Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

CHA - DIG

  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • change control - Change control is a systematic approach to managing all changes made to a product or system.
  • Change Healthcare - Change Healthcare is a healthcare technology provider of revenue cycle management, payment management and health information exchange (HIE) solutions.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • charge-coupled device - A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.
  • Chief Health Informatics Officer (CHIO) - The Chief Health Informatics Officer (CHIO) is a strategic, executive-level position responsible for developing, managing and applying health IT, health informatics and information management strategies.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is middleware that sits between the z/OS IBM mainframe operating system and business applications.
  • citizen development - Citizen development is a business process that encourages non-IT-trained employees to become software developers, using IT-sanctioned low-code/no-code (LCNC) platforms to create business applications.
  • clinical data analyst - A clinical data analyst is a healthcare information professional who verifies the validity of scientific experiments and gathered data from research.
  • clinical decision support system (CDSS) - A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care.
  • clinical document (HL7 clinical document) - A clinical document is a written, printed or electronic record that provides evidence of medical care.
  • Clinical Document Architecture (CDA) - Clinical Document Architecture (CDA) is a markup standard created by Health Level 7 International (HL7) that defines the structure of discharge summaries, progress notes and other medical records.
  • clinical documentation (healthcare) - Clinical documentation (CD) is the creation of a digital or analog record detailing a medical treatment, medical trial or clinical test.
  • clinical informatics - Clinical informatics, also known as health informatics, is the study of how technology and data analytics can be used to improve patient care plans.
  • clinical trial - A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental medical treatments or behavioral interventions on health outcomes.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud bursting - Cloud bursting is an application deployment technique in which an application runs in a private cloud or data center and bursts into a public cloud when the demand for computing capacity spikes.
  • cloud content management - Cloud content management is the process of collecting, delivering, retrieving, governing and managing information within a cloud-based hosting environment.
  • cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • Cloudflare - Cloudflare is a content distribution network (CDN) for the delivery of website and app content to users around the globe.
  • CloudHealth Technologies - CloudHealth Technologies is a provider of hybrid cloud management software that's designed to help an organization increase its visibility into and across public and private cloud infrastructure.
  • cluster computing - In computers, clustering is the use of multiple computers, typically PCs or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single highly available system.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • CMIO (Chief Medical Information Officer) - A Chief Medical Information Officer, or CMIO, essentially serves as the bridge between medical and IT departments at a health care organization.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cold backup (offline backup) - A cold backup, also called an offline backup, is a database backup during which the database is offline and not accessible to update.
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
  • common working file (CWF) - A common working file (CWF) is a tool used by the Centers for Medicare & Medicaid Services (CMS) to maintain national Medicare records for individual beneficiaries enrolled in the program.
  • compatibility test - A compatibility test is an assessment used to ensure a software application is properly working across different browsers, databases, operating systems (OS), mobile devices, networks and hardware.
  • compliance - Compliance is the state of being in accordance with established guidelines or specifications, or the process of becoming so.
  • compliance audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.
  • compute-intensive - Compute-intensive is a term that applies to any computer application that demands a lot of computation, such as meteorology programs and other scientific applications.
  • computer assisted coding system (CACS) - A computer assisted coding system (CACS) is medical software that reviews healthcare forms, including electronic health records, and assigns appropriate medical codes to its findings.
  • computerized physician order entry (CPOE) - Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.
  • Consolidated Health Informatics (CHI) - The Consolidated Health Informatics (CHI) initiative refers to a collaborative effort to create and adopt health informatics standards to be used by federal departments such as the Department of Health & Human Services and the Department of Veterans Affairs.
  • content - Many people agree that on the World Wide Web, "content is King.
  • content aggregator - A content aggregator is an individual, organization or tool that gathers web content and applications from different online sources for reuse.
  • content analytics - Content analytics is the act of applying business intelligence (BI) and business analytics (BA) practices to digital content.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content filtering - Content filtering is a process involving the use of software or hardware to screen and/or restrict access to objectionable email, webpages, executables and other suspicious items.
  • content management (CM) - Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • Content Management Interoperability Services (CMIS) - Content Management Interoperability Services (CMIS) is a specification for allowing users to share and access data across multiple content management (ECM) systems.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content marketing platform (CMP) - A content marketing platform (CMP) is a software solution that helps content marketing teams plan, envision, collaborate and create materials that successfully raise brand awareness, improve lead generation and increase revenue.
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • content sprawl - Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.
  • context menu (right-click menu) - A context menu is a pop-up menu that provides shortcuts for things the software developer anticipates the user might want to do.
  • Continuity of Care Document (CCD) - The Continuity of Care Document (CCD) is an electronic document exchange standard for sharing patient summary information.
  • Continuity of Care Record (CCR) - The Continuity of Care Record, or CCR, is a standard for the creation of electronic summaries of patient health.
  • copypasta - Copypasta is a chunk of text that is repeatedly copied and pasted until it proliferates across the Web, gaining meme status.
  • core banking system - A core banking system is the software used to support a bank’s most common transactions.
  • corporate wellness coach (health coach) - A corporate wellness coach (health coach) is a professional who is brought into a corporate or office environment to help employees maintain and improve their health and wellness goals.
  • COSO cube - The COSO cube is a diagram that shows the relationship among all parts of an internal control system.
  • counterfeit app (fake app) - A counterfeit app is an app that claims to fill a purpose while actually being fake, ineffective, useless or even harmful to a user's device.
  • CRM (customer relationship management) - Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.
  • CRM analytics - CRM (customer relationship management) analytics comprises all programming that analyzes data about customers and presents it to help facilitate and streamline better business decisions.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • cross-site scripting (XSS) - Cross-site scripting (XSS) is a type of injection attack in which a threat actor inserts data, such as a malicious script, into content from otherwise trusted websites.
  • Crystal Reports - Crystal Reports is a popular Windows-based report writer solution that allows a developer to create reports and dashboards from a variety of data sources with a minimum of code to write.
  • CSSLP (certified secure software lifecycle professional) - The CSSLP (certified secure software lifecycle professional) is a certification for security professionals who wish to strengthen and demonstrate their knowledge about application security.
  • curation - Curation is a field of endeavor involved with assembling, managing and presenting some type of collection.
  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer service and support - Customer service is the support that organizations offer to customers before and after purchasing a product or service.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, apps and perhaps internet capability to encourage the customer to control access to information and ordering.
  • D - D is one of two programming languages, Digital Mars D, an object-oriented metaprogramming language, or Microsoft D, a key component of the upcoming Oslo development environment.
  • dark post - A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in follower feeds organically.
  • data aggregation - Data aggregation is any process whereby data is gathered and expressed in a summary form.
  • data availability - Data availability is a term used by computer storage manufacturers and storage service providers to describe how data should be available at a required level of performance in situations ranging from normal through disastrous.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an unauthorized fashion.
  • data classification - Data classification is the process of organizing data into categories that make it is easy to retrieve, sort and store for future use.
  • data feed - A data feed is an ongoing stream of structured data that provides users with updates of current information from one or more sources.
  • data lifecycle management (DLM) - Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.
  • data mining - Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data source name (DSN) - A data source name (DSN) is a data structure that contains the information about a specific database that an Open Database Connectivity (ODBC) driver needs in order to connect to it.
  • decoupled CMS (content management system) - Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.
  • deep learning agent - A deep learning agent is any autonomous or semi-autonomous AI-driven system that uses deep learning to perform and improve at its tasks.
  • defragmentation - Defragmentation is the process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
  • demand planning - Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.
  • dependency hell - Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires to work.
  • deprecated - In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • development environment - In software, web and mobile application development, the development environment is a workspace with a set of processes and programming tools used to develop the source code for an application or software product.
  • device-agnostic (device agnosticism) - Device agnosticism, or device-agnostic, is the capacity of a computing component to work with various systems without requiring any particular adaptations.
  • DevOps as a Service - DevOps as a Service is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team.
  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital health (digital healthcare) - Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.
  • digital photo album - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
  • digital preservation - As a part of the formalized efforts of library and archival sciences, digital preservation includes the practices required to ensure that information is safe from medium failures as well as software and hardware obsolescence.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close