Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Advertising campaign

An advertising campaign is a series of advertisement messages that promote a product or service

Assertion

In computer programming, an assertion is a predicate connected to a point in the program that always should evaluate to true at that point in code execution

Associative array

An associative array, map, symbol table, or dictionary is an abstract data type composed of a collection of (key, value) pairs, such that each possible key appears at most once in the collection

Attribute–value pair

An attribute–value pair is a fundamental data representation in computing systems and applications

Automated code review

Automated code review software checks source code for compliance with a predefined set of rules or best practices

AWS

Acronym for Amazon Web Services

B

Balanced scorecard

A balanced scorecard is a report that can be used by managers to keep track of the execution of activities by the staff within their control

Bandwidth

In computing, bandwidth is the maximum rate of data transfer across a given path

Base64

Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation

Basic access authentication

Basic access authentication is an HTTP authentication method that allows the transmission of user ID and password credentials

Bastion host

A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks

Black-box testing

Black-box testing is a method of software testing that examines the functionality of an application

C

CC

Acronym for Contact Center or Call Center

CLI

Acronym for command-line interface

CNAME record

A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another

Codec

A codec is a computer program which encodes or decodes a digital data stream or signal

Concatenated SMS

A concatenated SMS is used to overcome the limitation on the number of characters that can be sent in a single SMS text message transmission (which is usually 160)

CRM classify

An intent classification system specific to certain CRMs

CSRF

Acronym for cross-site request forgery

D

DAST

A dynamic application security testing tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses

DDD

Acronym for Direct distance dialing

Django

Django is a Python-based free and open-source web framework

DNS

Acronym for Domain Name System

Document classification

Document classification is the task of assigning a document to one or more classes or categories

DOM

Acronym for Document Object Model

Doublet

An intent classification system specific to certain CRMs

DPA

Acronym for data processing agreement

DPO

Acronym for Data Protection Officer

E

EMI

Acronym for External Machine Interface

Empty string

In computing, an empty string is a string of length zero

Entity dictionary

An entity dictionary is a collection of named entities

Environment variable

An environment variable is a dynamic-named value that can affect the way running processes will behave on a computer

ETL

Acronym for Extract, transform, load

F

Fact table

In data warehousing, a fact table consists of the measurements, metrics or facts of a business process

Focus

In computing, focus indicates the act of selecting an element of a graphical user interface

FQDN

Acronym for fully qualified domain name

G

G.711

G.711 is an ITU-T standard for audio companding

H

Hardening

In computing, hardening is the process of securing a system by reducing its surface of vulnerability

HTML attribute

HTML attributes are special words used inside the opening tag to control the tag's behaviour

HTML element

An HTML element is an individual component of an HTML document or web page

HTTP method

HTTP method indicates the desired action to be performed on the identified resource

HTTP referer

A referer is an HTTP header field that identifies the address of the webpage that linked to the resource being requested

HTTP User agent

A user agent is an HTTP string used for content negotiation

Hybrid

Virtual agent + Human agent

I

Identifier

Identifiers (IDs) are lexical tokens that name entities

Inbound

Initiated by the customer

Invariant

In computer science, an invariant is a logical assertion that is always held to be true during a certain phase of execution

ISO 8601

ISO 8601 is an international standard covering the exchange of date- and time-related data

IVR

Acronym for Interactive Voice Response

J

Join

An SQL join clause combines columns from one or more tables in a relational database

JSON

Acronym for JavaScript Object Notation

JWT

Acronym for JSON Web Token

K

kbps

Acronym for kilobit per second

L

LAN

Acronym for local area network

Let's Encrypt

Let's Encrypt is a non-profit certificate authority

M

Mbps

Acronym for megabit per second

Media type

A media type (formerly known as MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet

Metadatum

A metadatum is a piece of information describing a piece of data

ML

Acronym for machine learning

ms

Acronym for millisecond

MSISDN

Acronym for Mobile Subscriber ISDN Number

Multitier architecture

In software engineering, a multitier architecture is a client–server architecture in which presentation, application processing and data management functions are physically separated

Music on hold

Music on hold (MOH) is the business practice of playing recorded music to fill the silence that would be heard by telephone callers who have been placed on hold

N

Named entity

In information extraction, a named entity is a real-world object, such as persons, locations, organizations, products, etc., that can be denoted with a proper name.

Named-entity recognition

Named-entity recognition is a subtask of information extraction that seeks to locate and classify named entity mentions in unstructured text into pre-defined categories such as person names, organizations, locations, time expressions, quantities, monetary values, percentages, etc.

NAT

Acronym for network address translation

NLP

Acronym for natural language processing

NTP

Acronym for Network Time Protocol

Null (SQL)

Null (or NULL) is a special marker used in Structured Query Language to indicate that a data value does not exist in the database

Null pointer

In computing, a null pointer has a value reserved for indicating that the pointer or reference does not refer to a valid object

Nullable type

In computing, a nullable type allows a value to be set to the special value NULL instead of the usual possible values of a data type

O

Opaque data type

An opaque data type is a data type whose concrete data structure is not defined in an interface

OTP

Acronym for one-time password

outbound

Initiated by the Enuan platform

P

PBX

Acronym for private branch exchange

PCM

Acronym for pulse-code modulation

Penetration test

A penetration test is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system

POST

POST is a request method supported by HTTP

PostgreSQL

PostgreSQL is a free and open-source relational database management system

pps

Acronym for packets per second, a measure of throughput

Primary key

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records

Production environment

Production is the deployment environment where changes go "live" and that users directly interact with

Q

QR code

A QR code is a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone

R

RCS

Acronym for Rich Communication Services

React

React is an open-source, front end, JavaScript library for building user interfaces or UI components

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

RSA

RSA is a public-key cryptosystem that is widely used for secure data transmission

S

SAST

Static application security testing is part of technologies used to secure software by reviewing the source code of the software to identify sources of vulnerabilities

SCP

Acronym for Secure copy protocol

SDK

Acronym for software development kit

SFTP

Acronym for SSH File Transfer Protocol

SHA-2

Acronym for Secure Hash Algorithm 2

SIP

Acronym for Session Initiation Protocol

SIP URI scheme

The SIP URI scheme is a Uniform Resource Identifier (URI) scheme for the Session Initiation Protocol (SIP) multimedia communications protocol

SLA

Acronym for service-level agreement

SMPP

Acronym for Short Message Peer-to-Peer

SMS

Acronym for short message service

SMSC

Acronym for Short Message Service Center

Speech recognition

Speech recognition is the recognition and translation of spoken language into text by computers

Speech synthesis

Speech synthesis is the artificial production of human speech

SSH

Acronym for Secure Shell

SSL

Acronym for Secure Sockets Layer

STT

Acronym for speech-to-text, also known as automatic speech recognition (ASR)

Superuser

In computing, the superuser is a special user account used for system administration

T

TLS

Acronym for Transport Layer Security

Tracing

In software engineering, tracing involves a specialized use of logging to record information about a program's execution

Tree view

A tree view or an outline view is a graphical control element that presents a hierarchical view of information

Triplet

An intent classification system specific to certain CRMs

TTS

Acronym for text-to-speech

U

UCP

Acronym for Universal Computer Protocol

UID

Acronym for user identifier

unambiguous

Not open to more than one interpretation (also see this definition)

Unix time

Unix time is an approximation of the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970

UTC

Acronym for Coordinated Universal Time

UTF-8

UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.

V

VAD

Acronym for voice activity detection

Visual IVR

Acronym for Visual Interactive Voice Response

VoIP

Acronym for Voice over Internet Protocol

VPC

Acronym for virtual private cloud

VPN

Acronym for virtual private network

Vulnerability scanner

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses

W

WAV

Abbreviation for Waveform Audio File Format

Web Messaging

Web Messaging allows documents to communicate with one another across different origins, or source domains while rendered in a web browser

Webhook

A webhook is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks

White-box testing

White-box testing is a method of software testing that tests internal structures or workings of an application

X

Y

YAML

YAML is a human-readable data-serialization language.