Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

ENC - IND

  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • End User License Agreement (EULA) - An End User License Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • enterprise collaboration (EC) - Enterprise collaboration is a system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public Internet.
  • enterprise information portal (EIP) - The enterprise information portal (EIP), also known as a business portal, is a concept for a Web site that serves as a single gateway to a company's information and knowledge base for employees and possibly for customers, business partners, and the general public as well.
  • enterprise search - There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.
  • Enterprise Services Architecture (ESA) - Enterprise Services Architecture (ESA) is SAP's enhanced version of service-oriented architecture (SOA).
  • ERM (enterprise resource management) - ERM also stands for enterprise relationship management.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • evolutionary robotics - Evolutionary robotics is a computer-simulated method of creating intelligent, autonomous robots with particular traits, based on the principles of Darwin's theory of evolution.
  • Excel - Excel is a spreadsheet program from Microsoft, a component of its Office product group for business applications.
  • Expression Graphic Designer - Expression Graphic Designer is Microsoft's new software tool for creating the images that appear in an application's user interface, or UI.
  • facepalm - Facepalm is a gesture in which an individual places the palm of one or both hands on their face to express one of a number of emotions, including shock, disbelief, distress, embarrassment, horror and frustration.
  • facial occlusion position - A facial occlusion position is one of a number of possible poses in which something, such as a person's hand, blocks (occludes) part of their face.
  • failover - Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
  • false positive - This definition of false positive explains what the term means and how it applies in various contexts.
  • fault-tolerant - Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.
  • feather - In graphic design, to feather is to soften an edge of an image by making the edge gradually fade out until it becomes transparent.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Fennec - Fennec is a version of the Firefox browser adapted for mobile phones and other small computing devices.
  • file format - In a computer, a file format is the layout of a file in terms of how the data within the file is organized.
  • FileMaker (FMP) - FileMaker is a relational database application in which an individual may design -- and easily share on the Internet -- a database file by starting with a blank document or implementing ready-made and customizable templates.
  • financial analytics - Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.
  • Find and replace (FnR) wildcards for Microsoft Word - A list of FnR wildcards for Microsoft Word.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • flat design - Flat design is a simple, graphic style common in user interface (UI), software and Web design.
  • flight simulator - A flight simulator is a system (software and hardware) that allows the user to experience what it feels like to pilot a specific type of aircraft.
  • Floating Ad - A floating ad is a type of rich media Web advertisement that appears uninitiated, superimposed over a user-requested page, and disappears or becomes unobtrusive after a specific time period (typically 5-30 seconds).
  • Foundation Software - Foundation Software Inc.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • FSP (full-service provider) - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application’s intended requirements.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • garbage in, garbage out (GIGO) - GIGO (garbage in, garbage out) is a concise expression of a concept common to computer science and mathematics: the quality of output is determined by the quality of the input.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • gesture recognition - Gesture recognition is the mathematical interpretation of a human motion by a computing device.
  • Ghost - Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media.
  • Ghostscript - Ghostscript is a program for UNIX systems that interprets a PostScript file (which is a file formatted for a PostScript printer) so that, using a related program, Ghostview, you can view it on a display screen.
  • GIMP (GNU Image Manipulation Program) - GIMP (GNU Image Manipulation Program) is a freely available open source application for creating and manipulating graphic images that runs on Linux, other Unix-based operating systems, and also on Windows and Mac OS X.
  • GIS (geographic information system) - A GIS (geographic information system) enables you to envision the geographic aspects of a body of data.
  • Global Available-to-Promise - Global Available-to-Promise is the SAP Supply Chain Management (SCM) module that allows companies to aggregate demand from different sources into one central location in SAP ERP.
  • globbing - Globbing is the process of expanding a non-specific file name containing a wildcard character into a set of specific file names that exist in storage on a computer, server, or network.
  • glocalization - Glocalization is the concept that in a global market, a product or service is more likely to succeed when it is customized for the locality or culture in which it is sold.
  • GNOME (GNU Network Object Model Environment) - GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user interface (GUI) and set of computer desktop applications for users of the Linux computer operating system.
  • goat - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
  • gold code - In software development, gold code is the final, ready-to-manufacture (that is, replicate onto media) version of the software.
  • GoodData - GoodData is a software company specializing in cloud-based business intelligence (BI) and big data analytics.
  • Google Docs - Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.
  • Google Health - Google Health is a personal health record (PHR) service that allows users to centrally store and manage their health information online.
  • Google Spreadsheets - Google Spreadsheets is a Web-based application that allows users to create, update and modify spreadsheets and share the data live online.
  • Gramm-Leach-Bliley Act (GLBA) - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals.
  • Greasemonkey - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • grep - Grep, a UNIX command and also a utility available for Windows and other operating systems, is used to search one or more files for a given character string or pattern and, if desired, replace the character string with another one.
  • greynet (or graynet) - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • groupware - Groupware refers to programs that help people work together collectively while located remotely from each other.
  • guest OS (guest operating system) - A guest OS (guest operating system) is the operating system installed on a virtual machine or partitioned disk.
  • gzip (GNU zip) - Gzip (GNU zip) is a free and open source algorithm for file compression.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • hamburger icon (slide drawer navigation) - The hamburger icon got its name because it resembles a burger in a bun.
  • haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile) sensation and control to interaction with computer applications.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • HCI (human-computer interaction) - HCI (human-computer interaction) is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • help system (help file) - A help system (sometimes called a help file) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities.
  • Hewlett Packard Enterprise (HP Enterprise, HPE) - Hewlett Packard Enterprise (HP Enterprise, also known as HPE) is an American multinational company that specializes in business IT (information technology).
  • hierarchical menu - A hierarchical menu is a multi-level arrangement of options, organized to allow users to find information, tools, or functions more easily than they could in an unstructured presentation.
  • home building software (residential construction software) - Home building software, also known as residential construction software, is a collection of programs, processes and information that lets residential construction contractors manage the construction process from home design and remodeling, to cost estimates and accounting, to project management and project completion.
  • Host OS (host operating system) - A host OS is the software installed on a computer that interacts with the underlying hardware in a computer using virtualization technology.
  • hot desking - Hot desking is a work space sharing model in which employees outnumber desks.
  • HP OpenView - HP OpenView is a suite of business computer management or "e-services" programs from Hewlett-Packard (HP), which states that the suite is "among the world's 20 largest software businesses.
  • HTML validator - An HTML validator is a quality assurance program used to check Hypertext Markup Language (HTML) markup elements for syntax errors.
  • HTML5 mobile app - HTML5 mobile apps are developed through that version of the Web content standard.
  • hybrid application (hybrid app) - A hybrid application (hybrid app) is one that combines elements of both native and Web applications.
  • hybrid online analytical processing (HOLAP or Hybrid OLAP) - Hybrid online analytical processing (HOLAP) is a combination of relational OLAP (ROLAP) and multidimensional OLAP (usually referred to simply as OLAP).
  • Hyper-G - Hyper-G is a publishing system with hypertext features more advanced than those available with the Hypertext Transfer Protocol and today's Web browser.
  • HyperCard - HyperCard is an early (1986) Macintosh application that enables users to author hypertext pages, called cards, without any programming knowledge.
  • ID3 tag - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • ideation management - Ideation management refers to creating, gathering, analyzing, disseminating and executing on idea generation within the enterprise.
  • identity management (ID management) - Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • IM bot - An IM bot is a chatterbot program that uses instant messaging (IM) as an application interface.
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • IMS (Information Management System) - IMS (Information Management System) is a database and transaction management system that was first introduced by IBM in 1968.
  • in-app purchase (IAP) - An in-app purchase (IAP) is something bought from within an application, typically a mobile app running on a smartphone or other mobile device.
  • in-circuit emulator (ICE) - An in-circuit emulator (ICE) is a hardware interface that allows a programmer to change or debug the software in an embedded system.
  • industrial software - Industrial software is a collection of programs, processes and information for construction contractors in sectors such as mining, chemical, power, oil, gas and manufacturing.

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close