Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

CON - HAS

  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • conversational user interface - A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users.
  • core banking system - A core banking system is the software used to support a bank’s most common transactions.
  • counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • data aggregation - Data aggregation is any process whereby data is gathered and expressed in a summary form.
  • data availability - Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through "disastrous.
  • data classification - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • data life cycle management (DLM) - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • data mining - Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data source name (DSN) - A data source name (DSN) is a data structure that contains the information about a specific database that an Open Database Connectivity (ODBC) driver needs in order to connect to it.
  • Daylight Saving Time patch - A Daylight Saving Time patch is a modular piece of code created to update systems, devices and programs for compatibility with new start and end dates for Daylight Saving Time (DST) in the United States, Canada and Bermuda.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital photo album - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
  • Digital Text Platform (DTP) - Digital Text Platform (DTP) is Amazon.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • distribution - In marketing, distribution is the process of moving a product from its manufacturing source to its customers.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • dynamic case management (DCM) - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • EAI (enterprise application integration) - Enterprise application integration (EAI) is the task of uniting the databases and workflows associated with business applications to ensure that the business uses the information consistently and that changes to core business data made by one application are correctly reflected in others.
  • Eclipse (Eclipse Foundation) - Eclipse is an open-source Java Integrated Development Environment (IDE) known for its plug-ins that allow developers to develop and test code written in other programming languages.
  • EDM (Electronic Document Management) - EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.
  • ElasticSearch - ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.
  • Electronic Data Interchange (EDI) - Following specific standards, EDI is a way for businesses to securely transfer important data, such as invoices and purchase orders, via the Internet.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • enterprise collaboration (EC) - Enterprise collaboration is a system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public Internet.
  • enterprise search - There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is modular software designed to integrate the main functional areas of an organization's business processes into a unified system.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • facepalm - Facepalm is a gesture in which an individual places the palm of one or both hands on their face to express one of a number of emotions, including shock, disbelief, distress, embarrassment, horror and frustration.
  • facial occlusion position - A facial occlusion position is one of a number of possible poses in which something, such as a person's hand, blocks (occludes) part of their face.
  • fault-tolerant - Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • file extension (file format) - In a computer, a file extension is the layout of a file -- in terms of how the data within the file is organized.
  • FileMaker (FMP) - FileMaker is a relational database application in which an individual may design -- and easily share on the Internet -- a database file by starting with a blank document or implementing ready-made and customizable templates.
  • financial analytics - Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.
  • Find and replace (FnR) wildcards for Microsoft Word - A list of FnR wildcards for Microsoft Word.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flat design - Flat design is a simple, graphic style common in user interface (UI), software and Web design.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application’s intended requirements.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • garbage in, garbage out (GIGO) - GIGO (garbage in, garbage out) is a concise expression of a concept common to computer science and mathematics: the quality of output is determined by the quality of the input.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • gesture recognition - Gesture recognition is the mathematical interpretation of a human motion by a computing device.
  • Ghost - Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media.
  • GIMP (GNU Image Manipulation Program) - GIMP (GNU Image Manipulation Program) is a freely available open source application for creating and manipulating graphic images that runs on Linux, other Unix-based operating systems, and also on Windows and Mac OS X.
  • GIS (geographic information system) - A GIS (geographic information system) enables you to envision the geographic aspects of a body of data.
  • Global Available-to-Promise - Global Available-to-Promise is the SAP Supply Chain Management (SCM) module that allows companies to aggregate demand from different sources into one central location in SAP ERP.
  • GNOME (GNU Network Object Model Environment) - GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user interface (GUI) and set of computer desktop applications for users of the Linux operating system.
  • GoodData - GoodData is a software company specializing in cloud-based business intelligence (BI) and big data analytics.
  • Google Docs - Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
  • Greasemonkey - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • grep - Grep, a UNIX command and also a utility available for Windows and other operating systems, is used to search one or more files for a given character string or pattern and, if desired, replace the character string with another one.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • groupware - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • guest OS (guest operating system) - A guest OS (guest operating system) is the operating system installed on a virtual machine or partitioned disk.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

Close