Browse Definitions :

Web services, SOA

Definitions related to web services, including tech terms about service-oriented architecture (SOA) and words and phrases about web applications that use XML and HTTP.

ACC - SEC

  • accessibility testing - Accessibility testing is a type of systems testing designed to determine whether individuals with disabilities will be able to use the system in question, which could be software, hardware, or some other type of system.
  • ad hoc test - An ad hoc test is an unplanned and undocumented procedure designed to assess the viability of a product.
  • ad hoc testing - Ad hoc testing is a non-methodical approach to assessing the viability of a product.
  • Alexa Top Sites - Alexa Top Sites is an Amazon Web Service (AWS) that provides lists of the highest-performing websites according to Alexa Traffic Rank algorithm.
  • Alexa Web Information Service (AWIS) - Alexa Web Information Service (AWIS) is a subscription-based service that makes it possible for developers to access Alexa Web traffic data for inclusion in their XML-based websites and applications.
  • Amazon AppStream - Amazon AppStream is an Amazon Web Service (AWS) that enables compute-intensive applications to be streamed from the cloud to computing devices of all types.
  • Amazon CloudWatch - Amazon CloudWatch is a component of Amazon Web Services (AWS) that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.
  • Amazon EC2 instance - An EC2 instance is a virtual server in Amazon’s Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure.
  • Amazon Elastic MapReduce (Amazon EMR) - Amazon Elastic MapReduce (EMR) is an Amazon Web Services (AWS) tool for big data processing and analysis.
  • Amazon Mechanical Turk - Amazon Mechanical Turk is a web service application program interface (API) that allows developers to integrate human intelligence into remote procedure calls (RPC).
  • API economy - API economy (application programming interface economy) is a general term that describes the way application programming interfaces (APIs) can positively affect an organization's profitability.
  • app virtualization (application virtualization) - App virtualization (application virtualization) is the separation of an installation of an application from the client computer that is accessing it.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • AWS Elastic Beanstalk - AWS Elastic Beanstalk is a cloud deployment and provisioning service that automates the process of getting applications set up on the Amazon Web Services (AWS) infrastructure.
  • AWS Management Console - The AWS Management Console is a browser-based GUI for Amazon Web Services (AWS).
  • AWS SDK for .NET - The AWS SDK for .
  • AWS SDK for Android - The AWS SDK for Android is a collection of tools for developers creating applications for the Android operating system.
  • AWS SDK for iOS - The AWS SDK for iOS is a collection of software tools for the development of applications for Apple iOS-based devices like the iPhone, iPad and iPod.
  • AWS SDK for Java - The AWS SDK for Java is a collection of tools for developers creating Java-based Web apps to run on Amazon cloud components such as Amazon Simple Storage Service (S3), Amazon Elastic Compute Cloud (EC2) and Amazon SimpleDB.
  • AWS SDK for JavaScript - The AWS SDK for JavaScript is a collection of software tools for the creation of applications and libraries that use Amazon Web Services (AWS) resources.
  • Azure Service Fabric - Azure Service Fabric is a Platform as a Service (PaaS) offering designed to facilitate the development, deployment and management of highly-scalable and customizable applications for the Microsoft Azure cloud platform.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • Bootstrap - Bootstrap is a free and open source front-end development framework for the creation of websites and web apps.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • build your own app (BYOA) - Build your own app (BYOA) is an increasing trend towards the creation of applications by people without software development skills.
  • business logic attack - A business logic attack is an exploit that takes advantage of a flaw in programming managing the exchange of information between a user interface and the application's supporting database.
  • cloud analytics - Cloud analytics is a service model in which one or more key element of data analytics is provided through a public or private cloud.
  • cloud IDE - A cloud IDE is a web-based integrated development platform (IDE) that is accessed through a browser.
  • cloud services - Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • content management application (CMA) - A content management application (CMA) is the front end component of a content management system (CMS).
  • crawl depth - Crawl depth is the extent to which a search engine indexes pages within a website.
  • Data Security Council of India (DSCI) - The Data Security Council of India (DSCI) is a not-for-profit organization created to promote the country as a secure destination for information technology (IT) outsourcing.
  • dependency checking - Dependency checking is a function that is performed to ensure that all pre-requisites for a given run-time image are present.
  • dependency injection - Dependency injection (DI) is an object-oriented programming (OOP) software design structure in which service references, also called dependencies, are delivered to clients from the outside as required.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.
  • destructive testing - Destructive testing is a software assessment method used to find points of failure in a program.
  • Digital Text Platform (DTP) - Digital Text Platform (DTP) is Amazon.
  • discoverability - Discoverability is the capacity of something to be found.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • DROP (delivery of real-time execution information protocol) - DROP (delivery of real-time execution information protocol) is a feature of various NASDAQ (National Association of Securities Dealers Automated Quotations) protocols that allows a subscriber to continuously view vital information about trades including the date and time, the participants (by symbol or icon), order identification data, condensed descriptions, the exchange prices and relevant commissions.
  • dynamic testing - Dynamic testing is a method of assessing the feasibility of a software program by giving input and examining output (I/O).
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.
  • event-driven computing - Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software.
  • exploratory testing - Exploratory testing is an approach to software assessment that integrates learning about the program with designing the test and conducting the testing processes.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • Force.com - Force.com is a Platform as a Service (PaaS) product designed to simplify the development and deployment of cloud-based applications and websites.
  • freemium - Freemium is a way of promoting services by offering the basic features at no cost, charging a premium only for supplemental features.
  • Globally Distributed MySQL-as-a-Service - Globally Distributed MySQL-as-a-Service is a Database as a Service (DBaaS) product from GenieDB.
  • Google App Engine - Google App Engine is a cloud computing platform as a service that allows web app developers and enterprises access to Google's scalable hosting and tier 1 internet service.
  • Google Compute Engine - Google Compute Engine is an Infrastructure as a Service (IaaS) offering that allows clients to run workloads on Google's physical hardware.
  • Google Docs - Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.
  • Hadoop - Hadoop is an open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems.
  • Heroku - Heroku is a cloud-based development platform as a service (PaaS) provider.
  • hierarchical menu - A hierarchical menu is a multi-level arrangement of options, organized to allow users to find information, tools, or functions more easily than they could in an unstructured presentation.
  • hot desking - Hot desking is a work space sharing model in which employees outnumber desks.
  • HP Quality Center - HP Quality Center is Hewlett-Packard’s software quality management product, part of the company’s application lifecycle management software suite.
  • HTML5 - HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages.
  • IAP (Internet access provider) - An IAP (Internet access provider) is a company that provides individuals and other ISP companies access to the Internet.
  • IFTTT (If This Then That) - IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered.
  • iTunes U - iTunes U is a dedicated section of Apple's iTunes Music Store that features educational audio and video files from universities, museums and public media organizations for free download to PCs and mobile devices.
  • JAX-WS (Java API for XML Web Services) - Java API for XML Web Services (JAX-WS) is one of a set of Java technologies used to develop Web services.
  • Joomla! - Joomla! is a free open source website development and content management (CMS) platform.
  • Keyhole Markup Language (KML) - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • LMGTFY (Let Me Google That For You) - LMGTFY (Let Me Google That For You) is a website that creates a demonstration of how to conduct a user-specified Google search.
  • location awareness - Location awareness is a component of presence technology that delivers information about a device's physical location to another user or application.
  • location-based service (LBS) - A location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located.
  • managed security services (MSS) - Managed security services (MSS) is a systematic approach to managing an organization's security needs.
  • massive open online course (MOOC) - A massive open online course (MOOC) is a free Web-based educational offering that is designed to enable the participation of large numbers of geographically dispersed students.
  • micropayment - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.
  • microservice architecture (MSA) - A microservice architecture (MSA) is a logical structure for the design of a software program involving loosely-coupled modular components known as microservices.
  • Microsoft SharePoint 2013 - SharePoint 2013 is a collaboration platform that offers a simplified user experience and enterprise social media capabilities.
  • mobile app - A mobile app is a software application designed for use on mobile devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile deep linking - Mobile deep linking makes it easier for people to access resources on smartphones, tablets and other mobile devices because it decreases the number of actions they have to take to get to their target destination.
  • mobile Internet device (MID) - A mobile Internet device (MID) is a handheld device that is larger than a smartphone but smaller than a netbook.
  • monolithic architecture - A monolithic architecture is the traditional unified model for the design of a software program.
  • NASSCOM (National Association of Software and Services Companies) - The National Association of Software and Services Companies (NASSCOM) is a not-for-profit Indian consortium created to promote the development of the country's IT (information technology) and business process outsourcing (BPO) industries.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • Online Service System (OSS) - Online Service System (OSS) is a name that SAP has used to describe its provision of online access by users to a company's R/3 applications and data.
  • open API (public API) - An open API, also known as a public API, is an application programming interface that allows the owner of a network-accessible service to give universal access to consumers of that service, such as developers.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • OTTO protocol (OUCH To Trade Options) - OTTO (OUCH To Trade Options) is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Platform as a Service (PaaS) - Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • production server - A production server is a server used to host website content and applications for deployment to a live environment.
  • RASHport (Routing and Special Handling) - RASHport, also called RASH (Routing and Special Handling), is a digital communications protocol that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to conduct business in the options market.
  • Red Hat OpenShift - Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc.
  • RELAX NG (RELAX Next Generation) - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • SaaS - SaaS stands for at least three different "as-a-service" offerings.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • BlueKeep (CVE-2019-0708)

    BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 ...

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close