A permanent redirect from one URL to another.
Creating three-dimensional images using software.
Page not found error message.
Ensuring web content is usable by people with disabilities.
ADFS works by issuing security tokens that contain user identity information.
Technologies designed to engage users for extended periods, often leading to excessive use.
AI-powered platform for quick, efficient content creation.
Techniques to create AI models that can resist malicious attacks.
Technology that can recognize and respond to human emotions.
Modeling complex systems using autonomous agents to simulate interactions and behaviors.
Research focused on creating Artificial General Intelligence, capable of performing any intellectual task that a human can.
A flexible and iterative approach to software development emphasizing incremental delivery and collaboration.
A short description of a feature or functionality from an end user's perspective in Agile development.
The process of transitioning an organization to Agile methodologies and principles.
Ability to respond quickly and effectively to change.
Autonomous programs that perform tasks or simulate behaviors using artificial intelligence.
Cloud-based AI services that provide businesses with AI capabilities without requiring in-house infrastructure.
The application of AI technologies to enhance cybersecurity measures.
Policies and practices to ensure the safe and ethical development of AI technologies.
The use of AI tools to enhance and automate aspects of software development.
Content such as images, videos, and text created using AI algorithms.
Integrated solutions leveraging AI, Internet of Things, and Extended Reality technologies.
Deploying AI and machine learning models directly on edge devices rather than centralized servers.
A technique for updating web content without reloading the page.
The arrangement of text or elements to create a cohesive visual layout.
Alpha testing is an early-stage testing process conducted by developers to identify bugs and validate the core functionality of software before external testing.
Digital or virtual currencies that function as alternatives to traditional currencies.
Colors that are next to each other on the color wheel.
Anti-Malware Software is a type of security software that detects, prevents and removes malware or malicious software.
A set of protocols and tools for building software and applications.
API Gateway centralizes and manages API calls, ensuring seamless interaction between clients and multiple services.
Connecting third-party services to a website.
A code used to authenticate and access APIs.
A visual programming environment for creating mobile applications.
A program or group of programs designed for end-users.
A data structure consisting of a collection of elements, each identified by an index or key.
A virtual canvas within graphic design software where designs are created.
Any file that is produced during the software development process.
Simulation of human intelligence processes by machines, especially computer systems.
An upward part of a letter that extends above the x-height.
The proportional relationship between an image's width and height.
Systematic approach to managing organizational assets.
ASU into security policies, organizations ensure that their systems are continuously protected against potential security risks and vulnerabilities.
A programming paradigm that allows tasks to run concurrently without blocking the execution of other tasks.
An enhanced version of reality where live, direct or indirect, views of physical real-world environments are augmented with superimposed computer-generated images.
The process of verifying the identity of a user or system.
The use of automation to ensure adherence to regulatory requirements.
Pharmacy automation systems that store and dispense medications, designed to improve the efficiency and safety of the medication distribution process in healthcare settings.
The use of robots and AI to perform tasks traditionally done by human workers.
Automated machine learning processes that simplify the creation of machine learning models.
Robots capable of performing tasks independently without human intervention.
Self-driving vehicles that operate without human input.
Comprehensive cloud platform offering scalable computing, storage, and databases.
Microsoft's cloud computing platform and services.
The server-side of a web application, responsible for managing data within the database and serving that data to the front end.
The area behind the main content of a design.
The process of creating a copy of site data.
The distribution of visual weight in a design for stability.
Unix shell and command language.
Command to execute Bash scripts from the command line.
Script written for the Bash command language.
Innovative language simplifying complex computations.
Large volumes of data that can be analyzed for insights and decision-making.
A request for permission to introduce, or deliver for introduction, a biologic product into interstate commerce, reviewed by the FDA.
A biometric authentication is a security process that verifies an individual’s identity using unique biological characteristics.
Biometrics refers to the measurement and statistical analysis of people's unique physical and behavioural characteristics.
Images made up of individual pixels, not scalable without quality loss.
Testing without knowledge of internal code structure.
Extra space beyond the document's edge to ensure images or colors extend to the paper's edge.
A decentralized digital ledger used to record transactions across multiple computers.
Technique for reducing downtime during deployments.
A front-end framework for responsive web design.
An area of program refinement that starts with smaller modules and builds into a complete software program.
Direct communication pathways between the brain and external devices.
A copy of source code within a version control system.
All elements that represent a companyÂ’s image to the public.
A visual depiction of a brand.
A document that details the business solution for a project including the documentation of customer needs and expectations.
Navigational links to show the user's location on a website.
An error, flaw, or fault in a computer program that causes it to produce incorrect or unexpected results.
Bugs are errors, flaws, or issues in software that cause it to behave unexpectedly or prevent it from functioning correctly.
The process of converting code into a standalone form that can be run on a computer.
A strategy for improving organizational efficiency by redesigning core business processes.
Modern, object-oriented programming language by Microsoft.
A hardware or software component that stores data so future requests for that data can be served faster.
NoSQL database for handling large amounts of data.
Methods for determining cause-and-effect relationships in machine learning models.
A method to frequently deliver apps to customers by introducing automation into the stages of app development.
A network for fast content distribution.
Focusing on a central element or user experience.
The practice of building software when all working copies of code are merged into one branch.
A health information technology system designed to assist physicians and other health professionals with clinical decision-making tasks.
The application of informatics and information technology to deliver healthcare services, focusing on the management of health information systems in clinical settings.
The study of health and illness in people, aimed at improving knowledge and treatment.
The use of technology to streamline and automate routine clinical tasks, such as patient check-ins, appointment scheduling, and documentation, to improve efficiency and reduce errors.
A vector path used to isolate an object from its background.
The delivery of computing services over the internet, including storage, processing, and software.
Hub for managing cloud operations and security.
Hardware and software that supports cloud computing.
The process of configuring multiple cloud services to share data and processes.
Moving data and applications to cloud environments.
Protecting data and applications in cloud environments.
An electronic health record system that is hosted on the cloud, enabling healthcare providers to access patient data from anywhere with an internet connection.
Applications designed for cloud environments.
Software to manage and publish web content.
Extensions to add features to a content management system.
The color model used for print design, consisting of cyan, magenta, yellow, and black inks.
Guidelines and principles to ensure ethical software development and usage.
The process of editing code to reduce or eliminate technical debt.
Platforms and tools that facilitate collaboration among diverse teams and organizations.
A set of colors used consistently in a design to maintain visual harmony.
The logical structure for color that includes harmony between colors, the context of how colors are used, and the color wheel.
Common secure configurations are standardized security settings and practices used to safeguard systems, networks, and applications against vulnerabilities.
A compiler is a program that converts source code written in a high-level programming language into machine code executable by a computer.
Colors that are opposite each other on the color wheel.
Guidelines issued by the Office of Inspector General (OIG) to assist healthcare providers in developing effective internal controls to ensure compliance with regulations.
The arrangement and organization of design elements within a layout.
A computer security incident refers to any event that compromises the confidentiality, integrity, or availability of computer systems or data.
A system that allows healthcare providers to enter and manage orders for medications, laboratory tests, and other services electronically, reducing the risk of errors.
The early stage of design focused on ideas and concepts.
The ability of different parts of a program to execute out-of-order or in partial order, without affecting the final outcome.
Confidentiality in technology refers to the principle of ensuring that sensitive information is accessed only by authorized individuals and remains protected from unauthorized disclosure.
Extended Reality technologies designed for consumer use, such as VR headsets and AR apps.
Packaging an application and its dependencies together to ensure consistent operation across environments (e.g., using Docker).
Practice of merging code changes frequently.
The degree of difference between elements in a design, often used to create emphasis.
The difference in brightness between foreground and background elements.
A conversion rate is a business metric that shows how many people take a desired action.
The data sent by an internet server to a browser.
Legal protection for original creative works, including designs.
A globally distributed, multi-model database service designed for managing data at scale.
Search engines send bots to gather intel on published web pages to determine what should be displayed or removed.
The software and apps used to gather, analyze, and maintain information on prospects.
The removal of unwanted areas from an image to focus on a specific part.
Lines indicating where a document will be trimmed after printing.
Ensuring a website works on different browsers.
Cross-selling is a sales technique that involves offering customers additional services or products related to the one(s) theyÂ’re already purchasing.
The four basic operations performed on database records.
A language used to describe the style of HTML documents.
A custodian refers to an individual or entity responsible for managing and safeguarding information assets, data, or technology resources within an organization.
The overall perception of a customer's interaction with a company or brand.
Protecting systems and data from digital threats and attacks.
Protecting websites from online threats.
Data refers to any collection of facts, figures, or information that can be processed, stored, and analyzed by computers.
Data abstraction simplifies complex systems by focusing on essential features while hiding implementation details.
Process of examining data sets to draw conclusions about the information they contain.
The process of connecting UI elements to application data.
Unified analytics platform for big data and machine learning.
Secure environments where data can be analyzed without exposing raw data to outside parties.
The process of detecting and correcting (or removing) corrupt or inaccurate records from a dataset.
Agreements that define the structure, quality, and access rights of data shared between parties.
The practice of designing and building systems for collecting, storing, and analyzing data.
The underlying framework that supports the collection, storage, and management of data.
The process of combining data from different sources to provide a unified view.
The ability of different information systems, devices, and applications to access, exchange, integrate, and cooperatively use data in a coordinated manner.
The process of tagging data with labels to make it usable for machine learning models.
Organizations implement DLP measures to safeguard critical data such as customer information, intellectual property, and financial records.
The practice of managing data as a valuable resource to unlock its potential for an organization.
Platforms where data providers and consumers can trade data assets.
An approach to data management that treats data as a product and organizes it by domain.
The process of creating a data model to organize and structure data.
Detailed definitions of data products to ensure consistency and quality in data management.
The legal frameworks that govern the collection, storage, and sharing of personal health information, including HIPAA in the U.S. and GDPR in the European Union.
Data scraping (or web scraping) is the process of extracting information from online sources with the help of a special digital tool.
A combination of technologies and tools used to process and analyze data.
The continuous flow of data at a high volume, often used for real-time processing.
A particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently.
Data structures organize and store data efficiently to enable quick access, modification, and management.
A system used for reporting and data analysis, storing current and historical data in one place.
An organized collection of data generally stored and accessed electronically.
Automated machine learning platform for building models.
Distributed Denial of Service attack to overwhelm a website.
The process of removing or obscuring personal identifiers from health information so that individuals cannot be readily identified, often used to comply with privacy regulations.
A situation where two or more processes are unable to proceed because each is waiting for the other to release resources.
The process of finding and resolving bugs or defects in software.
Data platforms that operate without centralized control, often using blockchain technology.
Identity management systems that allow users to control their own identity data without relying on central authorities.
Systems that allow individuals to store and manage their personal data independently.
Security measures that distribute control and decision-making to prevent centralized points of failure.
The application of quantitative techniques to inform decision-making processes.
Demand-based pricing is the revenue management strategy of rating products or services according to customer demand trends.
A design pattern that provides objects their dependencies rather than requiring them to create them.
To deploy is to release a software application or system into a specific environment, making it accessible and operational for users.
The process of distributing a software application to be used.
Tools and environments designed to enhance the productivity and satisfaction of software developers.
A set of practices that combines software development (Dev) and IT operations (Ops) to shorten the development lifecycle.
Integrating security practices into the DevOps process to enhance software security.
Techniques that ensure the privacy of individual data points while allowing for aggregate data analysis.
Technologies and practices for monitoring and reducing digital carbon footprints.
A digital certificate is an electronic document used to prove the ownership of a public key, enabling secure communication and transactions over the internet.
The complex network of interconnected digital technologies and platforms.
The use of technology to improve the health and wellness of individuals, including mobile health apps, wearable devices, telemedicine, and personalized medicine.
AI-generated characters that can interact with humans in a lifelike manner.
The extent to which an organization can use digital technologies to improve processes and outcomes.
Evidence-based therapeutic interventions driven by software programs to prevent, manage, or treat medical conditions, often used in conjunction with medication or other therapies.
The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.
A virtual replica of a physical object or system used for analysis and simulation.
Creating virtual replicas of physical objects or systems.
A Disaster Recovery Plan (DRP) is a documented strategy that outlines the procedures an organization must follow to recover from disruptive events.
Decentralized energy generation and storage systems, such as solar panels and batteries.
Converts domain names into IP addresses.
A platform for developing, shipping, and running applications inside software containers.
Docker Swarm is a powerful container orchestration tool that enables developers to manage a cluster of Docker containers seamlessly.
The Domain Name System (DNS) is a hierarchical and decentralized naming system used to translate human-readable domain names into numerical IP addresses.
Design approach focusing on complex domain logic.
A measurement of image resolution, affecting print quality.
A visual effect that adds a shadow behind an element to create depth.
Advanced technologies designed to deliver drugs to specific parts of the body in controlled amounts, improving the efficacy and reducing side effects of treatments.
Online buying and selling of products or services.
The process of electronically generating and sending prescription orders to a pharmacy.
Efforts to make generative AI technologies more accessible to users and businesses.
A situation that occurs at an extreme end of operating parameters, often testing software's robustness.
Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
The use of information and communication technologies (ICT) for health, including services such as telemedicine, electronic health records, and health information systems.
A digital version of a patient’s paper chart, making information available instantly and securely to authorized users.
Digital versions of patients' paper charts and medical history.
ElastiCache is a fully managed in-memory caching service provided by Amazon Web Services (AWS)
Electronic Information Resources (EIR) refer to digital materials that provide access to information and knowledge through electronic means.
Electronic Information, Communication, and Technology (EICT) encompasses a broad range of electronic tools and systems.
A digital version of a paper medication administration record, allowing for real-time tracking and administration of medications to patients.
Digital tools that allow patients to report their health status directly to healthcare providers, often used in clinical trials and chronic disease management.
A process that raises a design above the surface for a tactile effect.
A federal law that requires hospitals with emergency departments to provide a medical screening examination and necessary stabilization treatment to anyone seeking emergency care.
Performing computations on encrypted data to ensure privacy and security.
Encrypted data refers to information that has been transformed using cryptographic techniques to protect its confidentiality and integrity.
Encryption is the process of converting plaintext into ciphertext to protect sensitive data from unauthorized access.
The individual that uses a particular product.
The organizational structure that defines the operation of an organization.
Software designed to serve the needs of an organization rather than individual users.
Extended Reality technologies designed for use in enterprise environments, such as virtual training and simulations.
Software integrating and streamlining business processes into one system.
Escrow in tech refers to a legal arrangement where a third party holds valuable digital assets.
Ethernet is a widely used technology for local area networks (LANs) that facilitates the connection and communication of devices within a specific geographical area.
Structured guidelines for making ethical decisions in technology development and use.
A professional responsible for designing and creating the data warehousing process, which includes extraction, transformation, and loading of data.
Testing the process of extracting, transforming, and loading data to ensure data integrity and performance.
A system that responds to an external event.
Designed to handle external events.
Software design focused on responding to events.
A paradigm where the flow of a program is determined by events such as user actions or messages from other programs.
Architectures designed to evolve and adapt over time in response to changing requirements.
Code that can be run independently without translation.
AI systems designed to provide understandable and transparent explanations of their decisions.
Minimalist web framework for Node.js.
Blending or softening the edges of an image or object.
A mechanism to enable or disable features during runtime for testing or gradual rollout.
A machine learning approach where models are trained across multiple decentralized devices or servers.
A standard for exchanging healthcare information electronically, aiming to simplify implementation without sacrificing information integrity.
A layout or extension of a file. Popular file formats are JPEG, TIFF, PNG, and GIF.
FTP, or File Transfer Protocol, is a standard network protocol used to transfer files between a client and a server over a TCP/IP network, such as the internet.
Detailed and specific permissions for accessing different parts of a dataset.
Financial operations practices that optimize cloud spending and financial management.
A system to protect a secure network from an unsecured network.
Firewalls are essential security devices or software that monitor and control incoming and outgoing network traffic based on predetermined security rules.
A minimalistic design approach.
A specific typeface or style of text used in design.
A platform for developing software applications that provides a foundation structure.
Compatibility with multiple development frameworks.
Predefined structures to simplify software development.
The part of a website or application that users interact with directly.
Tools for building user interfaces.
A protocol for transferring files to a server.
A software developer that can work on the frontend and backend.
A functional language is a programming paradigm that emphasizes the use of mathematical functions, avoiding mutable data and side effects.
Paradigm focused on functions and immutability.
Specifications of functions that a system or component must be able to perform.
Testing software against functional requirements.
Gateways enable communication between different networks by translating data formats and protocols, enhancing connectivity and security across systems.
Generative AI tools integrated into Integrated Development Environments to assist developers.
A regulation in EU law on data protection and privacy for individuals, which also addresses the transfer of personal data outside the EU and EEA, impacting healthcare data management.
A general-purpose language (GPL) is a programming language designed for a wide variety of applications across different domains.
AI technologies that create new content, such as text, images, or music, from scratch.
The use of advanced analytics and computational tools to analyze genomic data, enabling personalized medicine, and the identification of genetic predispositions to diseases.
GeoServer allows users to publish spatial information from various formats and sources, enabling easy access and interaction with map data across web applications.
Technology that interprets human gestures to control devices or interact with systems.
A distributed version control system used for tracking changes in source code.
Branching model for managing Git projects.
A web-based hosting service for version control using Git.
Open-source programming language by Google.
An international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses, and reporting of clinical trials.
Regulations that require manufacturers, processors, and packagers of drugs, medical devices, and food to ensure that their products are safe, pure, and effective.
A gradual transition between two or more colors.
Query language for APIs, allowing for flexible data retrieval.
Cloud computing practices that aim to reduce environmental impact and promote sustainability.
Software development practices that focus on reducing environmental impact.
User experience design practices that prioritize sustainability and environmental impact.
A framework of horizontal and vertical lines used for layout consistency.
The space between columns or pages in a layout.
Open-source framework for big data processing and storage.
The electronic movement of health-related information among organizations according to nationally recognized standards.
The application of information technology to healthcare, including electronic health records, telemedicine, mobile health applications, and health information exchanges.
A public-private partnership to identify and reduce fraud, waste, and abuse across the healthcare sector.
A design approach that ensures systems remain operational for a high percentage of time.
A high-level language (HLL) is a programming language that is user-friendly and abstracted from machine code, like Python or Java.
Adherence to the regulations and standards set by the Health Insurance Portability and Accountability Act for protecting sensitive patient data.
Storing and serving web files on a server.
HP Diagnostics is a suite of tools provided by Hewlett-Packard to help diagnose, troubleshoot, and repair hardware and software issues on HP devices.
The standard language for web pages.
The foundation of data communication for the World Wide Web.
The attribute of color that distinguishes one from another.
HCI is the interaction between humans and computers through interfaces like graphical screens, voice commands, or gestures.
Combination of private and public cloud services.
A hybrid deployment is a model that combines on-premises infrastructure with cloud services, allowing organizations to leverage the benefits of both environments for flexibility, scalability, and optimized resource use.
Software that creates and runs virtual machines.
Icinga is an open-source monitoring software that helps organizations track the performance, availability, and overall health of their IT infrastructure, alerting them to issues before they impact users.
A simplified graphical representation of an object or concept.
A software application that provides comprehensive facilities to computer programmers for software development.
Hand-drawn or digital artwork used in design.
The ability of a software system to identify objects, places, people, or actions in images.
A surgical procedure in which the surgeon uses preoperative and intraoperative imaging to guide the surgery, often involving advanced visualization and navigation technologies.
IMAP (Internet Message Access Protocol) is a standard email protocol that allows users to access and manage their email messages on a remote server, enabling synchronization across multiple devices.
A field of cancer treatment that uses the body’s immune system to fight cancer, often involving advanced biotechnologies like CAR-T cell therapy.
The growing trend of governments imposing more regulations on technology companies and practices.
An Independent Test Group (ITG) is a team responsible for unbiased testing of software applications, ensuring quality and reliability.
Extended Reality technologies applied in industrial settings, such as manufacturing and maintenance.
A visual representation of data or information.
IRM professionals work closely with senior leadership to align information resource strategies with broader business objectives.
Information security (InfoSec) refers to the practice of protecting digital and physical data from unauthorized access, alteration, destruction, or disclosure.
The ISC is responsible for developing, implementing, and monitoring security policies, ensuring compliance with regulations.
An Information Security Officer (ISO) is a senior-level executive responsible for managing and overseeing an organization's information security program.
A process of communication between a patient and a healthcare provider that results in the patient's authorization or agreement to undergo a specific medical intervention, ensuring compliance with ethical and legal standards.
A concept in object-oriented programming where one class derives properties and behavior from another class.
Platforms that combine data management and AI capabilities for streamlined workflows.
Testing combined modules as a group.
Systems where machines communicate and work together autonomously.
Systems that engage patients in their care through interactive technology, such as bedside tablets or patient portals, to improve patient education and satisfaction.
In computing, a shared boundary across which two separate components of a computer system exchange information.
Intermediate code is a representation of a program that lies between source code and machine code, used during the compilation process for easier optimization and portability.
Legal frameworks governing the use and exchange of cryptocurrencies across different countries.
Ability of systems to work together seamlessly.
The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.
An Intrusion Detection System (IDS) is a security tool used to monitor network or system activities for malicious behavior or policy violations.
A design collaboration and prototyping platform.
A connected infrastructure of medical devices and software applications that communicate with various healthcare IT systems.
The network of physical objects embedded with sensors and connectivity to exchange data.
ISO is a global organization that develops and publishes international standards to ensure quality, safety, and efficiency across industries.
A single cycle in a process aimed at achieving a goal, often used in agile and iterative development methodologies.
A programming language for interactive web elements.
An open-source automation server that helps automate the parts of software development related to building, testing, and deploying.
A popular tool used for issue tracking and Agile project management.
Express framework tailored for JavaScript developers.
A lightweight data format used for data exchange.
Unit testing framework for Java programming language.
A compilation method that translates code during execution, often improving performance.
An approach for managing software development that depicts all planned work to optimize the overall process.
Adjusting the space between individual characters in a font.
A type of database where data is stored as key-value pairs, such as Redis or DynamoDB.
A network of entities and their relationships, used to integrate and access information.
Data structures that represent relationships between concepts and entities, used for organizing and retrieving information.
An open-source platform for automating deployment, scaling, and operations of application containers.
A software bundle for web development (Linux, Apache, MySQL, PHP).
A Local Area Network (LAN) is a network that connects computers and devices within a limited area, like a home, school, or office, allowing for resource sharing, file transfers, and internet access among users in close proximity.
A web page designed for specific user actions.
Framework for developing AI applications using large language models.
The arrangement of text and graphics on a page or screen.
Technique for deferring the loading of resources.
The vertical space between lines of text in a paragraph.
A methodology for developing businesses and products based on validated learning and rapid iteration.
A collection of non-volatile resources used by computer programs, often for software development.
The process of migrating applications and associated data to a cloud environment without redesigning the app.
LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information over a network.
Images composed of lines, often used in logos or illustrations.
Linux is a popular open-source operating system known for its stability, security, and flexibility, widely used in servers, desktops, and embedded systems worldwide.
A Linux server is a server that runs on a Linux operating system, providing a secure, reliable, and open-source platform for hosting websites, applications, and services in a wide range of environments.
Lisp is one of the oldest high-level programming languages, known for its unique syntax and powerful support for symbolic computation and artificial intelligence (AI) applications.
A process to test a system's performance under heavy usage.
The time it takes for a web page to fully load.
LANs enable communication between devices, allowing them to share resources like files, printers, and internet connections.
Development approach with minimal hand-coding.
Mac OS X is a Unix-based operating system developed by Apple Inc., designed for Mac computers.
Machine code is the lowest-level programming language, consisting of binary instructions directly executed by a computer's processor.
A subset of AI involving the use of algorithms and statistical models to enable computers to improve tasks.
A set of actions after the launch of a website to maintain the product.
Malicious code refers to any software or script that is designed to cause harm to a computer system, network, or user.
Malicious software that can harm websites.
Outsourced security services for organizations.
A markup language is a system for annotating a document's structure and content using tags or elements, commonly used in web development and document formatting.
The branch of health informatics that focuses on the efficient and effective management of medical images, including radiology and pathology images, often through PACS (Picture Archiving and Communication Systems).
Technology for medical and healthcare applications.
A system used to manage and monitor work-in-process on the factory floor.
Structured reference data that sorts attributes of specific information.
Virtual reality space for interacting in a digital environment.
A technique that enables the design and development of software to be implemented.
The use of mobile devices and wireless technology in healthcare to monitor patient health, deliver care, and provide health information.
An architectural style that structures an application as a collection of loosely coupled services.
Software that acts as a bridge between an operating system or database and applications, especially on a network.
A product with enough features to satisfy early adopters and provide feedback for future development.
Practices that combine machine learning, development, and operations to streamline the deployment and maintenance of ML models.
The ability to access information and services anywhere, anytime, on any device.
A visual representation of a design, often used for presentation or testing.
The process of adapting something to modern needs or habits, typically by updating systems, processes, and technology.
A separate unit of software or hardware.
A design or image that uses shades of a single color.
Single-tiered software architecture tightly integrated.
A font where letters and characters occupy the same amount of horizontal space.
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed for small, resource-constrained devices and low-bandwidth networks.
Design that includes a combination of text, graphics, audio, and video.
AI systems that can process and understand multiple types of data, such as text, images, and audio.
A software architectural pattern.
An open-source relational database management system.
Nagios is an open-source monitoring tool that tracks the health, availability, and performance of IT infrastructure, alerting users to issues with servers, networks, and applications
The application of nanotechnology to medicine, including the use of nanoparticles for drug delivery, imaging, and as part of therapeutic devices.
The field of AI focused on enabling machines to understand and process human language.
Links for website navigation.
Progressive framework for building efficient Node.js applications.
Network File System (NFS) is a protocol that allows users to access files over a network as if they were on their local machine, enabling file sharing and collaboration across connected devices.
Network monitoring is the process of continuously observing a network’s performance, health, and security to detect issues or inefficiencies.
A type of AI that mimics the human brain to recognize patterns and interpret data in complex ways, often used in diagnostics, imaging analysis, and drug discovery.
Advanced cryptographic techniques designed to enhance security and privacy.
Node Package Manager (NPM) is a package manager for JavaScript, used primarily to install, share, and manage libraries and tools for Node.js applications.
An open-source, cross-platform JavaScript runtime environment.
Non-relational databases for handling unstructured data.
A protocol for secure authorization.
Programming paradigm based on objects and classes.
The ability to measure and understand the internal state of a system based on the data it produces.
OData (Open Data Protocol) is a web-based protocol developed by Microsoft for querying and updating data.
OKHttp is an open-source HTTP client for Java and Android applications that simplifies network communication by handling requests, responses, and connection management efficiently.
An integrated approach to sales and marketing that provides customers with seamless experience across multiple channels.
Machine learning methods that process data and update models in real time as new data arrives.
The degree of transparency or translucency in an element.
Software with source code that anyone can inspect, modify, and enhance.
OpenBSD is a free and open-source operating system known for its emphasis on security, correctness, and code simplicity.
OpenSSL is an open-source toolkit used for implementing Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, enabling secure communication over networks by encrypting data.
The process of deploying and integrating AI models into business operations and workflows.
An Oracle Linux System Administrator is a professional responsible for managing and maintaining Oracle Linux servers, ensuring their optimal performance, security, and reliability.
OTRS (Open Ticket Request System) is an open-source service management software used to manage customer support requests, track tickets, and improve service delivery in various industries.
Comprehensive examination and improvement of a system.
A semi-transparent layer placed on top of an image or element.
A standardized color matching system used in printing.
Fundamental change in underlying assumptions or practices.
A special kind of variable, used in a subroutine to refer to one of the pieces of data provided as input to the subroutine.
A secure online website that gives patients access to their personal health information and enables communication with their healthcare providers.
An online advertising model where advertisers pay a fee each time a user clicks on their ad.
A simulated cyberattack on a system to evaluate its security.
Assessing system performance under specific conditions.
An economy where individuals control and monetize their personal data.
Tailoring medical treatment and care to individual patient characteristics and needs using data and technology.
Any information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service.
A set of data processing elements connected in series.
The smallest unit of digital image representation.
Oracle's procedural language extension for SQL.
A cloud computing model providing a platform allowing customers to develop, run, and manage applications.
Treating digital platforms as standalone products with their own value propositions and user experiences.
An add-on that adds new functionalities to a host program or software without alternating the host itself.
Creating custom website extensions.
A demonstration to verify that certain concepts or theories have the potential for real-world application.
Open-source relational database management system.
A measurement of image resolution for digital displays.
Techniques using data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.
A design file prepared for high-quality printing.
Approaches and practices that prioritize user privacy in the design and operation of technologies.
Communication systems that prioritize and protect user privacy.
Technologies designed to protect user privacy while enabling data usage and analysis.
Methods for performing computations on data while preserving the privacy of individual data points.
A set of coded instructions that tell a computer how to run a program or calculation.
The process of identifying and validating product ideas through user research and testing.
A strategic plan that outlines the vision, direction, priorities, and progress of a product over time.
Automated systems that detect and respond to anomalies in production environments to maintain stability and security.
A formal language comprising a set of instructions that produce various kinds of output.
Web applications that use modern web capabilities to deliver an app-like experience to users.
Designing effective prompts for AI models.
An early sample or model of a product to test a concept or process.
A notification given by developers when theyÂ’re done building a feature.
The process of reviewing a software product to ensure it meets expectations.
The use of automated testing tools to execute tests on software applications to ensure they meet specified requirements.
Ensuring products meet specified quality standards.
AI utilizing quantum computing for complex problem-solving.
Advanced computing technology that uses quantum mechanics principles to perform complex calculations faster than classical computers.
The application of quantum computing to enhance machine learning algorithms and processes.
A request for data or information from a database.
AI techniques that combine information retrieval with content generation to improve accuracy and relevance.
Converting vector graphics into pixel-based images.
The movement towards decentralizing control and decision-making in technology systems and platforms.
JavaScript library for building user interfaces.
The process of defining a function or calculating a number by the repeated application of an algorithm.
Forwarding one URL to another.
State management library for JavaScript applications.
Verifying that changes haven't introduced new issues.
Adherence to laws, regulations, guidelines, and specifications relevant to healthcare operations.
A relational database is a structured collection of data organized into tables, using relationships between rows and columns to ensure efficient storage and retrieval.
The use of digital technologies to collect health data from patients in one location and electronically transmit that information securely to healthcare providers in a different location for assessment and recommendations.
The use of digital technologies to monitor and manage patients' conditions remotely, often involving tracking metrics like medication adherence and symptom management.
A central place where data is stored and managed.
The clarity and sharpness of an image or display.
Efforts to promote the ethical and responsible development and use of technology.
Design that adapts to different screen sizes and devices.
An architectural style for designing networked applications.
Representational State Transfer for web services.
Extended Reality displays with resolutions comparable to the human retina, providing highly detailed visuals.
Revenue management is a set of practices or techniques that consider consumer demand and set the optimal price for the product.
The color model used for digital design, consisting of red, green, and blue.
Automating business processes using robots and low-code development platforms.
Web application framework written in Ruby programming language.
A compositional technique that divides an object or frame into an equal, three-by-three grid with two horizontal and vertical lines.
The period during which a computer program is executing.
A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
A subset of regression testing to verify that a particular function or bug is working as expected.
Networks of satellites used for communication, navigation, and data collection.
The intensity or richness of a color.
The ability to resize an image or design without loss of quality.
The structure of a database system, described in a formal language.
The code that can be used on a website to help search engines deliver more information to users.
A typeface that mimics handwritten script or calligraphy.
Writing small programs to automate tasks.
A scripting language is a programming language designed for automating tasks, controlling software, or developing dynamic content in a lightweight and efficient way.
A project management methodology for effective team collaboration thatÂ’s based on Agile software development.
A collection of software tools and libraries that developers use to create applications for specific platforms.
The general process of software development that follows a series of steps until completion.
Practices and tools to ensure the secure development and deployment of software applications.
The state of being free from danger or threat in a computing context.
Automated testing tool for web applications.
SQL-based command for querying databases.
A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
Cloud-based, scalable web hosting.
A style of software design where services are provided to the other components by application components, through a communication protocol over a network.
An outline of all pages on a website.
A rough or preliminary drawing or design.
Urban areas that use technology and data to improve infrastructure, services, and quality of life.
Systems that optimize energy use and efficiency in buildings and infrastructure.
Wearable or portable devices connected to a network that monitor health indicators such as heart rate, blood pressure, or glucose levels.
Homes equipped with connected devices and systems that automate and enhance daily living.
Medical implants equipped with sensors and connectivity features that allow them to monitor and transmit data on their performance and the patient’s condition in real-time.
Interconnected systems and devices that use data and intelligence to optimize performance and interactions.
Preliminary testing to check basic functionality.
Simple Objects Access Protocol is a web communication protocol for exchanging structured information in a decentralized, distributed environment.
The high-level structure of a software system, defining its components and their interactions.
Software engineering is the systematic application of engineering principles to design, develop, test, and maintain reliable and scalable software systems.
A set of activities, methods, practices, and transformations used to develop and maintain software.
Process of evaluating software for errors and bugs.
Vehicles that rely on software to control and manage their functions and features.
Programming language for developing Ethereum smart contracts.
The fundamental component of a computer program created by a programmer.
Audio technology that creates a three-dimensional sound experience for listeners.
A method of comparing two versions of a webpage or app against each other to determine which one performs better.
Launching point for further development or progress.
A set period during which specific work must be completed and made ready for review in Agile development.
Structured Query Language for managing relational databases.
A domain-specific language used in programming and designed for managing data held in a relational database management system.
A document that describes what the software will do and how it will be expected to perform.
A cryptographic network protocol for operating network services securely over an unsecured network.
Encryption protocol for web security.
Process for gradually introducing changes into a system.
A platform containing the exact copy of the site used for testing and debugging.
A sequence of sketches or images used to plan a visual narrative.
Structured data is highly organized and easily searchable; unstructured data lacks a pre-defined format or organization.
Network involved in producing and delivering products.
Syntax in programming refers to the set of rules that define the structure and format of valid statements in a programming language.
Artificially generated data that simulates real-world healthcare data, used in research, AI training, and software testing without compromising patient privacy.
The process of linking different computing systems and software applications physically or functionally.
Software designed to provide a platform for other software.
The process of linking together different computing systems and software applications physically or functionally.
Accumulation of suboptimal code requiring future rework.
The combination of programming languages, tools, and frameworks used in software development.
The relationship between technological advancements and national sovereignty and power.
Technologies that support the circular economy by promoting reuse, recycling, and sustainability.
The use of digital communication technologies, such as video conferencing and mobile apps, to provide healthcare services remotely, including consultations, diagnostics, and follow-ups.
The remote diagnosis and treatment of patients by means of telecommunications technology.
The remote monitoring of a patient’s vital signs, such as heart rate and rhythm, often used in critical care settings.
The delivery of pharmaceutical care through telecommunications to patients in locations where they may not have direct contact with a pharmacist.
The layout and design of the platform that can be replicated.
Open-source platform for machine learning.
A set of conditions under which a tester will determine whether a software application or system is working correctly.
A test plan is a detailed document outlining the scope, objectives, resources, and schedule for software testing to ensure quality assurance.
The surface quality or feel of an element in a design.
A small, low-resolution preview of an image or design.
The shade of color that is created when white is added to lighten the hue.
The process of substituting a sensitive data element with a non-sensitive equivalent, called a token, which can be used in a database or internal system without bringing it into scope.
User interfaces that allow interaction without physical contact, often using gestures or voice commands.
Development practice with a single shared branch.
Data that is accurate, reliable, and secure, ensuring confidence in its use.
Typed superset of JavaScript enhancing code quality.
The art and technique of arranging type in a visually appealing way.
The process of verifying that a software solution works for the user.
The widespread availability of network connections, enabling seamless communication and data exchange.
Designing the visual elements of software or websites
Designing user-friendly interfaces.
Clear and transparent mechanisms for obtaining user consent for data collection and usage.
Testing individual components of a software application.
Game development platform for creating 2D and 3D games.
Tool for creating high-quality games and interactive 3D experiences.
Percentage of time a website is available.
Web address for accessing content.
The ease with which users can navigate a website.
Evaluating user experience.
Path users take through a website.
Simple descriptions of a feature from the perspective of the end user or customer.
A design process that focuses on usability and user needs at every stage.
Gathering user feedback and insights.
Ensuring software meets requirements and specifications.
A healthcare delivery model in which providers are paid based on patient health outcomes rather than the volume of services provided.
Graphics created using mathematical equations, scalable without loss of quality.
Databases optimized for storing and querying high-dimensional data, often used in AI and machine learning.
Checking that software correctly implements specified functions.
A system that records changes to a file or set of files over time so that you can recall specific versions later.
A software-based emulation of a physical computer.
AI-powered virtual assistants that provide patients with basic nursing support, such as answering questions, monitoring symptoms, and providing medication reminders.
Simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way.
The arrangement of elements to guide the viewer's attention.
The overall look and feel of a brand's design elements.
A semi-transparent mark or logo placed on an image for copyright protection.
Electronic devices worn on the body that can collect data, track activities, or provide real-time feedback on health metrics.
Decentralized web with enhanced data privacy and user control.
An application program stored on a remote server and delivered over the Internet through a browser interface.
The practice of protecting websites and web applications from cyber threats.
Customizing server settings.
Software systems designed to support interoperable machine-to-machine interaction over a network.
Automated messages sent from apps when something happens, acting as triggers for other actions.
Structure and organization of a website.
Ongoing updates and improvements.
Moving a website to a new host or platform.
A fully customizable application developed by one company that other companies can rebrand and resell as their own.
The empty or unmarked areas in a design, used for balance and clarity.
A component of a graphical user interface (GUI) that displays information or provides a specific way for a user to interact with the operating system or an application.
A simplified, non-graphic representation of a web page or interface.
Software for creating wireframes.
The height of lowercase letters in a font.
Advanced software used to enhance, analyze, and share x-ray images, enabling better diagnosis and treatment planning in radiology.
Framework for building cross-platform mobile applications.
A data format for structured content.
Using Extended Reality technologies to facilitate remote and hybrid work environments.
The vertical line in a coordinate system used for positioning elements.
A human-readable data format for storing and transmitting information
The depth or three-dimensional aspect of a design.
Cryptographic methods that allow one party to prove to another that a statement is true without revealing any additional information.
Enlarging or reducing the view of a design or image.
The use of technology, including biosensors and data analytics, to monitor diseases that can be transmitted from animals to humans, crucial for public health surveillance.