Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

DIC - GIM

  • DICOM (Digital Imaging and Communications in Medicine) - DICOM (Digital Imaging and Communications in Medicine) is a standard protocol for the management and transmission of medical images and related data and is used in many healthcare facilities.
  • digital asset management (DAM) - Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions.
  • digital enterprise - A digital enterprise is an organization that uses technology as a competitive advantage in its internal and external operations.
  • digital health (digital healthcare) - Digital health, or digital healthcare, is a broad, multidisciplinary concept that includes concepts from an intersection between technology and healthcare.
  • digital photo album - A digital photo album is an application that allows the user to import graphic image files from a digital camera, memory card, scanner, or computer hard drive, to a central database.
  • digital preservation - As a part of the formalized efforts of library and archival sciences, digital preservation includes the practices required to ensure that information is safe from medium failures as well as software and hardware obsolescence.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • Distributed File System Replication (DFSR) - Distributed File System Replication (DFSR) is a replication engine that organizations can use to synchronize folders for servers on network connections that have a limited bandwidth.
  • distributed tracing - Distributed tracing, also called distributed request tracing, is a method for IT and DevOps teams to monitor applications, especially those composed of microservices.
  • distribution - In marketing, distribution is the process of moving a product from its manufacturing source to its customers.
  • distribution channel - A distribution channel is the network of individuals and organizations involved in getting a product or service from the producer to the customer.
  • DNN Platform (DotNetNuke) - DNN Platform, formerly called DotNetNuke Community Edition, is a free, open source content management system (CMS).
  • document capture - Document capture is any one of several processes used to convert a physical document to another format, typically a digital representation.
  • document lifecycle - The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction.
  • document metadata - Document metadata is information attached to a text-based file that may not be visible on the face of the document; documents may also contain supporting elements such as graphic images, photographs, tables and charts, each of which can have its own metadata.
  • Dolly (Digital Dolly) - Dolly, also called Digital Dolly, is a program that can quickly clone (copy) drives to drives, drives to files, files to drives, or files to files.
  • Domino - Domino is the name of the applications and messaging server program for the Lotus Corporation's Lotus Notes product, a sophisticated groupware application that is installed in many corporations.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • DuckDuckGo - DuckDuckGo (DDG) is a general search engine designed to protect user privacy, while avoiding the skewing of search results that can happen because of personalized search (sometimes referred to as a filter bubble).
  • dynamic case management (DCM) - Dynamic case management (DCM) is the handling of case-based work through the use of technologies that automate and streamline aspects of each case.
  • dynamic link library (DLL) - A dynamic link library (DLL) is a collection of small programs that larger programs can load when needed to complete specific tasks.
  • e-commerce - E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.
  • e-recruitment (e-recruiting) - E-recruitment is an umbrella term for any electronic-based recruiting and recruitment management activity.
  • eClinicalWorks - eClinicalWorks is a Massachusetts-based company that sells electronic medical record (EMR), practice management (PM) and personal health record (PHR) software and services to reportedly more than 115,000 physicians and 70,000 facilities in the United States.
  • Eclipse (Eclipse Foundation) - Eclipse is a free, Java-based development platform known for its plugins that allow developers to develop and test code written in other programming languages.
  • eHealth Initiative - The eHealth Initiative is an independent, nonprofit organization that engages doctors and patients in order to standardize and reform the use of health information technology (HIT) to improve patient care in the United States.
  • EHR implementation plan - An electronic health record (EHR) implementation plan is a comprehensive set of strategies and steps used by a health care organization when preparing for and executing the adoption of an electronic-based health care system.
  • ElasticSearch - ElasticSearch is an open source, RESTful search engine built on top of Apache Lucene and released under an Apache license.
  • Electronic Data Interchange (EDI) - Following specific standards, EDI is a way for businesses to securely transfer important data, such as invoices and purchase orders, via the Internet.
  • electronic health record (EHR) - An electronic health record (EHR) is an individual's official health document that is shared among multiple facilities and agencies.
  • electronic intensive care unit (eICU) - An Electronic Intensive Care Unit (eICU) is a form or model of telemedicine where state-of-the-art technology is used to provide an additional layer of critical care service to patients.
  • electronic medical billing - Electronic medical billing is the process by which a health care provider electronically submits a bill, or claim, to a health insurance company, or payer, for the rendering of medical services.
  • electronic medical record (EMR) - An electronic medical record (EMR) is a digital version of the traditional paper-based medical record for an individual.
  • electronic protected health information (ePHI) - Electronic protected health information (ePHI) is protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
  • Eloqua - Eloqua is a platform for automation of enterprise-level electronic marketing, offered by Oracle.
  • emergent medical data (EMD) - Emergent medical data (EMD) is health information gathered about an individual from seemingly unrelated user behavior data.
  • employee self-service (ESS) - Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.
  • emulation - Emulation, in a software context, is the use of an application program or device to imitate the behavior of another program or device.
  • encryption key management - Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • enhancement - In an information technology product, an enhancement is a noteworthy improvement to the product as part of a new version of it.
  • enterprise collaboration (EC) - Enterprise collaboration is a system of communication among corporate employees that may encompass the use of a collaboration platform, enterprise social networking tools, a corporate intranet and the public Internet.
  • enterprise content services - Enterprise content services are the evolution of enterprise content management (ECM); their goal is to adapt to the changing needs of enterprises and the emergence of new technologies, such as cloud computing.
  • enterprise document management (EDM) - Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
  • enterprise information management (EIM) - Enterprise information management (EIM) is the set of business processes, disciplines and practices used to manage the information created from an organization's data as an enterprise asset.
  • Enterprise Integration Patterns (EIP) - "Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions" is a book of design patterns for enterprise application integration.
  • enterprise license agreement (ELA) - An enterprise license agreement (ELA) is a contract between a customer and a vendor that allows purchase of a software product for a company at a discounted, fixed rate for a certain time period.
  • enterprise mashup (or data mashup) - An enterprise mashup is the integration of heterogeneous digital data and applications from multiple sources for business purposes.
  • enterprise master patient index (EMPI) - An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization.
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • Epic Systems - Epic Systems is one of the largest providers of health information technology, used primarily by large U.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is software designed to manage and integrate the functions of core business processes like finance, HR, supply chain and inventory management in a single system.
  • eTEK - eTEK International Inc.
  • Eucalyptus - Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-condition-action rule (ECA rule) - An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • Excel - Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.
  • expert system - An expert system is a program that uses artificial intelligence (AI) technologies to simulate the knowledge and judgment of humans.
  • fact checking - Fact checking is the process of attempting to verify or disprove assertions made in speech, print media or online content.
  • falsifiability - Falsifiability is the capacity for some proposition, statement, theory or hypothesis to be proven wrong.
  • fault-tolerant - Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, despite one or more of its components failing.
  • FDA (U.S. Food and Drug Administration) - The FDA (U.S.
  • Feature Manipulation Engine (FME) - The Feature Manipulation Engine (FME) is a platform that streamlines the translation of spatial data between geometric and digital formats.
  • Federal Health Information Exchange (FHIE) - Federal Health Information Exchange (FHIE) is a health information sharing project that allows the Department of Defense to share service members’ personal health information in a joint storage area also accessible by the Veterans Health Administration.
  • federated search (universal search) - Federated search is an approach to information retrieval that aggregates query results from multiple information sources.
  • fee-for-service (FFS) - Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service they perform.
  • femtech - 'Femtech' is a term that refers to diagnostic tools, products, services, wearables and software that use technology to address women's health issues, including menstrual health, reproductive health, sexual health, maternal health and menopause.
  • FHIR (Fast Healthcare Interoperability Resources) - Fast Healthcare Interoperability Resources (FHIR) is an interoperability standard for electronic exchange of healthcare information.
  • file extension (file format) - In a computer, a file extension is the layout of a file -- in terms of how the data within the file is organized.
  • FileMaker (FMP) - FileMaker is a relational database application in which an individual may design -- and easily share on the Internet -- a database file by starting with a blank document or implementing ready-made and customizable templates.
  • financial analytics - Financial analytics is the creation of ad hoc analysis to answer specific business questions and forecast possible future financial scenarios.
  • FinnOne - FinnOne is a web-based global banking product designed to support banks and financial solution companies in dealing with assets, liabilities, core financial accounting and customer service.
  • Firebase Cloud Messaging (FCM) - Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send notifications and messages to users across a variety of platforms, including Android, iOS and web applications.
  • Fizt (physics tool) - Fizt (pronounced FIZZ-tee, and short for physics tool) is an animation program that can speed up the production of special effects -- in some cases by a factor of more than 150 to 1 -- and can also make the effects appear more life-like than has been possible with less sophisticated programs.
  • font - The word 'font' refers to a set of printable or displayable typography or text characters in a specific style and size.
  • font psychology - Font psychology is the deliberate use of particular styles and sizes of characters to produce a desired effect in the viewer.
  • formulary - A formulary is a list of prescription drugs that are covered by a specific health care plan.
  • framework - In general, a framework is a real or conceptual structure intended to serve as a support or guide for the building of something that expands the structure into something useful.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • freebooting - Freebooting is the unauthorized duplication of digital content, which is then republished and presented as original work.
  • front end and back end - Front end and back end are terms used by programmers and computer professionals to describe the layers that make up hardware, a computer program or a website which are delineated based on how accessible they are to a user.
  • Full Packaged Product (FPP) - Full Packaged Product (FPP) is the retail version of a Microsoft licensed product.
  • functional testing - Functional testing is a process used to evaluate software during development to ensure that it meets the application's intended requirements and specifications.
  • fuzz testing (fuzzing) - Fuzz testing (fuzzing) is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an attempt to make it crash.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • garbage in, garbage out (GIGO) - GIGO (garbage in, garbage out) is a concise expression of a concept common to computer science and mathematics: the quality of output is determined by the quality of the input.
  • gated content / ungated content - Gated content is online materials, such as white papers, articles or videos, that require the user to fill out a form before they can access them.
  • GE Healthcare - GE Healthcare is a subsidiary of General Electric Co.
  • Generally Accepted Recordkeeping Principles (the Principles) - Generally Accepted Recordkeeping Principles is a framework for managing records in a way that supports an organization's immediate and future regulatory, legal, risk mitigation, environmental and operational requirements.
  • genomics - Genomics is the study of human genes and chromosomes.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • gesture recognition - Gesture recognition is the mathematical interpretation of a human motion by a computing device.
  • Ghost - Ghost is a software product from Symantec that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media.
  • GIMP (GNU Image Manipulation Program) - GIMP (GNU Image Manipulation Program) is a freely available open source application for creating and manipulating graphic images that runs on Linux, other Unix-based operating systems, and also on Windows and Mac OS X.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close