Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

SQL - ZIP

  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • speech recognition - Speech recognition, or speech-to-text, is the ability of a machine or program to identify words spoken aloud and convert them into readable text.
  • speech synthesis - Speech synthesis is the computer-generated simulation of human speech.
  • SQL injection - A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • SQL-ledger - SQL-Ledger (SL) is a Web-based open source double-entry accounting system that is used primarily in the retail and manufacturing sectors.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • state management - Application state management is the process of maintaining knowledge of an application's inputs across multiple related data flows that form a complete business transaction -- or a session -- to understand the condition of the app at any given moment.
  • stateful app - A stateful app is a program that saves client data from the activities of one session for use in the next session.
  • stateless app - A stateless app is an application program that does not save client data generated in one session for use in the next session with that client.
  • static analysis (static code analysis) - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity -- that is managed from a central console.
  • stream recorder (stream ripper) - What is stream recorder?A stream recorder (sometimes called a stream ripper) is a program used to save streaming media to a file so that it can be accessed locally.
  • streaming application - A streaming application is a program that has its necessary components downloaded as needed instead of being installed ahead of time on a computer.
  • sub-release - A sub-release is a slightly supplemented or improved version of a software product offered for purchase rather than as a free update to the existing version.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • supervised learning - Supervised learning is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labeled for a particular output.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • Supply Chain Planning (SCP) - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • systems integrator - A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.
  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • tape backup - Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge so the data can be recovered if there is a hard disk crash or failure.
  • telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.
  • terminate and stay resident (TSR) - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • Terraform - Terraform is an open source infrastructure as code software tool that allows DevOps engineers to programmatically provision the physical resources an application requires to run.
  • test case - A test case is a set of actions performed on a system to determine if it satisfies software requirements and functions correctly.
  • test harness - In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.
  • text editor - A text editor is a computer program that lets a user enter, change, store, and usually print text (characters and numbers, each encoded by the computer and its input and output devices, arranged to have meaning to users or to other programs).
  • time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.
  • transportation management system (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.
  • UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
  • Unified Functioning Testing Certification - Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.
  • Universal Windows app - A Universal Windows app is a software program that uses the Windows 8 or Windows 10 codebase and runs the same way on PCs, Windows tablets and smartphones.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • user acceptance testing (UAT) - In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • value chain - A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.
  • vertical solutions provider (VSP) - On the Internet, a vertical solutions provider (VSP) is a company that focuses on delivering industry-specific application hosting services to customers in a specific vertical market such as manufacturing, health care, retailing, or financial service.
  • virtual agent - A virtual agent (sometimes called an intelligent virtual agent, virtual rep or chatbot) is a software program that uses scripted rules and, increasingly, artificial intelligence applications to provide automated service or guidance to humans.
  • virtual appliance - A virtual appliance is a virtual machine image file consisting of a pre-configured operating system environment and a single application.
  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • virtual commerce (vCommerce, v-commerce, or vCom) - Virtual commerce (sometimes known as vCommerce, v-commerce, or vCom) is a type of application, service, or product feature that helps enterprises implement strategies and design Web sites for e-commerce (the buying and selling of goods and services using the Internet).
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual learning environment (VLE) or managed learning environment (MLE) - A virtual learning environment (VLE) is a set of teaching and learning tools designed to enhance a student's learning experience by including computers and the Internet in the learning process.
  • virtual network computing (VNC) - Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
  • virtual patching - Virtual patching is the quick development and short-term implementation of a security policy meant to prevent an exploit from occurring as a result of a newly discovered vulnerability.
  • virtual reality - Virtual reality is an artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • VMware - VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.
  • VMware Infrastructure 3 (VI3) - VMware Infrastructure 3 (VI3) is a software suite designed to centralize and optimize desktop management and data center resources through virtualization.
  • VMware Virtual SMP (Symmetric Multi-Processing) - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • voice emulation (voice reproduction) - Voice emulation is the software-generated reproduction of an individual's speech.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • warehouse management system (WMS) - A warehouse management system (WMS) consists of software and processes that allow organizations to control and administer warehouse operations from the time goods or materials enter a warehouse until they move out.
  • web analytics - Web analytics is the process of analyzing the behavior of visitors to a website.
  • Web application (Web app) - A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface.
  • Web based project management software - Web based project management software is the collection of programs, processes and information that is used to manage various phases of a project and that is accessible on the Internet.
  • web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider's web server for use by a client or other web-based programs.
  • webhook - A webhook is a software architecture approach that allows applications and services to submit a web-based notification to other applications whenever a specific event occurs.
  • WebLogic - Oracle WebLogic Server is a leading e-commerce online transaction processing (OLTP) platform, developed to connect users in distributed computing production environments and to facilitate the integration of mainframe applications with distributed corporate data and applications.
  • webMethods - webMethods is a company that specializes in business process integration software for the enterprise.
  • WebSphere - WebSphere is a set of Java-based tools from IBM that allow customers to create and manage sophisticated business Web sites.
  • What is artificial intelligence (AI)? - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • What is failover? - Failover is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
  • Windows Genuine Advantage (WGA) - Windows Genuine Advantage (WGA) is a program that investigates Windows -based computers to be sure that their copy of the Windows operating system (OS) is legitimate.
  • Windows Media Player (WMP) - Windows Media Player (WMP) is a software application from Microsoft used to play, store and organize digital audio, images and video.
  • Windows Remote Management (WinRM) - Windows Remote Management (WinRM) is a feature of Windows Vista that allows administrators to remotely run management scripts.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • WinZip - WinZip is a Windows program that lets you archive and compress files so that you can store or distribute them more efficiently.
  • Wirth's Law - Wirth's Law states that computer software increases in complexity faster than does the ability of available hardware to run it.
  • wizard - A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.
  • word processor - A word processor is a computer program that provides special capabilities beyond that of a text editor such as the WordPad program that comes as part of Microsoft's Windows operating systems.
  • workflow - Workflow is the series of activities that are necessary to complete a task.
  • workload - In computing, a workload, typically, is any program or application that runs on any computer.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • yacc (yet another compiler compiler) - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • yard management system (YMS) - A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • zipping - Zipping is the act of packaging a set of files into a single file or archive that is called a zip file.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close