Browse Definitions :

Software development

Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

MOD - SKE

  • model-based testing - Model-based testing (MBT) requires a test team to create a second, lightweight implementation of a software build- typically only the business logic - called the model.
  • model-driven development (MDD) - Model-driven development (MDD) is a format to write and implement software quickly, effectively and at minimum cost.
  • modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a physical or logical representation of a given system to generate data and help determine decisions or make predictions about the system.
  • monolithic - Monolithic, in information technology, means either very large or composed all in one piece, depending on the particular context.
  • monolithic architecture - A monolithic architecture is the traditional unified model for the design of a software program.
  • Moonlight - Moonlight is an open source implementation of Microsoft's Silverlight.
  • Moral Machine - The Moral Machine is a platform developed at MIT to gather human perspective on the moral decisions made by artificial intelligence (AI).
  • multi-tenancy - Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers.
  • mutation testing - Mutation testing, also known as code mutation testing, is a form of white box testing where testers will change specific components of an application's source code to ensure a software test suite will be able to detect the changes.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • Netflix Spinnaker - Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • NoOps - NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house.
  • not invented here (NIH) syndrome - Not invented here (NIH) syndrome is the name of the tendency for management to resist change by overlooking processes or solutions discovered outside of the company.
  • NUnit - NUnit is an evolving, open source framework designed for writing and running tests in Microsoft .
  • object-relational mapping (ORM) - Object-relational mapping (ORM) is a mechanism that makes it possible to address, access and manipulate objects without having to consider how those objects relate to their data sources.
  • offline first - Offline first is an approach to software development in which developers build an application’s core features to function with or without an internet connection.
  • offshore software testing - Offshore software testing is a software development model where an organization outsources the software testing process to a service partner team located in a different country with a different time zone.
  • open API (public API) - An open API, also known as a public API, is an application programming interface made publically available to software developers.
  • open core model (open core software) - The open core model is a business strategy where a company offers a “core” version of a product with limited features as free and open source (FOSS) software at the same time an add-on commercial version is released as proprietary software.
  • Open Document Format (ODF) - The Open Document Format (ODF) is an XML-based open source file format for saving and exchanging text, spreadsheets, charts, and presentations.
  • Open Network Automation Platform - The Open Network Automation Platform (ONAP) is a networking project that provides a digital environment for the orchestration and automation of complex network services.
  • Open Source Hardening Project - The Open Source Hardening Project is an initiative of the United States Department of Homeland Security, created to improve the security of open source code.
  • OpenServing - OpenServing is a service that provides free Web hosting and support to wiki developers and weblog enthusiasts.
  • out-of-band patch - An out-of-band patch is a patch released at some time other than the normal release time.
  • part-of-speech tagger (PoS tagger) - A part of speech (PoS) tagger is a software tool that labels words as one of several categories to identify the word's function in a given language.
  • pastebin - A pastebin is a Web application that allows users to upload and share text online.
  • Perforce Software - Perforce is a software company that specializes in software configuration management, version control and collaboration products.
  • performance testing - Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • Personal Search Syndication (PSS) - Personal Search Syndication (PSS) is a free technology offered by Septet Systems that allows Web site and blog owners to create, maintain and modify specialized search engines relevant to topics of their choice.
  • PERT chart (Program Evaluation Review Technique) - A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • photogrammetry - Photogrammetry is the gathering of measurements in the physical world by way of computer analysis of photographs and is a recognized scientific tool and field of study.
  • pigs and chickens - Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.
  • planned obsolescence - Planned obsolescence is the concept that a product should be designed and produced with the knowledge that it will only be popular, useful and functional for a limited length of time.
  • planning board - In agile software development, a planning board is used to track the progress of an project.
  • planning game - In agile software development, a planning game is a meeting attended by both IT and business teams that is focused on choosing stories for a release or iteration.
  • planning poker - Planning Poker is a teambuilding activity for achieving group consensus.
  • PMO (project management office) - A project management office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization.
  • point cloud - A point cloud is a collection of data points defined by a given coordinates system.
  • point release - A point release is a small or relatively minor software release that fixes or improves an existing software product.
  • poka-yoke - A poka-yoke is a mechanism that is put in place to prevent human error.
  • polyglot persistence - Polyglot persistence is an enterprise storage term used to describe choosing different data storage/data stores technologies to support the various data types and their storage needs.
  • PowerShell - PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.
  • principle of least privilege (POLP) - The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • private API - A private API is an application programming interface that has its application hosted with in-house developers.
  • product lifecycle - The product lifecycle is the collective stages that a product goes through from its conception and design through to its ultimate disposal.
  • product owner - The product owner is a role in scrum development of the person who represents the business or user community.
  • product-agnostic - Product-agnostic is a description of something that is not associated with a particular commercial product -- such as a specific device or application -- or something that is interoperable with all products of a given type.
  • production server - A production server is a server used to host website content and applications for deployment to a live environment.
  • Project Management Professional (PMP) - Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI).
  • Project Metro - Project Metro (formerly Project Tango) is an open source initiative for the implementation of Web services technologies involving optimization, reliability, security and atomic transactions.
  • Project Tango - Project Tango is the former name for the Project Metro Web services initiative.
  • proprietary solution - A proprietary solution is a hardware or software product or combination of products and services that is tied to a specific vendor, to the exclusion of all other vendors.
  • PTC ThingWorx - PTC ThingWorx is a model-based rapid application development (RAD) platform for the Internet of Things.
  • quality control (QC) - Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer.
  • quality gate - A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to the next phase.
  • Rapid Access Computing Environment (RACE) - Rapid Access Computing Environment (RACE) is a United States federal government infrastructure-as-a-service (IaaS) initiative for developing and testing new Department of Defense (DoD) software applications.
  • rapid mobile app development (RMAD) - Rapid mobile application development (RMAD) uses low-code/no-code programming tools to speed the process of application creation for mobile platforms.
  • React Native - React Native is an open source JavaScript framework for mobile application development.
  • real-time application (RTA) - A real-time application (RTA) is an application program that functions within a time frame that the user senses as immediate or current.
  • reality capture - Reality capture is the use of various technical means to capture a digital 3D model representation of a subject from the real world.
  • reality computing - Reality computing is the use of reality capture in conjunction with computer aided simulation, design and manufacturing CAD/CAM.
  • Red Hat OpenShift - Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc.
  • release - A release is the distribution of the final version of an application.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • requirements analysis (requirements engineering) - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
  • research and development (R&D) - Research and development (R&D) is the initial, exploratory stage of product and service development.
  • RESTful API - A RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • reuse-oriented model or reuse-oriented development (ROD) - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • Rich Client Platform (RCP) - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • robotic process automation (RPA) - Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.
  • rugged DevOps - Rugged DevOps is an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle.
  • Rule of Least Power - The Rule of Least Power is the notion that a programmer should use the least powerful programming language required to code for a given requirement.
  • SaaSgrid - SaaSGrid is an application server and integrated framework for software as a service (SaaS) applications.
  • SAP Mobile Platform (SMP) - SAP Mobile Platform (SMP) facilitates the development and deployment of business-to-enterprise (B2E) and business-to-customer (B2C) applications through reusable components, drag and drop HTML5 apps and other programming tools.
  • SAPUI5 - SAPUI5 is SAP's toolkit for building web applications using HTML5.
  • Scratch - Scratch is a free object-oriented software development kit (SDK) that allows children age 8-16 to create animations, interactive stories, games and music without needing to know a specific programming language.
  • scripting language - A scripting language is a form of programming language that is usually interpreted rather than compiled.
  • scrum master - A scrum master is the facilitator for a product development team that uses scrum, a rugby analogy for a development methodology that allows a team to self-organize and make changes quickly.
  • security by design - Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best practices.
  • seed capital - Seed capital is the funding required to get a new business started.
  • sensor competition - Sensor competition is the use of multiple redundant sensors to detect, measure or analyze a single phenomenon.
  • Serenity BDD - Serenity BDD is a framework and open source library for the creation of automated software testing for code in development.
  • serverless computing - Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • Service Integration Maturity Model (SIMM) - The Service Integration Maturity Model (SIMM) is a paradigm developed by IBM that defines the extent to which various services are integrated in a service-oriented architecture (SOA).
  • service virtualization - Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • shift left testing - Shift left testing is an approach used to speed software testing and facilitate development by moving the testing process to an earlier point in the development cycle.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • sidecar proxy - A sidecar proxy is an application design pattern which abstracts certain features, such as inter-service communications, monitoring and security, away from the main architecture to ease the tracking and maintenance of the application as a whole.
  • Silverlight - Silverlight is: (1) A programming model for developing and distributing rich Internet applications (RIA) that use graphics, animations or video within the .
  • Single Responsibility Principle (SRP) - Single Responsibility Principle (SRP) is the concept that any single object in object-oriented programing (OOP) should be made for one specific function.
  • single-page application (SPA) - A single-page application (SPA) is a Web app that is presented to the user through a single HTML page to more closely replicate a desktop application.
  • site reliability engineer - Site reliability engineer is a job title for a specialist who works with software developers to ensure that an organization's computing systems are scalable, stable and predictable.
  • skeuomorphism - Skeuomorphism is the design concept of making items represented resemble their real-world counterparts.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close