Browse Definitions :

AppDev

Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.

Agile software development

Definitions related to agile software development, including terms about Scrum and words and phrases about user stories, extreme programming (XP), Crystal, feature-driven development and Adaptive.

  • product owner

    A product owner is a role on a Scrum team that is accountable for the project's outcome. The product owner is responsible for maximizing product's value by managing and optimizing the product backlog.

  • continuous delivery (CD)

    Continuous delivery (CD) is an approach for software delivery in which development teams produce and test code in short but continuous cycles, usually with high degrees of automation.

  • mobile application development

    Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.

View All Agile software development Definitions

Apple

Definitions related to Apple Computer, including terms about MacBooks and words and phrases about i-everything.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

  • mobile application development

    Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.

  • Apple Pay

    Apple Pay is a contactless mobile financial transactions service developed for Apple devices.

View All Apple Definitions Back to Top

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

  • Joint Academic Network (JANET)

    The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.K. education and research community.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • e-procurement (supplier exchange)

    Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.

View All Internet applications Definitions Back to Top

Java

This glossary contains definitions related to the Enterprise Java platform, including definitions for the tools and methodologies that are used by enterprise Java developers, architects and technical team leads.

  • inversion of control (IoC)

    Inversion of control, also known as the Hollywood Principle, changes the control flow of an application and allows developers to sidestep some typical configuration hassles.

  • Pascal case

    Pascal case is a naming convention in which developers start each new word in a variable with an uppercase letter.

  • Java Mission Control

    Java Mission Control is a performance-analysis tool that renders sampled JVM metrics in easy-to-understand graphs, tables, histograms, lists and charts.

View All Java Definitions Back to Top

Linux

Definitions related to Linux, including tech terms about open source and words and phrases about Linux distributions and software development.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

  • operating system (OS)

    An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.

View All Linux Definitions Back to Top

Microsoft

Definitions for Microsoft Windows, including terms about bugs or patches and words and phrases about Microsoft operating systems.

View All Microsoft Definitions Back to Top

Open source

Definitions related to open source, including tech terms about Linux and words and phrases about Apache and other open source software development projects.

  • Snort

    Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch.

  • RPM Package Manager (Red-hat Package Manager)

    RPM Package Manager (RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.

  • boot loader (boot manager)

    A boot loader, also called a boot manager, is a small program that places the operating system (OS) of a computer into memory.

View All Open source Definitions Back to Top

Operating systems

Definitions related to operating systems, including tech terms about open source and proprietary operating systems and words and phrases about system programs, boot mechanisms, kernels, command interpreters, DLL libraries and drivers.

  • supervisor call (SVC)

    In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.

  • What is failover?

    Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

  • job

    In certain computer operating systems, a job is the unit of work that a computer operator gives to the operating system.

View All Operating systems Definitions Back to Top

Programming

Definitions related to software programming, including tech terms about programming languages and words and phrases about software design, coding, testing and debugging.

  • trunk-based development

    In software development, a trunk is the base code into which all subsequent code is merged.

  • refactoring

    Refactoring is the process of restructuring code, while not changing its original functionality.

  • user interface (UI)

    The user interface (UI) is the point of human-computer interaction and communication in a device.

View All Programming Definitions Back to Top

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

  • speech recognition

    Speech recognition, or speech-to-text, is the ability of a machine or program to identify words spoken aloud and convert them into readable text.

  • data mining

    Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis.

  • What is artificial intelligence?

    Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision.

View All Software applications Definitions Back to Top

Web services, SOA

Definitions related to web services, including tech terms about service-oriented architecture (SOA) and words and phrases about web applications that use XML and HTTP.

  • Amazon EMR (Elastic MapReduce)

    Amazon EMR (previously known as Amazon Elastic MapReduce) is an Amazon Web Services (AWS) tool for big data processing and analysis.

  • microservices

    Microservices, or microservices architecture, is an approach to application development in which a large application is built from modular components or services.

  • Amazon EC2 instance

    An Amazon EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure.

View All Web services, SOA Definitions Back to Top
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close