Glossary

Dictionary of Software Development

A brief list of terms related to software development used by Engineering, Product, and Design teams.

    0-9

  • 301 Redirect

    A permanent redirect from one URL to another.  

  • 3D Rendering

    Creating three-dimensional images using software.   

  • 404 Error

    Page not found error message.  

  • A

  • Accessibility

    Ensuring web content is usable by people with disabilities.  

  • Active Directory Federation Services (ADFS)

    Active Directory Federation Services (ADFS) is a feature of Windows Server that provides users with seamless access to multiple applications using single sign-on (SSO) capabilities. It enables organizations to authenticate users across different domains or organizations without the need for multiple logins, enhancing user experience and improving productivity. ADFS works by issuing security tokens that […]

  • Addictive Tech

    Technologies designed to engage users for extended periods, often leading to excessive use.

  • Adobe Firefly

    AI-powered platform for quick, efficient content creation.

  • Adversarial Machine Learning

    Techniques to create AI models that can resist malicious attacks.

  • Affective (emotional) Computing

    Technology that can recognize and respond to human emotions.

  • Agent-Based Simulation

    Modeling complex systems using autonomous agents to simulate interactions and behaviors.

  • AGI Research

    Research focused on creating Artificial General Intelligence, capable of performing any intellectual task that a human can.

  • Agile

    A flexible and iterative approach to software development emphasizing incremental delivery and collaboration.  

  • Agile Story

    A short description of a feature or functionality from an end user's perspective in Agile development.  

  • Agile Transformation

    The process of transitioning an organization to Agile methodologies and principles.  

  • Agility

    Ability to respond quickly and effectively to change.

  • AI Agents

    Autonomous programs that perform tasks or simulate behaviors using artificial intelligence.

  • AI As A Service

    Cloud-based AI services that provide businesses with AI capabilities without requiring in-house infrastructure.

  • AI In Security

    The application of AI technologies to enhance cybersecurity measures.

  • AI Safety And Regulation

    Policies and practices to ensure the safe and ethical development of AI technologies.

  • AI-assisted Software Development

    The use of AI tools to enhance and automate aspects of software development.

  • AI-generated Media

    Content such as images, videos, and text created using AI algorithms.

  • AI, IoT And XR Combined Solutions

    Integrated solutions leveraging AI, Internet of Things, and Extended Reality technologies.

  • AI/ML On Edge

    Deploying AI and machine learning models directly on edge devices rather than centralized servers.

  • AJAX (Asynchronous JavaScript And XML)

    A technique for updating web content without reloading the page.  

  • Alignment

    The arrangement of text or elements to create a cohesive visual layout.  

  • Alternative Currencies

    Digital or virtual currencies that function as alternatives to traditional currencies.

  • Analogous Colors

    Colors that are next to each other on the color wheel.  

  • Anti-Malware Software

    Anti-Malware Software is a type of security software that detects, prevents and removes malware or malicious software, describing a form of malware from attacking a computer, network, and other digital systems. Malware refers to bad programs like viruses, worms, trojans, ransomware, spyware, and adware, that may compromise the security and functionality of a system. Key […]

  • API (Application Programming Interface)

    A set of protocols and tools for building software and applications.  

  • API Gateway

    An API Gateway is a server that acts as an intermediary between client applications and backend services, facilitating communication and managing requests. In modern microservices architectures, where different services communicate via APIs (Application Programming Interfaces), an API Gateway centralizes and manages API calls, ensuring seamless interaction between clients and multiple services. The API Gateway handles […]

  • API Integration

    Connecting third-party services to a website.  

  • API Key

    A code used to authenticate and access APIs.  

  • App Inventor

    A visual programming environment for creating mobile applications.  

  • Application

    A program or group of programs designed for end-users.  

  • Array

    A data structure consisting of a collection of elements, each identified by an index or key.  

  • Artboard

    A virtual canvas within graphic design software where designs are created.  

  • Artifact

    Any file that is produced during the software development process.  

  • Artificial Intelligence (AI)

    Simulation of human intelligence processes by machines, especially computer systems.  

  • Ascender

    An upward part of a letter that extends above the x-height.  

  • Aspect Ratio

    The proportional relationship between an image's width and height.  

  • Asset Management

    Systematic approach to managing organizational assets.

  • ASU In Security Policy

    In the context of security policy, ASU typically stands for Automated Security Updates. These are updates that are automatically applied to systems or software to address security vulnerabilities, improve performance, or patch bugs without requiring manual intervention. Key Aspects of ASU (Automated Security Updates): 1. Automated Patching: Security patches and updates are applied automatically as […]

  • Augmented Reality

    An enhanced version of reality where live, direct or indirect, views of physical real-world environments are augmented with superimposed computer-generated images.  

  • Authentication

    The process of verifying the identity of a user or system.  

  • Automated Compliance

    The use of automation to ensure adherence to regulatory requirements.

  • Automated Dispensing Machines (ADMs)

    Pharmacy automation systems that store and dispense medications, designed to improve the efficiency and safety of the medication distribution process in healthcare settings.

  • Automated Workforce

    The use of robots and AI to perform tasks traditionally done by human workers.

  • AutoML

    Automated machine learning processes that simplify the creation of machine learning models.

  • Autonomous Robots

    Robots capable of performing tasks independently without human intervention.

  • Autonomous Vehicles

    Self-driving vehicles that operate without human input.

  • AWS

    Comprehensive cloud platform offering scalable computing, storage, and databases.

  • Azure

    Microsoft's cloud computing platform and services.

  • B

  • Back End

    The server-side of a web application, responsible for managing data within the database and serving that data to the front end.  

  • Background

    The area behind the main content of a design.  

  • Backup

    The process of creating a copy of site data.  

  • Balance

    The distribution of visual weight in a design for stability.  

  • Bash

    Unix shell and command language.

  • Bash -c

    Command to execute Bash scripts from the command line.

  • Bash Script

    Script written for the Bash command language.

  • Bend Programming Language

    Innovative language simplifying complex computations.

  • Big Data

    Large volumes of data that can be analyzed for insights and decision-making.  

  • Biologics License Application (BLA)

    A request for permission to introduce, or deliver for introduction, a biologic product into interstate commerce, reviewed by the FDA.

  • Biometric Authentication

    A biometric authentication is a security process that verifies an individual’s identity using unique biological characteristics, such as fingerprints, facial features, iris patterns, or voice recognition. Unlike traditional methods like passwords or PINs, biometric data is inherently unique to each person, making it a more secure and difficult-to-replicate form of authentication. This technology is widely […]

  • Biometrics

    Biometrics refers to the measurement and statistical analysis of people’s unique physical and behavioural characteristics. These characteristics are used primarily for identification and access control. Biometrics systems are commonly used for security purposes, as they provide a highly reliable and difficult-to-replicate method of authentication. Types of Biometrics: – Fingerprint Recognition: Scans the unique patterns of […]

  • Bitmap

    Images made up of individual pixels, not scalable without quality loss.  

  • Black Box Testing

    Testing without knowledge of internal code structure.

  • Bleed

    Extra space beyond the document's edge to ensure images or colors extend to the paper's edge.  

  • Blockchain

    A decentralized digital ledger used to record transactions across multiple computers.  

  • Blue-Green Deployment

    Technique for reducing downtime during deployments.

  • Bootstrap

    A front-end framework for responsive web design.  

  • Bottom-up Design

    An area of program refinement that starts with smaller modules and builds into a complete software program.   

  • Brain-computer Interfaces

    Direct communication pathways between the brain and external devices.

  • Branch

    A copy of source code within a version control system.  

  • Brand Identity

    All elements that represent a companyÂ’s image to the public.  

  • Brandmark

    A visual depiction of a brand.  

  • BRD (Business Requirements Document)

    A document that details the business solution for a project including the documentation of customer needs and expectations.  

  • Breadcrumbs

     Navigational links to show the user's location on a website.  

  • Bug

    An error, flaw, or fault in a computer program that causes it to produce incorrect or unexpected results.  

  • Build

    The process of converting code into a standalone form that can be run on a computer.  

  • Business Process Reengineering

    A strategy for improving organizational efficiency by redesigning core business processes.  

  • C

  • C Sharp (C#)

    Modern, object-oriented programming language by Microsoft.

  • Cache

    A hardware or software component that stores data so future requests for that data can be served faster.  

  • Cassandra

    NoSQL database for handling large amounts of data.

  • Causal Inference For ML

    Methods for determining cause-and-effect relationships in machine learning models.

  • CD (Continuous Deployment)

    A method to frequently deliver apps to customers by introducing automation into the stages of app development.  

  • CDN (Content Delivery Network)

     A network for fast content distribution.  

  • Centricity

    Focusing on a central element or user experience.

  • CI (Continuous Integration)

    The practice of building software when all working copies of code are merged into one branch.  

  • Clinical Decision Support System (CDSS)

    A health information technology system designed to assist physicians and other health professionals with clinical decision-making tasks.

  • Clinical Informatics

    The application of informatics and information technology to deliver healthcare services, focusing on the management of health information systems in clinical settings.

  • Clinical Research

    The study of health and illness in people, aimed at improving knowledge and treatment.  

  • Clinical Workflow Automation

    The use of technology to streamline and automate routine clinical tasks, such as patient check-ins, appointment scheduling, and documentation, to improve efficiency and reduce errors.

  • Clipping Path

    A vector path used to isolate an object from its background.  

  • Cloud Computing

    The delivery of computing services over the internet, including storage, processing, and software.  

  • Cloud Fusion Center

    Hub for managing cloud operations and security.

  • Cloud Infrastructure

    Hardware and software that supports cloud computing.

  • Cloud Integration

    The process of configuring multiple cloud services to share data and processes.  

  • Cloud Migration

    Moving data and applications to cloud environments.

  • Cloud Security

    Protecting data and applications in cloud environments.

  • Cloud-Based EHR

    An electronic health record system that is hosted on the cloud, enabling healthcare providers to access patient data from anywhere with an internet connection.

  • Cloud-Native Applications

    Applications designed for cloud environments.

  • CMS (Content Management System)

     Software to manage and publish web content.  

  • CMS Plugin

     Extensions to add features to a content management system.  

  • CMYK

    The color model used for print design, consisting of cyan, magenta, yellow, and black inks.  

  • Code Of Ethics For Software

    Guidelines and principles to ensure ethical software development and usage.

  • Code Refactoring

    The process of editing code to reduce or eliminate technical debt.   

  • Collaboration Ecosystems

    Platforms and tools that facilitate collaboration among diverse teams and organizations.

  • Color Palette

    A set of colors used consistently in a design to maintain visual harmony.  

  • Color Theory

    The logical structure for color that includes harmony between colors, the context of how colors are used, and the color wheel.  

  • Common Secure Configurations

    Common secure configurations are standardized security settings and practices used to safeguard systems, networks, and applications against vulnerabilities. These configurations are designed to minimize security risks by enforcing best practices, such as disabling unnecessary services, applying strong authentication methods, securing default settings, and managing permissions. Implementing common secure configurations ensures that systems are hardened, reducing […]

  • Complementary Colors

    Colors that are opposite each other on the color wheel.  

  • Compliance Program Guidance (CPG)

    Guidelines issued by the Office of Inspector General (OIG) to assist healthcare providers in developing effective internal controls to ensure compliance with regulations.

  • Composition

    The arrangement and organization of design elements within a layout.  

  • Computer Security Incident

    A computer security incident refers to any event that compromises the confidentiality, integrity, or availability of computer systems or data. This can include unauthorized access, data breaches, malware infections, denial of service attacks, or any other event that negatively impacts system operations or data security. Responding to a computer security incident typically involves identifying the […]

  • Computerized Physician Order Entry (CPOE)

    A system that allows healthcare providers to enter and manage orders for medications, laboratory tests, and other services electronically, reducing the risk of errors.

  • Conceptual Design

    The early stage of design focused on ideas and concepts.  

  • Concurrency

    The ability of different parts of a program to execute out-of-order or in partial order, without affecting the final outcome.  

  • Confidentiality

    Confidentiality in technology refers to the principle of ensuring that sensitive information is accessed only by authorized individuals and remains protected from unauthorized disclosure. It is a critical aspect of information security, aimed at safeguarding personal data, intellectual property, and proprietary information from breaches or leaks. To maintain confidentiality, organizations implement various measures, including encryption, […]

  • Consumer XR

    Extended Reality technologies designed for consumer use, such as VR headsets and AR apps.

  • Continuous Integration

    Practice of merging code changes frequently.

  • Contrast

    The degree of difference between elements in a design, often used to create emphasis.  

  • Contrast Ratio

    The difference in brightness between foreground and background elements.  

  • Conversion Rate

    A conversion rate is a business metric that shows how many people take a desired action.  

  • Cookies

     The data sent by an internet server to a browser.  

  • Copyright

    Legal protection for original creative works, including designs.  

  • Cosmos DB

    A globally distributed, multi-model database service designed for managing data at scale.  

  • Crawl

     Search engines send bots to gather intel on published web pages to determine what should be displayed or removed.  

  • CRM (Customer Relationship Management)

     The software and apps used to gather, analyze, and maintain information on prospects.  

  • Crop

    The removal of unwanted areas from an image to focus on a specific part.  

  • Crop Marks

    Lines indicating where a document will be trimmed after printing.  

  • Cross-Browser Compatibility

     Ensuring a website works on different browsers.  

  • Cross-selling

    Cross-selling is a sales technique that involves offering customers additional services or products related to the one(s) theyÂ’re already purchasing.  

  • CSS (Cascading Style Sheets)

    A language used to describe the style of HTML documents.  

  • Custodian

    A custodian refers to an individual or entity responsible for managing and safeguarding information assets, data, or technology resources within an organization. Custodians play a vital role in ensuring that data is protected, compliant with legal and regulatory requirements, and accessible only to authorized users. Custodians are often responsible for the implementation of data governance […]

  • Customer Experience (CX)

    The overall perception of a customer's interaction with a company or brand.  

  • Cyber Security

    Protecting systems and data from digital threats and attacks.

  • Cybersecurity

     Protecting websites from online threats.  

  • D

  • Data

    Data refers to any collection of facts, figures, or information that can be processed, stored, and analyzed by computers. It can exist in various forms, including text, numbers, images, audio, and video, and is fundamental to the functioning of software applications, databases, and digital systems. It is often categorized into structured, semi-structured, and unstructured types. […]

  • Data Analytics

    Process of examining data sets to draw conclusions about the information they contain.  

  • Data Bricks

    Unified analytics platform for big data and machine learning.

  • Data Clean Room

    Secure environments where data can be analyzed without exposing raw data to outside parties.

  • Data Cleaning

    The process of detecting and correcting (or removing) corrupt or inaccurate records from a dataset.  

  • Data Contract

    Agreements that define the structure, quality, and access rights of data shared between parties.

  • Data Engineering

    The practice of designing and building systems for collecting, storing, and analyzing data.  

  • Data Infrastructure

    The underlying framework that supports the collection, storage, and management of data.  

  • Data Integration

    The process of combining data from different sources to provide a unified view.  

  • Data Interoperability

    The ability of different information systems, devices, and applications to access, exchange, integrate, and cooperatively use data in a coordinated manner.

  • Data Labeling

    The process of tagging data with labels to make it usable for machine learning models.  

  • Data Loss Prevention (DLP)

    Data Loss Prevention (DLP) refers to a set of strategies and tools designed to protect sensitive information from unauthorized access, accidental deletion, or data breaches. DLP aims to prevent data loss across various environments, including on-premises systems, cloud storage, and mobile devices. Organizations implement DLP measures to safeguard critical data such as customer information, intellectual […]

  • Data Management

    The practice of managing data as a valuable resource to unlock its potential for an organization.  

  • Data Marketplaces

    Platforms where data providers and consumers can trade data assets.

  • Data Mesh

    An approach to data management that treats data as a product and organizes it by domain.

  • Data Modeling

    The process of creating a data model to organize and structure data.  

  • Data Product Specification

    Detailed definitions of data products to ensure consistency and quality in data management.

  • Data Protection And Privacy

    The legal frameworks that govern the collection, storage, and sharing of personal health information, including HIPAA in the U.S. and GDPR in the European Union.

  • Data Scraping

    Data scraping (or web scraping) is the process of extracting information from online sources with the help of a special digital tool.    

  • Data Stack

    A combination of technologies and tools used to process and analyze data.  

  • Data Streaming

    The continuous flow of data at a high volume, often used for real-time processing.  

  • Data Structure

    A particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently.  

  • Data Warehouse

    A system used for reporting and data analysis, storing current and historical data in one place.  

  • Database

    An organized collection of data generally stored and accessed electronically.  

  • DataRobot

    Automated machine learning platform for building models.

  • DDoS Attack

    Distributed Denial of Service attack to overwhelm a website.  

  • De-Identification Of Data

    The process of removing or obscuring personal identifiers from health information so that individuals cannot be readily identified, often used to comply with privacy regulations.

  • Debugging

    The process of finding and resolving bugs or defects in software.  

  • Decentralized Data Platforms

    Data platforms that operate without centralized control, often using blockchain technology.

  • Decentralized Identity

    Identity management systems that allow users to control their own identity data without relying on central authorities.

  • Decentralized Personal Data Stores

    Systems that allow individuals to store and manage their personal data independently.

  • Decentralized Security

    Security measures that distribute control and decision-making to prevent centralized points of failure.

  • Decision Science

    The application of quantitative techniques to inform decision-making processes.

  • Demand-based Pricing

    Demand-based pricing is the revenue management strategy of rating products or services according to customer demand trends.  

  • Deployment

    The process of distributing a software application to be used.  

  • Developer Experience Platforms

    Tools and environments designed to enhance the productivity and satisfaction of software developers.

  • DevOps

    A set of practices that combines software development (Dev) and IT operations (Ops) to shorten the development lifecycle.  

  • DevSecOps

    Integrating security practices into the DevOps process to enhance software security.

  • Differential Privacy

    Techniques that ensure the privacy of individual data points while allowing for aggregate data analysis.

  • Digital Carbon Management

    Technologies and practices for monitoring and reducing digital carbon footprints.

  • Digital Certificate

    A digital certificate is an electronic document used to prove the ownership of a public key, enabling secure communication and transactions over the internet. It serves as a digital counterpart to a traditional certificate, providing verification of an entity’s identity, such as an individual, organization, or device. Digital certificates are issued by a trusted third […]

  • Digital Ecosystem

    The complex network of interconnected digital technologies and platforms.  

  • Digital Health

    The use of technology to improve the health and wellness of individuals, including mobile health apps, wearable devices, telemedicine, and personalized medicine.

  • Digital Humans

    AI-generated characters that can interact with humans in a lifelike manner.

  • Digital Maturity

    The extent to which an organization can use digital technologies to improve processes and outcomes.  

  • Digital Therapeutics

    Evidence-based therapeutic interventions driven by software programs to prevent, manage, or treat medical conditions, often used in conjunction with medication or other therapies.

  • Digital Transformation

    The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.  

  • Digital Twin

    A virtual replica of a physical object or system used for analysis and simulation.

  • Digital Twinning

    Creating virtual replicas of physical objects or systems.

  • Disaster Recovery Plan (DRP)

    A Disaster Recovery Plan (DRP) is a documented strategy that outlines the procedures an organization must follow to recover from disruptive events, such as natural disasters, cyberattacks, or system failures. The primary goal of a DRP is to ensure the continuity of critical business operations and minimize the impact of disruptions on an organization’s infrastructure, […]

  • Distributed Energy Resources

    Decentralized energy generation and storage systems, such as solar panels and batteries.

  • DNS (Domain Name System)

    Converts domain names into IP addresses.  

  • Docker

    A platform for developing, shipping, and running applications inside software containers.  

  • Docker Swarm

    Docker Swarm is a powerful container orchestration tool that enables developers to manage a cluster of Docker containers seamlessly. It transforms a group of Docker engines into a single virtual system, simplifying the deployment, scaling, and management of applications. Key terms related to Docker Swarm include: Node: A machine participating in the Swarm, which can […]

  • Domain Name System (DNS)

    The Domain Name System (DNS) is a hierarchical and decentralized naming system used to translate human-readable domain names into numerical IP addresses, which are essential for locating and accessing resources on the internet. For example, when a user enters a web address like www.example.com into their browser, the DNS converts this domain name into the […]

  • Domain-Driven Design

    Design approach focusing on complex domain logic.

  • DPI (Dots Per Inch)

    A measurement of image resolution, affecting print quality.  

  • Drop Shadow

    A visual effect that adds a shadow behind an element to create depth.  

  • Drug Delivery Systems

    Advanced technologies designed to deliver drugs to specific parts of the body in controlled amounts, improving the efficacy and reducing side effects of treatments.

  • E

  • E-commerce

    Online buying and selling of products or services.  

  • E-Prescribing

    The process of electronically generating and sending prescription orders to a pharmacy.

  • Easing Access To Generative AI

    Efforts to make generative AI technologies more accessible to users and businesses.

  • Edge Computing

    Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.  

  • EHealth

    The use of information and communication technologies (ICT) for health, including services such as telemedicine, electronic health records, and health information systems.

  • EHR (Electronic Health Record)

    A digital version of a patient’s paper chart, making information available instantly and securely to authorized users.

  • EHR And EMR (Electronic Health Record And Electronic Medical Record)

    Digital versions of patients' paper charts and medical history.  

  • ElastiCache

    ElastiCache is a fully managed in-memory caching service provided by Amazon Web Services (AWS) that enhances the performance of applications by allowing data retrieval from fast, managed in-memory data stores, instead of relying on slower disk-based databases. It supports two popular open-source in-memory caching engines: Redis and Memcached. Key terms related to ElastiCache include: Cache […]

  • Electronic Information Resources (EIR)

    Electronic Information Resources (EIR) refer to digital materials that provide access to information and knowledge through electronic means. These resources encompass a wide range of formats, including e-books, online databases, electronic journals, multimedia content, and websites. EIR plays a crucial role in research, education, and professional development by offering convenient access to vast amounts of […]

  • Electronic Information, Communication, And Technology (EICT)

    Electronic Information, Communication, and Technology (EICT) encompasses a broad range of electronic tools and systems that facilitate the creation, storage, dissemination, and management of information. EICT integrates various technologies, including computers, telecommunications, and software applications, to enable efficient communication and data exchange across different platforms and devices. EICT plays a crucial role in modern society, […]

  • Electronic Medication Administration Record (eMAR)

    A digital version of a paper medication administration record, allowing for real-time tracking and administration of medications to patients.

  • Electronic Patient-Reported Outcomes (ePROs)

    Digital tools that allow patients to report their health status directly to healthcare providers, often used in clinical trials and chronic disease management.

  • Embossing

    A process that raises a design above the surface for a tactile effect.  

  • Emergency Medical Treatment And Labor Act (EMTALA)

    A federal law that requires hospitals with emergency departments to provide a medical screening examination and necessary stabilization treatment to anyone seeking emergency care, regardless of their ability to pay.

  • Encrypted Computation

    Performing computations on encrypted data to ensure privacy and security.

  • Encrypted Data

    Encrypted data refers to information that has been transformed using cryptographic techniques to protect its confidentiality and integrity. The encryption process involves converting plaintext (readable data) into ciphertext (unreadable format) using an algorithm and a key. Only individuals or systems with the correct decryption key can revert the ciphertext back to its original plaintext form, […]

  • Encryption

    Encryption is the process of converting plaintext (readable information) into ciphertext (a scrambled format) to protect sensitive data from unauthorized access. This transformation is achieved using mathematical algorithms and encryption keys, which serve as the security mechanism that allows only authorized users to decode and access the original information. Encryption plays a vital role in […]

  • End User

    The individual that uses a particular product.  

  • Enterprise Architecture

    The organizational structure that defines the operation of an organization.  

  • Enterprise Software

    Software designed to serve the needs of an organization rather than individual users.  

  • Enterprise XR

    Extended Reality technologies designed for use in enterprise environments, such as virtual training and simulations.

  • ERP

    Software integrating and streamlining business processes into one system.

  • Escrow

    Escrow in tech refers to a legal arrangement where a third party holds valuable digital assets, such as software source code, cryptographic keys, or sensitive data, on behalf of two other parties involved in a transaction or agreement. The purpose of tech escrow is to ensure that the assets are securely managed and only released […]

  • Ethernet

    Ethernet is a widely used technology for local area networks (LANs) that facilitates the connection and communication of devices within a specific geographical area. First developed in the 1970s by Xerox, Ethernet has evolved significantly over the decades, becoming a standard protocol for wired networking. At its core, Ethernet defines the physical and data link […]

  • Ethical Frameworks

    Structured guidelines for making ethical decisions in technology development and use.

  • ETL Developer

    A professional responsible for designing and creating the data warehousing process, which includes extraction, transformation, and loading of data.  

  • ETL Testing

    Testing the process of extracting, transforming, and loading data to ensure data integrity and performance.  

  • Event Driven

    A system that responds to an external event.  

  • Event Driven Language

    Designed to handle external events.   

  • Event-Driven Architecture

    Software design focused on responding to events.

  • Evolutionary Architectures

    Architectures designed to evolve and adapt over time in response to changing requirements.

  • Executable Code

    Code that can be run independently without translation.  

  • Explainable AI

    AI systems designed to provide understandable and transparent explanations of their decisions.

  • ExpressJS

    Minimalist web framework for Node.js.

  • F

  • Feathering

    Blending or softening the edges of an image or object.  

  • Federated Learning

    A machine learning approach where models are trained across multiple decentralized devices or servers.

  • FHIR (Fast Healthcare Interoperability Resources)

    A standard for exchanging healthcare information electronically, aiming to simplify implementation without sacrificing information integrity.

  • File Format

    A layout or extension of a file. Popular file formats are JPEG, TIFF, PNG, and GIF.   

  • File Transfer Protocol

    FTP, or File Transfer Protocol, is a standard network protocol used to transfer files between a client and a server over a TCP/IP network, such as the internet. Developed in the early 1970s, FTP enables users to upload, download, delete, and manage files on a remote server, making it a vital tool for web developers, […]

  • Fine-grained Data Access Controls

    Detailed and specific permissions for accessing different parts of a dataset.

  • FinOps

    Financial operations practices that optimize cloud spending and financial management.

  • Firewall

    A system to protect a secure network from an unsecured network.  

  • Firewalls

    Firewalls are essential security devices or software that monitor and control incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between trusted internal networks and untrusted external networks, such as the internet, firewalls help protect systems from unauthorized access, cyber threats, and data breaches. There are several types of firewalls, […]

  • Flat Design

    A minimalistic design approach.  

  • Font

    A specific typeface or style of text used in design.  

  • Framework

    A platform for developing software applications that provides a foundation structure.  

  • Framework Agnostic

    Compatibility with multiple development frameworks.  

  • Frameworks

    Predefined structures to simplify software development.

  • Front End

    The part of a website or application that users interact with directly.  

  • Frontend Framework

    Tools for building user interfaces.  

  • FTP (File Transfer Protocol)

     A protocol for transferring files to a server.  

  • Full Stack

    A software developer that can work on the frontend and backend.   

  • Functional Programming

    Paradigm focused on functions and immutability.

  • Functional Requirements

    Specifications of functions that a system or component must be able to perform.  

  • Functional Testing

    Testing software against functional requirements.

  • G

  • GenAI Tools In IDEs

    Generative AI tools integrated into Integrated Development Environments to assist developers.

  • General Data Protection Regulation (GDPR)

    A regulation in EU law on data protection and privacy for individuals, which also addresses the transfer of personal data outside the EU and EEA, impacting healthcare data management.

  • Generative AI

    AI technologies that create new content, such as text, images, or music, from scratch.

  • Genomic Data Analytics

    The use of advanced analytics and computational tools to analyze genomic data, enabling personalized medicine, and the identification of genetic predispositions to diseases.

  • Gesture Recognition

    Technology that interprets human gestures to control devices or interact with systems.

  • Git

    A distributed version control system used for tracking changes in source code.  

  • GitFlow

    Branching model for managing Git projects.

  • GitHub

    A web-based hosting service for version control using Git.  

  • Golang

    Open-source programming language by Google.

  • Good Clinical Practice (GCP)

    An international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses, and reporting of clinical trials.

  • Good Manufacturing Practice (GMP)

    Regulations that require manufacturers, processors, and packagers of drugs, medical devices, and food to ensure that their products are safe, pure, and effective.

  • Gradient

    A gradual transition between two or more colors.  

  • GraphQL

    Query language for APIs, allowing for flexible data retrieval.

  • Green Cloud

    Cloud computing practices that aim to reduce environmental impact and promote sustainability.

  • Green Software Engineering

    Software development practices that focus on reducing environmental impact.

  • Green UX

    User experience design practices that prioritize sustainability and environmental impact.

  • Grid System

    A framework of horizontal and vertical lines used for layout consistency.  

  • Gutter

    The space between columns or pages in a layout.  

  • H

  • Hadoop

    Open-source framework for big data processing and storage.

  • Health Information Exchange (HIE)

    The electronic movement of health-related information among organizations according to nationally recognized standards.

  • Health Information Technology (HIT)

    The application of information technology to healthcare, including electronic health records, telemedicine, mobile health applications, and health information exchanges.

  • Healthcare Fraud Prevention Partnership (HFPP)

    A public-private partnership to identify and reduce fraud, waste, and abuse across the healthcare sector.

  • HIPAA Compliance

    Adherence to the regulations and standards set by the Health Insurance Portability and Accountability Act for protecting sensitive patient data.  

  • Hosting

     Storing and serving web files on a server.   

  • HTML (Hypertext Markup Language)

    The standard language for web pages.  

  • HTTP (Hypertext Transfer Protocol)

    The foundation of data communication for the World Wide Web.  

  • Hue

    The attribute of color that distinguishes one from another.  

  • Hybrid Cloud

    Combination of private and public cloud services.

  • I

  • Icon

    A simplified graphical representation of an object or concept.  

  • IDE (Integrated Development Environment)

    A software application that provides comprehensive facilities to computer programmers for software development.  

  • Illustration

    Hand-drawn or digital artwork used in design.  

  • Image Recognition

    The ability of a software system to identify objects, places, people, or actions in images.  

  • Image-Guided Surgery (IGS)

    A surgical procedure in which the surgeon uses preoperative and intraoperative imaging to guide the surgery, often involving advanced visualization and navigation technologies.

  • Immuno-Oncology

    A field of cancer treatment that uses the body’s immune system to fight cancer, often involving advanced biotechnologies like CAR-T cell therapy.

  • Increased Regulation

    The growing trend of governments imposing more regulations on technology companies and practices.

  • Industrial XR

    Extended Reality technologies applied in industrial settings, such as manufacturing and maintenance.

  • Infographic

    A visual representation of data or information.  

  • Information Resources Manager (IRM)

    An Information Resources Manager (IRM) is responsible for overseeing the strategic management of an organization’s information assets, including data, technology, and related resources. The role of an IRM is to ensure that information is effectively utilized to support business goals while maintaining security, compliance, and operational efficiency. This often involves developing and implementing policies, managing […]

  • Information Security

    Information security (InfoSec) refers to the practice of protecting digital and physical data from unauthorized access, alteration, destruction, or disclosure. It encompasses a wide range of strategies, tools, and measures designed to safeguard the confidentiality, integrity, and availability (CIA) of information within an organization. In tech, InfoSec plays a crucial role in protecting sensitive data […]

  • Information Security Council

    An Information Security Council (ISC) is a governance body within an organization that focuses on overseeing, advising, and setting strategic direction for all aspects of information security. The council is typically made up of senior executives, IT leaders, and security professionals who collaborate to ensure that the organization’s information security policies and practices are aligned […]

  • Information Security Officer (ISO)

    An Information Security Officer (ISO) is a senior-level executive responsible for managing and overseeing an organization’s information security program. The ISO ensures that all digital assets, sensitive data, and IT infrastructure are protected from cyber threats, unauthorized access, and data breaches. This role involves establishing and enforcing security policies, coordinating risk management activities, and ensuring […]

  • Informed Consent

    A process of communication between a patient and a healthcare provider that results in the patient's authorization or agreement to undergo a specific medical intervention, ensuring compliance with ethical and legal standards.

  • Integrated Data And AI Platforms

    Platforms that combine data management and AI capabilities for streamlined workflows.

  • Integration Testing

    Testing combined modules as a group.

  • Intelligent Machine-to-machine Collaboration

    Systems where machines communicate and work together autonomously.

  • Interactive Patient Care (IPC)

    Systems that engage patients in their care through interactive technology, such as bedside tablets or patient portals, to improve patient education and satisfaction.

  • Interface

    In computing, a shared boundary across which two separate components of a computer system exchange information.  

  • International Law For Crypto Assets

    Legal frameworks governing the use and exchange of cryptocurrencies across different countries.

  • Interoperability

    Ability of systems to work together seamlessly.

  • Interoperability

    The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.

  • Intrusion Detection System (IDS)

    An Intrusion Detection System (IDS) is a security tool used to monitor network or system activities for malicious behavior or policy violations. IDS solutions are designed to detect unauthorized access, cyberattacks, and other security breaches in real-time, alerting administrators when potential threats are identified. Unlike firewalls, which block intrusions, IDS passively monitors and reports suspicious […]

  • InVision

    A design collaboration and prototyping platform.

  • IoMT (Internet Of Medical Things)

    A connected infrastructure of medical devices and software applications that communicate with various healthcare IT systems.

  • IoT (Internet Of Things)

    The network of physical objects embedded with sensors and connectivity to exchange data.  

  • Iteration

    A single cycle in a process aimed at achieving a goal, often used in agile and iterative development methodologies.  

  • J

  • JavaScript

     A programming language for interactive web elements.  

  • Jenkins

    An open-source automation server that helps automate the parts of software development related to building, testing, and deploying.  

  • JS Express

    Express framework tailored for JavaScript developers.

  • JUnit

    Unit testing framework for Java programming language.

  • K

  • Kanban

    An approach for managing software development that depicts all planned work to optimize the overall process.   

  • Kerning

    Adjusting the space between individual characters in a font.  

  • Knowledge Graph

    A network of entities and their relationships, used to integrate and access information.  

  • Knowledge Graphs

    Data structures that represent relationships between concepts and entities, used for organizing and retrieving information.

  • Kubernetes

    An open-source platform for automating deployment, scaling, and operations of application containers.  

  • L

  • LAMP Stack

     A software bundle for web development (Linux, Apache, MySQL, PHP).  

  • Landing Page

     A web page designed for specific user actions.  

  • Langchain

    Framework for developing AI applications using large language models.

  • Layout

    The arrangement of text and graphics on a page or screen.  

  • Lazy Loading

    Technique for deferring the loading of resources.

  • Leading

    The vertical space between lines of text in a paragraph.  

  • Lean Startup

    A methodology for developing businesses and products based on validated learning and rapid iteration.  

  • Library

    A collection of non-volatile resources used by computer programs, often for software development.  

  • Lift And Shift

    The process of migrating applications and associated data to a cloud environment without redesigning the app.  

  • Line Art

    Images composed of lines, often used in logos or illustrations.  

  • Load Time

     The time it takes for a web page to fully load.  

  • Local Area Network (LAN)

    A Local Area Network (LAN) is a network infrastructure that connects computers, devices, and other resources within a small geographic area, such as a home, office, or school. LANs enable communication between devices, allowing them to share resources like files, printers, and internet connections. Typically, LANs consist of network devices such as routers, switches, and […]

  • Low Code

    Development approach with minimal hand-coding.

  • M

  • Machine Learning

    A subset of AI involving the use of algorithms and statistical models to enable computers to improve tasks.  

  • Maintenance

    A set of actions after the launch of a website to maintain the product.  

  • Malicious Code

    Malicious code refers to any software or script that is designed to cause harm to a computer system, network, or user. It encompasses a wide range of cyber threats, including viruses, worms, Trojans, ransomware, spyware, and other types of malware. Malicious code can exploit system vulnerabilities, steal sensitive data, corrupt files, or disrupt normal operations. […]

  • Malware

    Malicious software that can harm websites.  

  • Managed Security Services

    Outsourced security services for organizations.

  • Medical Imaging Informatics

    The branch of health informatics that focuses on the efficient and effective management of medical images, including radiology and pathology images, often through PACS (Picture Archiving and Communication Systems).

  • MedTech

    Technology for medical and healthcare applications.

  • MES (Manufacturing Execution System)

    A system used to manage and monitor work-in-process on the factory floor.  

  • Metadata

     Structured reference data that sorts attributes of specific information.  

  • Metaverse

    Virtual reality space for interacting in a digital environment.

  • Methodology

    A technique that enables the design and development of software to be implemented.   

  • MHealth (Mobile Health)

    The use of mobile devices and wireless technology in healthcare to monitor patient health, deliver care, and provide health information.

  • Microservices

    An architectural style that structures an application as a collection of loosely coupled services.  

  • Middleware

    Software that acts as a bridge between an operating system or database and applications, especially on a network.  

  • Minimum Viable Product (MVP)

    A product with enough features to satisfy early adopters and provide feedback for future development.  

  • MLOps

    Practices that combine machine learning, development, and operations to streamline the deployment and maintenance of ML models.

  • Mobility

    The ability to access information and services anywhere, anytime, on any device.  

  • Mockup

    A visual representation of a design, often used for presentation or testing.  

  • Modernization

    The process of adapting something to modern needs or habits, typically by updating systems, processes, and technology.  

  • Module

     A separate unit of software or hardware.  

  • Monochrome

    A design or image that uses shades of a single color.  

  • Monolithic

    Single-tiered software architecture tightly integrated.

  • Monospace

    A font where letters and characters occupy the same amount of horizontal space.  

  • Multimedia

    Design that includes a combination of text, graphics, audio, and video.  

  • Multimodal AI

    AI systems that can process and understand multiple types of data, such as text, images, and audio.

  • MVC (Model-View-Controller)

    A software architectural pattern.  

  • MySQL

    An open-source relational database management system.  

  • N

  • Nanomedicine

    The application of nanotechnology to medicine, including the use of nanoparticles for drug delivery, imaging, and as part of therapeutic devices.

  • Natural Language Processing

    The field of AI focused on enabling machines to understand and process human language.

  • Navigation Menu

    Links for website navigation.  

  • Nest.js

    Progressive framework for building efficient Node.js applications.

  • Neural Networks In Medicine

    A type of AI that mimics the human brain to recognize patterns and interpret data in complex ways, often used in diagnostics, imaging analysis, and drug discovery.

  • Next-generation Cryptography

    Advanced cryptographic techniques designed to enhance security and privacy.

  • Node.js

    An open-source, cross-platform JavaScript runtime environment.  

  • NoSQL

    Non-relational databases for handling unstructured data.

  • O

  • OAuth

    A protocol for secure authorization.  

  • Object Oriented Programming

    Programming paradigm based on objects and classes.

  • Observability

    The ability to measure and understand the internal state of a system based on the data it produces.  

  • Omnichannel

    An integrated approach to sales and marketing that provides customers with seamless experience across multiple channels.  

  • Online Machine Learning

    Machine learning methods that process data and update models in real time as new data arrives.

  • Opacity

    The degree of transparency or translucency in an element.  

  • Open Source

    Software with source code that anyone can inspect, modify, and enhance.  

  • Operationalize AI

    The process of deploying and integrating AI models into business operations and workflows.

  • Overhaul

    Comprehensive examination and improvement of a system.

  • Overlay

    A semi-transparent layer placed on top of an image or element.  

  • P

  • Pantone

    A standardized color matching system used in printing.  

  • Paradigm Shift

    Fundamental change in underlying assumptions or practices.

  • Parameter

    A special kind of variable, used in a subroutine to refer to one of the pieces of data provided as input to the subroutine.  

  • Patient Portal

    A secure online website that gives patients access to their personal health information and enables communication with their healthcare providers.

  • Pay-per-click (PPC)

    An online advertising model where advertisers pay a fee each time a user clicks on their ad.    

  • Penetration Testing

    A simulated cyberattack on a system to evaluate its security.  

  • Performance Testing

    Assessing system performance under specific conditions.

  • Personal Information Economy

    An economy where individuals control and monetize their personal data.

  • Personalized Healthcare

    Tailoring medical treatment and care to individual patient characteristics and needs using data and technology.

  • PHI (Protected Health Information)

    Any information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service.

  • Pipeline

     A set of data processing elements connected in series.  

  • Pixel

    The smallest unit of digital image representation.  

  • PL/SQL

    Oracle's procedural language extension for SQL.

  • Platform As A Service (PaaS)

    A cloud computing model providing a platform allowing customers to develop, run, and manage applications.  

  • Platforms As Products

    Treating digital platforms as standalone products with their own value propositions and user experiences.

  • Plugin

    An add-on that adds new functionalities to a host program or software without alternating the host itself.   

  • Plugin Development

    Creating custom website extensions.  

  • POC (Proof Of Concept)

    A demonstration to verify that certain concepts or theories have the potential for real-world application.  

  • PostgreSQL

    Open-source relational database management system.

  • PPI (Pixels Per Inch)

    A measurement of image resolution for digital displays.  

  • Predictive Analytics

    Techniques using data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.  

  • Print Ready

    A design file prepared for high-quality printing.  

  • Privacy First

    Approaches and practices that prioritize user privacy in the design and operation of technologies.

  • Privacy-aware Communication

    Communication systems that prioritize and protect user privacy.

  • Privacy-enhancing Technologies (PETs)

    Technologies designed to protect user privacy while enabling data usage and analysis.

  • Privacy-respecting Computation

    Methods for performing computations on data while preserving the privacy of individual data points.

  • Procedure

    A set of coded instructions that tell a computer how to run a program or calculation.  

  • Product Discovery

    The process of identifying and validating product ideas through user research and testing.  

  • Product Roadmap

    A strategic plan that outlines the vision, direction, priorities, and progress of a product over time.   

  • Production Immune Systems

    Automated systems that detect and respond to anomalies in production environments to maintain stability and security.

  • Programming Language

    A formal language comprising a set of instructions that produce various kinds of output.  

  • Progressive Web Apps

    Web applications that use modern web capabilities to deliver an app-like experience to users.  

  • Prompt Engineering

    Designing effective prompts for AI models.

  • Prototype

    An early sample or model of a product to test a concept or process.  

  • Pull Request

    A notification given by developers when theyÂ’re done building a feature.   

  • Q

  • QA (Quality Assurance)

    The process of reviewing a software product to ensure it meets expectations.  

  • QA Automation

    The use of automated testing tools to execute tests on software applications to ensure they meet specified requirements.  

  • Quality Control

    Ensuring products meet specified quality standards.

  • Quantum AI

    AI utilizing quantum computing for complex problem-solving.

  • Quantum Computing

    Advanced computing technology that uses quantum mechanics principles to perform complex calculations faster than classical computers.

  • Quantum Machine Learning

    The application of quantum computing to enhance machine learning algorithms and processes.

  • Query

     A request for data or information from a database.  

  • R

  • RAG (Retrieval Augmented Generation)

    AI techniques that combine information retrieval with content generation to improve accuracy and relevance.

  • Rasterize

     Converting vector graphics into pixel-based images.  

  • Re-decentralization

    The movement towards decentralizing control and decision-making in technology systems and platforms.

  • ReactJS

    JavaScript library for building user interfaces.

  • Recursion

    The process of defining a function or calculating a number by the repeated application of an algorithm.  

  • Redirect

    Forwarding one URL to another.  

  • Redux

    State management library for JavaScript applications.

  • Regression Testing

    Verifying that changes haven't introduced new issues.

  • Regulatory Compliance

    Adherence to laws, regulations, guidelines, and specifications relevant to healthcare operations.

  • Remote Patient Monitoring (RPM)

    The use of digital technologies to collect health data from patients in one location and electronically transmit that information securely to healthcare providers in a different location for assessment and recommendations.

  • Remote Therapeutic Monitoring (RTM)

    The use of digital technologies to monitor and manage patients' conditions remotely, often involving tracking metrics like medication adherence and symptom management.

  • Repository

    A central place where data is stored and managed.  

  • Resolution

    The clarity and sharpness of an image or display.  

  • Responsible Tech Facilitation

    Efforts to promote the ethical and responsible development and use of technology.

  • Responsive Design

    Design that adapts to different screen sizes and devices.  

  • REST (Representational State Transfer)

    An architectural style for designing networked applications.  

  • REST API

    Representational State Transfer for web services.  

  • Retina Resolution XR

    Extended Reality displays with resolutions comparable to the human retina, providing highly detailed visuals.

  • Revenue Management

    Revenue management is a set of practices or techniques that consider consumer demand and set the optimal price for the product.  

  • RGB

    The color model used for digital design, consisting of red, green, and blue.  

  • Robotic Process Automation And Low Code

    Automating business processes using robots and low-code development platforms.

  • Ruby On Rails

    Web application framework written in Ruby programming language.

  • Rule Of Thirds

    A compositional technique that divides an object or frame into an equal, three-by-three grid with two horizontal and vertical lines.  

  • Runtime

    The period during which a computer program is executing.  

  • S

  • SaaS (Software As A Service)

    A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.  

  • Sanity Testing

    A subset of regression testing to verify that a particular function or bug is working as expected.  

  • Satellite Networks

    Networks of satellites used for communication, navigation, and data collection.

  • Saturation

    The intensity or richness of a color.  

  • Scalability

    The ability to resize an image or design without loss of quality.  

  • Schema

    The structure of a database system, described in a formal language.  

  • Schema Markup

    The code that can be used on a website to help search engines deliver more information to users.  

  • Script Font

    A typeface that mimics handwritten script or calligraphy.  

  • Scripting

    Writing small programs to automate tasks.

  • Scrum

    A project management methodology for effective team collaboration thatÂ’s based on Agile software development.  

  • SDK (Software Development Kit)

    A collection of software tools and libraries that developers use to create applications for specific platforms.  

  • SDLC (Software Development Life Cycle)

    The general process of software development that follows a series of steps until completion.   

  • Secure Software Delivery

    Practices and tools to ensure the secure development and deployment of software applications.

  • Security

     The state of being free from danger or threat in a computing context.  

  • Selenium

    Automated testing tool for web applications.

  • Sequel

    SQL-based command for querying databases.

  • Server

    A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.  

  • Serverless Architecture

    Cloud-based, scalable web hosting.  

  • Service-Oriented Architecture (SOA)

    A style of software design where services are provided to the other components by application components, through a communication protocol over a network.  

  • Sitemap

    An outline of all pages on a website.  

  • Sketch

    A rough or preliminary drawing or design.  

  • Smart Cities

    Urban areas that use technology and data to improve infrastructure, services, and quality of life.

  • Smart Energy Management Systems

    Systems that optimize energy use and efficiency in buildings and infrastructure.

  • Smart Health Devices

    Wearable or portable devices connected to a network that monitor health indicators such as heart rate, blood pressure, or glucose levels.

  • Smart Homes

    Homes equipped with connected devices and systems that automate and enhance daily living.

  • Smart Implants

    Medical implants equipped with sensors and connectivity features that allow them to monitor and transmit data on their performance and the patient’s condition in real-time.

  • Smart Systems And Ecosystems

    Interconnected systems and devices that use data and intelligence to optimize performance and interactions.

  • Smoke Testing

    Preliminary testing to check basic functionality.

  • SOAP APIs

    Simple Objects Access Protocol is a web communication protocol for exchanging structured information in a decentralized, distributed environment.  

  • Software Architecture

    The high-level structure of a software system, defining its components and their interactions.  

  • Software Process

    A set of activities, methods, practices, and transformations used to develop and maintain software.  

  • Software Testing

    Process of evaluating software for errors and bugs.

  • Software-defined Vehicles

    Vehicles that rely on software to control and manage their functions and features.

  • Solidity Language

    Programming language for developing Ethereum smart contracts.

  • Source Code

    The fundamental component of a computer program created by a programmer.  

  • Spatial Audio

    Audio technology that creates a three-dimensional sound experience for listeners.

  • Split Testing

    A method of comparing two versions of a webpage or app against each other to determine which one performs better.  

  • Springboard

    Launching point for further development or progress.

  • Sprint

    A set period during which specific work must be completed and made ready for review in Agile development. 

  • SQL

    Structured Query Language for managing relational databases.

  • SQL (Structured Query Language)

    A domain-specific language used in programming and designed for managing data held in a relational database management system.  

  • SRS (Software Requirements Specification)

    A document that describes what the software will do and how it will be expected to perform.  

  • SSH (Secure Shell)

     A cryptographic network protocol for operating network services securely over an unsecured network.  

  • SSL (Secure Sockets Layer)

    Encryption protocol for web security.  

  • Stable Diffusion

    Process for gradually introducing changes into a system.

  • Staging Site

    A platform containing the exact copy of the site used for testing and debugging.  

  • Storyboard

    A sequence of sketches or images used to plan a visual narrative.  

  • Structured Vs Unstructured Data

    Structured data is highly organized and easily searchable; unstructured data lacks a pre-defined format or organization.  

  • Supply Chain

    Network involved in producing and delivering products.

  • Synthetic Data In Healthcare

    Artificially generated data that simulates real-world healthcare data, used in research, AI training, and software testing without compromising patient privacy.

  • System Integration

    The process of linking different computing systems and software applications physically or functionally.  

  • System Software

    Software designed to provide a platform for other software.  

  • Systems Integration

    The process of linking together different computing systems and software applications physically or functionally.  

  • T

  • Tech Debt

    Accumulation of suboptimal code requiring future rework.

  • Tech Stack

    The combination of programming languages, tools, and frameworks used in software development.  

  • Technology And Sovereign Power

    The relationship between technological advancements and national sovereignty and power.

  • Technology For Circular Economy

    Technologies that support the circular economy by promoting reuse, recycling, and sustainability.

  • Telehealth

    The use of digital communication technologies, such as video conferencing and mobile apps, to provide healthcare services remotely, including consultations, diagnostics, and follow-ups.

  • Telemedicine

    The remote diagnosis and treatment of patients by means of telecommunications technology.

  • Telemetry

    The remote monitoring of a patient’s vital signs, such as heart rate and rhythm, often used in critical care settings.

  • Telepharmacy

    The delivery of pharmaceutical care through telecommunications to patients in locations where they may not have direct contact with a pharmacist.

  • Template

    The layout and design of the platform that can be replicated.  

  • TensorFlow

    Open-source platform for machine learning.

  • Test Case

    A set of conditions under which a tester will determine whether a software application or system is working correctly.  

  • Texture

    The surface quality or feel of an element in a design.  

  • Thumbnail

    A small, low-resolution preview of an image or design.  

  • Tint

    The shade of color that is created when white is added to lighten the hue.  

  • Tokenization

    The process of substituting a sensitive data element with a non-sensitive equivalent, called a token, which can be used in a database or internal system without bringing it into scope.

  • Touchless Interactions

    User interfaces that allow interaction without physical contact, often using gestures or voice commands.

  • Trunk-Based Development

    Development practice with a single shared branch.

  • Trustworthy Data

    Data that is accurate, reliable, and secure, ensuring confidence in its use.

  • TypeScript

    Typed superset of JavaScript enhancing code quality.

  • Typography

    The art and technique of arranging type in a visually appealing way.  

  • U

  • UAT (User Acceptance Testing)

    The process of verifying that a software solution works for the user.  

  • Ubiquitous Connectivity

    The widespread availability of network connections, enabling seamless communication and data exchange.

  • UI (User Interface) Design

      Designing the visual elements of software or websites  

  • UI/UX (User Interface/User Experience)

    Designing user-friendly interfaces.  

  • Understandable Consent

    Clear and transparent mechanisms for obtaining user consent for data collection and usage.

  • Unit Test

    Testing individual components of a software application.

  • Unity

    Game development platform for creating 2D and 3D games.

  • Unreal Engine

    Tool for creating high-quality games and interactive 3D experiences.

  • Uptime

    Percentage of time a website is available.  

  • URL (Uniform Resource Locator)

    Web address for accessing content.  

  • Usability

    The ease with which users can navigate a website.  

  • Usability Testing

    Evaluating user experience.  

  • User Flow

    Path users take through a website.  

  • User Stories

    Simple descriptions of a feature from the perspective of the end user or customer.  

  • User-Centered Design (UCD)

    A design process that focuses on usability and user needs at every stage.  

  • UX Research

    Gathering user feedback and insights.  

  • V

  • Validation

    Ensuring software meets requirements and specifications.

  • Value-Based Care

    A healthcare delivery model in which providers are paid based on patient health outcomes rather than the volume of services provided.

  • Vector

    Graphics created using mathematical equations, scalable without loss of quality.  

  • Vector Databases

    Databases optimized for storing and querying high-dimensional data, often used in AI and machine learning.

  • Verification

    Checking that software correctly implements specified functions.

  • Version Control

    A system that records changes to a file or set of files over time so that you can recall specific versions later.  

  • Virtual Nursing Assistants

    AI-powered virtual assistants that provide patients with basic nursing support, such as answering questions, monitoring symptoms, and providing medication reminders.

  • Virtual Reality (VR)

    Simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way.  

  • Visual Hierarchy

    The arrangement of elements to guide the viewer's attention.   

  • Visual Identity

    The overall look and feel of a brand's design elements.  

  • W

  • Watermark

    A semi-transparent mark or logo placed on an image for copyright protection.  

  • Wearable Technology

    Electronic devices worn on the body that can collect data, track activities, or provide real-time feedback on health metrics.

  • Web 3.0

    Decentralized web with enhanced data privacy and user control.

  • Web Application

    An application program stored on a remote server and delivered over the Internet through a browser interface.  

  • Web Security

    The practice of protecting websites and web applications from cyber threats.  

  • Web Server Configuration

    Customizing server settings.  

  • Web Services

    Software systems designed to support interoperable machine-to-machine interaction over a network.  

  • Website Architecture

    Structure and organization of a website.  

  • Website Maintenance

    Ongoing updates and improvements.  

  • Website Migration

    Moving a website to a new host or platform.  

  • White Label App

    A fully customizable application developed by one company that other companies can rebrand and resell as their own. 

  • White Space

    The empty or unmarked areas in a design, used for balance and clarity.  

  • Widget

     A component of a graphical user interface (GUI) that displays information or provides a specific way for a user to interact with the operating system or an application.  

  • Wireframe

    A simplified, non-graphic representation of a web page or interface.  

  • Wireframing Tool

    Software for creating wireframes.  

  • X

  • X-height

    The height of lowercase letters in a font.  

  • X-Ray Imaging Software

    Advanced software used to enhance, analyze, and share x-ray images, enabling better diagnosis and treatment planning in radiology.

  • Xamarin

    Framework for building cross-platform mobile applications.

  • XML (eXtensible Markup Language)

    A data format for structured content.  

  • XR-enabled Hybrid Working

    Using Extended Reality technologies to facilitate remote and hybrid work environments.

  • Y

  • Y-axis

    The vertical line in a coordinate system used for positioning elements.  

  • YAML

    A human-readable data format for storing and transmitting information  

  • Z

  • Z-axis

    The depth or three-dimensional aspect of a design.  

  • Zero Knowledge Proofs

    Cryptographic methods that allow one party to prove to another that a statement is true without revealing any additional information.

  • Zoom

    Enlarging or reducing the view of a design or image.  

  • Zoonotic Disease Monitoring

    The use of technology, including biosensors and data analytics, to monitor diseases that can be transmitted from animals to humans, crucial for public health surveillance.