Browse Definitions :

Software Development

Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

COW - IMP

  • cowboy coding - Cowboy coding describes an undisciplined approach to software development.
  • cross-browser testing - Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.
  • cross-platform mobile development - Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
  • dark infrastructure - Dark infrastructure is undocumented but active software or services whose existence and function is unknown to system administrators -- despite the fact that it may be integral to the continued operation of documented infrastructure.
  • dark pattern - Dark patterns are manipulative or deceptive design elements used in some web pages, popups and programs that include malware, freeware, shareware, freemium offerings and even fully paid software.
  • Daylight Saving Time patch - A Daylight Saving Time patch is a modular piece of code created to update systems, devices and programs for compatibility with new start and end dates for Daylight Saving Time (DST) in the United States, Canada and Bermuda.
  • declarative programming - Declarative programming is a method to abstract away the control flow for logic required for software to perform an action, and instead involves stating what the task or desired outcome is.
  • definition of done - A definition of done is a checklist of criteria that a product, product increment or project must satisfy to be considered completed.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency injection - In object-oriented programming (OOP) software design, dependency injection (DI) is the process of supplying a resource that a given piece of code requires.
  • deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or usage that is acknowledged but discouraged.
  • design thinking - Design thinking is an iterative approach to problem solving that intentionally seeks out people with different perspectives, knowledge, skills and experience and has them work together to create a practical solution for a real-world problem.
  • DevOps engineer - A DevOps engineer is an IT professional who works with software developers, system operators and other production IT staff to create and oversee code releases and deployments.
  • digital commons - The digital commons is the collective of discreet online resources that are collaboratively developed and overseen by a community.
  • Direct3D - Direct3D is the Microsoft 3D application programming interface (API) component of the DirectX API package.
  • discoverability (in UX design) - Discoverability, in the context of product and interface design, is the degree of ease with which the user can find all the elements and features of a new system when they first encounter it.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • Docker Engine - Docker Engine is the underlying client-server technology that builds and runs containers using Docker's components and services.
  • domain-driven design (DDD) - Domain-driven design (DDD) is a software development philosophy centered around the domain, or sphere of knowledge, of those that use it.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • dynamic analysis - Dynamic analysis is the testing and evaluation of a program based on execution with selected data.
  • embedded firmware - Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
  • embedded software - Hardware makers use embedded software to control the functions of various hardware devices and systems.
  • empiricism - Empiricism is the theory that human knowledge comes predominantly from experiences gathered through the five senses.
  • encapsulation in Java - Java offers four different "scope" realms--public, protected, private, and package--that can be used to selectively hide data constructs.
  • end-to-end testing - End-to-end testing is a methodology that assesses the working order of a complex product in a start-to-finish process.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • Enterprise Integration Patterns (EIP) - "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • error handling - Error handling refers to the anticipation, detection, and resolution of programming, application, and communications errors.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • event sourcing - Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • exception - An exception, in programming, is an unplanned event, such as invalid input or a loss of connectivity, that occurs while a program is executing and disrupts the flow of its instructions.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • F8 (Facebook F8) - F8 (pronounced F-eight) is Facebook's developer conference for those creating applications on the social media site's platform.
  • facepalm - Facepalm is a gesture in which an individual places the palm of one or both hands on their face to express one of a number of emotions, including shock, disbelief, distress, embarrassment, horror and frustration.
  • facial occlusion position - A facial occlusion position is one of a number of possible poses in which something, such as a person's hand, blocks (occludes) part of their face.
  • fail fast - Fail fast is a philosophy that values the development or implementation of many small experimental products, changes or approaches before committing large amounts of time or resources.
  • fault injection testing - Fault injection is a testing process which deliberately introduces errors to a system to ensure the system can withstand the error and recover.
  • feature flagging - Feature flagging is a cost-effective and simple programming method that involves a programming design pattern which allows developers to turn a feature of a software application on or off without having to release or change the code in production.
  • finite element analysis (FEA) - Finite element analysis (FEA) is the use of calculations, models and simulations to predict and understand how an object might behave under various physical conditions.
  • flat design - Flat design is a simple, graphic style common in user interface (UI), software and Web design.
  • Force.com - Force.com is a Platform as a Service (PaaS) product designed to simplify the development and deployment of cloud-based applications and websites.
  • formal methods - Formal methods are the use of a specific mathematical technique for the specification, development and verification of systems in both software and electronic hardware.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • Free and open source software (FOSS) or free/libre open source software (FLOSS) - Free and open source software (FOSS), also known as free/libre open source software (FLOSS) and free/open source software (F/OSS), is software developed by informal collaborative networks of programmers and end users.
  • fudge factor - A fudge factor is an element inserted into a calculation, formula or model to allow for error or uncertainty.
  • full-stack developer - A full-stack developer is a type of programmer that has a functional knowledge of all techniques, languages and systems engineering concepts required in software development.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application's intended requirements and specifications.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • garbage in, garbage out (GIGO) - GIGO (garbage in, garbage out) is a concise expression of a concept common to computer science and mathematics: the quality of output is determined by the quality of the input.
  • Git - Git is a free and open source distributed code management and version control system that is distributed under the GNU General Public License version 2.
  • GitHub - GitHub is a web-based revision control hosting service for software development and code sharing.
  • GNU project - The GNU project is a mass collaborative initiative for the development of free software.
  • go-live (go live) - Go-live is the time at which something becomes available for use.
  • go-to-market strategy (GTM strategy) - A go-to-market strategy (GTM strategy) is an action plan that specifies how a company will reach target customers and achieve competitive advantage.
  • gold plating - Gold plating is the practice of making changes to a project that are outside of the original agreed-upon scope.
  • Google App Engine - Google App Engine is a cloud computing platform as a service that allows web app developers and enterprises access to Google's scalable hosting and tier 1 internet service.
  • Google Chromium - Google Chromium is an open source project that was initiated to make source code for the Chrome OS and the Chrome browser available to developers.
  • Google Compute Engine - Google Compute Engine is an Infrastructure as a Service (IaaS) offering that allows clients to run workloads on Google's physical hardware.
  • Google Preemptible VM - A Preemptible VM (PVM) is a Google Compute Engine (GCE) virtual machine (VM) instance that can be purchased for a steep discount as long as the customer accepts that the instance will terminate after 24 hours.
  • GraphQL - GraphQL is a query language that allows developers to ask for specific data and return that data from multiple sources through a single API call.
  • gray box testing (gray box) - Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program.
  • Groovy - Groovy is a dynamic object-oriented programming language for the Java virtual machine (JVM) that can be used anywhere Java is used.
  • GUI testing (graphical user interface testing) - GUI testing is the process of ensuring proper functionality of the graphical user interface (GUI) for a given application and making sure it conforms to its written specifications.
  • GWT (GWT Web Toolkit) - The GWT software development kit facilitates the creation of complex browser-based Java applications that can be deployed as JavaScript, for portability across browsers, devices and platforms.
  • hackathon - A hackathon, also known as a codefest, is a social coding event that brings computer programmers and other interested people together to improve upon or build a new software program.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • hamburger icon (slide drawer navigation) - The hamburger icon got its name because it resembles a burger in a bun.
  • happy path testing - Happy-path testing is a type of software testing that uses known input and produces an expected output.
  • hard real-time system (immediate real-time system) - A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • health informatics - Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction with health information technology systems to help clinicians provide better healthcare.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heroku - Heroku is a cloud-based development platform as a service (PaaS) provider.
  • Hibernate - Hibernate is an open source object relational mapping (ORM) tool that provides a framework to map object-oriented domain models to relational databases for web applications.
  • hierarchical menu - A hierarchical menu is a multi-level arrangement of options, organized to allow users to find information, tools, or functions more easily than they could in an unstructured presentation.
  • HL7 (Health Level Seven International) - HL7 (Health Level Seven International) is a set of standards, formats and definitions for exchanging and developing electronic health records (EHRs).
  • Hofstadter's law - Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter's Law.
  • HP Quality Center - HP Quality Center is Hewlett-Packard’s software quality management product, part of the company’s application lifecycle management software suite.
  • HTML5 mobile app - HTML5 mobile apps are developed through that version of the Web content standard.
  • hybrid application (hybrid app) - A hybrid application (hybrid app) is one that combines elements of both native and Web applications.
  • hybrid mobile app dev - Hybrid mobile app development is an approach to programming for mobile devices that combines the strengths of native programming and HTML5 mobile app development.
  • IBM MobileFirst Platform Foundation (formerly IBM Worklight) - IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.
  • IC-BPMS (integration-centric business process management suite) - Integration-centric business process management suite (IC-BPMS) combines business process management (BPM) and service-oriented architecture (SOA).
  • ID3 tag - An ID3 tag is a type of meta data container used to store information about an MP3 file within the audio file itself.
  • idempotence - Idempotence, in programming and mathematics, is a property of some operations such that no matter how many times you execute them, you achieve the same result.
  • IDOV methodology (identify, design, optimize, verify) - The IDOV methodology (Identify, Design, Optimize and Verify methodology) is a component of the Six Sigma management system intended to guide processes involved in creating a new new product, service or business process.
  • IFrame (Inline Frame) - The IFrame HTML element is often used to insert content from another source, such as an advertisement, into a Web page.
  • imperative programming - Imperative programming is a software development paradigm where functions are implicitly coded in all the steps required to solve a problem.
  • improvement kata - The improvement kata is a four-step routine for working toward a goal in a systematic way.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close