers understanding images.
Generative AI
AI creating new content.
Virtual Assistant
AI helping with tasks.
Data Warehouse
System for data reporting.
Data Lake
Storage for raw data.
ETL
Extract, Transform, Load.
Public Cloud
Cloud services available to everyone.
Private Cloud
Cloud used by a single org.
Hybrid Cloud
Mix of public and private clouds.
Containerization
Bundling app with dependencies.
SDLC
Software Development Life Cycle.
Waterfall
Linear project management.
XML
Extensible Markup Language.
Version Control
Managing changes to code.
Git
Distributed version control system.
GitHub
Platform for hosting code.
MongoDB
Popular NoSQL database.
PostgreSQL
Advanced open source relational database.
Redis
In-memory data structure store.
HTTP
Hypertext Transfer Protocol.
HTTPS
Secure HTTP.
TCP/IP
Protocols driving the internet.
DNS
Domain Name System.
IP Address
Unique address of a device.
SSH
Secure Shell.
HTML
HyperText Markup Language.
CSS
Cascading Style Sheets.
JavaScript
Language of the web.
TypeScript
JavaScript with syntax for types.
Python
Versatile programming language.
Java
Class-based, object-oriented language.
C++
High-performance language.
Kotlin
Language for Android apps.
Rust
Language focused on safety.
Go
Language by Google.
PHP
Server-side scripting language.
Ruby
Dynamic, open source language.
OS
Operating System.
Kernel
Core of an OS.
Shell
Interface to the kernel.
Terminal
Interface for text commands.
CLI
Command Line Interface.
GUI
Graphical User Interface.
Responsive Design
Design adapting to screen size.
Wireframe
Blueprint of a web page.
Prototype
Early sample of a product.
Refactoring
Restructuring code without changing behavior.
Legacy Code
Old code still in use.
Technical Debt
Cost of choosing easy solution now.
Throughput
Actual data transfer rate.
Load Balancing
Distributing traffic across servers.
Caching
Storing data for faster access.
Session
Period of user interaction.
Local Storage
Storage in browser.
Hardware
Physical parts of computer.
Software
Programs running on hardware.
Firmware
Software embedded in hardware.
CPU
Central Processing Unit.
GPU
Graphics Processing Unit.
RAM
Random Access Memory.
Internet
Global network of computers.
WWW
World Wide Web.
ISP
Internet Service Provider.
Router
Device directing network traffic.
Modem
Device connecting to ISP.
Motherboard
Main circuit board.
SSD
Solid State Drive.
HDD
Hard Disk Drive.
Bluetooth
Short-range wireless tech.
Wi-Fi
Wireless networking.
LTE
Long Term Evolution (4G).
Pixel
Smallest unit of image.
Resolution
Number of pixels on screen.
4K
Resolution approx 4000 pixels wide.
Codec
Device/program to encode data.
Binary
System using 0 and 1.
Hexadecimal
Base-16 number system.
ASCII
Character encoding standard.
Unicode
Standard for text encoding.
Hash Function
Function mapping data to fixed size.
Logic Gate
Building block of digital circuit.
Compilation
Translating code to machine language.
Interpretation
Executing code line by line.
IDE
Integrated Development Environment.
Variable
Container for data value.
Function
Block of code to perform task.
Class
Blueprint for creating objects.
Object
Instance of a class.
Inheritance
Class deriving from another.
Polymorphism
Objects taken on many forms.
Encapsulation
Bundling data and methods.
Loop
Repeating code block.
Conditional
If-then logic.
Integer
Whole number.
Float
Number with decimal point.
String
Sequence of characters.
Array
Collection of items.
Pointer
Variable storing memory address.
Stack
LIFO data structure.
Queue
FIFO data structure.
Tree
Hierarchical data structure.
Graph
Nodes connected by edges.
Hash Table
Key-value store.
Complexity
Efficiency of algorithm.
Big O
Notation for complexity.
Searching
Finding item in data.
Bit
0 or 1.
Byte
Unit of digital information.
Clock Speed
Speed of processor.
BIOS
Basic Input/Output System.
Driver
Software controlling hardware.
Recursion
Function calling itself.
Syntax
Rules of language structure.
Semantics
Meaning of code.
Linker
Program linking object files.
Abstraction
Hiding complex logic.
Concurrency
Dealing with multiple tasks.
Parallelism
Executing tasks simultaneously.
Thread
Unit of execution.
Process
Program in execution.
Deadlock
Processes waiting for each other.
Race Condition
Timing dependent bug.
Mutex
Mutual exclusion object.
Semaphore
Variable controlling access.
Garbage Collection
Automatic memory management.
Reference
Alias for a variable.
Compiler
Translates code to machine lang.
Interpreter
Executes code line by line.
Bytecode
Intermediate code.
Linked List
Linear collection of nodes.
Hash Map
Key-value store.
Binary Tree
Tree with two children max.
Heap
Tree-based structure.
Trie
Prefix tree.
Vector
Dynamic array.
Set
Collection of unique items.
TCP
Transmission Control Protocol.
UDP
User Datagram Protocol.
IP
Internet Protocol.
DHCP
Assigns IP addresses.
FTP
File Transfer Protocol.
SMTP
Protocol for sending email.
IMAP
Protocol for retrieving email.
WebSocket
Two-way communication channel.
SOAP
Protocol for structured info.
OSI Model
7 layers of networking.
RAID
Redundant Array of Independent Disks.
Virtual Machine
Emulated computer.
Hypervisor
Software creating VMs.
Reverse Proxy
Server sitting in front of web servers.
Buffer
Temp storage for data transfer.
AGI
Artificial General Intelligence; human-level AI.
Transformer Model
Architecture used in modern NLP.
Prompt Engineering
Crafting inputs to guide AI responses.
Hallucination (AI)
AI generating false information confidently.
Turing Test
Test of a machine's ability to exhibit intelligent behavior.
Multi-Cloud
Using services from multiple cloud providers.
DDos
Distributed Denial of Service attack.
Man-in-the-Middle
Attacker intercepts communication between two parties.
SQL Injection
Injecting malicious SQL code into queries.
XSS
Cross-Site Scripting attack.
Social Engineering
Manipulating people into divulging info.
Penetration Testing
Simulated cyberattack to find vulnerabilities.
Keylogger
Spyware determining keys pressed on a keyboard.
Botnet
Network of infected computers controlled by attacker.
Trojan
Malware disguised as legitimate software.
Worm
Malware that replicates itself across networks.
Exploit
Code taking advantage of a vulnerability.
Patch Menganement
Process of applying updates to software.
Qubit
Basic unit of quantum information.
Superposition
State of being in multiple states at once.
Entanglement
Quantum correlation between particles.
AR
Augmented Reality; digital overlay on real world.
VR
Virtual Reality; immersive digital environment.
MR
Mixed Reality; interaction between real and digital.
Robotics
Design and construction of robots.
Automation RPA
Robotic Process Automation.
Bioinformatics
Using software to analyze biological data.
Genomics
Study of genomes.
Dark Mode
User interface color scheme.
Hadoop
Framework for distributed storage and processing.
Spark
Engine for large-scale data processing.
Data Scientist
Expert analyzing complex data.
PWA
Progressive Web App; web app behaving like mobile app.
SPA
Single Page Application.
SSR
Server-Side Rendering.
CSR
Client-Side Rendering.
SEO
Search Engine Optimization.
Accessibility
Making web usable by everyone.
DOM
Document Object Model; HTML structure.
RFID
Radio Frequency Identification.
Moore's Law
Observation that computing power doubles every 2 years.
Singularity
Hypothetical point where AI surpasses human intelligence.
Deepfake
AI-generated fake video/audio.
Digital Twin
Virtual replica of a physical object.
Smart City
City using tech to improve services.
Wi-Fi 6
Latest standard for Wi-Fi.
Open Data
Data freely available to everyone.
Dark Data
Data collected but not used.
Algorithm Trading
Trading by algorithms.
Sorting Algorithm
Method to arrange data in order.
Big O Notation
Describing algorithm performance.
Code Review
Peer review of source code.
Design Pattern
Reusable solution to common problems.
MVC
Model-View-Controller architecture.
MVVM
Model-View-ViewModel architecture.
GitLab
DevOps platform with Git.
Jira
Issue tracking tool.
Windows
OS by Microsoft.
macOS
OS by Apple.
Linux
Open-source OS kernel.
Android
Mobile OS by Google.
iOS
Mobile OS by Apple.
Ubuntu
Popular Linux distribution.
Kali Linux
Linux for penetration testing.
Boolean
True or False.
Null
Intentional absence of any object value.
Undefined
Variable declared but not assigned a value.
Exception
Problem occurring during execution.
Bug Tracking
Managing software bugs.
Confluence
Collaboration wiki tool.
Slack
Messaging app for teams.
Zoom
Video conferencing tool.
3D Printing
Manufacturing objects from digital file.
Drone
Unmanned aerial vehicle.
Autonomous Vehicle
Self-driving car.
Smart Home
Home equipped with internet-connected devices.
Wearable Tech
Electronics worn on the body.
Nanotechnology
Manipulation of matter via individual atoms.
Renewable Energy
Energy from natural sources.
Alan Turing
Father of computer science.
Grace Hopper
Pioneer of computer programming.
Bill Gates
Co-founder of Microsoft.
Steve Jobs
Co-founder of Apple.
Elon Musk
CEO of Tesla and SpaceX.
Tim Berners-Lee
Inventor of the World Wide Web.
Linus Torvalds
Creator of Linux and Git.
Tech giant known for search.
Apple
Tech giant known for iPhone.
Microsoft
Software giant behind Windows.
Amazon
E-commerce and cloud giant.
Meta
Parent company of Facebook.
Tesla
Electric vehicle company.
NVIDIA
GPU manufacturer.
Intel
Semiconductor chip manufacturer.
AMD
Semiconductor company rival to Intel.
Samsung
Korean tech conglomerate.
Sony
Japanese tech and entertainment company.
Netflix
Streaming service giant.
Spotify
Music streaming service.
Uber
Ride-hailing platform.
Airbnb
Home-sharing platform.
JPG
Image file format.
PNG
Image format supporting transparency.
GIF
Animated image format.
SVG
Scalable Vector Graphics.
MP3
Audio file format.
MP4
Video file format.
Portable Document Format.
DOCX
Microsoft Word document.
TXT
Plain text file.
ZIP
Archive file format.
RAR
Archive file format.
EXE
Executable file (Windows).
APK
Android Package Kit.
IPA
iOS App Store Package.
DMG
Disk Image (macOS).
ISO
Disk image of an optical disc.
Bin/Cue
Disc image formats.
Torrent
P2P file sharing protocol.
Magnet Link
Link to download torrent without file.
Seed
Sharing a completed file.
Leech
Downloading without sharing.
Peer
User sharing/downloading files.
Tracker
Server coordinating peers.
Proxy
Server acting as intermediary.
Tor
Network for anonymous communication.
Deep Web
Part of web not indexed by search engines.
Salt
Random data added to hash.
Brute Force
Guessing passwords by trying all combinations.
Rainbow Table
Precomputed table for reversing hashes.
Zero Day
Vulnerability known to hackers but not vendors.
Spyware
Software that spies on user.
Adware
Software showing unwanted ads.
Rootkit
Software enabling unauthorized root access.