A permanent redirect from one URL to another.
Creating three-dimensional images using software.
Page not found error message.
Ensuring web content is usable by people with disabilities.
Active Directory Federation Services (ADFS) is a feature of Windows Server that provides users with seamless access to multiple applications using single sign-on (SSO) capabilities. It enables organizations to authenticate users across different domains or organizations without the need for multiple logins, enhancing user experience and improving productivity. ADFS works by issuing security tokens that […]
Technologies designed to engage users for extended periods, often leading to excessive use.
AI-powered platform for quick, efficient content creation.
Techniques to create AI models that can resist malicious attacks.
Technology that can recognize and respond to human emotions.
Modeling complex systems using autonomous agents to simulate interactions and behaviors.
Research focused on creating Artificial General Intelligence, capable of performing any intellectual task that a human can.
A flexible and iterative approach to software development emphasizing incremental delivery and collaboration.
A short description of a feature or functionality from an end user's perspective in Agile development.
The process of transitioning an organization to Agile methodologies and principles.
Ability to respond quickly and effectively to change.
Autonomous programs that perform tasks or simulate behaviors using artificial intelligence.
Cloud-based AI services that provide businesses with AI capabilities without requiring in-house infrastructure.
The application of AI technologies to enhance cybersecurity measures.
Policies and practices to ensure the safe and ethical development of AI technologies.
The use of AI tools to enhance and automate aspects of software development.
Content such as images, videos, and text created using AI algorithms.
Integrated solutions leveraging AI, Internet of Things, and Extended Reality technologies.
Deploying AI and machine learning models directly on edge devices rather than centralized servers.
A technique for updating web content without reloading the page.
The arrangement of text or elements to create a cohesive visual layout.
Digital or virtual currencies that function as alternatives to traditional currencies.
Colors that are next to each other on the color wheel.
Anti-Malware Software is a type of security software that detects, prevents and removes malware or malicious software, describing a form of malware from attacking a computer, network, and other digital systems. Malware refers to bad programs like viruses, worms, trojans, ransomware, spyware, and adware, that may compromise the security and functionality of a system. Key […]
A set of protocols and tools for building software and applications.
An API Gateway is a server that acts as an intermediary between client applications and backend services, facilitating communication and managing requests. In modern microservices architectures, where different services communicate via APIs (Application Programming Interfaces), an API Gateway centralizes and manages API calls, ensuring seamless interaction between clients and multiple services. The API Gateway handles […]
Connecting third-party services to a website.
A code used to authenticate and access APIs.
A visual programming environment for creating mobile applications.
A program or group of programs designed for end-users.
A data structure consisting of a collection of elements, each identified by an index or key.
A virtual canvas within graphic design software where designs are created.
Any file that is produced during the software development process.
Simulation of human intelligence processes by machines, especially computer systems.
An upward part of a letter that extends above the x-height.
The proportional relationship between an image's width and height.
Systematic approach to managing organizational assets.
In the context of security policy, ASU typically stands for Automated Security Updates. These are updates that are automatically applied to systems or software to address security vulnerabilities, improve performance, or patch bugs without requiring manual intervention. Key Aspects of ASU (Automated Security Updates): 1. Automated Patching: Security patches and updates are applied automatically as […]
An enhanced version of reality where live, direct or indirect, views of physical real-world environments are augmented with superimposed computer-generated images.
The process of verifying the identity of a user or system.
The use of automation to ensure adherence to regulatory requirements.
Pharmacy automation systems that store and dispense medications, designed to improve the efficiency and safety of the medication distribution process in healthcare settings.
The use of robots and AI to perform tasks traditionally done by human workers.
Automated machine learning processes that simplify the creation of machine learning models.
Robots capable of performing tasks independently without human intervention.
Self-driving vehicles that operate without human input.
Comprehensive cloud platform offering scalable computing, storage, and databases.
Microsoft's cloud computing platform and services.
The server-side of a web application, responsible for managing data within the database and serving that data to the front end.
The area behind the main content of a design.
The process of creating a copy of site data.
The distribution of visual weight in a design for stability.
Unix shell and command language.
Command to execute Bash scripts from the command line.
Script written for the Bash command language.
Innovative language simplifying complex computations.
Large volumes of data that can be analyzed for insights and decision-making.
A request for permission to introduce, or deliver for introduction, a biologic product into interstate commerce, reviewed by the FDA.
A biometric authentication is a security process that verifies an individual’s identity using unique biological characteristics, such as fingerprints, facial features, iris patterns, or voice recognition. Unlike traditional methods like passwords or PINs, biometric data is inherently unique to each person, making it a more secure and difficult-to-replicate form of authentication. This technology is widely […]
Biometrics refers to the measurement and statistical analysis of people’s unique physical and behavioural characteristics. These characteristics are used primarily for identification and access control. Biometrics systems are commonly used for security purposes, as they provide a highly reliable and difficult-to-replicate method of authentication. Types of Biometrics: – Fingerprint Recognition: Scans the unique patterns of […]
Images made up of individual pixels, not scalable without quality loss.
Testing without knowledge of internal code structure.
Extra space beyond the document's edge to ensure images or colors extend to the paper's edge.
A decentralized digital ledger used to record transactions across multiple computers.
Technique for reducing downtime during deployments.
A front-end framework for responsive web design.
An area of program refinement that starts with smaller modules and builds into a complete software program.
Direct communication pathways between the brain and external devices.
A copy of source code within a version control system.
All elements that represent a companyÂ’s image to the public.
A visual depiction of a brand.
A document that details the business solution for a project including the documentation of customer needs and expectations.
Navigational links to show the user's location on a website.
An error, flaw, or fault in a computer program that causes it to produce incorrect or unexpected results.
The process of converting code into a standalone form that can be run on a computer.
A strategy for improving organizational efficiency by redesigning core business processes.
Modern, object-oriented programming language by Microsoft.
A hardware or software component that stores data so future requests for that data can be served faster.
NoSQL database for handling large amounts of data.
Methods for determining cause-and-effect relationships in machine learning models.
A method to frequently deliver apps to customers by introducing automation into the stages of app development.
A network for fast content distribution.
Focusing on a central element or user experience.
The practice of building software when all working copies of code are merged into one branch.
A health information technology system designed to assist physicians and other health professionals with clinical decision-making tasks.
The application of informatics and information technology to deliver healthcare services, focusing on the management of health information systems in clinical settings.
The study of health and illness in people, aimed at improving knowledge and treatment.
The use of technology to streamline and automate routine clinical tasks, such as patient check-ins, appointment scheduling, and documentation, to improve efficiency and reduce errors.
A vector path used to isolate an object from its background.
The delivery of computing services over the internet, including storage, processing, and software.
Hub for managing cloud operations and security.
Hardware and software that supports cloud computing.
The process of configuring multiple cloud services to share data and processes.
Moving data and applications to cloud environments.
Protecting data and applications in cloud environments.
An electronic health record system that is hosted on the cloud, enabling healthcare providers to access patient data from anywhere with an internet connection.
Applications designed for cloud environments.
Software to manage and publish web content.
Extensions to add features to a content management system.
The color model used for print design, consisting of cyan, magenta, yellow, and black inks.
Guidelines and principles to ensure ethical software development and usage.
The process of editing code to reduce or eliminate technical debt.
Platforms and tools that facilitate collaboration among diverse teams and organizations.
A set of colors used consistently in a design to maintain visual harmony.
The logical structure for color that includes harmony between colors, the context of how colors are used, and the color wheel.
Common secure configurations are standardized security settings and practices used to safeguard systems, networks, and applications against vulnerabilities. These configurations are designed to minimize security risks by enforcing best practices, such as disabling unnecessary services, applying strong authentication methods, securing default settings, and managing permissions. Implementing common secure configurations ensures that systems are hardened, reducing […]
Colors that are opposite each other on the color wheel.
Guidelines issued by the Office of Inspector General (OIG) to assist healthcare providers in developing effective internal controls to ensure compliance with regulations.
The arrangement and organization of design elements within a layout.
A computer security incident refers to any event that compromises the confidentiality, integrity, or availability of computer systems or data. This can include unauthorized access, data breaches, malware infections, denial of service attacks, or any other event that negatively impacts system operations or data security. Responding to a computer security incident typically involves identifying the […]
A system that allows healthcare providers to enter and manage orders for medications, laboratory tests, and other services electronically, reducing the risk of errors.
The early stage of design focused on ideas and concepts.
The ability of different parts of a program to execute out-of-order or in partial order, without affecting the final outcome.
Confidentiality in technology refers to the principle of ensuring that sensitive information is accessed only by authorized individuals and remains protected from unauthorized disclosure. It is a critical aspect of information security, aimed at safeguarding personal data, intellectual property, and proprietary information from breaches or leaks. To maintain confidentiality, organizations implement various measures, including encryption, […]
Extended Reality technologies designed for consumer use, such as VR headsets and AR apps.
Practice of merging code changes frequently.
The degree of difference between elements in a design, often used to create emphasis.
The difference in brightness between foreground and background elements.
A conversion rate is a business metric that shows how many people take a desired action.
The data sent by an internet server to a browser.
Legal protection for original creative works, including designs.
A globally distributed, multi-model database service designed for managing data at scale.
Search engines send bots to gather intel on published web pages to determine what should be displayed or removed.
The software and apps used to gather, analyze, and maintain information on prospects.
The removal of unwanted areas from an image to focus on a specific part.
Lines indicating where a document will be trimmed after printing.
Ensuring a website works on different browsers.
Cross-selling is a sales technique that involves offering customers additional services or products related to the one(s) theyÂ’re already purchasing.
A language used to describe the style of HTML documents.
A custodian refers to an individual or entity responsible for managing and safeguarding information assets, data, or technology resources within an organization. Custodians play a vital role in ensuring that data is protected, compliant with legal and regulatory requirements, and accessible only to authorized users. Custodians are often responsible for the implementation of data governance […]
The overall perception of a customer's interaction with a company or brand.
Protecting systems and data from digital threats and attacks.
Protecting websites from online threats.
Data refers to any collection of facts, figures, or information that can be processed, stored, and analyzed by computers. It can exist in various forms, including text, numbers, images, audio, and video, and is fundamental to the functioning of software applications, databases, and digital systems. It is often categorized into structured, semi-structured, and unstructured types. […]
Process of examining data sets to draw conclusions about the information they contain.
Unified analytics platform for big data and machine learning.
Secure environments where data can be analyzed without exposing raw data to outside parties.
The process of detecting and correcting (or removing) corrupt or inaccurate records from a dataset.
Agreements that define the structure, quality, and access rights of data shared between parties.
The practice of designing and building systems for collecting, storing, and analyzing data.
The underlying framework that supports the collection, storage, and management of data.
The process of combining data from different sources to provide a unified view.
The ability of different information systems, devices, and applications to access, exchange, integrate, and cooperatively use data in a coordinated manner.
The process of tagging data with labels to make it usable for machine learning models.
Data Loss Prevention (DLP) refers to a set of strategies and tools designed to protect sensitive information from unauthorized access, accidental deletion, or data breaches. DLP aims to prevent data loss across various environments, including on-premises systems, cloud storage, and mobile devices. Organizations implement DLP measures to safeguard critical data such as customer information, intellectual […]
The practice of managing data as a valuable resource to unlock its potential for an organization.
Platforms where data providers and consumers can trade data assets.
An approach to data management that treats data as a product and organizes it by domain.
The process of creating a data model to organize and structure data.
Detailed definitions of data products to ensure consistency and quality in data management.
The legal frameworks that govern the collection, storage, and sharing of personal health information, including HIPAA in the U.S. and GDPR in the European Union.
Data scraping (or web scraping) is the process of extracting information from online sources with the help of a special digital tool.
A combination of technologies and tools used to process and analyze data.
The continuous flow of data at a high volume, often used for real-time processing.
A particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently.
A system used for reporting and data analysis, storing current and historical data in one place.
An organized collection of data generally stored and accessed electronically.
Automated machine learning platform for building models.
Distributed Denial of Service attack to overwhelm a website.
The process of removing or obscuring personal identifiers from health information so that individuals cannot be readily identified, often used to comply with privacy regulations.
The process of finding and resolving bugs or defects in software.
Data platforms that operate without centralized control, often using blockchain technology.
Identity management systems that allow users to control their own identity data without relying on central authorities.
Systems that allow individuals to store and manage their personal data independently.
Security measures that distribute control and decision-making to prevent centralized points of failure.
The application of quantitative techniques to inform decision-making processes.
Demand-based pricing is the revenue management strategy of rating products or services according to customer demand trends.
The process of distributing a software application to be used.
Tools and environments designed to enhance the productivity and satisfaction of software developers.
A set of practices that combines software development (Dev) and IT operations (Ops) to shorten the development lifecycle.
Integrating security practices into the DevOps process to enhance software security.
Techniques that ensure the privacy of individual data points while allowing for aggregate data analysis.
Technologies and practices for monitoring and reducing digital carbon footprints.
A digital certificate is an electronic document used to prove the ownership of a public key, enabling secure communication and transactions over the internet. It serves as a digital counterpart to a traditional certificate, providing verification of an entity’s identity, such as an individual, organization, or device. Digital certificates are issued by a trusted third […]
The complex network of interconnected digital technologies and platforms.
The use of technology to improve the health and wellness of individuals, including mobile health apps, wearable devices, telemedicine, and personalized medicine.
AI-generated characters that can interact with humans in a lifelike manner.
The extent to which an organization can use digital technologies to improve processes and outcomes.
Evidence-based therapeutic interventions driven by software programs to prevent, manage, or treat medical conditions, often used in conjunction with medication or other therapies.
The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.
A virtual replica of a physical object or system used for analysis and simulation.
Creating virtual replicas of physical objects or systems.
A Disaster Recovery Plan (DRP) is a documented strategy that outlines the procedures an organization must follow to recover from disruptive events, such as natural disasters, cyberattacks, or system failures. The primary goal of a DRP is to ensure the continuity of critical business operations and minimize the impact of disruptions on an organization’s infrastructure, […]
Decentralized energy generation and storage systems, such as solar panels and batteries.
Converts domain names into IP addresses.
A platform for developing, shipping, and running applications inside software containers.
Docker Swarm is a powerful container orchestration tool that enables developers to manage a cluster of Docker containers seamlessly. It transforms a group of Docker engines into a single virtual system, simplifying the deployment, scaling, and management of applications. Key terms related to Docker Swarm include: Node: A machine participating in the Swarm, which can […]
The Domain Name System (DNS) is a hierarchical and decentralized naming system used to translate human-readable domain names into numerical IP addresses, which are essential for locating and accessing resources on the internet. For example, when a user enters a web address like www.example.com into their browser, the DNS converts this domain name into the […]
Design approach focusing on complex domain logic.
A measurement of image resolution, affecting print quality.
A visual effect that adds a shadow behind an element to create depth.
Advanced technologies designed to deliver drugs to specific parts of the body in controlled amounts, improving the efficacy and reducing side effects of treatments.
Online buying and selling of products or services.
The process of electronically generating and sending prescription orders to a pharmacy.
Efforts to make generative AI technologies more accessible to users and businesses.
Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
The use of information and communication technologies (ICT) for health, including services such as telemedicine, electronic health records, and health information systems.
A digital version of a patient’s paper chart, making information available instantly and securely to authorized users.
Digital versions of patients' paper charts and medical history.
ElastiCache is a fully managed in-memory caching service provided by Amazon Web Services (AWS) that enhances the performance of applications by allowing data retrieval from fast, managed in-memory data stores, instead of relying on slower disk-based databases. It supports two popular open-source in-memory caching engines: Redis and Memcached. Key terms related to ElastiCache include: Cache […]
Electronic Information Resources (EIR) refer to digital materials that provide access to information and knowledge through electronic means. These resources encompass a wide range of formats, including e-books, online databases, electronic journals, multimedia content, and websites. EIR plays a crucial role in research, education, and professional development by offering convenient access to vast amounts of […]
Electronic Information, Communication, and Technology (EICT) encompasses a broad range of electronic tools and systems that facilitate the creation, storage, dissemination, and management of information. EICT integrates various technologies, including computers, telecommunications, and software applications, to enable efficient communication and data exchange across different platforms and devices. EICT plays a crucial role in modern society, […]
A digital version of a paper medication administration record, allowing for real-time tracking and administration of medications to patients.
Digital tools that allow patients to report their health status directly to healthcare providers, often used in clinical trials and chronic disease management.
A process that raises a design above the surface for a tactile effect.
A federal law that requires hospitals with emergency departments to provide a medical screening examination and necessary stabilization treatment to anyone seeking emergency care, regardless of their ability to pay.
Performing computations on encrypted data to ensure privacy and security.
Encrypted data refers to information that has been transformed using cryptographic techniques to protect its confidentiality and integrity. The encryption process involves converting plaintext (readable data) into ciphertext (unreadable format) using an algorithm and a key. Only individuals or systems with the correct decryption key can revert the ciphertext back to its original plaintext form, […]
Encryption is the process of converting plaintext (readable information) into ciphertext (a scrambled format) to protect sensitive data from unauthorized access. This transformation is achieved using mathematical algorithms and encryption keys, which serve as the security mechanism that allows only authorized users to decode and access the original information. Encryption plays a vital role in […]
The individual that uses a particular product.
The organizational structure that defines the operation of an organization.
Software designed to serve the needs of an organization rather than individual users.
Extended Reality technologies designed for use in enterprise environments, such as virtual training and simulations.
Software integrating and streamlining business processes into one system.
Escrow in tech refers to a legal arrangement where a third party holds valuable digital assets, such as software source code, cryptographic keys, or sensitive data, on behalf of two other parties involved in a transaction or agreement. The purpose of tech escrow is to ensure that the assets are securely managed and only released […]
Ethernet is a widely used technology for local area networks (LANs) that facilitates the connection and communication of devices within a specific geographical area. First developed in the 1970s by Xerox, Ethernet has evolved significantly over the decades, becoming a standard protocol for wired networking. At its core, Ethernet defines the physical and data link […]
Structured guidelines for making ethical decisions in technology development and use.
A professional responsible for designing and creating the data warehousing process, which includes extraction, transformation, and loading of data.
Testing the process of extracting, transforming, and loading data to ensure data integrity and performance.
A system that responds to an external event.
Designed to handle external events.
Software design focused on responding to events.
Architectures designed to evolve and adapt over time in response to changing requirements.
Code that can be run independently without translation.
AI systems designed to provide understandable and transparent explanations of their decisions.
Minimalist web framework for Node.js.
Blending or softening the edges of an image or object.
A machine learning approach where models are trained across multiple decentralized devices or servers.
A standard for exchanging healthcare information electronically, aiming to simplify implementation without sacrificing information integrity.
A layout or extension of a file. Popular file formats are JPEG, TIFF, PNG, and GIF.
FTP, or File Transfer Protocol, is a standard network protocol used to transfer files between a client and a server over a TCP/IP network, such as the internet. Developed in the early 1970s, FTP enables users to upload, download, delete, and manage files on a remote server, making it a vital tool for web developers, […]
Detailed and specific permissions for accessing different parts of a dataset.
Financial operations practices that optimize cloud spending and financial management.
A system to protect a secure network from an unsecured network.
Firewalls are essential security devices or software that monitor and control incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between trusted internal networks and untrusted external networks, such as the internet, firewalls help protect systems from unauthorized access, cyber threats, and data breaches. There are several types of firewalls, […]
A minimalistic design approach.
A specific typeface or style of text used in design.
A platform for developing software applications that provides a foundation structure.
Compatibility with multiple development frameworks.
Predefined structures to simplify software development.
The part of a website or application that users interact with directly.
Tools for building user interfaces.
A protocol for transferring files to a server.
A software developer that can work on the frontend and backend.
Paradigm focused on functions and immutability.
Specifications of functions that a system or component must be able to perform.
Testing software against functional requirements.
Generative AI tools integrated into Integrated Development Environments to assist developers.
A regulation in EU law on data protection and privacy for individuals, which also addresses the transfer of personal data outside the EU and EEA, impacting healthcare data management.
AI technologies that create new content, such as text, images, or music, from scratch.
The use of advanced analytics and computational tools to analyze genomic data, enabling personalized medicine, and the identification of genetic predispositions to diseases.
Technology that interprets human gestures to control devices or interact with systems.
A distributed version control system used for tracking changes in source code.
Branching model for managing Git projects.
A web-based hosting service for version control using Git.
Open-source programming language by Google.
An international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses, and reporting of clinical trials.
Regulations that require manufacturers, processors, and packagers of drugs, medical devices, and food to ensure that their products are safe, pure, and effective.
A gradual transition between two or more colors.
Query language for APIs, allowing for flexible data retrieval.
Cloud computing practices that aim to reduce environmental impact and promote sustainability.
Software development practices that focus on reducing environmental impact.
User experience design practices that prioritize sustainability and environmental impact.
A framework of horizontal and vertical lines used for layout consistency.
The space between columns or pages in a layout.
Open-source framework for big data processing and storage.
The electronic movement of health-related information among organizations according to nationally recognized standards.
The application of information technology to healthcare, including electronic health records, telemedicine, mobile health applications, and health information exchanges.
A public-private partnership to identify and reduce fraud, waste, and abuse across the healthcare sector.
Adherence to the regulations and standards set by the Health Insurance Portability and Accountability Act for protecting sensitive patient data.
Storing and serving web files on a server.
The standard language for web pages.
The foundation of data communication for the World Wide Web.
The attribute of color that distinguishes one from another.
Combination of private and public cloud services.
A simplified graphical representation of an object or concept.
A software application that provides comprehensive facilities to computer programmers for software development.
Hand-drawn or digital artwork used in design.
The ability of a software system to identify objects, places, people, or actions in images.
A surgical procedure in which the surgeon uses preoperative and intraoperative imaging to guide the surgery, often involving advanced visualization and navigation technologies.
A field of cancer treatment that uses the body’s immune system to fight cancer, often involving advanced biotechnologies like CAR-T cell therapy.
The growing trend of governments imposing more regulations on technology companies and practices.
Extended Reality technologies applied in industrial settings, such as manufacturing and maintenance.
A visual representation of data or information.
An Information Resources Manager (IRM) is responsible for overseeing the strategic management of an organization’s information assets, including data, technology, and related resources. The role of an IRM is to ensure that information is effectively utilized to support business goals while maintaining security, compliance, and operational efficiency. This often involves developing and implementing policies, managing […]
Information security (InfoSec) refers to the practice of protecting digital and physical data from unauthorized access, alteration, destruction, or disclosure. It encompasses a wide range of strategies, tools, and measures designed to safeguard the confidentiality, integrity, and availability (CIA) of information within an organization. In tech, InfoSec plays a crucial role in protecting sensitive data […]
An Information Security Council (ISC) is a governance body within an organization that focuses on overseeing, advising, and setting strategic direction for all aspects of information security. The council is typically made up of senior executives, IT leaders, and security professionals who collaborate to ensure that the organization’s information security policies and practices are aligned […]
An Information Security Officer (ISO) is a senior-level executive responsible for managing and overseeing an organization’s information security program. The ISO ensures that all digital assets, sensitive data, and IT infrastructure are protected from cyber threats, unauthorized access, and data breaches. This role involves establishing and enforcing security policies, coordinating risk management activities, and ensuring […]
A process of communication between a patient and a healthcare provider that results in the patient's authorization or agreement to undergo a specific medical intervention, ensuring compliance with ethical and legal standards.
Platforms that combine data management and AI capabilities for streamlined workflows.
Testing combined modules as a group.
Systems where machines communicate and work together autonomously.
Systems that engage patients in their care through interactive technology, such as bedside tablets or patient portals, to improve patient education and satisfaction.
In computing, a shared boundary across which two separate components of a computer system exchange information.
Legal frameworks governing the use and exchange of cryptocurrencies across different countries.
Ability of systems to work together seamlessly.
The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.
An Intrusion Detection System (IDS) is a security tool used to monitor network or system activities for malicious behavior or policy violations. IDS solutions are designed to detect unauthorized access, cyberattacks, and other security breaches in real-time, alerting administrators when potential threats are identified. Unlike firewalls, which block intrusions, IDS passively monitors and reports suspicious […]
A design collaboration and prototyping platform.
A connected infrastructure of medical devices and software applications that communicate with various healthcare IT systems.
The network of physical objects embedded with sensors and connectivity to exchange data.
A single cycle in a process aimed at achieving a goal, often used in agile and iterative development methodologies.
A programming language for interactive web elements.
An open-source automation server that helps automate the parts of software development related to building, testing, and deploying.
Express framework tailored for JavaScript developers.
Unit testing framework for Java programming language.
An approach for managing software development that depicts all planned work to optimize the overall process.
Adjusting the space between individual characters in a font.
A network of entities and their relationships, used to integrate and access information.
Data structures that represent relationships between concepts and entities, used for organizing and retrieving information.
An open-source platform for automating deployment, scaling, and operations of application containers.
A software bundle for web development (Linux, Apache, MySQL, PHP).
A web page designed for specific user actions.
Framework for developing AI applications using large language models.
The arrangement of text and graphics on a page or screen.
Technique for deferring the loading of resources.
The vertical space between lines of text in a paragraph.
A methodology for developing businesses and products based on validated learning and rapid iteration.
A collection of non-volatile resources used by computer programs, often for software development.
The process of migrating applications and associated data to a cloud environment without redesigning the app.
Images composed of lines, often used in logos or illustrations.
The time it takes for a web page to fully load.
A Local Area Network (LAN) is a network infrastructure that connects computers, devices, and other resources within a small geographic area, such as a home, office, or school. LANs enable communication between devices, allowing them to share resources like files, printers, and internet connections. Typically, LANs consist of network devices such as routers, switches, and […]
Development approach with minimal hand-coding.
A subset of AI involving the use of algorithms and statistical models to enable computers to improve tasks.
A set of actions after the launch of a website to maintain the product.
Malicious code refers to any software or script that is designed to cause harm to a computer system, network, or user. It encompasses a wide range of cyber threats, including viruses, worms, Trojans, ransomware, spyware, and other types of malware. Malicious code can exploit system vulnerabilities, steal sensitive data, corrupt files, or disrupt normal operations. […]
Malicious software that can harm websites.
Outsourced security services for organizations.
The branch of health informatics that focuses on the efficient and effective management of medical images, including radiology and pathology images, often through PACS (Picture Archiving and Communication Systems).
Technology for medical and healthcare applications.
A system used to manage and monitor work-in-process on the factory floor.
Structured reference data that sorts attributes of specific information.
Virtual reality space for interacting in a digital environment.
A technique that enables the design and development of software to be implemented.
The use of mobile devices and wireless technology in healthcare to monitor patient health, deliver care, and provide health information.
An architectural style that structures an application as a collection of loosely coupled services.
Software that acts as a bridge between an operating system or database and applications, especially on a network.
A product with enough features to satisfy early adopters and provide feedback for future development.
Practices that combine machine learning, development, and operations to streamline the deployment and maintenance of ML models.
The ability to access information and services anywhere, anytime, on any device.
A visual representation of a design, often used for presentation or testing.
The process of adapting something to modern needs or habits, typically by updating systems, processes, and technology.
A separate unit of software or hardware.
A design or image that uses shades of a single color.
Single-tiered software architecture tightly integrated.
A font where letters and characters occupy the same amount of horizontal space.
Design that includes a combination of text, graphics, audio, and video.
AI systems that can process and understand multiple types of data, such as text, images, and audio.
A software architectural pattern.
An open-source relational database management system.
The application of nanotechnology to medicine, including the use of nanoparticles for drug delivery, imaging, and as part of therapeutic devices.
The field of AI focused on enabling machines to understand and process human language.
Links for website navigation.
Progressive framework for building efficient Node.js applications.
A type of AI that mimics the human brain to recognize patterns and interpret data in complex ways, often used in diagnostics, imaging analysis, and drug discovery.
Advanced cryptographic techniques designed to enhance security and privacy.
An open-source, cross-platform JavaScript runtime environment.
Non-relational databases for handling unstructured data.
A protocol for secure authorization.
Programming paradigm based on objects and classes.
The ability to measure and understand the internal state of a system based on the data it produces.
An integrated approach to sales and marketing that provides customers with seamless experience across multiple channels.
Machine learning methods that process data and update models in real time as new data arrives.
The degree of transparency or translucency in an element.
Software with source code that anyone can inspect, modify, and enhance.
The process of deploying and integrating AI models into business operations and workflows.
Comprehensive examination and improvement of a system.
A semi-transparent layer placed on top of an image or element.
A standardized color matching system used in printing.
Fundamental change in underlying assumptions or practices.
A special kind of variable, used in a subroutine to refer to one of the pieces of data provided as input to the subroutine.
A secure online website that gives patients access to their personal health information and enables communication with their healthcare providers.
An online advertising model where advertisers pay a fee each time a user clicks on their ad.
A simulated cyberattack on a system to evaluate its security.
Assessing system performance under specific conditions.
An economy where individuals control and monetize their personal data.
Tailoring medical treatment and care to individual patient characteristics and needs using data and technology.
Any information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service.
A set of data processing elements connected in series.
The smallest unit of digital image representation.
Oracle's procedural language extension for SQL.
A cloud computing model providing a platform allowing customers to develop, run, and manage applications.
Treating digital platforms as standalone products with their own value propositions and user experiences.
An add-on that adds new functionalities to a host program or software without alternating the host itself.
Creating custom website extensions.
A demonstration to verify that certain concepts or theories have the potential for real-world application.
Open-source relational database management system.
A measurement of image resolution for digital displays.
Techniques using data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.
A design file prepared for high-quality printing.
Approaches and practices that prioritize user privacy in the design and operation of technologies.
Communication systems that prioritize and protect user privacy.
Technologies designed to protect user privacy while enabling data usage and analysis.
Methods for performing computations on data while preserving the privacy of individual data points.
A set of coded instructions that tell a computer how to run a program or calculation.
The process of identifying and validating product ideas through user research and testing.
A strategic plan that outlines the vision, direction, priorities, and progress of a product over time.
Automated systems that detect and respond to anomalies in production environments to maintain stability and security.
A formal language comprising a set of instructions that produce various kinds of output.
Web applications that use modern web capabilities to deliver an app-like experience to users.
Designing effective prompts for AI models.
An early sample or model of a product to test a concept or process.
A notification given by developers when theyÂ’re done building a feature.
The process of reviewing a software product to ensure it meets expectations.
The use of automated testing tools to execute tests on software applications to ensure they meet specified requirements.
Ensuring products meet specified quality standards.
AI utilizing quantum computing for complex problem-solving.
Advanced computing technology that uses quantum mechanics principles to perform complex calculations faster than classical computers.
The application of quantum computing to enhance machine learning algorithms and processes.
A request for data or information from a database.
AI techniques that combine information retrieval with content generation to improve accuracy and relevance.
Converting vector graphics into pixel-based images.
The movement towards decentralizing control and decision-making in technology systems and platforms.
JavaScript library for building user interfaces.
The process of defining a function or calculating a number by the repeated application of an algorithm.
Forwarding one URL to another.
State management library for JavaScript applications.
Verifying that changes haven't introduced new issues.
Adherence to laws, regulations, guidelines, and specifications relevant to healthcare operations.
The use of digital technologies to collect health data from patients in one location and electronically transmit that information securely to healthcare providers in a different location for assessment and recommendations.
The use of digital technologies to monitor and manage patients' conditions remotely, often involving tracking metrics like medication adherence and symptom management.
A central place where data is stored and managed.
The clarity and sharpness of an image or display.
Efforts to promote the ethical and responsible development and use of technology.
Design that adapts to different screen sizes and devices.
An architectural style for designing networked applications.
Representational State Transfer for web services.
Extended Reality displays with resolutions comparable to the human retina, providing highly detailed visuals.
Revenue management is a set of practices or techniques that consider consumer demand and set the optimal price for the product.
The color model used for digital design, consisting of red, green, and blue.
Automating business processes using robots and low-code development platforms.
Web application framework written in Ruby programming language.
A compositional technique that divides an object or frame into an equal, three-by-three grid with two horizontal and vertical lines.
The period during which a computer program is executing.
A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
A subset of regression testing to verify that a particular function or bug is working as expected.
Networks of satellites used for communication, navigation, and data collection.
The intensity or richness of a color.
The ability to resize an image or design without loss of quality.
The structure of a database system, described in a formal language.
The code that can be used on a website to help search engines deliver more information to users.
A typeface that mimics handwritten script or calligraphy.
Writing small programs to automate tasks.
A project management methodology for effective team collaboration thatÂ’s based on Agile software development.
A collection of software tools and libraries that developers use to create applications for specific platforms.
The general process of software development that follows a series of steps until completion.
Practices and tools to ensure the secure development and deployment of software applications.
The state of being free from danger or threat in a computing context.
Automated testing tool for web applications.
SQL-based command for querying databases.
A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
Cloud-based, scalable web hosting.
A style of software design where services are provided to the other components by application components, through a communication protocol over a network.
An outline of all pages on a website.
A rough or preliminary drawing or design.
Urban areas that use technology and data to improve infrastructure, services, and quality of life.
Systems that optimize energy use and efficiency in buildings and infrastructure.
Wearable or portable devices connected to a network that monitor health indicators such as heart rate, blood pressure, or glucose levels.
Homes equipped with connected devices and systems that automate and enhance daily living.
Medical implants equipped with sensors and connectivity features that allow them to monitor and transmit data on their performance and the patient’s condition in real-time.
Interconnected systems and devices that use data and intelligence to optimize performance and interactions.
Preliminary testing to check basic functionality.
Simple Objects Access Protocol is a web communication protocol for exchanging structured information in a decentralized, distributed environment.
The high-level structure of a software system, defining its components and their interactions.
A set of activities, methods, practices, and transformations used to develop and maintain software.
Process of evaluating software for errors and bugs.
Vehicles that rely on software to control and manage their functions and features.
Programming language for developing Ethereum smart contracts.
The fundamental component of a computer program created by a programmer.
Audio technology that creates a three-dimensional sound experience for listeners.
A method of comparing two versions of a webpage or app against each other to determine which one performs better.
Launching point for further development or progress.
A set period during which specific work must be completed and made ready for review in Agile development.
Structured Query Language for managing relational databases.
A domain-specific language used in programming and designed for managing data held in a relational database management system.
A document that describes what the software will do and how it will be expected to perform.
A cryptographic network protocol for operating network services securely over an unsecured network.
Encryption protocol for web security.
Process for gradually introducing changes into a system.
A platform containing the exact copy of the site used for testing and debugging.
A sequence of sketches or images used to plan a visual narrative.
Structured data is highly organized and easily searchable; unstructured data lacks a pre-defined format or organization.
Network involved in producing and delivering products.
Artificially generated data that simulates real-world healthcare data, used in research, AI training, and software testing without compromising patient privacy.
The process of linking different computing systems and software applications physically or functionally.
Software designed to provide a platform for other software.
The process of linking together different computing systems and software applications physically or functionally.
Accumulation of suboptimal code requiring future rework.
The combination of programming languages, tools, and frameworks used in software development.
The relationship between technological advancements and national sovereignty and power.
Technologies that support the circular economy by promoting reuse, recycling, and sustainability.
The use of digital communication technologies, such as video conferencing and mobile apps, to provide healthcare services remotely, including consultations, diagnostics, and follow-ups.
The remote diagnosis and treatment of patients by means of telecommunications technology.
The remote monitoring of a patient’s vital signs, such as heart rate and rhythm, often used in critical care settings.
The delivery of pharmaceutical care through telecommunications to patients in locations where they may not have direct contact with a pharmacist.
The layout and design of the platform that can be replicated.
Open-source platform for machine learning.
A set of conditions under which a tester will determine whether a software application or system is working correctly.
The surface quality or feel of an element in a design.
A small, low-resolution preview of an image or design.
The shade of color that is created when white is added to lighten the hue.
The process of substituting a sensitive data element with a non-sensitive equivalent, called a token, which can be used in a database or internal system without bringing it into scope.
User interfaces that allow interaction without physical contact, often using gestures or voice commands.
Development practice with a single shared branch.
Data that is accurate, reliable, and secure, ensuring confidence in its use.
Typed superset of JavaScript enhancing code quality.
The art and technique of arranging type in a visually appealing way.
The process of verifying that a software solution works for the user.
The widespread availability of network connections, enabling seamless communication and data exchange.
Designing the visual elements of software or websites
Designing user-friendly interfaces.
Clear and transparent mechanisms for obtaining user consent for data collection and usage.
Testing individual components of a software application.
Game development platform for creating 2D and 3D games.
Tool for creating high-quality games and interactive 3D experiences.
Percentage of time a website is available.
Web address for accessing content.
The ease with which users can navigate a website.
Evaluating user experience.
Path users take through a website.
Simple descriptions of a feature from the perspective of the end user or customer.
A design process that focuses on usability and user needs at every stage.
Gathering user feedback and insights.
Ensuring software meets requirements and specifications.
A healthcare delivery model in which providers are paid based on patient health outcomes rather than the volume of services provided.
Graphics created using mathematical equations, scalable without loss of quality.
Databases optimized for storing and querying high-dimensional data, often used in AI and machine learning.
Checking that software correctly implements specified functions.
A system that records changes to a file or set of files over time so that you can recall specific versions later.
AI-powered virtual assistants that provide patients with basic nursing support, such as answering questions, monitoring symptoms, and providing medication reminders.
Simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way.
The arrangement of elements to guide the viewer's attention.
The overall look and feel of a brand's design elements.
A semi-transparent mark or logo placed on an image for copyright protection.
Electronic devices worn on the body that can collect data, track activities, or provide real-time feedback on health metrics.
Decentralized web with enhanced data privacy and user control.
An application program stored on a remote server and delivered over the Internet through a browser interface.
The practice of protecting websites and web applications from cyber threats.
Customizing server settings.
Software systems designed to support interoperable machine-to-machine interaction over a network.
Structure and organization of a website.
Ongoing updates and improvements.
Moving a website to a new host or platform.
A fully customizable application developed by one company that other companies can rebrand and resell as their own.
The empty or unmarked areas in a design, used for balance and clarity.
A component of a graphical user interface (GUI) that displays information or provides a specific way for a user to interact with the operating system or an application.
A simplified, non-graphic representation of a web page or interface.
Software for creating wireframes.
The height of lowercase letters in a font.
Advanced software used to enhance, analyze, and share x-ray images, enabling better diagnosis and treatment planning in radiology.
Framework for building cross-platform mobile applications.
A data format for structured content.
Using Extended Reality technologies to facilitate remote and hybrid work environments.
The vertical line in a coordinate system used for positioning elements.
A human-readable data format for storing and transmitting information
The depth or three-dimensional aspect of a design.
Cryptographic methods that allow one party to prove to another that a statement is true without revealing any additional information.
Enlarging or reducing the view of a design or image.
The use of technology, including biosensors and data analytics, to monitor diseases that can be transmitted from animals to humans, crucial for public health surveillance.