Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

CHA - ELE

  • challenge-response authentication - In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, and another entity provides a valid response to be authenticated.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud application performance management (CAPM) - Cloud application performance management (CAPM or cloud APM) is the process of monitoring resources that support application program performance in private and hybrid cloud environments.
  • cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • cluster computing - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • Cognos - Cognos is IBM's business intelligence (BI) and performance management software suite.
  • cold backup (offline backup) - Cold backups are ideal for disaster recovery because they protect important data.
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • collaborative CRM - Collaborative CRM is an approach to customer relationship management (CRM) in which the various departments of a company, such as sales, technical support, and marketing, share any information they collect from interactions with customers.
  • comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • commercial construction software - Commercial construction software is a collection of programs and processes that provides contractors with the information necessary to successfully bid on and complete commercial construction projects, which include offices, restaurants, gas stations, retail stores and convenience stores.
  • communications-enabled business processes (CEBP) - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • Compiere - Compiere is a popular open-source system of software applications that provide enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), tax accounting, and general accounting for the small and medium-size enterprise.
  • compliance - Compliance is the act of being in alignment with guidelines, regulations and/or legislation.
  • compound document - In information technology, a compound document is an organized collection of user interfaces that form a single integrated perceptual environment.
  • computational origami - Computational origami is a type of computer program for modeling the ways in which various materials, including paper, can be folded.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • construction accounting software - Construction accounting software is collection of programs, processes and information that serves all the essential job functions of general accounting software, such as accounts receivable, accounts payable and general ledger, with the addition of modules for construction-specific functions such as equipment service and usage tracking, time and material billing, and consolidated general ledgers.
  • construction software - Construction software is the collection of programs, processes and information used to perform various tasks within the building or assembling of a structure or infrastructure as a means of increasing productivity, efficiency, and competitiveness.
  • construction takeoff software - Construction takeoff software (sometimes spelled take-off or take off) is a collection of programs, processes and information used to perform a part of the cost estimating process in the construction industry.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer contacts are managed.
  • content generation software - Content generation software is a type of computer program that produces content for publication.
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • contextual collaboration - Contextual collaboration is a new approach to collaborative software that involves embedding all the relevant applications, such as word processors, enterprise instant messaging (EIM), shared calendars, and groupware, into a unified user interface that uses presence technology to enhance collaboration.
  • conversational user interface - A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users.
  • core banking system - A core banking system is the software used to support a bank’s most common transactions.
  • counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
  • crippleware - Crippleware is any software program that cannot be fully utilized until the user registers or, in the case of shareware, purchases the program.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving customer service relationships and assisting in customer retention and driving sales growth.
  • CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer service chat (CSC) - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
  • customer valuation - In customer relationship management (CRM), customer valuation is a scoring process used to help a company determine which customers the company should target in order to maximize profit.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • data aggregation - Data aggregation is any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis.
  • data availability - Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through "disastrous.
  • data classification - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • data life cycle management (DLM) - Data life cycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its life cycle: from creation and initial storage to the time when it becomes obsolete and is deleted.
  • data mining - Data mining is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.
  • data protection management (DPM) - Data protection management (DPM) is the administration of backup processes to ensure that tasks run on schedule, and that data is securely backed up and recoverable.
  • data source name (DSN) - A data source name (DSN) is a data structure that contains the information about a specific database that an Open Database Connectivity (ODBC) driver needs in order to connect to it.
  • Daylight Saving Time patch - A Daylight Saving Time patch is a modular piece of code created to update systems, devices and programs for compatibility with new start and end dates for Daylight Saving Time (DST) in the United States, Canada and Bermuda.
  • decision tree software - In data mining, decision tree software describes a combination of mathematical and computing techniques that enable a given set of data to be accurately described, categorized and analyzed to derive conclusions.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • deliverable - Deliverable, as an adjective, describes something that can be delivered, such as a product or service.
  • Demand Planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • development environment - In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital photo album - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
  • Digital Text Platform (DTP) - Digital Text Platform (DTP) is Amazon.
  • digitizer software - Digitizer software is the collection of programs, processes and information used to transform and store images into a format compatible for computer processing.
  • Direct R/3 - Direct R/3 is a partnership program between Dell Computer Corporation and the software company SAP that allows customers to use Dell's commercial Web site to order Dell products with pre-bundled, pre-configured AcceleratedSAP (ASAP) R/3 products.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed computing - In general, distributed computing is any computing that involves programs with components shared among multiple computers.
  • distribution - In marketing, distribution is the process of moving a product from its manufacturing source to its customers.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Drizzle - Drizzle is a lightweight open source database management system in development based on MySQL 6.
  • drop shadow - In graphic design, a drop shadow is an effect where an image is repeated behind itself to create the illusion that the image is floating over its background.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • duotone - In graphic design, a duotone is an image composed of two colors.
  • dynamic case management (DCM) - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • e-mail extractor - An e-mail extractor is a program that finds e-mail addresses and stores them in a list file, with each line containing one e-mail address.
  • E2K (Exchange 2000) - E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.
  • EAI (enterprise application integration) - Enterprise application integration (EAI) is the task of uniting the databases and workflows associated with business applications to ensure that the business uses the information consistently and that changes to core business data made by one application are correctly reflected in others.
  • Eclipse (Eclipse Foundation) - Eclipse is an open-source Java Integrated Development Environment (IDE) known for its plug-ins that allow developers to develop and test code written in other programming languages.
  • Edapt - Edapt is the trade name for an e-learning (electronic learning) program developed by Tcert of Atlanta, Georgia.
  • EDM (Electronic Document Management) - EDM (Electronic Document Management) is the management of different kinds of documents in an enterprise using computer programs and storage.
  • ElasticSearch - ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.
  • Electronic Data Interchange (EDI) - Following specific standards, EDI is a way for businesses to securely transfer important data, such as invoices and purchase orders, via the Internet.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close