A-B testing

A/B testing

A/B testing is a user experience research methodology consisting of a randomized experiment with two variants, A and B


Acronym for automated call distributor

Array slicing

In computer programming, array slicing is an operation that extracts a subset of elements from an array and packages them as another array, possibly in a different dimension from the original

Artificial neural network

Artificial neural networks are computing systems inspired by the biological neural networks that constitute animal brains


In computer programming, an assertion is a predicate connected to a point in the program that always should evaluate to true at that point in code execution

Associative array

An associative array, map, symbol table, or dictionary is an abstract data type composed of a collection of (key, value) pairs, such that each possible key appears at most once in the collection

Attribute–value pair

An attribute–value pair is a fundamental data representation in computing systems and applications

Audio frame

An audio frame is a data record that contains one sample for each of the channels available in an audio signal

Audio packet

An audio packet consists of 20 ms of 16-bit LPCM audio, and is equal to 160 contiguous single-channel audio samples

Audio sample

An audio sample is a numerical value representing the amplitude of the sound waveform at a single moment in time

Audio stream

An audio stream is a sequence of contiguous audio packets

Automated code review

Automated code review software checks source code for compliance with a predefined set of rules or best practices


Acronym for Amazon Web Services


Balanced scorecard

A balanced scorecard is a report that can be used by managers to keep track of the execution of activities by the staff within their control


In computing, bandwidth is the maximum rate of data transfer across a given path

Base URL

The consistent part of an API path, to which endpoint paths are appended


Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation

Basic access authentication

Basic access authentication is an HTTP authentication method that allows the transmission of user ID and password credentials

Bastion host

A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks

Bit rate

In telecommunications and computing, a bit rate is the number of bits that are conveyed or processed per unit of time

Black-box testing

Black-box testing is a method of software testing that examines the functionality of an application


Acronym for Binary Large OBject

Breaking change

A breaking change is a change in one part of a software system that potentially causes other components to fail

Business logic

In computer software, business logic is the part of the program that encodes the real-world business rules that determine how data can be created, stored, and changed


CA bundle

A CA bundle is a group of individual SSL certificates that are bundled together into a single file

Call transfer

A call transfer is a process of relocating an inbound call to another phone or messaging system


In Python, a callable is any object that you can call using a pair of parentheses and, optionally, a series of arguments.


A carousel is a graphical widget used to cycle through a series of visual elements


Acronym for Contact Center or Call Center


Acronym for content delivery network

Change control

Change control is a process used to ensure that changes to a product or system are introduced in a controlled and coordinated manner


Acronym for command-line interface


Click-to-call is a form of Web-based communication in which a person clicks an object (e.g., button, image or text) to request an immediate connection with another person in real-time either by phone call, VoIP, or text


Client-side refers to operations that are performed by the client in a client–server relationship in a computer network

CNAME record

A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another


A codec is a computer program which encodes or decodes a digital data stream or signal

Communication protocol

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information

Concatenated SMS

A concatenated SMS is used to overcome the limitation on the number of characters that can be sent in a single SMS text message transmission (which is usually 160)

Conference call

A conference call is a telephone call in which someone talks to several people at the same time


Acronym for central processing unit


Acronym for cross-site request forgery


Acronym for Cascading Style Sheets

CUI acronym

Acronym for conversational user interface



A dynamic application security testing tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses

Data anonymization

Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous

Data buffer

In computer science, a data buffer is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another

Data compression

In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation

Data preprocessing

Data preprocessing is a data mining and machine learning technique that involves transforming raw data into an understandable format


Datetime is a variable or data type that can hold both date and time components


Acronym for Direct distance dialing

Deployment environment

In software deployment, a deployment environment is a computer system or set of systems in which a computer program or software component is deployed and executed

Digest access authentication

Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser


Django is a Python-based free and open-source web framework


Acronym for Domain Name System

Document classification

Document classification is the task of assigning a document to one or more classes or categories


Acronym for Document Object Model


Acronym for data processing agreement


Acronym for Data Protection Officer



Acronym for end-to-end encryption


Acronym for External Machine Interface

Empty string

In computing, an empty string is a string of length zero

Entity dictionary

An entity dictionary is a collection of named entities

Entity linking

In natural language processing, entity linking (also referred to as named-entity linking, named-entity disambiguation, named-entity recognition and disambiguation, or named-entity normalization) is the task of assigning a unique identity to entities mentioned in text

Environment variable

An environment variable is a dynamic-named value that can affect the way running processes will behave on a computer


Acronym for Extract, transform, load

Exponential smoothing

Exponential smoothing is a rule of thumb technique for smoothing time series data using the exponential window function


Fact table

In data warehousing, a fact table consists of the measurements, metrics or facts of a business process

Finite-state machine

A finite-state machine is an abstract machine that can be in exactly one of a finite number of states at any given time

Focus - computing

Focus (computing)

In computing, focus indicates the act of selecting an element of a graphical user interface


Acronym for fully qualified domain name

From header field - SIP

From header field (SIP)

The From header field indicates the initiator of a SIP request, containing a URI and an optional display name



G.711 is an ITU-T standard for audio companding

Ghost call

A ghost call is a telephone call for which, when the recipient of the call answers, there is no one on the other end of the call


Git is a distributed version-control system for tracking changes in any set of files


In computer programming, glob patterns specify sets of filenames with wildcard characters


Grafana is a multi-platform open source analytics and interactive visualization web application


Acronym for graphical user interface


gzip is a file format and a software application used for file compression and decompression



In computing, hardening is the process of securing a system by reducing its surface of vulnerability

Header - computing

Header (computing)

In information technology, header refers to supplemental data placed at the beginning of a block of data being stored or transmitted

Heartbeat - computing

Heartbeat (computing)

In computer science, a heartbeat is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a computer system

HTML attribute

HTML attributes are special words used inside the opening tag to control the tag's behaviour

HTML element

An HTML element is an individual component of an HTML document or web page


Acronym for Hypertext Transfer Protocol

HTTP Location

The Location response header indicates the URL to redirect a page to

HTTP method

HTTP method indicates the desired action to be performed on the identified resource

HTTP Referer

The Referer HTTP request header contains the absolute or partial address from which a resource has been requested


Virtual agent + Human agent


Identifier - computer languages

Identifier (computer languages)

In computer languages, identifiers (IDs) are lexical tokens that name entities


Initiated by the customer

Instant messaging

Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet

Interactive banner

An interactive banner is a web banner that allows viewers to interact with it


In computer science, an invariant is a logical assertion that is always held to be true during a certain phase of execution



INVITE is a request message used to initiate a communication session between two SIP endpoints

ISO 3166

ISO 8601 is an international standard that defines codes for the names of countries, dependent territories, special areas of geographical interest, and their principal subdivisions

ISO 8601

ISO 8601 is an international standard covering the exchange of date- and time-related data


Acronym for Interactive Voice Response



JavaScript is an object-oriented computer programming language

Join - SQL

Join (SQL)

An SQL join clause combines columns from one or more tables in a relational database


Acronym for JavaScript Object Notation


Acronym for JSON Web Token



Abbreviation for kilobit per second


A keepalive is a message sent by one device to another to check that the link between the two is operating, or to prevent the link from being broken



Acronym for local area network

Let's Encrypt

Let's Encrypt is a non-profit certificate authority


Locale (computer software)

In computing, a locale is a set of parameters that defines the user's language, region and any special variant preferences that the user wants to see in their user interface


In computer networking, localhost is a hostname that refers to the current device used to access it


Acronym for linear pulse-code modulation


Machine to machine

Machine to machine (M2M) is direct communication between devices using any communications channel


Abbreviation for megabit per second

Media type

A media type (formerly known as MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet

Message broker

A message broker is an intermediary computer program module that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver


A metadatum is a piece of information describing a piece of data


Acronym for machine learning


Abbreviation for millisecond


Acronym for Mobile Subscriber ISDN Number

Multitier architecture

In software engineering, a multitier architecture is a client–server architecture in which presentation, application processing and data management functions are physically separated

Music on hold

Music on hold (MOH) is the business practice of playing recorded music to fill the silence that would be heard by telephone callers who have been placed on hold

Mutator method

In computer science, a mutator method is a method used to control changes to a variable. They are also widely known as setter methods. Often a setter is accompanied by a getter (also known as an accessor), which returns the value of the private member variable.


Named entity

In information extraction, a named entity is a real-world object, such as persons, locations, organizations, products, etc., that can be denoted with a proper name.

Named-entity recognition

Named-entity recognition is a subtask of information extraction that seeks to locate and classify named entity mentions in unstructured text into pre-defined categories such as person names, organizations, locations, time expressions, quantities, monetary values, percentages, etc.


Acronym for network address translation

Natural language processing

Natural language processing (NLP) is a subfield of linguistics, computer science, and artificial intelligence concerned with the interactions between computers and human language, in particular how to program computers to process and analyze large amounts of natural language data


Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache


Acronym for natural language processing

Non-speech audio packet

An audio packet for which the VAD processor returned a false value, or its energy value is < energy_threshold (i.e., silence or background noise)


Acronym for Network Time Protocol

Null - SQL

Null (SQL)

Null (or NULL) is a special marker used in Structured Query Language to indicate that a data value does not exist in the database

Null pointer

In computing, a null pointer has a value reserved for indicating that the pointer or reference does not refer to a valid object

Nullable type

In computing, a nullable type allows a value to be set to the special value NULL instead of the usual possible values of a data type



OAuth is an open standard for access delegation

Opaque data type

An opaque data type is a data type whose concrete data structure is not defined in an interface


Acronym for one-time password


Initiated by Enuan Platform



Parsing is the process of analyzing a string of symbols, usually in the form of text, in order to determine its structure and meaning according to a set of predefined rules or grammar

PATH variable

PATH is an environment variable on Unix-like operating systems, DOS, OS/2, and Microsoft Windows, specifying a set of directories where executable programs are located


In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message (headers and metadata are sent only to enable payload delivery)


Acronym for private branch exchange


Acronym for pulse-code modulation

Penetration test

A penetration test is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system

Personal data

Personal data, also known as personal information or personally identifiable information, is any information relating to an identifiable person


In computing, a pointer is a graphical image on a display device that echoes the movements of a pointing device


POST is a request method supported by HTTP


In web development, a postback is the exchange of information between servers to report a user's action on a website, network, or app


PostgreSQL is a free and open-source relational database management system


Abbreviation for packets per second, a measure of throughput

Primary key

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records

Product demonstration

In marketing, a product demonstration is a promotion where a product is demonstrated to potential customers

Production environment

Production is the deployment environment where changes go "live" and that users directly interact with

Proxy server

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource

Public key certificate

In cryptography, a public key certificate is an electronic document used to prove the validity of a public key


QR code

A QR code is a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone



Acronym for random-access memory


Acronym for Rich Communication Services

React - JavaScript library

React (JavaScript library)

React is an open-source, front end, JavaScript library for building user interfaces or UI components

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

Reverse proxy

In computer networks, a reverse proxy is an application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications

Root mean square

In mathematics and its applications, the root mean square of a set of numbers is defined as the square root of the mean square (the arithmetic mean of the squares) of the set


RSA is a public-key cryptosystem that is widely used for secure data transmission


Sankey diagram

A sankey diagram is a type of flow diagram in which the width of the arrows is proportional to the flow rate


Static application security testing is part of technologies used to secure software by reviewing the source code of the software to identify sources of vulnerabilities


Acronym for Secure copy protocol


Acronym for software development kit


In computing, serialization is the process of translating a data structure or object state into a format that can be stored or transmitted and reconstructed later


Acronym for SSH File Transfer Protocol


Acronym for Secure Hash Algorithm 1


Acronym for Secure Hash Algorithm 2

Shared secret

In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication.

Silent call

A silent call is a telephone call in which the caller does not speak when the call is answered

Single sign-on

Single sign-on is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems


Acronym for Session Initiation Protocol

SIP trunking

SIP trunking is a Voice over Internet Protocol technology and streaming media service based on the Session Initiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equipped with SIP-based private branch exchange and unified communications facilities

SIP URI scheme

The SIP URI scheme is a Uniform Resource Identifier (URI) scheme for the Session Initiation Protocol (SIP) multimedia communications protocol

SIP user agent

A SIP user agent is a logical network endpoint that sends or receives SIP messages and manages SIP sessions


Acronym for service-level agreement


Acronym for Short Message Peer-to-Peer


Acronym for short message service


Acronym for Short Message Service Center


Acronym for signal-to-noise ratio

Social media

Social media are interactive technologies that allow the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks

Software framework

In computer programming, a software framework is a platform where common code with generic functionality can be selectively specialized or overridden by users

Software widget

A software widget is a relatively simple and easy-to-use software application or component made for one or more different software platforms

Sound energy

The amount of energy carried by a sound wave

Source-code editor

A source-code editor is a text editor program designed specifically for editing source code of computer programs

Speech audio packet

An audio packet for which the VAD processor returned a true value, and its energy value is ≥ energy_threshold

Speech recognition

Speech recognition is the recognition and translation of spoken language into text by computers

Speech synthesis

Speech synthesis is the artificial production of human speech


Acronym for Secure Shell


Acronym for Secure Sockets Layer


Acronym for speech-to-text, also known as automatic speech recognition (ASR)


A substring is a contiguous sequence of characters within a string.


In computing, the superuser is a special user account used for system administration



Acronym for to be determined

Technology demonstration

A technology demonstration is a prototype, rough example or an otherwise incomplete version of a conceivable product or future system, put together as proof of concept with the primary purpose of showcasing the possible applications, feasibility, performance and method of an idea for a new technology

Template processor

A template processor is software designed to combine templates with a data model to produce result documents

Text box

A text box is a control element of a graphical user interface, that enables a user to input text information to be used by a program

Text editor

A text editor is a type of computer program that edits plain text

Thread pool

In computer programming, a thread pool is a software design pattern for achieving concurrency of execution in a computer program


In the context of communication networks, throughput is the rate of successful message delivery over a communication channel

Timing attack

In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms


Acronym for Transport Layer Security


In software engineering, tracing involves a specialized use of logging to record information about a program's execution

Tree view

A tree view or an outline view is a graphical control element that presents a hierarchical view of information


Acronym for text-to-speech


TURN (protocol)

Acronym for Traversal Using Relays around NAT



Acronym for Universal Computer Protocol


Acronym for User Datagram Protocol


Acronym for user identifier


Not open to more than one interpretation (also see this definition)

Unit of time

A unit of time is any particular time interval, used as a standard way of measuring or expressing duration

Unix domain socket

A Unix domain socket is a data communications endpoint for exchanging data between processes executing on the same host operating system

Unix time

Unix time is an approximation of the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970

Unstructured data

Unstructured data is information that either does not have a pre-defined data model or is not organized in a pre-defined manner

User agent

In computing, a user agent is any software, acting on behalf of a user, which retrieves, renders and facilitates end-user interaction with Web content

User-Agent header

In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request


Acronym for Coordinated Universal Time


UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.



Acronym for voice activity detection

Version control

In software engineering, version control is a class of systems responsible for managing changes to source code

Virtual assistant

A virtual assistant is a software agent that can perform tasks or services for an individual based on commands or question

Virtual network interface

A virtual network interface is an abstract virtualized representation of a computer network interface

Visual IVR

Acronym for Visual Interactive Voice Response


Acronym for Voice over Internet Protocol


Acronym for virtual private cloud


Acronym for virtual private network

Vulnerability scanner

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses



Abbreviation for Waveform Audio File Format

Web chat

A web chat is a type of Internet online chat that allows users to communicate in real-time using easily accessible web interfaces

Web development tools

Web development tools (often called devtools or inspect element) allow web developers to test and debug their code

Web Messaging

Web Messaging allows documents to communicate with one another across different origins, or source domains while rendered in a web browser

Web service

A Web service is a software system for the interoperable machine-to-machine communication over a network

Web widget

A web widget is a web page or web application that is embedded as an element of a host web page but which is substantially independent of the host page, having limited or no interaction with the host


A webhook is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks


Acronym for Web Real-Time Communication


WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection.

White-box testing

White-box testing is a method of software testing that tests internal structures or workings of an application


Acronym for WebSocket


Acronym for WebSocket Secure




YAML is a human-readable data-serialization language that is commonly used for configuration files