Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

ABA - COM

  • abandoned call - An abandoned call is a call or other type of contact initiated to a call center that is ended before any conversation occurs.
  • ACF2 or CA-ACF2 (Access Control Facility) - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facility) is a set of programs from Computer Associates that enable security on mainframes.
  • ad blocker - An ad blocker is a software product that prevents advertisements from appearing with the content the user is intentionally viewing.
  • Adaptive Server Enterprise (ASE) - Adaptive Server Enterprise (ASE) is a relational database management system (RDBMS) from Sybase, Inc.
  • add-in - Add-in is a term used, especially by Microsoft, for a software utility or other program that can be added to a primary program.
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • Adobe Buzzword - Adobe Buzzword is a free, Web-based word processor similar to Google Docs in which documents are created, edited and stored online.
  • advanced planning and scheduling (APS) - Advanced planning and scheduling (APS) is a type of system that tracks costs based on the activities that are responsible for driving costs in the production of manufactured goods.
  • adware - Adware is any software application in which advertising banners are displayed while a program is running.
  • agentless - Agentless, in computing, refers to operations where no service, daemon or process (AKA an agent) needs to run in the background on the machine the action is being performed on.
  • Agile Software Development - Agile software development -- also referred to simply as Agile -- is a type of development methodology that anticipates the need for flexibility and applies a level of pragmatism to the delivery of the finished product.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • Alpha TransForm (Alpha Software) - Alpha TransForm is a mobile app development and deployment platform that allows developers and individuals to build and deploy mobile apps that can be integrated into enterprise workflows.
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud (Amazon EC2) is a web-based service that allows businesses to run application programs in the Amazon Web Services (AWS) public cloud.
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • AMSI - AMSI is part of Infor Global Solutions and provides software solutions for construction management and property management.
  • Android OS - Android OS is a Linux-based mobile operating system that primarily runs on smartphones and tablets.
  • anti-money laundering software (AML) - Anti-laundering software is a type of computer program used by financial institutions to analyze customer data and detect suspicious transactions.
  • anti-spyware software - Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
  • Apache JMeter - Apache JMeter is an open source, Java-based, load testing tool that can be used to analyze the functional behavior of a system and measure the performance of a system under a load test.
  • Apache Mesos - Apache Mesos is a cluster manager that isolates and shares pooled resources from across clusters with applications and frameworks.
  • API gateway - An API gateway is a software pattern that sits in front of an application programming interface (API) or group of microservices, to facilitate requests and delivery of data and services.
  • API key - An API key is a unique identifier used to connect to, or perform, an API call.
  • API testing - API testing is a type of software testing that analyzes an application program interface (API) to verify it fulfills its expected functionality, security, performance and reliability.
  • app monetization - App monetization is how an app developer can make money from a mobile app, which most users expect to be able to access for free.
  • app virtualization (application virtualization) - App virtualization (application virtualization) is the separation of an installation of an application from the client computer that is accessing it.
  • app wrapping (application wrapping) - App wrapping is the process of applying a management layer to a mobile app without requiring any changes to the underlying application.
  • applet - An applet (little application) is a small software program that supports a larger application program.
  • applicant tracking system (ATS) - An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job applications.
  • application - An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.
  • application architecture - An application architecture is a map of how an organization's software applications are assembled as part of its overarching enterprise architecture and how those applications interact.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • application clustering (software clustering) - Application clustering (sometimes called software clustering) is a method of turning multiple computer servers into a cluster (a group of servers that acts like a single system).
  • Application Compatibility Toolkit (ACT) - Application Compatibility Toolkit (ACT) is a set of freely downloadable program utilities and related documents from Microsoft for ensuring compatibility among application programs in Windows operating systems, especially in a large network environment.
  • application integration (enterprise application integration or EAI) - Application integration (sometimes called enterprise application integration or EAI) is the process of bringing data or a function from one application program together with that of another application program.
  • application lifecycle management (ALM) - Application lifecycle management (ALM) is the integrated system of people, tools and processes that supervise a software application from its initial planning through retirement.
  • application modernization - Application modernization is the refactoring, re-purposing or consolidation of legacy software programming to align it more closely with current business needs.
  • application performance monitoring (APM) - Application performance monitoring (APM) is the collection of tools and processes designed to help information technology (IT) professionals ensure that the applications users work with meet performance standards and provide a valuable user experience (UX).
  • application portfolio management (APM) - Application portfolio management (APM) is a framework for managing enterprise IT software applications and software-based services.
  • application program interface (API) - An application program interface (API) is code that allows two software programs to communicate with each other.
  • application rationalization (AR) - Application rationalization is the process of identifying which business applications should be kept, replaced, retired or consolidated across an organization to improve business operations.
  • application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and mobile application management (MAM) that limits the environments in which certain code can execute.
  • application service provider (ASP) - An application service provider (ASP) is a company that offers individuals or enterprises access to applications and related services over the internet.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • ARCore - ARCore (Google ARCore) is a development platform for building augmented reality apps (AR apps) for Android mobile devices.
  • ARKit - ARKit (Apple ARKit) is Apple’s augmented reality (AR) development platform for iOS mobile devices.
  • artificial intellect (artilect) - An artificial intellect (or "artilect"), according to Dr.
  • artificial intelligence - Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
  • artificial passenger (AP) - An artificial passenger (AP) is a device that would be used in a motor vehicle to make sure that the driver stays awake.
  • assistive software (adaptive software) - Assistive software, also called adaptive software, refers to computer programs designed for specialized hardware used by physically challenged people.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • auto-correct - Auto-correct is a type of software program that identifies misspelled words, uses algorithms to identify the word most likely to have been intended, and edits the text accordingly.
  • auto-correct fail (auto-correct error) - An auto-correct fail is an error created when the software created to detect and correct misspelled words replaces a user-generated mistake with a different, and possibly worse, error.
  • autoblog - An autoblog is a blog with content that is automatically gathered and compiled from RSS feeds.
  • Autodesk Constructware - Constructware is Autodesk's Web-based project management tool that connects different business operations and information in order to standardize business processes.
  • Automated License Plate Recognition (ALPR) - Automated License Plate Recognition (ALPR) is a technology that uses optical character recognition (OCR) to automatically read license plate characters.
  • automated testing - Automated testing is a process that validates if software is functioning appropriately and meeting requirements before it is released into production.
  • AWS Device Farm - AWS Device Farm is an Amazon Web Services (AWS) mobile app testing service for Android or Fire OS-based devices.
  • AWS Test Drive - The AWS Test Drive is a free Amazon Web Services tool that allows consulting and technology partners to test third-party software environments.
  • back-end - Front-end and back-end are terms used to characterize program interfaces and services relative to the initial user of these interfaces and services.
  • batch - In a computer, a batch job is a program that is assigned to the computer to run without further user interaction.
  • batch file - A batch file is a text file that contains a sequence of commands for a computer operating system.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • beta test - In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.
  • Bezier curve - A Bezier curve is a mathematically defined curve used in two-dimensional graphic applications.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Blue Gene - Blue Gene is a supercomputer development project at IBM for a series of high-performance system-on-a-chip (SoC) arcitectures with minimal power demands.
  • blue/green deployment - A blue/green deployment is a software deployment strategy that relies on two identical production configurations that alternate between active and inactive.
  • bookmarklet - A bookmarklet is a JavaScript applet that runs directly in the browser.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy.
  • building information modeling (BIM) - Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice processes and additional information about specifications, materials, functionality, maintenance and even continued history.
  • business analytics (BA) - Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.
  • business event management - Business event management is the practice of incorporating business logic into labeling events, communicating events and handling events.
  • business intelligence (BI) - Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
  • Business Planning and Control System (BPCS) - Business Planning and Control System (BPCS) is a popular system of application programs for manufacturing and other industries that is developed and sold by Systems Software Associates (SSA).
  • business process automation (BPA) - Business process automation (BPA) is the use of technology to complete business processes with minimal human intervention.
  • business process management (BPM) - Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.
  • cache thrash - Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conflicts in the caching system.
  • calibration management software (CMS) - Calibration management software (CMS) is software designed to schedule the calibration of instrumentation and maintenance requirements in all types of industrial settings.
  • call center - A call center is a centralized department to which phone calls from current and potential customers are directed.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • CAVEman - CAVEman is an interactive, object-oriented model of a human body consisting of over 3,000 anatomically correct, catalogued and computerized body parts.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • CICS (Customer Information Control System) - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud integrator - A cloud integrator is a product or service that helps a business negotiate the complexities of cloud migrations.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • clustered file system (CFS) - Clustered file systems are file systems that run on multiple storage servers and can be accessed and managed as a single system.
  • cognitive modeling - Cognitive modeling is an area of computer science that deals with simulating human problem-solving and mental processing in a computerized model.
  • cold backup (offline backup) - Cold backups are ideal for disaster recovery because they protect important data.
  • collaboration platform - A collaboration platform is a category of business software that adds broad social networking capabilities to work processes.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close