Browse Definitions :

Software applications

Definitions related to software applications, including tech terms about software programs for vertical industries and words and phrases about software development, use and management.

PRI - STR

  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are strictly required to do their jobs.
  • privatization - Privatization is the process of transferring an enterprise or industry from the public sector to the private sector.
  • problem list - A problem list is a document that states the most important health problems facing a patient such as nontransitive illnesses or diseases, injuries suffered by the patient, and anything else that has affected the patient or is currently ongoing with the patient.
  • product development (new product development -- NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • product lifecycle management (PLM) - Product lifecycle management (PLM) is a systematic approach to managing the series of changes a product goes through, from its design and development to its ultimate retirement or disposal.
  • productivity software - Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, spreadsheets and presentations.
  • Project Nightingale - Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States.
  • protected health information (PHI) or personal health information - Protected health information (PHI), also referred to as personal health information, is the demographic information, medical histories, test and laboratory results, mental health conditions, insurance information and other data that a healthcare professional collects to identify an individual and determine appropriate care.
  • public data - Public data is information that can be freely used, reused and redistributed by anyone with no existing local, national or international legal restrictions on access or usage.
  • public domain - Public domain is a designation for content that is not protected by any copyright law or other restriction and may be freely copied, shared, altered and republished by anyone.
  • public sector - The public sector is the segment of an economic system that is controlled by government; it contrasts with the private sector, which is run by private citizens.
  • R/3 - R/3 is the comprehensive set of integrated business applications from SAP, the German company that states it is the market and technology leader in business application software.
  • Radiology Information System (RIS) - A RIS is the traditional core software system for electronically managing medical images, scheduling and billing in hospital radiology departments and physician practices.
  • rapid mobile app development (RMAD) - Rapid mobile application development (RMAD) uses low-code/no-code programming tools to speed the process of application creation for mobile platforms.
  • reactive programming - Reactive programming describes a design paradigm that relies on asynchronous programming logic to handle real-time updates to otherwise static content.
  • reactive systems architecture - A computer systems paradigm that takes advantage of the responsiveness, flexibility and resiliency of reactive programming, so that various components can take continue to function and even thrive if any component is compromised.
  • real-time application (RTA) - A real-time application is an application program that functions within a time frame that the user senses as immediate or current.
  • recommendation engine - Recommendation engines are common among online retail websites, such as Amazon.
  • records information management (RIM) - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • records retention schedule - A records retention schedule is a policy that depicts how long data items must be kept, as well as the disposal guidelines for these data items.
  • Red Hat Enterprise Linux (RHEL) - Red Hat Enterprise Linux (RHEL) is an enterprise Linux operating system (OS) developed by Red Hat for the business market.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • reliability - Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote patient monitoring (RPM) - Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.
  • rendering - In 3-D graphic design, rendering is the process of add shading, color and lamination to a 2-D or 3-D wireframe in order to create life-like images on a screen.
  • replenishment - Replenishment is the controlled and regular movement of inventory from an upstream point on the supply chain to a downstream location that requires sufficient stock to cover demand.
  • request for proposal (RFP) - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
  • restricted API - A restricted API is an application program interface whose access, or use, is intentionally limited by web site developers for security purposes or business reasons.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • robo-advisor - A robo-advisor is an artificial intelligence (AI) driven virtual financial advisor.
  • robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • sales force automation (SFA) - Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline.
  • SAP Business One - SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • SAP ERP - SAP ERP is enterprise resource planning software developed by the company SAP SE.
  • SAP Integration Server - SAP Integration Server is the central component of SAP XI (Exchange Infrastructure), the company's enterprise application integration (EAI) product.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • SCADA (supervisory control and data acquisition) - SCADA (supervisory control and data acquisition) is a category of software application program for process control, the gathering of data in real time from remote locations in order to control equipment and conditions.
  • screen scraping - Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources.
  • SELinux (Security-Enhanced Linux) - SELinux, or Security-Enhanced Linux, is a part of the Linux security kernel that acts as a protective agent on servers.
  • semi-structured data - Semi-structured data is data that has not been organized into a specialized format, such as a table, a record, an array or a tree but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data.
  • serious reportable event (SRE) - A serious reportable event (SRE) is an incident involving death or serious harm to a patient resulting from a lapse or error in a healthcare facility.
  • Service Data Objects (SDO) - Service Data Objects (SDO) is the name of a specification designed to streamline the processing of SOA (service-oriented architecture) data from diverse sources such as XML documents, relational databases and Web services.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • seven wastes - The seven wastes are categories of unproductive manufacturing practices identified by Taiichi Ohno, the father of the Toyota Production System (TPS).
  • SFX (special effects) - SFX, an abbreviation for special effects, is a software product that makes it easy to create certain kinds of hypertext links within a collection of information such as the description of a library collection.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • SharePoint farm - A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.
  • SharePoint Online - Microsoft SharePoint Online is a collection of cloud- and web-based technologies that make it easy for organizations to store, share and manage digital information.
  • shareware - Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later.
  • shift-right testing - Shift-right testing is a method of continuously testing software while it is in a post-production environment.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • single pane of glass - A single pane of glass is a management console that presents data from multiple sources in a unified display.
  • single-tenancy - Single-tenancy is an architecture in which a single instance of a software application and supporting infrastructure serves one customer.
  • site reliability engineering (SRE) - Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support.
  • Six Sigma - Six Sigma is a business methodology for quality improvement that measures how many defects there are in a current process and seeks to systematically eliminate them.
  • skeuomorphism - Skeuomorphism is the design concept of making items represented resemble their real-world counterparts.
  • smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
  • snap-in - Snap-in, in general, refers to an object that can be attached to another object and that will then function as part of the whole.
  • SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) - SNOMED CT (Systematized Nomenclature of Medicine -- Clinical Terms) is a standardized, multilingual vocabulary of clinical terminology that is used by physicians and other health care providers for the electronic exchange of clinical health information.
  • SOA registry - An SOA registry is a resource that provides controlled access to data necessary for governance of SOA (service-oriented architecture) projects.
  • SOA repository - An SOA repository is a database containing the software and metadata that constitute an SOA registry.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • soft copy - A soft copy (sometimes spelled 'softcopy') is an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer's display or transmitted as an email attachment.
  • soft keyboard (onscreen keyboard or software keyboard) - A soft keyboard (sometimes called an onscreen keyboard or software keyboard) is a system that replaces the hardware keyboard on a computing device with an on-screen image map.
  • software - Software is a set of instructions, data or programs used to operate computers and execute specific tasks.
  • software agent - A software agent is a persistent, goal-oriented computer program that reacts to its environment and runs without continuous direct supervision to perform some function for an end user or another program.
  • Software as a Medical Device (SaMD) - Software as a Medical Device (SaMD) is software that performs a medical task without being part of a hardware device.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software audit - A software audit is an internal or external review of a software program to check its quality, progress or adherence to plans, standards and regulations.
  • software license - A software license is a document that provides legally binding guidelines for the use and distribution of software.
  • software package - A software package is an assemblage of files and information about those files.
  • software resilience testing - Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.
  • software stack - A software stack is a collection of independent components that work together to support the execution of an application.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • sorting algorithm - A sorting algorithm is a method for reorganizing a large number of items into a specific order, such as alphabetical, highest-to-lowest value or shortest-to-longest distance.
  • spam confidence level (SCL) - Spam confidence level (SCL) is a numerical value indicating the likelihood that an incoming email message is spam.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • speech analytics - Speech analytics is the process of analyzing voice recordings or live customer calls to contact centers with speech recognition software to find useful information and provide quality assurance.
  • speech recognition - Speech recognition, or speech-to-text, is the ability of a machine or program to identify words spoken aloud and convert them into readable text.
  • SQL injection - A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • stack overflow - A stack overflow is a type of buffer overflow error that occurs when a computer program tries to use more memory space in the call stack than has been allocated to that stack.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • state management - Application state management is the process of maintaining knowledge of an application's inputs across multiple related data flows that form a complete business transaction -- or a session -- to understand the condition of the app at any given moment.
  • stateful app - A stateful app is a program that saves client data from the activities of one session for use in the next session.
  • stateless app - A stateless app is an application program that does not save client data generated in one session for use in the next session with that client.
  • static analysis (static code analysis) - Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity -- that is managed from a central console.
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close