A/B testing
A/B testing is a user experience research methodology consisting of a randomized experiment with two variants, A and B
AAI
Acronym for Authentication and Authorization Infrastructure
ACD
Acronym for automated call distributor
AIaaS
Acronym for Artificial Intelligence as a Service
AMQP
Acronym for Advanced Message Queuing Protocol
API
Acronym for application programming interface
Array slicing
In computer programming, array slicing is an operation that extracts a subset of elements from an array and packages them as another array, possibly in a different dimension from the original
Artificial neural network
Artificial neural networks are computing systems inspired by the biological neural networks that constitute animal brains
ASR
Acronym for automatic speech recognition
Assertion
In computer programming, an assertion is a predicate connected to a point in the program that always should evaluate to true at that point in code execution
Associative array
An associative array, map, symbol table, or dictionary is an abstract data type composed of a collection of (key, value) pairs, such that each possible key appears at most once in the collection
Attribute–value pair
An attribute–value pair is a fundamental data representation in computing systems and applications
Audio frame
An audio frame is a data record that contains one sample for each of the channels available in an audio signal
Audio packet
An audio packet consists of 20 ms of 16-bit LPCM audio, and is equal to 160 contiguous single-channel audio samples
Audio sample
An audio sample is a numerical value representing the amplitude of the sound waveform at a single moment in time
Audio stream
An audio stream is a sequence of contiguous audio packets
Automated code review
Automated code review software checks source code for compliance with a predefined set of rules or best practices
AWS
Acronym for Amazon Web Services
Balanced scorecard
A balanced scorecard is a report that can be used by managers to keep track of the execution of activities by the staff within their control
Bandwidth
In computing, bandwidth is the maximum rate of data transfer across a given path
Base URL
The consistent part of an API path, to which endpoint paths are appended
Base64
Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation
Basic access authentication
Basic access authentication is an HTTP authentication method that allows the transmission of user ID and password credentials
Bastion host
A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks
Bit rate
In telecommunications and computing, a bit rate is the number of bits that are conveyed or processed per unit of time
Black-box testing
Black-box testing is a method of software testing that examines the functionality of an application
BLOB
Acronym for Binary Large OBject
Breaking change
A breaking change is a change in one part of a software system that potentially causes other components to fail
Brute-force attack
In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
Business logic
In computer software, business logic is the part of the program that encodes the real-world business rules that determine how data can be created, stored, and changed
CA bundle
A CA bundle is a group of individual SSL certificates that are bundled together into a single file
Call transfer
A call transfer is a process of relocating an inbound call to another phone or messaging system
Callable
In Python, a callable is any object that you can call using a pair of parentheses and, optionally, a series of arguments.
Carousel
A carousel is a graphical widget used to cycle through a series of visual elements
CC
Acronym for Contact Center or Call Center
CDN
Acronym for content delivery network
Change control
Change control is a process used to ensure that changes to a product or system are introduced in a controlled and coordinated manner
CLI
Acronym for command-line interface
Click-to-call
Click-to-call is a form of Web-based communication in which a person clicks an object (e.g., button, image or text) to request an immediate connection with another person in real-time either by phone call, VoIP, or text
Client-side
Client-side refers to operations that are performed by the client in a client–server relationship in a computer network
CNAME record
A Canonical Name record is a type of resource record in the Domain Name System that maps one domain name to another
Codec
A codec is a computer program which encodes or decodes a digital data stream or signal
Communication protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information
Concatenated SMS
A concatenated SMS is used to overcome the limitation on the number of characters that can be sent in a single SMS text message transmission (which is usually 160)
Conference call
A conference call is a telephone call in which someone talks to several people at the same time
CORS
Acronym for Cross-origin resource sharing
CPaaS
Acronym for Communications Platform as a Service
CPU
Acronym for central processing unit
CRUD
Acronym for create, read, update, and delete
CSRF
Acronym for cross-site request forgery
CSS
Acronym for Cascading Style Sheets
CTI
Acronym for computer telephony integration
CUI acronym
Acronym for conversational user interface
DAST
A dynamic application security testing tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses
Data anonymization
Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous
Data buffer
In computer science, a data buffer is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another
Data compression
In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation
Data preprocessing
Data preprocessing is a data mining and machine learning technique that involves transforming raw data into an understandable format
Datetime
Datetime is a variable or data type that can hold both date and time components
DDD
Acronym for Direct distance dialing
Deployment environment
In software deployment, a deployment environment is a computer system or set of systems in which a computer program or software component is deployed and executed
Digest access authentication
Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser
Django
Django is a Python-based free and open-source web framework
DNS
Acronym for Domain Name System
Document classification
Document classification is the task of assigning a document to one or more classes or categories
DOM
Acronym for Document Object Model
DPA
Acronym for data processing agreement
DPIA
Acronym for Data Protection Impact Assessment
DPO
Acronym for Data Protection Officer
DTMF
Acronym for Dual-tone multi-frequency signaling
E2EE
Acronym for end-to-end encryption
EC2
Acronym for Amazon Elastic Compute Cloud
EDPB
Acronym for European Data Protection Board
EMI
Acronym for External Machine Interface
Empty string
In computing, an empty string is a string of length zero
Entity dictionary
An entity dictionary is a collection of named entities
Entity linking
In natural language processing, entity linking (also referred to as named-entity linking, named-entity disambiguation, named-entity recognition and disambiguation, or named-entity normalization) is the task of assigning a unique identity to entities mentioned in text
Environment variable
An environment variable is a dynamic-named value that can affect the way running processes will behave on a computer
ETL
Acronym for Extract, transform, load
Exponential smoothing
Exponential smoothing is a rule of thumb technique for smoothing time series data using the exponential window function
Fact table
In data warehousing, a fact table consists of the measurements, metrics or facts of a business process
Finite-state machine
A finite-state machine is an abstract machine that can be in exactly one of a finite number of states at any given time
Focus (computing)
In computing, focus indicates the act of selecting an element of a graphical user interface
FQDN
Acronym for fully qualified domain name
From header field (SIP)
The From header field indicates the initiator of a SIP request, containing a URI and an optional display name
G.711
G.711 is an ITU-T standard for audio companding
GDPR
Acronym for General Data Protection Regulation
Ghost call
A ghost call is a telephone call for which, when the recipient of the call answers, there is no one on the other end of the call
Git
Git is a distributed version-control system for tracking changes in any set of files
Glob
In computer programming, glob patterns specify sets of filenames with wildcard characters
Grafana
Grafana is a multi-platform open source analytics and interactive visualization web application
GSM
Acronym for Global System for Mobile communications
GUI
Acronym for graphical user interface
gzip
gzip is a file format and a software application used for file compression and decompression
Hardening
In computing, hardening is the process of securing a system by reducing its surface of vulnerability
Header (computing)
In information technology, header refers to supplemental data placed at the beginning of a block of data being stored or transmitted
Heartbeat (computing)
In computer science, a heartbeat is a periodic signal generated by hardware or software to indicate normal operation or to synchronize other parts of a computer system
HMAC
Acronym for hash-based message authentication code
HTML attribute
HTML attributes are special words used inside the opening tag to control the tag's behaviour
HTML element
An HTML element is an individual component of an HTML document or web page
HTTP
Acronym for Hypertext Transfer Protocol
HTTP Location
The Location response header indicates the URL to redirect a page to
HTTP method
HTTP method indicates the desired action to be performed on the identified resource
HTTP Referer
The Referer HTTP request header contains the absolute or partial address from which a resource has been requested
Hybrid
Virtual agent + Human agent
ICE
Acronym for Interactive Connectivity Establishment
ICU
Acronym for International Components for Unicode
Identifier (computer languages)
In computer languages, identifiers (IDs) are lexical tokens that name entities
Inbound
Initiated by the customer
Instant messaging
Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet
Interactive banner
An interactive banner is a web banner that allows viewers to interact with it
Invariant
In computer science, an invariant is a logical assertion that is always held to be true during a certain phase of execution
INVITE (SIP)
INVITE is a request message used to initiate a communication session between two SIP endpoints
ISO 3166
ISO 8601 is an international standard that defines codes for the names of countries, dependent territories, special areas of geographical interest, and their principal subdivisions
ISO 8601
ISO 8601 is an international standard covering the exchange of date- and time-related data
ITSP
Acronym for Internet telephony service provider
IVR
Acronym for Interactive Voice Response
JavaScript
JavaScript is an object-oriented computer programming language
Join (SQL)
An SQL join clause combines columns from one or more tables in a relational database
JSON
Acronym for JavaScript Object Notation
JWT
Acronym for JSON Web Token
kbps
Abbreviation for kilobit per second
Keepalive
A keepalive is a message sent by one device to another to check that the link between the two is operating, or to prevent the link from being broken
LAN
Acronym for local area network
LDAP
Acronym for Lightweight Directory Access Protocol
Let's Encrypt
Let's Encrypt is a non-profit certificate authority
Locale (computer software)
In computing, a locale is a set of parameters that defines the user's language, region and any special variant preferences that the user wants to see in their user interface
localhost
In computer networking, localhost is a hostname that refers to the current device used to access it
LPCM
Acronym for linear pulse-code modulation
Machine to machine
Machine to machine (M2M) is direct communication between devices using any communications channel
Mbps
Abbreviation for megabit per second
Media type
A media type (formerly known as MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet
Message broker
A message broker is an intermediary computer program module that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver
Metadatum
A metadatum is a piece of information describing a piece of data
ML
Acronym for machine learning
MMS
Acronym for Multimedia Messaging Service
ms
Abbreviation for millisecond
MSISDN
Acronym for Mobile Subscriber ISDN Number
Multitier architecture
In software engineering, a multitier architecture is a client–server architecture in which presentation, application processing and data management functions are physically separated
Music on hold
Music on hold (MOH) is the business practice of playing recorded music to fill the silence that would be heard by telephone callers who have been placed on hold
Mutator method
In computer science, a mutator method is a method used to control changes to a variable. They are also widely known as setter methods. Often a setter is accompanied by a getter (also known as an accessor), which returns the value of the private member variable.
Named entity
In information extraction, a named entity is a real-world object, such as persons, locations, organizations, products, etc., that can be denoted with a proper name.
Named-entity recognition
Named-entity recognition is a subtask of information extraction that seeks to locate and classify named entity mentions in unstructured text into pre-defined categories such as person names, organizations, locations, time expressions, quantities, monetary values, percentages, etc.
NAT
Acronym for network address translation
Natural language processing
Natural language processing (NLP) is a subfield of linguistics, computer science, and artificial intelligence concerned with the interactions between computers and human language, in particular how to program computers to process and analyze large amounts of natural language data
Nginx
Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache
NLP
Acronym for natural language processing
Non-speech audio packet
An audio packet for which the VAD processor returned a false value, or its energy value is < energy_threshold (i.e., silence or background noise)
NTP
Acronym for Network Time Protocol
Null (SQL)
Null (or NULL) is a special marker used in Structured Query Language to indicate that a data value does not exist in the database
Null pointer
In computing, a null pointer has a value reserved for indicating that the pointer or reference does not refer to a valid object
Nullable type
In computing, a nullable type allows a value to be set to the special value NULL instead of the usual possible values of a data type
OAuth
OAuth is an open standard for access delegation
Opaque data type
An opaque data type is a data type whose concrete data structure is not defined in an interface
OTP
Acronym for one-time password
outbound
Initiated by Enuan Platform
Parsing
Parsing is the process of analyzing a string of symbols, usually in the form of text, in order to determine its structure and meaning according to a set of predefined rules or grammar
PATH variable
PATH is an environment variable on Unix-like operating systems, DOS, OS/2, and Microsoft Windows, specifying a set of directories where executable programs are located
Payload
In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message (headers and metadata are sent only to enable payload delivery)
PBX
Acronym for private branch exchange
PCI DSS
Acronym for Payment Card Industry Data Security Standard
PCM
Acronym for pulse-code modulation
Penetration test
A penetration test is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system
Personal data
Personal data, also known as personal information or personally identifiable information, is any information relating to an identifiable person
Pointer
In computing, a pointer is a graphical image on a display device that echoes the movements of a pointing device
POST
POST is a request method supported by HTTP
Postback
In web development, a postback is the exchange of information between servers to report a user's action on a website, network, or app
PostgreSQL
PostgreSQL is a free and open-source relational database management system
pps
Abbreviation for packets per second, a measure of throughput
Primary key
A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records
Product demonstration
In marketing, a product demonstration is a promotion where a product is demonstrated to potential customers
Production environment
Production is the deployment environment where changes go "live" and that users directly interact with
Proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource
Public key certificate
In cryptography, a public key certificate is an electronic document used to prove the validity of a public key
QR code
A QR code is a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone
RAM
Acronym for random-access memory
RCS
Acronym for Rich Communication Services
RDS
Acronym for Amazon Relational Database Service
React (JavaScript library)
React is an open-source, front end, JavaScript library for building user interfaces or UI components
Replay attack
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
Reverse proxy
In computer networks, a reverse proxy is an application that sits in front of back-end applications and forwards client (e.g. browser) requests to those applications
Root mean square
In mathematics and its applications, the root mean square of a set of numbers is defined as the square root of the mean square (the arithmetic mean of the squares) of the set
RSA
RSA is a public-key cryptosystem that is widely used for secure data transmission
RTP
Acronym for Real-time Transport Protocol
Sankey diagram
A sankey diagram is a type of flow diagram in which the width of the arrows is proportional to the flow rate
SAST
Static application security testing is part of technologies used to secure software by reviewing the source code of the software to identify sources of vulnerabilities
SCP
Acronym for Secure copy protocol
SDK
Acronym for software development kit
SDP
Acronym for Session Description Protocol
Serialization
In computing, serialization is the process of translating a data structure or object state into a format that can be stored or transmitted and reconstructed later
SFTP
Acronym for SSH File Transfer Protocol
SHA-1
Acronym for Secure Hash Algorithm 1
SHA-2
Acronym for Secure Hash Algorithm 2
Shared secret
In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication.
Shoulder surfing
In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as PINs, passwords and other confidential data by looking over the victim's shoulder
Silent call
A silent call is a telephone call in which the caller does not speak when the call is answered
Single sign-on
Single sign-on is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
SIP
Acronym for Session Initiation Protocol
SIP trunking
SIP trunking is a Voice over Internet Protocol technology and streaming media service based on the Session Initiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equipped with SIP-based private branch exchange and unified communications facilities
SIP URI scheme
The SIP URI scheme is a Uniform Resource Identifier (URI) scheme for the Session Initiation Protocol (SIP) multimedia communications protocol
SIP user agent
A SIP user agent is a logical network endpoint that sends or receives SIP messages and manages SIP sessions
SLA
Acronym for service-level agreement
SMPP
Acronym for Short Message Peer-to-Peer
SMS
Acronym for short message service
SMSC
Acronym for Short Message Service Center
Smudge attack
A smudge attack is an information extraction attack that discerns the password input of a touchscreen device such as a smartphone or tablet computer from fingerprint smudges
SNR
Acronym for signal-to-noise ratio
Social media
Social media are interactive technologies that allow the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks
Software framework
In computer programming, a software framework is a platform where common code with generic functionality can be selectively specialized or overridden by users
Software widget
A software widget is a relatively simple and easy-to-use software application or component made for one or more different software platforms
Sound energy
The amount of energy carried by a sound wave
Source-code editor
A source-code editor is a text editor program designed specifically for editing source code of computer programs
Speech audio packet
An audio packet for which the VAD processor returned a true value, and its energy value is ≥ energy_threshold
Speech recognition
Speech recognition is the recognition and translation of spoken language into text by computers
Speech synthesis
Speech synthesis is the artificial production of human speech
Spoofing attack
In information security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
SSH
Acronym for Secure Shell
SSL
Acronym for Secure Sockets Layer
SSML
Acronym for Speech Synthesis Markup Language
STT
Acronym for speech-to-text, also known as automatic speech recognition (ASR)
STUN
Acronym for Session Traversal Utilities for NAT
Substring
A substring is a contiguous sequence of characters within a string.
Superuser
In computing, the superuser is a special user account used for system administration
Synthetic data
Synthetic data is information that is artificially generated rather than produced by real-world events
TBD
Acronym for to be determined
TCP
Acronym for Transmission Control Protocol
Technology demonstration
A technology demonstration is a prototype, rough example or an otherwise incomplete version of a conceivable product or future system, put together as proof of concept with the primary purpose of showcasing the possible applications, feasibility, performance and method of an idea for a new technology
Template processor
A template processor is software designed to combine templates with a data model to produce result documents
Text box
A text box is a control element of a graphical user interface, that enables a user to input text information to be used by a program
Text editor
A text editor is a type of computer program that edits plain text
Thread pool
In computer programming, a thread pool is a software design pattern for achieving concurrency of execution in a computer program
Throughput
In the context of communication networks, throughput is the rate of successful message delivery over a communication channel
Timing attack
In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms
TLS
Acronym for Transport Layer Security
Tracing
In software engineering, tracing involves a specialized use of logging to record information about a program's execution
Tree view
A tree view or an outline view is a graphical control element that presents a hierarchical view of information
TTS
Acronym for text-to-speech
TURN (protocol)
Acronym for Traversal Using Relays around NAT
UCP
Acronym for Universal Computer Protocol
UDP
Acronym for User Datagram Protocol
UID
Acronym for user identifier
unambiguous
Not open to more than one interpretation (also see this definition)
Unit of time
A unit of time is any particular time interval, used as a standard way of measuring or expressing duration
Unix domain socket
A Unix domain socket is a data communications endpoint for exchanging data between processes executing on the same host operating system
Unix time
Unix time is an approximation of the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970
Unstructured data
Unstructured data is information that either does not have a pre-defined data model or is not organized in a pre-defined manner
User agent
In computing, a user agent is any software, acting on behalf of a user, which retrieves, renders and facilitates end-user interaction with Web content
User-Agent header
In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request
UTC
Acronym for Coordinated Universal Time
UTF-8
UTF-8 is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes.
UUID
Acronym for universally unique identifier
VAD
Acronym for voice activity detection
Version control
In software engineering, version control is a class of systems responsible for managing changes to source code
Virtual assistant
A virtual assistant is a software agent that can perform tasks or services for an individual based on commands or question
Virtual network interface
A virtual network interface is an abstract virtualized representation of a computer network interface
Visual IVR
Acronym for Visual Interactive Voice Response
VoIP
Acronym for Voice over Internet Protocol
VPC
Acronym for virtual private cloud
VPN
Acronym for virtual private network
Vulnerability scanner
A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses
WAV
Abbreviation for Waveform Audio File Format
Web chat
A web chat is a type of Internet online chat that allows users to communicate in real-time using easily accessible web interfaces
Web development tools
Web development tools (often called devtools or inspect element) allow web developers to test and debug their code
Web Messaging
Web Messaging allows documents to communicate with one another across different origins, or source domains while rendered in a web browser
Web service
A Web service is a software system for the interoperable machine-to-machine communication over a network
Web widget
A web widget is a web page or web application that is embedded as an element of a host web page but which is substantially independent of the host page, having limited or no interaction with the host
Webhook
A webhook is a method of augmenting or altering the behaviour of a web page, or web application, with custom callbacks
WebRTC
Acronym for Web Real-Time Communication
WebSocket
WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection.
White-box testing
White-box testing is a method of software testing that tests internal structures or workings of an application
WS
Acronym for WebSocket
WSS
Acronym for WebSocket Secure
XMPP
Acronym for Extensible Messaging and Presence Protocol
YAML
YAML is a human-readable data-serialization language that is commonly used for configuration files
Zero-day vulnerability
A zero-day is a vulnerability in software or hardware that is typically unknown to the vendor and for which no patch or other fix is available