Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.
  • content management (CM) - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • Content Management Interoperability Services (CMIS) - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content marketing platform (CMP) - A content marketing platform (CMP) is a software solution that helps content marketing teams plan, envision, collaborate and create materials that successfully raise brand awareness, improve lead generation and increase revenue.
  • content personalization - Content personalization is a branding and marketing strategy in which webpages, email and other forms of content are tailored to match the characteristics, preferences or behaviors of individual users.
  • content sprawl - Content sprawl is a condition of an organization's content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for actions the software developer anticipates the user might want to take.
  • copypasta - Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.
  • core banking system - A core banking system is the software that banks use to manage their most critical processes, such as customer accounts, transactions and risk management.
  • COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
  • COTS, MOTS, GOTS and NOTS - COTS, MOTS, GOTS and NOTS are abbreviations that describe prepackaged software or -- less commonly -- hardware purchase alternatives.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM (customer relationship management) analytics - CRM (customer relationship management) analytics comprises all of the programming that analyzes data about customers and presents it to an organization to help facilitate and streamline better business decisions.
  • cross-platform mobile development - Cross-platform mobile development is an approach to developing software applications that are compatible with multiple mobile operating systems (OSes) or platforms.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection attack in which a threat actor inserts data, such as a malicious script, into content from otherwise trusted websites.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSSLP (Certified Secure Software Lifecycle Professional) - CSSLP (Certified Secure Software Lifecycle Professional) is a certification from ISC2 that focuses on application security within the software development lifecycle (SDLC).
  • curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) is a medical code set that enables physicians and other healthcare providers to describe and report the medical, surgical, and diagnostic procedures and services they perform to government and private payers, researchers and other interested parties.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that have similar characteristics relevant to marketing, such as age, gender, interests and spending habits.
  • customer service and support - Customer service is the support that organizations offer to customers before and after purchasing a product or service.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, apps and perhaps internet capability to encourage the customer to control access to information and ordering.
  • cybersecurity - Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.
  • dark post - A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in follower feeds organically.
  • data aggregation - Data aggregation is any process whereby data is gathered and expressed in a summary form.
  • data availability - Data availability is a term used by computer storage manufacturers and storage service providers to describe how data should be available at a required level of performance in situations ranging from normal through disastrous.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an unauthorized fashion.
  • data classification - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • data feed - A data feed is an ongoing stream of structured data that provides users with updates of current information from one or more sources.
  • data lifecycle management (DLM) - Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.
  • data mining - Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis.
  • data protection management (DPM) - Data protection management (DPM) is the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data source name (DSN) - A data source name (DSN) is a data structure containing information about a specific database to which an Open Database Connectivity (ODBC) driver needs to connect.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client used to access it.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, systems operators and other production IT staff to oversee code releases and deployments.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital cash (e-cash) - Digital cash is a system of purchasing cash credits, storing the credits in your computer or digital wallet, and then spending them when making electronic purchases over the internet or in person on a mobile device at the point of sale.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital health (digital healthcare) - Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.
  • digital marketing - Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic technologies.
  • digital platform - A digital platform is a web-based structural software package that speeds and eases transactions among users.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed tracing - Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • Drupal - Drupal is a free, open source content management system (CMS) to build and maintain websites, online directories, e-commerce stores, intranets and other types of digital content.
  • DuckDuckGo - DuckDuckGo is an independent company that offers products geared toward internet privacy.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • e-commerce - E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
  • e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
  • eClinicalWorks - eClinicalWorks is a Massachusetts-based company that sells electronic medical record (EMR), practice management (PM) and personal health record (PHR) software and services to reportedly more than 115,000 physicians and 70,000 facilities in the United States.
  • Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
  • Electronic Data Interchange (EDI) - Following specific standards, EDI is a way for businesses to securely transfer important data, such as invoices and purchase orders, via the Internet.
  • electronic health record (EHR) - An electronic health record (EHR) is an individual's official health document that is shared among multiple facilities and agencies.
  • electronic intensive care unit (eICU) - An Electronic Intensive Care Unit (eICU) is a form or model of telemedicine where state-of-the-art technology is used to provide an additional layer of critical care service to patients.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information that is produced, saved, transferred or received in an electronic form.
  • Eloqua - Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • encryption key management - Encryption key management is the practice of generating, organizing, protecting, storing, backing up and distributing encryption keys.
  • enterprise content services - Enterprise content services are the evolution of enterprise content management (ECM); their goal is to adapt to the changing needs of enterprises and the emergence of new technologies, such as cloud computing.
  • enterprise document management (EDM) - Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
  • enterprise file sync and share (EFSS) - Enterprise file sync and share (EFSS) is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.
  • enterprise information management (EIM) - Enterprise information management (EIM) is the set of business processes, disciplines and practices used to manage the information created from an organization's data as an enterprise asset.
  • enterprise license agreement (ELA) - An enterprise license agreement (ELA) is a contract between a customer and a vendor that allows purchase of a software product for a company at a discounted, fixed rate for a certain time period.
  • enterprise mashup (or data mashup) - An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes.
  • enterprise master patient index (EMPI) - An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • EOM (end of message) - EOM means 'end of message,' a phrase used in written communications -- typically email messages, instant messages or text -- to indicate a complete message that doesn't require a response.
  • Epic Systems - Epic Systems is one of the largest providers of health information technology, used primarily by large U.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is software designed to manage and integrate the functions of core business processes like finance, HR, supply chain and inventory management in a single system.
  • event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
  • expert system - An expert system is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expertise and experience in a particular field.
  • FaceTime - FaceTime is a proprietary video and audio calling service developed by Apple Inc.
  • failover - Failover is a backup operational mode in which the functions of a system component are assumed by a secondary component when the primary becomes unavailable.
  • falsifiability - Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong.
  • fault tolerance - Fault tolerance is the capability of a system to deliver uninterrupted service despite one or more of its components failing.
  • FDA (U.S. Food and Drug Administration) - The FDA (U.S.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • fee-for-service (FFS) - Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service they perform.
  • femtech - 'Femtech' is a term that refers to diagnostic tools, products, services, wearables and software that use technology to address women's health issues, including menstrual health, reproductive health, sexual health, maternal health and menopause.
  • FHIR (Fast Healthcare Interoperability Resources) - Fast Healthcare Interoperability Resources (FHIR) is an interoperability standard for electronic exchange of healthcare information.
  • file extension (file format) - In computing, a file extension is a suffix added to the name of a file to indicate the file's layout, in terms of how the data within the file is organized.
  • financial analytics - Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • B2B (business to business)

    B2B (business-to-business) is a type of commerce involving the exchange of products, services or information between businesses, ...

  • return on investment (ROI)

    Return on investment (ROI) is a crucial financial metric investors and businesses use to evaluate an investment's efficiency or ...

  • big data as a service (BDaaS)

    Big data as a service (BDaS) is the delivery of data platforms and tools by a cloud provider to help organizations process, ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process an organization uses to identify, recruit and hire the people it needs to achieve its...

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing ...

  • Betterworks

    Betterworks is performance management software that helps workforces and organizations to improve manager effectiveness and ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close