Browse Definitions :

Software development

Definitions related to software development, including tech terms about programming and words and phrases about Scrum, Agile and waterfall methodologies.

WIR - ZEN

  • wireframe - A wireframe is a black and white line drawing that's used in early-stage web design to provide stakeholders with a visual representation of a web page's layout and information architecture.
  • Wirth's Law - Wirth's Law states that computer software increases in complexity faster than does the ability of available hardware to run it.
  • wizard - A wizard is a computer utility designed to simplify the execution of lengthy or complicated tasks.
  • work breakdown structure (WBS) - A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole.
  • write once, run anywhere (WORA) - Write once, run anywhere (WORA) is a term that refers to a particular program's supposed ability to run on all common OSs (operating systems).
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • WS-Policy (Web Services Policy Framework specifications) - WS-Policy is an abbreviation for the Web Services Policy specifications, members of the core Web Services architecture specifications.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • XAML (Extensible Application Markup Language) - XAML, Extensible Application Markup Language, is Microsoft's XML-based language for creating a rich GUI, or graphical user interface.
  • XML pipeline - An XML pipeline is a formalized, logical expression of the method by which an XML (Extensible Markup Language) document is handled.
  • XMLHttpRequest - XMLHttpRequest, also called XHR, is an application program interface (API) that was first used by Microsoft in version 5.
  • XNA Game Studio - XNA Game Studio is an integrated development environment (IDE) that includes tools and code development libraries that hobbyists, students and other nonprofessionals can use to create computer games for Microsoft Windows and X-Box 360.
  • yacc (yet another compiler compiler) - Yacc (for 'yet another compiler compiler' ) is the standard parser generator for the Unix operating system.
  • YAGNI principle ("You Aren't Gonna Need It") - YAGNI principle ("You Aren't Gonna Need It") is a practice in software development which states that features should only be added when required.
  • Yoda conditions (Yoda notation) - Yoda conditions, also known as Yoda notation, is a programming variation that reverses the standard order of a conditional statement.
  • zenware - Zenware refers to application programs that function with a minimum of superfluous user intervention.

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close