Glossary

A

A-B testing

A/B testing

A/B testing is a user experience research methodology consisting of a randomized experiment with two variants, A and B

ACD

Acronym for automated call distributor

Array slicing

In computer programming, array slicing is an operation that extracts a subset of elements from an array and packages them as another array, possibly in a different dimension from the original

Artificial neural network

Artificial neural networks are computing systems inspired by the biological neural networks that constitute animal brains

Assertion

In computer programming, an assertion is a predicate connected to a point in the program that always should evaluate to true at that point in code execution

Associative array

An associative array, map, symbol table, or dictionary is an abstract data type composed of a collection of (key, value) pairs, such that each possible key appears at most once in the collection

Attribute–value pair

An attribute–value pair is a fundamental data representation in computing systems and applications

Audio frame

An audio frame is a data record that contains one sample for each of the channels available in an audio signal

Audio packet

An audio packet consists of 20 ms of 16-bit LPCM audio, and is equal to 160 contiguous single-channel audio samples

Audio sample

An audio sample is a numerical value representing the amplitude of the sound waveform at a single moment in time

Audio stream

An audio stream is a sequence of contiguous audio packets

Automated code review

Automated code review software checks source code for compliance with a predefined set of rules or best practices

AWS

Acronym for Amazon Web Services

B

Balanced scorecard

A balanced scorecard is a report that can be used by managers to keep track of the execution of activities by the staff within their control

Bandwidth

In computing, bandwidth is the maximum rate of data transfer across a given path

Base URL

The consistent part of an API path, to which endpoint paths are appended

Base64

Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation

Basic access authentication

Basic access authentication is an HTTP authentication method that allows the transmission of user ID and password credentials

Bastion host

A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks

Bit rate

In telecommunications and computing, a bit rate is the number of bits that are conveyed or processed per unit of time

Black-box testing

Black-box testing is a method of software testing that examines the functionality of an application

BLOB

Acronym for Binary Large OBject

Breaking change

A breaking change is a change in one part of a software system that potentially causes other components to fail

Brute-force attack

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly

Business logic

In computer software, business logic is the part of the program that encodes the real-world business rules that determine how data can be created, stored, and changed

C

CA bundle

A CA bundle is a group of individual SSL certificates that are bundled together into a single file

Call transfer

A call transfer is a process of relocating an inbound call to another phone or messaging system

Callable

In Python, a callable is any object that you can call using a pair of parentheses and, optionally, a series of arguments.

Carousel

A carousel is a graphical widget used to cycle through a series of visual elements

CC

Acronym for Contact Center or Call Center

CDN

Acronym for content delivery network

Change control

Change control is a process used to ensure that changes to a product or system are introduced in a controlled and coordinated manner

CLI

Acronym for command-line interface

Click-to-call

Click-to-call is a form of Web-based communication in which a person clicks an object (e.g., button, image or text) to request an immediate connection with another person in real-time either by phone call, VoIP, or text

Client-side

Client-side refers to operations that are performed by the client in a client–server relationship in a computer network

CNAME record

A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another

Codec

A codec is a computer program which encodes or decodes a digital data stream or signal

Communication protocol

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information

Concatenated SMS

A concatenated SMS is used to overcome the limitation on the number of characters that can be sent in a single SMS text message transmission (which is usually 160)

Conference call

A conference call is a telephone call in which someone talks to several people at the same time

CPU

Acronym for central processing unit

CSRF

Acronym for cross-site request forgery

CSS

Acronym for Cascading Style Sheets

CUI acronym

Acronym for conversational user interface

D

DAST

A dynamic application security testing tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses

Data anonymization

Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous

Data buffer

In computer science, a data buffer is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another

Data compression

In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation

Data preprocessing

Data preprocessing is a data mining and machine learning technique that involves transforming raw data into an understandable format

Datetime

Datetime is a variable or data type that can hold both date and time components

DDD

Acronym for Direct distance dialing

Deployment environment

In software deployment, a deployment environment is a computer system or set of systems in which a computer program or software component is deployed and executed

Digest access authentication

Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser

Django

Django is a Python-based free and open-source web framework

DNS

Acronym for Domain Name System

Document classification

Document classification is the task of assigning a document to one or more classes or categories

DOM

Acronym for Document Object Model

DPA

Acronym for data processing agreement

DPO

Acronym for Data Protection Officer

E

E2EE

Acronym for end-to-end encryption

EMI

Acronym for External Machine Interface

Empty string

In computing, an empty string is a string of length zero

Entity dictionary

An entity dictionary is a collection of named entities

Entity linking

In natural language processing, entity linking (also referred to as named-entity linking, named-entity disambiguation, named-entity recognition and disambiguation, or named-entity normalization) is the task of assigning a unique identity to entities mentioned in text

Environment variable

An environment variable is a dynamic-named value that can affect the way running processes will behave on a computer

ETL

Acronym for Extract, transform, load

Exponential smoothing

Exponential smoothing is a rule of thumb technique for smoothing time series data using the exponential window function

F

Fact table

In data warehousing, a fact table consists of the measurements, metrics or facts of a business process

Finite-state machine

A finite-state machine is an abstract machine that can be in exactly one of a finite number of states at any given time

Focus - computing

Focus (computing)

In computing, focus indicates the act of selecting an element of a graphical user interface

FQDN

Acronym for fully qualified domain name

From header field - SIP

From header field (SIP)

The From header field indicates the initiator of a SIP request, containing a URI and an optional display name

G

G.711

G.711 is an ITU-T standard for audio companding

Ghost call

A ghost call is a telephone call for which, when the recipient of the call answers, there is no one on the other end of the call

Git

Git is a distributed version-control system for tracking changes in any set of files

Glob

In computer programming, glob patterns specify sets of filenames with wildcard characters

Grafana

Grafana is a multi-platform open source analytics and interactive visualization web application

GUI

Acronym for graphical user interface

gzip

gzip is a file format and a software application used for file compression and decompression

H

Hardening

In computing, hardening is the process of securing a system by reducing its surface of vulnerability

Header - computing

Header (computing)

In information technology, header refers to supplemental data placed at the beginning of a block of data being stored or transmitted

Heartbeat - computing

Heartbeat (computing)

In computer science, a heartbeat is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a computer system

HTML attribute

HTML attributes are special words used inside the opening tag to control the tag's behaviour

HTML element

An HTML element is an individual component of an HTML document or web page

HTTP

Acronym for Hypertext Transfer Protocol

HTTP Location

The Location response header indicates the URL to redirect a page to

HTTP method

HTTP method indicates the desired action to be performed on the identified resource

HTTP Referer

The Referer HTTP request header contains the absolute or partial address from which a resource has been requested

Hybrid

Virtual agent + Human agent

I

Identifier - computer languages

Identifier (computer languages)

In computer languages, identifiers (IDs) are lexical tokens that name entities

Inbound

Initiated by the customer

Instant messaging

Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet

Interactive banner

An interactive banner is a web banner that allows viewers to interact with it

Invariant

In computer science, an invariant is a logical assertion that is always held to be true during a certain phase of execution

INVITE - SIP

INVITE (SIP)

INVITE is a request message used to initiate a communication session between two SIP endpoints

ISO 3166

ISO 8601 is an international standard that defines codes for the names of countries, dependent territories, special areas of geographical interest, and their principal subdivisions

ISO 8601

ISO 8601 is an international standard covering the exchange of date- and time-related data

IVR

Acronym for Interactive Voice Response

J

JavaScript

JavaScript is an object-oriented computer programming language

Join - SQL

Join (SQL)

An SQL join clause combines columns from one or more tables in a relational database

JSON

Acronym for JavaScript Object Notation

JWT

Acronym for JSON Web Token

K

kbps

Abbreviation for kilobit per second

Keepalive

A keepalive is a message sent by one device to another to check that the link between the two is operating, or to prevent the link from being broken

L

LAN

Acronym for local area network

Let's Encrypt

Let's Encrypt is a non-profit certificate authority

Locale

Locale (computer software)

In computing, a locale is a set of parameters that defines the user's language, region and any special variant preferences that the user wants to see in their user interface

localhost

In computer networking, localhost is a hostname that refers to the current device used to access it

LPCM

Acronym for linear pulse-code modulation

M

Machine to machine

Machine to machine (M2M) is direct communication between devices using any communications channel

Mbps

Abbreviation for megabit per second

Media type

A media type (formerly known as MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet

Message broker

A message broker is an intermediary computer program module that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver

Metadatum

A metadatum is a piece of information describing a piece of data

ML

Acronym for machine learning

ms

Abbreviation for millisecond

MSISDN

Acronym for Mobile Subscriber ISDN Number

Multitier architecture

In software engineering, a multitier architecture is a client–server architecture in which presentation, application processing and data management functions are physically separated

Music on hold

Music on hold (MOH) is the business practice of playing recorded music to fill the silence that would be heard by telephone callers who have been placed on hold

Mutator method

In computer science, a mutator method is a method used to control changes to a variable. They are also widely known as setter methods. Often a setter is accompanied by a getter (also known as an accessor), which returns the value of the private member variable.

N

Named entity

In information extraction, a named entity is a real-world object, such as persons, locations, organizations, products, etc., that can be denoted with a proper name.

Named-entity recognition

Named-entity recognition is a subtask of information extraction that seeks to locate and classify named entity mentions in unstructured text into pre-defined categories such as person names, organizations, locations, time expressions, quantities, monetary values, percentages, etc.

NAT

Acronym for network address translation

Natural language processing

Natural language processing (NLP) is a subfield of linguistics, computer science, and artificial intelligence concerned with the interactions between computers and human language, in particular how to program computers to process and analyze large amounts of natural language data

Nginx

Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache

NLP

Acronym for natural language processing

Non-speech audio packet

An audio packet for which the VAD processor returned a false value, or its energy value is < energy_threshold (i.e., silence or background noise)

NTP

Acronym for Network Time Protocol

Null - SQL

Null (SQL)

Null (or NULL) is a special marker used in Structured Query Language to indicate that a data value does not exist in the database

Null pointer

In computing, a null pointer has a value reserved for indicating that the pointer or reference does not refer to a valid object

Nullable type

In computing, a nullable type allows a value to be set to the special value NULL instead of the usual possible values of a data type

O

OAuth

OAuth is an open standard for access delegation

Opaque data type

An opaque data type is a data type whose concrete data structure is not defined in an interface

OTP

Acronym for one-time password

outbound

Initiated by Enuan Platform

P

Parsing

Parsing is the process of analyzing a string of symbols, usually in the form of text, in order to determine its structure and meaning according to a set of predefined rules or grammar

PATH variable

PATH is an environment variable on Unix-like operating systems, DOS, OS/2, and Microsoft Windows, specifying a set of directories where executable programs are located

Payload

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message (headers and metadata are sent only to enable payload delivery)

PBX

Acronym for private branch exchange

PCM

Acronym for pulse-code modulation

Penetration test

A penetration test is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system

Personal data

Personal data, also known as personal information or personally identifiable information, is any information relating to an identifiable person

Pointer

In computing, a pointer is a graphical image on a display device that echoes the movements of a pointing device

POST

POST is a request method supported by HTTP

Postback

In web development, a postback is the exchange of information between servers to report a user's action on a website, network, or app

PostgreSQL

PostgreSQL is a free and open-source relational database management system

pps

Abbreviation for packets per second, a measure of throughput

Primary key

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records

Product demonstration

In marketing, a product demonstration is a promotion where a product is demonstrated to potential customers

Production environment

Production is the deployment environment where changes go "live" and that users directly interact with

Proxy server

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource

Public key certificate

In cryptography, a public key certificate is an electronic document used to prove the validity of a public key

Q

QR code

A QR code is a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone

R

RAM

Acronym for random-access memory

RCS

Acronym for Rich Communication Services

React - JavaScript library

React (JavaScript library)

React is an open-source, front end, JavaScript library for building user interfaces or UI components

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

Reverse proxy

In computer networks, a reverse proxy is an application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications

Root mean square

In mathematics and its applications, the root mean square of a set of numbers is defined as the square root of the mean square (the arithmetic mean of the squares) of the set

RSA

RSA is a public-key cryptosystem that is widely used for secure data transmission

S

Sankey diagram

A sankey diagram is a type of flow diagram in which the width of the arrows is proportional to the flow rate

SAST

Static application security testing is part of technologies used to secure software by reviewing the source code of the software to identify sources of vulnerabilities

SCP

Acronym for Secure copy protocol

SDK

Acronym for software development kit

Serialization

In computing, serialization is the process of translating a data structure or object state into a format that can be stored or transmitted and reconstructed later

SFTP

Acronym for SSH File Transfer Protocol

SHA-1

Acronym for Secure Hash Algorithm 1

SHA-2

Acronym for Secure Hash Algorithm 2

Shared secret

In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication.

Shoulder surfing

In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as PINs, passwords and other confidential data by looking over the victim's shoulder

Silent call

A silent call is a telephone call in which the caller does not speak when the call is answered

Single sign-on

Single sign-on is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems

SIP

Acronym for Session Initiation Protocol

SIP trunking

SIP trunking is a Voice over Internet Protocol technology and streaming media service based on the Session Initiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equipped with SIP-based private branch exchange and unified communications facilities

SIP URI scheme

The SIP URI scheme is a Uniform Resource Identifier (URI) scheme for the Session Initiation Protocol (SIP) multimedia communications protocol

SIP user agent

A SIP user agent is a logical network endpoint that sends or receives SIP messages and manages SIP sessions

SLA

Acronym for service-level agreement

SMPP

Acronym for Short Message Peer-to-Peer

SMS

Acronym for short message service

SMSC

Acronym for Short Message Service Center

Smudge attack

A smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a smartphone or tablet computer from fingerprint smudges

SNR

Acronym for signal-to-noise ratio

Social media

Social media are interactive technologies that allow the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks

Software framework

In computer programming, a software framework is a platform where common code with generic functionality can be selectively specialized or overridden by users

Software widget

A software widget is a relatively simple and easy-to-use software application or component made for one or more different software platforms

Sound energy

The amount of energy carried by a sound wave

Source-code editor

A source-code editor is a text editor program designed specifically for editing source code of computer programs

Speech audio packet

An audio packet for which the VAD processor returned a true value, and its energy value is ≥ energy_threshold

Speech recognition

Speech recognition is the recognition and translation of spoken language into text by computers

Speech synthesis

Speech synthesis is the artificial production of human speech

Spoofing attack

In information security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage

SSH

Acronym for Secure Shell

SSL

Acronym for Secure Sockets Layer

STT

Acronym for speech-to-text, also known as automatic speech recognition (ASR)

Substring

A substring is a contiguous sequence of characters within a string.

Superuser

In computing, the superuser is a special user account used for system administration

Synthetic data

Synthetic data is information that is artificially generated rather than produced by real-world events

T

TBD

Acronym for to be determined

Technology demonstration

A technology demonstration is a prototype, rough example or an otherwise incomplete version of a conceivable product or future system, put together as proof of concept with the primary purpose of showcasing the possible applications, feasibility, performance and method of an idea for a new technology

Template processor

A template processor is software designed to combine templates with a data model to produce result documents

Text box

A text box is a control element of a graphical user interface, that enables a user to input text information to be used by a program

Text editor

A text editor is a type of computer program that edits plain text

Thread pool

In computer programming, a thread pool is a software design pattern for achieving concurrency of execution in a computer program

Throughput

In the context of communication networks, throughput is the rate of successful message delivery over a communication channel

Timing attack

In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms

TLS

Acronym for Transport Layer Security

Tracing

In software engineering, tracing involves a specialized use of logging to record information about a program's execution

Tree view

A tree view or an outline view is a graphical control element that presents a hierarchical view of information

TTS

Acronym for text-to-speech

TURN_protocol

TURN (protocol)

Acronym for Traversal Using Relays around NAT

U

UCP

Acronym for Universal Computer Protocol

UDP

Acronym for User Datagram Protocol

UID

Acronym for user identifier

unambiguous

Not open to more than one interpretation (also see this definition)

Unit of time

A unit of time is any particular time interval, used as a standard way of measuring or expressing duration

Unix domain socket

A Unix domain socket is a data communications endpoint for exchanging data between processes executing on the same host operating system

Unix time

Unix time is an approximation of the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970

Unstructured data

Unstructured data is information that either does not have a pre-defined data model or is not organized in a pre-defined manner

User agent

In computing, a user agent is any software, acting on behalf of a user, which retrieves, renders and facilitates end-user interaction with Web content

User-Agent header

In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request

UTC

Acronym for Coordinated Universal Time

UTF-8

UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.

V

VAD

Acronym for voice activity detection

Version control

In software engineering, version control is a class of systems responsible for managing changes to source code

Virtual assistant

A virtual assistant is a software agent that can perform tasks or services for an individual based on commands or question

Virtual network interface

A virtual network interface is an abstract virtualized representation of a computer network interface

Visual IVR

Acronym for Visual Interactive Voice Response

VoIP

Acronym for Voice over Internet Protocol

VPC

Acronym for virtual private cloud

VPN

Acronym for virtual private network

Vulnerability scanner

A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses

W

WAV

Abbreviation for Waveform Audio File Format

Web chat

A web chat is a type of Internet online chat that allows users to communicate in real-time using easily accessible web interfaces

Web development tools

Web development tools (often called devtools or inspect element) allow web developers to test and debug their code

Web Messaging

Web Messaging allows documents to communicate with one another across different origins, or source domains while rendered in a web browser

Web service

A Web service is a software system for the interoperable machine-to-machine communication over a network

Web widget

A web widget is a web page or web application that is embedded as an element of a host web page but which is substantially independent of the host page, having limited or no interaction with the host

Webhook

A webhook is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks

WebRTC

Acronym for Web Real-Time Communication

WebSocket

WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection.

White-box testing

White-box testing is a method of software testing that tests internal structures or workings of an application

WS

Acronym for WebSocket

WSS

Acronym for WebSocket Secure

X

Y

YAML

YAML is a human-readable data-serialization language that is commonly used for configuration files

Z

Zero-day vulnerability

A zero-day is a vulnerability in software or hardware that is typically unknown to the vendor and for which no patch or other fix is available