Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

TAB - ZEN

  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • Tagetik - Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.
  • talking translator - A talking translator is a program that translates words and phrases from one language to another language and delivers the translation to the user as audio information.
  • tape backup - Tape can help fix an unstructured data backup issue and is a good archiving medium.
  • teach box - A teach box is a device that registers and memorizes mechanical motions or processes for later recall and execution by an electronic or computer system.
  • teledactyl - A teledactyl (pronounced TEHL-eh-DAK-til) is a specialized voice recognition system designed to produce ASCII text from human speech.
  • telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.
  • terminate and stay resident (TSR) - A terminate and stay resident (TSR) program is one that is set up to be loaded and then remain in computer memory so that it is quickly accessible when a user presses a certain keyboard combination.
  • tessellation - A tessellation is a design that uses repeating interlocking shapes without overlapping or gaps.
  • test harness - In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.
  • text editor - A text editor is a computer program that lets a user enter, change, store, and usually print text (characters and numbers, each encoded by the computer and its input and output devices, arranged to have meaning to users or to other programs).
  • text-to-speech (TTS) - Text-to-speech (TTS) is a type of speech synthesis application that is used to create a spoken sound version of the text in a computer document, such as a help file or a Web page.
  • thought recognition - Thought recognition is the ability of a computer to recognize neural patterns in the brain as a form of input and control of computer processes.
  • Tibco - Tibco makes integration server software for enterprises.
  • time and attendance software - Time and attendance software is a type of business application designed to track and optimize the hours that employees spend on the job and keep records of wages and salaries paid.
  • Titanium (TiBook) - Titanium is the name of a popular laptop computer from Apple that is encased in titanium, the strong but light metal that is used in supersonic aircraft engines.
  • Tivoli - Tivoli Systems is an IBM-owned company that develops software that allows a business to manage its computing environment.
  • Top searches of 2008 - What were people searching the WhatIs.
  • transcoding - Transcoding is the ability to adapt digital files so that content can be viewed on different playback devices.
  • Transportation Management System (TMS) - A transportation management system (TMS) is specialized software for planning, executing and optimizing the shipment of goods.
  • trouble ticket (trouble report) - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • turnkey solution provider - A turnkey solution provider is a solution provider that offers limited consultation and one or more established product packages that allow only minimal configuration.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • Twitter Lite - Twitter Lite is a storage and bandwidth-efficient version of the app for Twitter.
  • UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
  • UCCnet - UCCnet is a standards organization that provides an Internet-based supply chain management (SCM) data registry service for e-commerce companies and companies that have an e-commerce component.
  • Unified Functioning Testing Certification - Unified Functional Testing (UFT) Certification is a Hewlett Packard Enteprise program designed to ensure that trained IT professionals have comprehensive knowledge of HP’s testing automation software.
  • Universal Windows app - A Universal Windows app is a software program that uses the Windows 8 or Windows 10 codebase and runs the same way on PCs, Windows tablets and smartphones.
  • upgrade - In computers, an upgrade is a new version of or addition to a hardware or, more often, software product that is already installed or in use.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • user acceptance testing (UAT) - In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.
  • user exit - In computer software, a user exit is a place in a software program where a customer can arrange for their own tailor-made program to be called.
  • user script - A user script is programming that modifies the appearance or behavior of an application.
  • value chain - A value chain is "a string of companies working together to satisfy market demands.
  • Veepers - Veepers is a product that is used to animate digital images of people (or other creatures) for video presentations in which the characters appear to talk.
  • Vendor Independent Messaging (VIM) - VIM (Vendor Independent Messaging) is an application program interface (API) that facilitates the exchange of e-mail and attachments among programs from different vendors.
  • vertical solutions provider (VSP) - On the Internet, a vertical solutions provider (VSP) is a company that focuses on delivering industry-specific application hosting services to customers in a specific vertical market such as manufacturing, health care, retailing, or financial service.
  • vi - vi, pronounced by using each letter (vee-aye), is a widely-used and popular UNIX-based text editor.
  • video e-mail - Video e-mail is an e-mail message with a video file either inserted in the body of the message or accessible through a hypertext link.
  • virtual agent (intelligent virtual agent or virtual rep) - A virtual agent (sometimes called an intelligent virtual agent, virtual rep or chatbot) is used to describe a program based in artificial intelligence (AI) that provides automated customer service.
  • virtual appliance - A virtual appliance is a virtual machine image file consisting of a pre-configured operating system environment and a single application.
  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • virtual commerce (vCommerce, v-commerce, or vCom) - Virtual commerce (sometimes known as vCommerce, v-commerce, or vCom) is a type of application, service, or product feature that helps enterprises implement strategies and design Web sites for e-commerce (the buying and selling of goods and services using the Internet).
  • virtual desktop - A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.
  • virtual learning environment (VLE) or managed learning environment (MLE) - A virtual learning environment (VLE) is a set of teaching and learning tools designed to enhance a student's learning experience by including computers and the Internet in the learning process.
  • virtual microscopy - Virtual microscopy is a method of posting microscope images on, and transmitting them over, computer networks.
  • virtual network computing (VNC) - Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
  • virtual patching - Virtual patching is the quick development and short-term implementation of a security policy meant to prevent an exploit from occurring as a result of a newly discovered vulnerability.
  • virtual reality - Virtual reality is an artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment.
  • virtual SAN appliance (VSA) - A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
  • Vitria - Vitria specializes in integration server software for enterprises.
  • VMware - VMware is a virtualization and cloud computing software provider for x86-compatible computers.
  • VMware Infrastructure 3 (VI3) - VMware Infrastructure 3 (VI3) is a software suite designed to centralize and optimize desktop management and data center resources through virtualization.
  • VMware Virtual SMP (Symmetric Multi-Processing) - VMware Virtual SMP is a utility that allows a single virtual machine to use two or more processors simultaneously.
  • voice commerce (vCommerce) - Voice commerce (sometimes known as vCommerce) is user interaction with a commercial Web site that incorporates voice recognition technology.
  • voice dial - Voice dial is a telephone feature that initiates a call when the user says a contact name or the digits in a phone number.
  • voice emulation (voice reproduction) - Voice emulation is the software-generated reproduction of an individual's speech.
  • voice ID (voice authentication) - Voice ID (sometimes called voice authentication) is a type of user authentication that uses voiceprintbiometrics, voice ID relies on the fact that vocal characteristics, like fingerprints and the patterns of people's irises, are unique for each individual.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • WAD - A WAD (pronounced WAHD) is a file that comes with Doom and possibly other Id Software games, containing information about game levels, game objects, creatures, graphic images, and sound.
  • WAN accelerator - A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).
  • warehouse management system (WMS) - A warehouse management system (WMS) is software and processes that allow organizations to control and administer warehouse operations from the time goods or materials enter a warehouse until they move out.
  • Web analytics - Web analytics is the process of analyzing the behavior of visitors to a Web site.
  • Web application (Web app) - A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface.
  • Web based project management software - Web based project management software is the collection of programs, processes and information that is used to manage various phases of a project and that is accessible on the Internet.
  • Web development freeware and shareware - Web development freeware and shareware.
  • Web Intermediaries (WBI) - Web Intermediaries (WBI - pronounced "webby") is a framework and set of programming tools from IBM for the uniform creation and control of intermediary programs such as proxy servers, transcoding processors, and any kind of program that sits somewhere between two end points in a network.
  • Web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider’s web server for use by a client or other web-based programs.
  • WebLogic - BEA Systems' WebLogic is a server software application that runs on a middle tier, between back-end databases and related applications and browser-based thin clients.
  • webMethods - webMethods is a company that specializes in business process integration software for the enterprise.
  • whiteboard - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
  • WikiScanner - WikiScanner is a free, Web-based database application that tracks the source IP addresses of computers used to edit anonymous Wikipedia entries.
  • WinAMP (Windows Audio MPEG Player) - WinAMP (Windows Audio MPEG Player) is a program from Nullsoft that allows PC users to play audio files, particularly music, in many (but not all) popular digital audio formats, including MS-Audio, WAV, and MP3.
  • Windows Genuine Advantage (WGA) - Windows Genuine Advantage (WGA) is a program that investigates Windows -based computers to be sure that their copy of the Windows operating system (OS) is legitimate.
  • Windows Media Player (WMP) - Windows Media Player (WMP) is a software application from Microsoft used to play, store and organize digital audio, images and video.
  • Windows Product Activation (WPA) - Windows Product Activation (WPA) is the mandatory product registration system included in Microsoft's Windows XP, Office XP, and recent Office products (such as Word 2002 or Excel 2002) as a means of enforcing compliance with the company's End User License Agreement (EULA).
  • Windows Remote Management (WinRM) - Windows Remote Management (WinRM) is a feature of Windows Vista that allows administrators to remotely run management scripts.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • Windows XP Mode - Windows XP Mode is a feature of the Windows 7 operating system that allows it to run applications that are only compatible with Windows XP.
  • Wine (Wine is not an emulator) - Wine is open source software that allows Microsoft Windows applications to be run on x86 processor-based Unix-like systems, including Linux, FreeBSD, and Solaris.
  • WinZip - WinZip is a Windows program that lets you archive and compress files so that you can store or distribute them more efficiently.
  • wiretap Trojan - A wiretap Trojan is a program that surreptitiously records VoIP calls.
  • Wirth's Law - Wirth's Law states that computer software increases in complexity faster than does the ability of available hardware to run it.
  • wizard - A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.
  • word processor - A word processor is a computer program that provides special capabilities beyond that of a text editor such as the WordPad program that comes as part of Microsoft's Windows operating systems.
  • workflow - Workflow is the series of activities that are necessary to complete a task.
  • workload - In computing, the workload is the amount of processing that the computer has been given to do at a given time.
  • workplace (user interface) - In a computer user interface, a workplace is a personalized view of a company and its processes that builds on the popular desktop metaphor.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-Policy (Web Services Policy Framework specifications) - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • XyWrite - XyWrite was a text editor from XYQuest that gained a following in the 1980s.
  • yacc (yet another compiler compiler) - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • yard management system (YMS) - A yard management system (YMS) is a software system designed to oversee the movement of trucks and trailers in the yard of a manufacturing facility, warehouse, or distribution center.
  • Yellowdog Updater, Modified (YUM) - Yellowdog Update, Modified (YUM) is a program that manages installation, updates and removal for Red Hat package manager (RPM) systems.
  • zenware - Zenware refers to application programs that function with a minimum of superfluous user intervention.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close