Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

ABA - COR

  • abandoned call - An abandoned call is a call or other type of contact initiated to a call center that is ended before any conversation occurs.
  • ACF2 or CA-ACF2 (Access Control Facility) - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ad blocker - An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.
  • Adaptive Server Enterprise (ASE) - Adaptive Server Enterprise (ASE) is a relational database management system (RDBMS) from Sybase, Inc.
  • add-in - Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program.
  • advanced planning and scheduling (APS) - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • adware - Adware is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
  • agentless - Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.
  • Agile Software Development - Agile software development -- also referred to simply as Agile -- is a type of development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Alpha TransForm (Alpha Software) - Alpha TransForm is a mobile app development and deployment platform that allows developers and individuals to build and deploy mobile apps that can be integrated into enterprise workflows.
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud (Amazon EC2) is a web-based service that allows businesses to run application programs in the Amazon Web Services (AWS) public cloud.
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • Android OS - Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets.
  • anti-money laundering software (AML) - Anti-laundering software is a type of computer program used by financial institutions to analyze customer data and detect suspicious transactions.
  • anti-spyware software - Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
  • Apache JMeter - Apache JMeter is an open source, Java-based load testing tool that can analyze the functional behavior of a system and measure the performance of a system under a load test.
  • Apache Mesos - Apache Mesos is a cluster manager that isolates and shares pooled resources from across clusters with applications and frameworks.
  • API gateway - An API gateway is a software pattern that sits in front of an application programming interface (API) or group of microservices, to facilitate requests and delivery of data and services.
  • API key - An API key is a unique identifier used to connect to, or perform, an API call.
  • API testing - API testing is a type of software testing that analyzes an application program interface (API) to verify it fulfills its expected functionality, security, performance and reliability.
  • app monetization - App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.
  • app virtualization (application virtualization) - App virtualization (application virtualization) is the separation of an installation of an application from the client computer that is accessing it.
  • app wrapping (application wrapping) - App wrapping is the process of applying a management layer to a mobile app without requiring any changes to the underlying application.
  • applet - An applet (little application) is a small software program that supports a larger application program.
  • applicant tracking system (ATS) - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • application - An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.
  • application architecture - An application architecture is a structural map of how an organization's software applications are assembled and how those applications interact with each other to meet business or user requirements.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • application clustering (software clustering) - Application clustering (sometimes called software clustering) is a method of turning multiple computer servers into a cluster (a group of servers that acts like a single system).
  • Application Compatibility Toolkit (ACT) - Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment.
  • application integration (enterprise application integration or EAI) - Application integration (sometimes called enterprise application integration or EAI) is the process of bringing data or a function from one application program together with that of another application program.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning through retirement.
  • application modernization - Application modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs.
  • application performance monitoring (APM) - Application performance monitoring (APM) is the collection of tools and processes designed to help information technology (IT) professionals ensure that the applications users work with meet performance standards and provide a valuable user experience (UX).
  • application portfolio management (APM) - Application portfolio management (APM) is a framework for managing enterprise IT software applications and software-based services.
  • application program interface (API) - An application program interface (API) is code that allows two software programs to communicate with each other.
  • application rationalization (AR) - Application rationalization is the process of identifying which business applications should be kept, replaced, retired or consolidated across an organization to improve business operations.
  • application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and mobile application management (MAM) that limits the environments in which certain code can execute.
  • application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • ARCore - ARCore (Google ARCore) is a development platform for building augmented reality apps (AR apps) for Android mobile devices.
  • ARKit - ARKit (Apple ARKit) is Apple’s augmented reality (AR) development platform for iOS mobile devices.
  • artificial intellect (artilect) - An artificial intellect (or "artilect"), according to Dr.
  • artificial passenger (AP) - An artificial passenger (AP) is a device that would be used in a motor vehicle to make sure that the driver stays awake.
  • assistive software (adaptive software) - Assistive software, also called adaptive software, refers to computer programs designed for specialized hardware used by physically challenged people.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • AWS Device Farm - AWS Device Farm is an Amazon Web Services (AWS) mobile app testing service for Android or Fire OS-based devices.
  • AWS Test Drive - The AWS Test Drive is a free Amazon Web Services tool that allows consulting and technology partners to test third-party software environments.
  • back-end - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a text file that contains a sequence of commands for a computer operating system.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • Bezier curve - A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • blue/green deployment - A blue/green deployment is a change management strategy for releasing software code.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • business analytics - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • Business Planning and Control System (BPCS) - Business Planning and Control System (BPCS) is a popular system of application programs for manufacturing and other industries that is developed and sold by Systems Software Associates (SSA).
  • business process automation (BPA) - Business process automation (BPA) is the use of technology to complete business processes with minimal human intervention.
  • business process management (BPM) - Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, applying improvements, monitoring the improved process and continually optimizing it.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
  • call center - A call center is a centralized department that handles inbound and outbound calls from current and potential customers.
  • CAVEman - CAVEman is an interactive, object-oriented model of a human body consisting of over 3,000 anatomically correct, catalogued and computerized body parts.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • conversational user interface - A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users.
  • core banking system - A core banking system is the software used to support a bank’s most common transactions.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

  • footprinting

    Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close