Glossary

Dictionary of Software Development

A brief list of terms related to software development used by Engineering, Product, and Design teams.

    0-9

  • 301 Redirect

    A permanent redirect from one URL to another.  

  • 3D Rendering

    Creating three-dimensional images using software.   

  • 404 Error

    Page not found error message.  

  • A

  • Accessibility

    Ensuring web content is usable by people with disabilities.  

  • Active Directory Federation Services (ADFS)

    ADFS works by issuing security tokens that contain user identity information.

  • Addictive Tech

    Technologies designed to engage users for extended periods, often leading to excessive use.

  • Adobe Firefly

    AI-powered platform for quick, efficient content creation.

  • Adversarial Machine Learning

    Techniques to create AI models that can resist malicious attacks.

  • Affective (emotional) Computing

    Technology that can recognize and respond to human emotions.

  • Agent-Based Simulation

    Modeling complex systems using autonomous agents to simulate interactions and behaviors.

  • AGI Research

    Research focused on creating Artificial General Intelligence, capable of performing any intellectual task that a human can.

  • Agile

    A flexible and iterative approach to software development emphasizing incremental delivery and collaboration.  

  • Agile Story

    A short description of a feature or functionality from an end user's perspective in Agile development.  

  • Agile Transformation

    The process of transitioning an organization to Agile methodologies and principles.  

  • Agility

    Ability to respond quickly and effectively to change.

  • AI Agents

    Autonomous programs that perform tasks or simulate behaviors using artificial intelligence.

  • AI As A Service

    Cloud-based AI services that provide businesses with AI capabilities without requiring in-house infrastructure.

  • AI In Security

    The application of AI technologies to enhance cybersecurity measures.

  • AI Safety And Regulation

    Policies and practices to ensure the safe and ethical development of AI technologies.

  • AI-assisted Software Development

    The use of AI tools to enhance and automate aspects of software development.

  • AI-generated Media

    Content such as images, videos, and text created using AI algorithms.

  • AI, IoT And XR Combined Solutions

    Integrated solutions leveraging AI, Internet of Things, and Extended Reality technologies.

  • AI/ML On Edge

    Deploying AI and machine learning models directly on edge devices rather than centralized servers.

  • AJAX (Asynchronous JavaScript And XML)

    A technique for updating web content without reloading the page.  

  • Alignment

    The arrangement of text or elements to create a cohesive visual layout.  

  • Alternative Currencies

    Digital or virtual currencies that function as alternatives to traditional currencies.

  • Analogous Colors

    Colors that are next to each other on the color wheel.  

  • Anti-Malware Software

    Anti-Malware Software is a type of security software that detects, prevents and removes malware or malicious software.

  • API (Application Programming Interface)

    A set of protocols and tools for building software and applications.  

  • API Gateway

    API Gateway centralizes and manages API calls, ensuring seamless interaction between clients and multiple services.

  • API Integration

    Connecting third-party services to a website.  

  • API Key

    A code used to authenticate and access APIs.  

  • App Inventor

    A visual programming environment for creating mobile applications.  

  • Application

    A program or group of programs designed for end-users.  

  • Array

    A data structure consisting of a collection of elements, each identified by an index or key.  

  • Artboard

    A virtual canvas within graphic design software where designs are created.  

  • Artifact

    Any file that is produced during the software development process.  

  • Artificial Intelligence (AI)

    Simulation of human intelligence processes by machines, especially computer systems.  

  • Ascender

    An upward part of a letter that extends above the x-height.  

  • Aspect Ratio

    The proportional relationship between an image's width and height.  

  • Asset Management

    Systematic approach to managing organizational assets.

  • ASU In Security Policy

    ASU into security policies, organizations ensure that their systems are continuously protected against potential security risks and vulnerabilities.

  • Asynchronous Programming

    A programming paradigm that allows tasks to run concurrently without blocking the execution of other tasks.

  • Augmented Reality

    An enhanced version of reality where live, direct or indirect, views of physical real-world environments are augmented with superimposed computer-generated images.  

  • Authentication

    The process of verifying the identity of a user or system.  

  • Automated Compliance

    The use of automation to ensure adherence to regulatory requirements.

  • Automated Dispensing Machines (ADMs)

    Pharmacy automation systems that store and dispense medications, designed to improve the efficiency and safety of the medication distribution process in healthcare settings.

  • Automated Workforce

    The use of robots and AI to perform tasks traditionally done by human workers.

  • AutoML

    Automated machine learning processes that simplify the creation of machine learning models.

  • Autonomous Robots

    Robots capable of performing tasks independently without human intervention.

  • Autonomous Vehicles

    Self-driving vehicles that operate without human input.

  • AWS

    Comprehensive cloud platform offering scalable computing, storage, and databases.

  • Azure

    Microsoft's cloud computing platform and services.

  • B

  • Back End

    The server-side of a web application, responsible for managing data within the database and serving that data to the front end.  

  • Background

    The area behind the main content of a design.  

  • Backup

    The process of creating a copy of site data.  

  • Balance

    The distribution of visual weight in a design for stability.  

  • Bash

    Unix shell and command language.

  • Bash -c

    Command to execute Bash scripts from the command line.

  • Bash Script

    Script written for the Bash command language.

  • Bend Programming Language

    Innovative language simplifying complex computations.

  • Big Data

    Large volumes of data that can be analyzed for insights and decision-making.  

  • Biologics License Application (BLA)

    A request for permission to introduce, or deliver for introduction, a biologic product into interstate commerce, reviewed by the FDA.

  • Biometric Authentication

    A biometric authentication is a security process that verifies an individual’s identity using unique biological characteristics.

  • Biometrics

    Biometrics refers to the measurement and statistical analysis of people's unique physical and behavioural characteristics.

  • Bitmap

    Images made up of individual pixels, not scalable without quality loss.  

  • Black Box Testing

    Testing without knowledge of internal code structure.

  • Bleed

    Extra space beyond the document's edge to ensure images or colors extend to the paper's edge.  

  • Blockchain

    A decentralized digital ledger used to record transactions across multiple computers.  

  • Blue-Green Deployment

    Technique for reducing downtime during deployments.

  • Bootstrap

    A front-end framework for responsive web design.  

  • Bottom-up Design

    An area of program refinement that starts with smaller modules and builds into a complete software program.   

  • Brain-computer Interfaces

    Direct communication pathways between the brain and external devices.

  • Branch

    A copy of source code within a version control system.  

  • Brand Identity

    All elements that represent a company’s image to the public.  

  • Brandmark

    A visual depiction of a brand.  

  • BRD (Business Requirements Document)

    A document that details the business solution for a project including the documentation of customer needs and expectations.  

  • Breadcrumbs

     Navigational links to show the user's location on a website.  

  • Bug

    An error, flaw, or fault in a computer program that causes it to produce incorrect or unexpected results.  

  • Build

    The process of converting code into a standalone form that can be run on a computer.  

  • Business Process Reengineering

    A strategy for improving organizational efficiency by redesigning core business processes.  

  • C

  • C Sharp (C#)

    Modern, object-oriented programming language by Microsoft.

  • Cache

    A hardware or software component that stores data so future requests for that data can be served faster.  

  • Cassandra

    NoSQL database for handling large amounts of data.

  • Causal Inference For ML

    Methods for determining cause-and-effect relationships in machine learning models.

  • CD (Continuous Deployment)

    A method to frequently deliver apps to customers by introducing automation into the stages of app development.  

  • CDN (Content Delivery Network)

     A network for fast content distribution.  

  • Centricity

    Focusing on a central element or user experience.

  • CI (Continuous Integration)

    The practice of building software when all working copies of code are merged into one branch.  

  • Clinical Decision Support System (CDSS)

    A health information technology system designed to assist physicians and other health professionals with clinical decision-making tasks.

  • Clinical Informatics

    The application of informatics and information technology to deliver healthcare services, focusing on the management of health information systems in clinical settings.

  • Clinical Research

    The study of health and illness in people, aimed at improving knowledge and treatment.  

  • Clinical Workflow Automation

    The use of technology to streamline and automate routine clinical tasks, such as patient check-ins, appointment scheduling, and documentation, to improve efficiency and reduce errors.

  • Clipping Path

    A vector path used to isolate an object from its background.  

  • Cloud Computing

    The delivery of computing services over the internet, including storage, processing, and software.  

  • Cloud Fusion Center

    Hub for managing cloud operations and security.

  • Cloud Infrastructure

    Hardware and software that supports cloud computing.

  • Cloud Integration

    The process of configuring multiple cloud services to share data and processes.  

  • Cloud Migration

    Moving data and applications to cloud environments.

  • Cloud Security

    Protecting data and applications in cloud environments.

  • Cloud-Based EHR

    An electronic health record system that is hosted on the cloud, enabling healthcare providers to access patient data from anywhere with an internet connection.

  • Cloud-Native Applications

    Applications designed for cloud environments.

  • CMS (Content Management System)

     Software to manage and publish web content.  

  • CMS Plugin

     Extensions to add features to a content management system.  

  • CMYK

    The color model used for print design, consisting of cyan, magenta, yellow, and black inks.  

  • Code Of Ethics For Software

    Guidelines and principles to ensure ethical software development and usage.

  • Code Refactoring

    The process of editing code to reduce or eliminate technical debt.   

  • Collaboration Ecosystems

    Platforms and tools that facilitate collaboration among diverse teams and organizations.

  • Color Palette

    A set of colors used consistently in a design to maintain visual harmony.  

  • Color Theory

    The logical structure for color that includes harmony between colors, the context of how colors are used, and the color wheel.  

  • Common Secure Configurations

    Common secure configurations are standardized security settings and practices used to safeguard systems, networks, and applications against vulnerabilities.

  • Complementary Colors

    Colors that are opposite each other on the color wheel.  

  • Compliance Program Guidance (CPG)

    Guidelines issued by the Office of Inspector General (OIG) to assist healthcare providers in developing effective internal controls to ensure compliance with regulations.

  • Composition

    The arrangement and organization of design elements within a layout.  

  • Computer Security Incident

    A computer security incident refers to any event that compromises the confidentiality, integrity, or availability of computer systems or data.

  • Computerized Physician Order Entry (CPOE)

    A system that allows healthcare providers to enter and manage orders for medications, laboratory tests, and other services electronically, reducing the risk of errors.

  • Conceptual Design

    The early stage of design focused on ideas and concepts.  

  • Concurrency

    The ability of different parts of a program to execute out-of-order or in partial order, without affecting the final outcome.  

  • Confidentiality

    Confidentiality in technology refers to the principle of ensuring that sensitive information is accessed only by authorized individuals and remains protected from unauthorized disclosure.

  • Consumer XR

    Extended Reality technologies designed for consumer use, such as VR headsets and AR apps.

  • Containerization

    Packaging an application and its dependencies together to ensure consistent operation across environments (e.g., using Docker).

  • Continuous Integration

    Practice of merging code changes frequently.

  • Contrast

    The degree of difference between elements in a design, often used to create emphasis.  

  • Contrast Ratio

    The difference in brightness between foreground and background elements.  

  • Conversion Rate

    A conversion rate is a business metric that shows how many people take a desired action.  

  • Cookies

     The data sent by an internet server to a browser.  

  • Copyright

    Legal protection for original creative works, including designs.  

  • Cosmos DB

    A globally distributed, multi-model database service designed for managing data at scale.  

  • Crawl

     Search engines send bots to gather intel on published web pages to determine what should be displayed or removed.  

  • CRM (Customer Relationship Management)

     The software and apps used to gather, analyze, and maintain information on prospects.  

  • Crop

    The removal of unwanted areas from an image to focus on a specific part.  

  • Crop Marks

    Lines indicating where a document will be trimmed after printing.  

  • Cross-Browser Compatibility

     Ensuring a website works on different browsers.  

  • Cross-selling

    Cross-selling is a sales technique that involves offering customers additional services or products related to the one(s) they’re already purchasing.  

  • CRUD Operations: Create, Read, Update, Delete

    The four basic operations performed on database records.

  • CSS (Cascading Style Sheets)

    A language used to describe the style of HTML documents.  

  • Custodian

    A custodian refers to an individual or entity responsible for managing and safeguarding information assets, data, or technology resources within an organization.

  • Customer Experience (CX)

    The overall perception of a customer's interaction with a company or brand.  

  • Cyber Security

    Protecting systems and data from digital threats and attacks.

  • Cybersecurity

     Protecting websites from online threats.  

  • D

  • Data

    Data refers to any collection of facts, figures, or information that can be processed, stored, and analyzed by computers.

  • Data Analytics

    Process of examining data sets to draw conclusions about the information they contain.  

  • Data Binding

    The process of connecting UI elements to application data.

  • Data Bricks

    Unified analytics platform for big data and machine learning.

  • Data Clean Room

    Secure environments where data can be analyzed without exposing raw data to outside parties.

  • Data Cleaning

    The process of detecting and correcting (or removing) corrupt or inaccurate records from a dataset.  

  • Data Contract

    Agreements that define the structure, quality, and access rights of data shared between parties.

  • Data Engineering

    The practice of designing and building systems for collecting, storing, and analyzing data.  

  • Data Infrastructure

    The underlying framework that supports the collection, storage, and management of data.  

  • Data Integration

    The process of combining data from different sources to provide a unified view.  

  • Data Interoperability

    The ability of different information systems, devices, and applications to access, exchange, integrate, and cooperatively use data in a coordinated manner.

  • Data Labeling

    The process of tagging data with labels to make it usable for machine learning models.  

  • Data Loss Prevention (DLP)

    Organizations implement DLP measures to safeguard critical data such as customer information, intellectual property, and financial records.

  • Data Management

    The practice of managing data as a valuable resource to unlock its potential for an organization.  

  • Data Marketplaces

    Platforms where data providers and consumers can trade data assets.

  • Data Mesh

    An approach to data management that treats data as a product and organizes it by domain.

  • Data Modeling

    The process of creating a data model to organize and structure data.  

  • Data Product Specification

    Detailed definitions of data products to ensure consistency and quality in data management.

  • Data Protection And Privacy

    The legal frameworks that govern the collection, storage, and sharing of personal health information, including HIPAA in the U.S. and GDPR in the European Union.

  • Data Scraping

    Data scraping (or web scraping) is the process of extracting information from online sources with the help of a special digital tool.    

  • Data Stack

    A combination of technologies and tools used to process and analyze data.  

  • Data Streaming

    The continuous flow of data at a high volume, often used for real-time processing.  

  • Data Structure

    A particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently.  

  • Data Warehouse

    A system used for reporting and data analysis, storing current and historical data in one place.  

  • Database

    An organized collection of data generally stored and accessed electronically.  

  • DataRobot

    Automated machine learning platform for building models.

  • DDoS Attack

    Distributed Denial of Service attack to overwhelm a website.  

  • De-Identification Of Data

    The process of removing or obscuring personal identifiers from health information so that individuals cannot be readily identified, often used to comply with privacy regulations.

  • Deadlock

    A situation where two or more processes are unable to proceed because each is waiting for the other to release resources.

  • Debugging

    The process of finding and resolving bugs or defects in software.  

  • Decentralized Data Platforms

    Data platforms that operate without centralized control, often using blockchain technology.

  • Decentralized Identity

    Identity management systems that allow users to control their own identity data without relying on central authorities.

  • Decentralized Personal Data Stores

    Systems that allow individuals to store and manage their personal data independently.

  • Decentralized Security

    Security measures that distribute control and decision-making to prevent centralized points of failure.

  • Decision Science

    The application of quantitative techniques to inform decision-making processes.

  • Demand-based Pricing

    Demand-based pricing is the revenue management strategy of rating products or services according to customer demand trends.  

  • Dependency Injection

    A design pattern that provides objects their dependencies rather than requiring them to create them.

  • Deployment

    The process of distributing a software application to be used.  

  • Developer Experience Platforms

    Tools and environments designed to enhance the productivity and satisfaction of software developers.

  • DevOps

    A set of practices that combines software development (Dev) and IT operations (Ops) to shorten the development lifecycle.  

  • DevSecOps

    Integrating security practices into the DevOps process to enhance software security.

  • Differential Privacy

    Techniques that ensure the privacy of individual data points while allowing for aggregate data analysis.

  • Digital Carbon Management

    Technologies and practices for monitoring and reducing digital carbon footprints.

  • Digital Certificate

    A digital certificate is an electronic document used to prove the ownership of a public key, enabling secure communication and transactions over the internet.

  • Digital Ecosystem

    The complex network of interconnected digital technologies and platforms.  

  • Digital Health

    The use of technology to improve the health and wellness of individuals, including mobile health apps, wearable devices, telemedicine, and personalized medicine.

  • Digital Humans

    AI-generated characters that can interact with humans in a lifelike manner.

  • Digital Maturity

    The extent to which an organization can use digital technologies to improve processes and outcomes.  

  • Digital Therapeutics

    Evidence-based therapeutic interventions driven by software programs to prevent, manage, or treat medical conditions, often used in conjunction with medication or other therapies.

  • Digital Transformation

    The integration of digital technology into all areas of a business, fundamentally changing how it operates and delivers value to customers.  

  • Digital Twin

    A virtual replica of a physical object or system used for analysis and simulation.

  • Digital Twinning

    Creating virtual replicas of physical objects or systems.

  • Disaster Recovery Plan (DRP)

    A Disaster Recovery Plan (DRP) is a documented strategy that outlines the procedures an organization must follow to recover from disruptive events.

  • Distributed Energy Resources

    Decentralized energy generation and storage systems, such as solar panels and batteries.

  • DNS (Domain Name System)

    Converts domain names into IP addresses.  

  • Docker

    A platform for developing, shipping, and running applications inside software containers.  

  • Docker Swarm

    Docker Swarm is a powerful container orchestration tool that enables developers to manage a cluster of Docker containers seamlessly.

  • Domain Name System (DNS)

    The Domain Name System (DNS) is a hierarchical and decentralized naming system used to translate human-readable domain names into numerical IP addresses.

  • Domain-Driven Design

    Design approach focusing on complex domain logic.

  • DPI (Dots Per Inch)

    A measurement of image resolution, affecting print quality.  

  • Drop Shadow

    A visual effect that adds a shadow behind an element to create depth.  

  • Drug Delivery Systems

    Advanced technologies designed to deliver drugs to specific parts of the body in controlled amounts, improving the efficacy and reducing side effects of treatments.

  • E

  • E-commerce

    Online buying and selling of products or services.  

  • E-Prescribing

    The process of electronically generating and sending prescription orders to a pharmacy.

  • Easing Access To Generative AI

    Efforts to make generative AI technologies more accessible to users and businesses.

  • Edge Case

    A situation that occurs at an extreme end of operating parameters, often testing software's robustness.

  • Edge Computing

    Distributed computing paradigm that brings computation and data storage closer to the location where it is needed.  

  • EHealth

    The use of information and communication technologies (ICT) for health, including services such as telemedicine, electronic health records, and health information systems.

  • EHR (Electronic Health Record)

    A digital version of a patient’s paper chart, making information available instantly and securely to authorized users.

  • EHR And EMR (Electronic Health Record And Electronic Medical Record)

    Digital versions of patients' paper charts and medical history.  

  • ElastiCache

    ElastiCache is a fully managed in-memory caching service provided by Amazon Web Services (AWS)

  • Electronic Information Resources (EIR)

    Electronic Information Resources (EIR) refer to digital materials that provide access to information and knowledge through electronic means.

  • Electronic Information, Communication, And Technology (EICT)

    Electronic Information, Communication, and Technology (EICT) encompasses a broad range of electronic tools and systems.

  • Electronic Medication Administration Record (eMAR)

    A digital version of a paper medication administration record, allowing for real-time tracking and administration of medications to patients.

  • Electronic Patient-Reported Outcomes (ePROs)

    Digital tools that allow patients to report their health status directly to healthcare providers, often used in clinical trials and chronic disease management.

  • Embossing

    A process that raises a design above the surface for a tactile effect.  

  • Emergency Medical Treatment And Labor Act (EMTALA)

    A federal law that requires hospitals with emergency departments to provide a medical screening examination and necessary stabilization treatment to anyone seeking emergency care.

  • Encrypted Computation

    Performing computations on encrypted data to ensure privacy and security.

  • Encrypted Data

    Encrypted data refers to information that has been transformed using cryptographic techniques to protect its confidentiality and integrity.

  • Encryption

    Encryption is the process of converting plaintext into ciphertext to protect sensitive data from unauthorized access.

  • End User

    The individual that uses a particular product.  

  • Enterprise Architecture

    The organizational structure that defines the operation of an organization.  

  • Enterprise Software

    Software designed to serve the needs of an organization rather than individual users.  

  • Enterprise XR

    Extended Reality technologies designed for use in enterprise environments, such as virtual training and simulations.

  • ERP

    Software integrating and streamlining business processes into one system.

  • Escrow

    Escrow in tech refers to a legal arrangement where a third party holds valuable digital assets.

  • Ethernet

    Ethernet is a widely used technology for local area networks (LANs) that facilitates the connection and communication of devices within a specific geographical area.

  • Ethical Frameworks

    Structured guidelines for making ethical decisions in technology development and use.

  • ETL Developer

    A professional responsible for designing and creating the data warehousing process, which includes extraction, transformation, and loading of data.  

  • ETL Testing

    Testing the process of extracting, transforming, and loading data to ensure data integrity and performance.  

  • Event Driven

    A system that responds to an external event.  

  • Event Driven Language

    Designed to handle external events.   

  • Event-Driven Architecture

    Software design focused on responding to events.

  • Event-Driven Programming

    A paradigm where the flow of a program is determined by events such as user actions or messages from other programs.

  • Evolutionary Architectures

    Architectures designed to evolve and adapt over time in response to changing requirements.

  • Executable Code

    Code that can be run independently without translation.  

  • Explainable AI

    AI systems designed to provide understandable and transparent explanations of their decisions.

  • ExpressJS

    Minimalist web framework for Node.js.

  • F

  • Feathering

    Blending or softening the edges of an image or object.  

  • Feature Flag

    A mechanism to enable or disable features during runtime for testing or gradual rollout.

  • Federated Learning

    A machine learning approach where models are trained across multiple decentralized devices or servers.

  • FHIR (Fast Healthcare Interoperability Resources)

    A standard for exchanging healthcare information electronically, aiming to simplify implementation without sacrificing information integrity.

  • File Format

    A layout or extension of a file. Popular file formats are JPEG, TIFF, PNG, and GIF.   

  • File Transfer Protocol

    FTP, or File Transfer Protocol, is a standard network protocol used to transfer files between a client and a server over a TCP/IP network, such as the internet.

  • Fine-grained Data Access Controls

    Detailed and specific permissions for accessing different parts of a dataset.

  • FinOps

    Financial operations practices that optimize cloud spending and financial management.

  • Firewall

    A system to protect a secure network from an unsecured network.  

  • Firewalls

    Firewalls are essential security devices or software that monitor and control incoming and outgoing network traffic based on predetermined security rules.

  • Flat Design

    A minimalistic design approach.  

  • Font

    A specific typeface or style of text used in design.  

  • Framework

    A platform for developing software applications that provides a foundation structure.  

  • Framework Agnostic

    Compatibility with multiple development frameworks.  

  • Frameworks

    Predefined structures to simplify software development.

  • Front End

    The part of a website or application that users interact with directly.  

  • Frontend Framework

    Tools for building user interfaces.  

  • FTP (File Transfer Protocol)

     A protocol for transferring files to a server.  

  • Full Stack

    A software developer that can work on the frontend and backend.   

  • Functional Programming

    Paradigm focused on functions and immutability.

  • Functional Requirements

    Specifications of functions that a system or component must be able to perform.  

  • Functional Testing

    Testing software against functional requirements.

  • G

  • Gateway

    Gateways enable communication between different networks by translating data formats and protocols, enhancing connectivity and security across systems.

  • GenAI Tools In IDEs

    Generative AI tools integrated into Integrated Development Environments to assist developers.

  • General Data Protection Regulation (GDPR)

    A regulation in EU law on data protection and privacy for individuals, which also addresses the transfer of personal data outside the EU and EEA, impacting healthcare data management.

  • Generative AI

    AI technologies that create new content, such as text, images, or music, from scratch.

  • Genomic Data Analytics

    The use of advanced analytics and computational tools to analyze genomic data, enabling personalized medicine, and the identification of genetic predispositions to diseases.

  • GeoServer

    GeoServer allows users to publish spatial information from various formats and sources, enabling easy access and interaction with map data across web applications.

  • Gesture Recognition

    Technology that interprets human gestures to control devices or interact with systems.

  • Git

    A distributed version control system used for tracking changes in source code.  

  • GitFlow

    Branching model for managing Git projects.

  • GitHub

    A web-based hosting service for version control using Git.  

  • Golang

    Open-source programming language by Google.

  • Good Clinical Practice (GCP)

    An international ethical and scientific quality standard for the design, conduct, performance, monitoring, auditing, recording, analyses, and reporting of clinical trials.

  • Good Manufacturing Practice (GMP)

    Regulations that require manufacturers, processors, and packagers of drugs, medical devices, and food to ensure that their products are safe, pure, and effective.

  • Gradient

    A gradual transition between two or more colors.  

  • GraphQL

    Query language for APIs, allowing for flexible data retrieval.

  • Green Cloud

    Cloud computing practices that aim to reduce environmental impact and promote sustainability.

  • Green Software Engineering

    Software development practices that focus on reducing environmental impact.

  • Green UX

    User experience design practices that prioritize sustainability and environmental impact.

  • Grid System

    A framework of horizontal and vertical lines used for layout consistency.  

  • Gutter

    The space between columns or pages in a layout.  

  • H

  • Hadoop

    Open-source framework for big data processing and storage.

  • Health Information Exchange (HIE)

    The electronic movement of health-related information among organizations according to nationally recognized standards.

  • Health Information Technology (HIT)

    The application of information technology to healthcare, including electronic health records, telemedicine, mobile health applications, and health information exchanges.

  • Healthcare Fraud Prevention Partnership (HFPP)

    A public-private partnership to identify and reduce fraud, waste, and abuse across the healthcare sector.

  • High Availability (HA)

    A design approach that ensures systems remain operational for a high percentage of time.

  • HIPAA Compliance

    Adherence to the regulations and standards set by the Health Insurance Portability and Accountability Act for protecting sensitive patient data.  

  • Hosting

     Storing and serving web files on a server.   

  • HP Diagnostics

    HP Diagnostics is a suite of tools provided by Hewlett-Packard to help diagnose, troubleshoot, and repair hardware and software issues on HP devices.

  • HTML (Hypertext Markup Language)

    The standard language for web pages.  

  • HTTP (Hypertext Transfer Protocol)

    The foundation of data communication for the World Wide Web.  

  • Hue

    The attribute of color that distinguishes one from another.  

  • Hybrid Cloud

    Combination of private and public cloud services.

  • Hybrid Deployment

    A hybrid deployment is a model that combines on-premises infrastructure with cloud services, allowing organizations to leverage the benefits of both environments for flexibility, scalability, and optimized resource use.

  • Hypervisor

    Software that creates and runs virtual machines.

  • I

  • Icinga

    Icinga is an open-source monitoring software that helps organizations track the performance, availability, and overall health of their IT infrastructure, alerting them to issues before they impact users.

  • Icon

    A simplified graphical representation of an object or concept.  

  • IDE (Integrated Development Environment)

    A software application that provides comprehensive facilities to computer programmers for software development.  

  • Illustration

    Hand-drawn or digital artwork used in design.  

  • Image Recognition

    The ability of a software system to identify objects, places, people, or actions in images.  

  • Image-Guided Surgery (IGS)

    A surgical procedure in which the surgeon uses preoperative and intraoperative imaging to guide the surgery, often involving advanced visualization and navigation technologies.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that allows users to access and manage their email messages on a remote server, enabling synchronization across multiple devices.

  • Immuno-Oncology

    A field of cancer treatment that uses the body’s immune system to fight cancer, often involving advanced biotechnologies like CAR-T cell therapy.

  • Increased Regulation

    The growing trend of governments imposing more regulations on technology companies and practices.

  • Industrial XR

    Extended Reality technologies applied in industrial settings, such as manufacturing and maintenance.

  • Infographic

    A visual representation of data or information.  

  • Information Resources Manager (IRM)

    IRM professionals work closely with senior leadership to align information resource strategies with broader business objectives.

  • Information Security

    Information security (InfoSec) refers to the practice of protecting digital and physical data from unauthorized access, alteration, destruction, or disclosure.

  • Information Security Council

    The ISC is responsible for developing, implementing, and monitoring security policies, ensuring compliance with regulations.

  • Information Security Officer (ISO)

    An Information Security Officer (ISO) is a senior-level executive responsible for managing and overseeing an organization's information security program.

  • Informed Consent

    A process of communication between a patient and a healthcare provider that results in the patient's authorization or agreement to undergo a specific medical intervention, ensuring compliance with ethical and legal standards.

  • Inheritance

    A concept in object-oriented programming where one class derives properties and behavior from another class.

  • Integrated Data And AI Platforms

    Platforms that combine data management and AI capabilities for streamlined workflows.

  • Integration Testing

    Testing combined modules as a group.

  • Intelligent Machine-to-machine Collaboration

    Systems where machines communicate and work together autonomously.

  • Interactive Patient Care (IPC)

    Systems that engage patients in their care through interactive technology, such as bedside tablets or patient portals, to improve patient education and satisfaction.

  • Interface

    In computing, a shared boundary across which two separate components of a computer system exchange information.  

  • International Law For Crypto Assets

    Legal frameworks governing the use and exchange of cryptocurrencies across different countries.

  • Interoperability

    Ability of systems to work together seamlessly.

  • Interoperability

    The ability of different information technology systems and software applications to communicate, exchange data, and use the information that has been exchanged.

  • Intrusion Detection System (IDS)

    An Intrusion Detection System (IDS) is a security tool used to monitor network or system activities for malicious behavior or policy violations.

  • InVision

    A design collaboration and prototyping platform.

  • IoMT (Internet Of Medical Things)

    A connected infrastructure of medical devices and software applications that communicate with various healthcare IT systems.

  • IoT (Internet Of Things)

    The network of physical objects embedded with sensors and connectivity to exchange data.  

  • Iteration

    A single cycle in a process aimed at achieving a goal, often used in agile and iterative development methodologies.  

  • J

  • JavaScript

     A programming language for interactive web elements.  

  • Jenkins

    An open-source automation server that helps automate the parts of software development related to building, testing, and deploying.  

  • JIRA

    A popular tool used for issue tracking and Agile project management.

  • JS Express

    Express framework tailored for JavaScript developers.

  • JSON (JavaScript Object Notation)

    A lightweight data format used for data exchange.

  • JUnit

    Unit testing framework for Java programming language.

  • Just-In-Time (JIT)

    A compilation method that translates code during execution, often improving performance.

  • K

  • Kanban

    An approach for managing software development that depicts all planned work to optimize the overall process.   

  • Kerning

    Adjusting the space between individual characters in a font.  

  • Key-Value Store

    A type of database where data is stored as key-value pairs, such as Redis or DynamoDB.

  • Knowledge Graph

    A network of entities and their relationships, used to integrate and access information.  

  • Knowledge Graphs

    Data structures that represent relationships between concepts and entities, used for organizing and retrieving information.

  • Kubernetes

    An open-source platform for automating deployment, scaling, and operations of application containers.  

  • L

  • LAMP Stack

     A software bundle for web development (Linux, Apache, MySQL, PHP).  

  • LAN- Local Area Network

    A Local Area Network (LAN) is a network that connects computers and devices within a limited area, like a home, school, or office, allowing for resource sharing, file transfers, and internet access among users in close proximity.

  • Landing Page

     A web page designed for specific user actions.  

  • Langchain

    Framework for developing AI applications using large language models.

  • Layout

    The arrangement of text and graphics on a page or screen.  

  • Lazy Loading

    Technique for deferring the loading of resources.

  • Leading

    The vertical space between lines of text in a paragraph.  

  • Lean Startup

    A methodology for developing businesses and products based on validated learning and rapid iteration.  

  • Library

    A collection of non-volatile resources used by computer programs, often for software development.  

  • Lift And Shift

    The process of migrating applications and associated data to a cloud environment without redesigning the app.  

  • Lightweight Directory Access Protocol (LDAP)

    LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information over a network.

  • Line Art

    Images composed of lines, often used in logos or illustrations.  

  • Linux

    Linux is a popular open-source operating system known for its stability, security, and flexibility, widely used in servers, desktops, and embedded systems worldwide.

  • Linux Server

    A Linux server is a server that runs on a Linux operating system, providing a secure, reliable, and open-source platform for hosting websites, applications, and services in a wide range of environments.

  • Lisp

    Lisp is one of the oldest high-level programming languages, known for its unique syntax and powerful support for symbolic computation and artificial intelligence (AI) applications.

  • Load Testing

    A process to test a system's performance under heavy usage.

  • Load Time

     The time it takes for a web page to fully load.  

  • Local Area Network (LAN)

    LANs enable communication between devices, allowing them to share resources like files, printers, and internet connections.

  • Low Code

    Development approach with minimal hand-coding.

  • M

  • Mac OS X

    Mac OS X is a Unix-based operating system developed by Apple Inc., designed for Mac computers.

  • Machine Learning

    A subset of AI involving the use of algorithms and statistical models to enable computers to improve tasks.  

  • Maintenance

    A set of actions after the launch of a website to maintain the product.  

  • Malicious Code

    Malicious code refers to any software or script that is designed to cause harm to a computer system, network, or user.

  • Malware

    Malicious software that can harm websites.  

  • Managed Security Services

    Outsourced security services for organizations.

  • Medical Imaging Informatics

    The branch of health informatics that focuses on the efficient and effective management of medical images, including radiology and pathology images, often through PACS (Picture Archiving and Communication Systems).

  • MedTech

    Technology for medical and healthcare applications.

  • MES (Manufacturing Execution System)

    A system used to manage and monitor work-in-process on the factory floor.  

  • Metadata

     Structured reference data that sorts attributes of specific information.  

  • Metaverse

    Virtual reality space for interacting in a digital environment.

  • Methodology

    A technique that enables the design and development of software to be implemented.   

  • MHealth (Mobile Health)

    The use of mobile devices and wireless technology in healthcare to monitor patient health, deliver care, and provide health information.

  • Microservices

    An architectural style that structures an application as a collection of loosely coupled services.  

  • Middleware

    Software that acts as a bridge between an operating system or database and applications, especially on a network.  

  • Minimum Viable Product (MVP)

    A product with enough features to satisfy early adopters and provide feedback for future development.  

  • MLOps

    Practices that combine machine learning, development, and operations to streamline the deployment and maintenance of ML models.

  • Mobility

    The ability to access information and services anywhere, anytime, on any device.  

  • Mockup

    A visual representation of a design, often used for presentation or testing.  

  • Modernization

    The process of adapting something to modern needs or habits, typically by updating systems, processes, and technology.  

  • Module

     A separate unit of software or hardware.  

  • Monochrome

    A design or image that uses shades of a single color.  

  • Monolithic

    Single-tiered software architecture tightly integrated.

  • Monospace

    A font where letters and characters occupy the same amount of horizontal space.  

  • MQTT

    MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed for small, resource-constrained devices and low-bandwidth networks.

  • Multimedia

    Design that includes a combination of text, graphics, audio, and video.  

  • Multimodal AI

    AI systems that can process and understand multiple types of data, such as text, images, and audio.

  • MVC (Model-View-Controller)

    A software architectural pattern.  

  • MySQL

    An open-source relational database management system.  

  • N

  • Nagios

    Nagios is an open-source monitoring tool that tracks the health, availability, and performance of IT infrastructure, alerting users to issues with servers, networks, and applications

  • Nanomedicine

    The application of nanotechnology to medicine, including the use of nanoparticles for drug delivery, imaging, and as part of therapeutic devices.

  • Natural Language Processing

    The field of AI focused on enabling machines to understand and process human language.

  • Navigation Menu

    Links for website navigation.  

  • Nest.js

    Progressive framework for building efficient Node.js applications.

  • Network File System (NFS)

    Network File System (NFS) is a protocol that allows users to access files over a network as if they were on their local machine, enabling file sharing and collaboration across connected devices.

  • Network Monitoring

    Network monitoring is the process of continuously observing a network’s performance, health, and security to detect issues or inefficiencies.

  • Neural Networks In Medicine

    A type of AI that mimics the human brain to recognize patterns and interpret data in complex ways, often used in diagnostics, imaging analysis, and drug discovery.

  • Next-generation Cryptography

    Advanced cryptographic techniques designed to enhance security and privacy.

  • Node Package Manager (NPM)

    Node Package Manager (NPM) is a package manager for JavaScript, used primarily to install, share, and manage libraries and tools for Node.js applications.

  • Node.js

    An open-source, cross-platform JavaScript runtime environment.  

  • NoSQL

    Non-relational databases for handling unstructured data.

  • O

  • OAuth

    A protocol for secure authorization.  

  • Object Oriented Programming

    Programming paradigm based on objects and classes.

  • Observability

    The ability to measure and understand the internal state of a system based on the data it produces.  

  • OData

    OData (Open Data Protocol) is a web-based protocol developed by Microsoft for querying and updating data.

  • OKHTTP

    OKHttp is an open-source HTTP client for Java and Android applications that simplifies network communication by handling requests, responses, and connection management efficiently.

  • Omnichannel

    An integrated approach to sales and marketing that provides customers with seamless experience across multiple channels.  

  • Online Machine Learning

    Machine learning methods that process data and update models in real time as new data arrives.

  • Opacity

    The degree of transparency or translucency in an element.  

  • Open Source

    Software with source code that anyone can inspect, modify, and enhance.  

  • OpenBSD

    OpenBSD is a free and open-source operating system known for its emphasis on security, correctness, and code simplicity.

  • OpenSSL

    OpenSSL is an open-source toolkit used for implementing Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, enabling secure communication over networks by encrypting data.

  • Operationalize AI

    The process of deploying and integrating AI models into business operations and workflows.

  • Oracle Linux System Administrator

    An Oracle Linux System Administrator is a professional responsible for managing and maintaining Oracle Linux servers, ensuring their optimal performance, security, and reliability.

  • OTRS (Open Ticket Request System)

    OTRS (Open Ticket Request System) is an open-source service management software used to manage customer support requests, track tickets, and improve service delivery in various industries.

  • Overhaul

    Comprehensive examination and improvement of a system.

  • Overlay

    A semi-transparent layer placed on top of an image or element.  

  • P

  • Pantone

    A standardized color matching system used in printing.  

  • Paradigm Shift

    Fundamental change in underlying assumptions or practices.

  • Parameter

    A special kind of variable, used in a subroutine to refer to one of the pieces of data provided as input to the subroutine.  

  • Patient Portal

    A secure online website that gives patients access to their personal health information and enables communication with their healthcare providers.

  • Pay-per-click (PPC)

    An online advertising model where advertisers pay a fee each time a user clicks on their ad.    

  • Penetration Testing

    A simulated cyberattack on a system to evaluate its security.  

  • Performance Testing

    Assessing system performance under specific conditions.

  • Personal Information Economy

    An economy where individuals control and monetize their personal data.

  • Personalized Healthcare

    Tailoring medical treatment and care to individual patient characteristics and needs using data and technology.

  • PHI (Protected Health Information)

    Any information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service.

  • Pipeline

     A set of data processing elements connected in series.  

  • Pixel

    The smallest unit of digital image representation.  

  • PL/SQL

    Oracle's procedural language extension for SQL.

  • Platform As A Service (PaaS)

    A cloud computing model providing a platform allowing customers to develop, run, and manage applications.  

  • Platforms As Products

    Treating digital platforms as standalone products with their own value propositions and user experiences.

  • Plugin

    An add-on that adds new functionalities to a host program or software without alternating the host itself.   

  • Plugin Development

    Creating custom website extensions.  

  • POC (Proof Of Concept)

    A demonstration to verify that certain concepts or theories have the potential for real-world application.  

  • PostgreSQL

    Open-source relational database management system.

  • PPI (Pixels Per Inch)

    A measurement of image resolution for digital displays.  

  • Predictive Analytics

    Techniques using data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.  

  • Print Ready

    A design file prepared for high-quality printing.  

  • Privacy First

    Approaches and practices that prioritize user privacy in the design and operation of technologies.

  • Privacy-aware Communication

    Communication systems that prioritize and protect user privacy.

  • Privacy-enhancing Technologies (PETs)

    Technologies designed to protect user privacy while enabling data usage and analysis.

  • Privacy-respecting Computation

    Methods for performing computations on data while preserving the privacy of individual data points.

  • Procedure

    A set of coded instructions that tell a computer how to run a program or calculation.  

  • Product Discovery

    The process of identifying and validating product ideas through user research and testing.  

  • Product Roadmap

    A strategic plan that outlines the vision, direction, priorities, and progress of a product over time.   

  • Production Immune Systems

    Automated systems that detect and respond to anomalies in production environments to maintain stability and security.

  • Programming Language

    A formal language comprising a set of instructions that produce various kinds of output.  

  • Progressive Web Apps

    Web applications that use modern web capabilities to deliver an app-like experience to users.  

  • Prompt Engineering

    Designing effective prompts for AI models.

  • Prototype

    An early sample or model of a product to test a concept or process.  

  • Pull Request

    A notification given by developers when they’re done building a feature.   

  • Q

  • QA (Quality Assurance)

    The process of reviewing a software product to ensure it meets expectations.  

  • QA Automation

    The use of automated testing tools to execute tests on software applications to ensure they meet specified requirements.  

  • Quality Control

    Ensuring products meet specified quality standards.

  • Quantum AI

    AI utilizing quantum computing for complex problem-solving.

  • Quantum Computing

    Advanced computing technology that uses quantum mechanics principles to perform complex calculations faster than classical computers.

  • Quantum Machine Learning

    The application of quantum computing to enhance machine learning algorithms and processes.

  • Query

     A request for data or information from a database.  

  • R

  • RAG (Retrieval Augmented Generation)

    AI techniques that combine information retrieval with content generation to improve accuracy and relevance.

  • Rasterize

     Converting vector graphics into pixel-based images.  

  • Re-decentralization

    The movement towards decentralizing control and decision-making in technology systems and platforms.

  • ReactJS

    JavaScript library for building user interfaces.

  • Recursion

    The process of defining a function or calculating a number by the repeated application of an algorithm.  

  • Redirect

    Forwarding one URL to another.  

  • Redux

    State management library for JavaScript applications.

  • Regression Testing

    Verifying that changes haven't introduced new issues.

  • Regulatory Compliance

    Adherence to laws, regulations, guidelines, and specifications relevant to healthcare operations.

  • Remote Patient Monitoring (RPM)

    The use of digital technologies to collect health data from patients in one location and electronically transmit that information securely to healthcare providers in a different location for assessment and recommendations.

  • Remote Therapeutic Monitoring (RTM)

    The use of digital technologies to monitor and manage patients' conditions remotely, often involving tracking metrics like medication adherence and symptom management.

  • Repository

    A central place where data is stored and managed.  

  • Resolution

    The clarity and sharpness of an image or display.  

  • Responsible Tech Facilitation

    Efforts to promote the ethical and responsible development and use of technology.

  • Responsive Design

    Design that adapts to different screen sizes and devices.  

  • REST (Representational State Transfer)

    An architectural style for designing networked applications.  

  • REST API

    Representational State Transfer for web services.  

  • Retina Resolution XR

    Extended Reality displays with resolutions comparable to the human retina, providing highly detailed visuals.

  • Revenue Management

    Revenue management is a set of practices or techniques that consider consumer demand and set the optimal price for the product.  

  • RGB

    The color model used for digital design, consisting of red, green, and blue.  

  • Robotic Process Automation And Low Code

    Automating business processes using robots and low-code development platforms.

  • Ruby On Rails

    Web application framework written in Ruby programming language.

  • Rule Of Thirds

    A compositional technique that divides an object or frame into an equal, three-by-three grid with two horizontal and vertical lines.  

  • Runtime

    The period during which a computer program is executing.  

  • S

  • SaaS (Software As A Service)

    A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.  

  • Sanity Testing

    A subset of regression testing to verify that a particular function or bug is working as expected.  

  • Satellite Networks

    Networks of satellites used for communication, navigation, and data collection.

  • Saturation

    The intensity or richness of a color.  

  • Scalability

    The ability to resize an image or design without loss of quality.  

  • Schema

    The structure of a database system, described in a formal language.  

  • Schema Markup

    The code that can be used on a website to help search engines deliver more information to users.  

  • Script Font

    A typeface that mimics handwritten script or calligraphy.  

  • Scripting

    Writing small programs to automate tasks.

  • Scrum

    A project management methodology for effective team collaboration that’s based on Agile software development.  

  • SDK (Software Development Kit)

    A collection of software tools and libraries that developers use to create applications for specific platforms.  

  • SDLC (Software Development Life Cycle)

    The general process of software development that follows a series of steps until completion.   

  • Secure Software Delivery

    Practices and tools to ensure the secure development and deployment of software applications.

  • Security

     The state of being free from danger or threat in a computing context.  

  • Selenium

    Automated testing tool for web applications.

  • Sequel

    SQL-based command for querying databases.

  • Server

    A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.  

  • Serverless Architecture

    Cloud-based, scalable web hosting.  

  • Service-Oriented Architecture (SOA)

    A style of software design where services are provided to the other components by application components, through a communication protocol over a network.  

  • Sitemap

    An outline of all pages on a website.  

  • Sketch

    A rough or preliminary drawing or design.  

  • Smart Cities

    Urban areas that use technology and data to improve infrastructure, services, and quality of life.

  • Smart Energy Management Systems

    Systems that optimize energy use and efficiency in buildings and infrastructure.

  • Smart Health Devices

    Wearable or portable devices connected to a network that monitor health indicators such as heart rate, blood pressure, or glucose levels.

  • Smart Homes

    Homes equipped with connected devices and systems that automate and enhance daily living.

  • Smart Implants

    Medical implants equipped with sensors and connectivity features that allow them to monitor and transmit data on their performance and the patient’s condition in real-time.

  • Smart Systems And Ecosystems

    Interconnected systems and devices that use data and intelligence to optimize performance and interactions.

  • Smoke Testing

    Preliminary testing to check basic functionality.

  • SOAP APIs

    Simple Objects Access Protocol is a web communication protocol for exchanging structured information in a decentralized, distributed environment.  

  • Software Architecture

    The high-level structure of a software system, defining its components and their interactions.  

  • Software Process

    A set of activities, methods, practices, and transformations used to develop and maintain software.  

  • Software Testing

    Process of evaluating software for errors and bugs.

  • Software-defined Vehicles

    Vehicles that rely on software to control and manage their functions and features.

  • Solidity Language

    Programming language for developing Ethereum smart contracts.

  • Source Code

    The fundamental component of a computer program created by a programmer.  

  • Spatial Audio

    Audio technology that creates a three-dimensional sound experience for listeners.

  • Split Testing

    A method of comparing two versions of a webpage or app against each other to determine which one performs better.  

  • Springboard

    Launching point for further development or progress.

  • Sprint

    A set period during which specific work must be completed and made ready for review in Agile development. 

  • SQL

    Structured Query Language for managing relational databases.

  • SQL (Structured Query Language)

    A domain-specific language used in programming and designed for managing data held in a relational database management system.  

  • SRS (Software Requirements Specification)

    A document that describes what the software will do and how it will be expected to perform.  

  • SSH (Secure Shell)

     A cryptographic network protocol for operating network services securely over an unsecured network.  

  • SSL (Secure Sockets Layer)

    Encryption protocol for web security.  

  • Stable Diffusion

    Process for gradually introducing changes into a system.

  • Staging Site

    A platform containing the exact copy of the site used for testing and debugging.  

  • Storyboard

    A sequence of sketches or images used to plan a visual narrative.  

  • Structured Vs Unstructured Data

    Structured data is highly organized and easily searchable; unstructured data lacks a pre-defined format or organization.  

  • Supply Chain

    Network involved in producing and delivering products.

  • Synthetic Data In Healthcare

    Artificially generated data that simulates real-world healthcare data, used in research, AI training, and software testing without compromising patient privacy.

  • System Integration

    The process of linking different computing systems and software applications physically or functionally.  

  • System Software

    Software designed to provide a platform for other software.  

  • Systems Integration

    The process of linking together different computing systems and software applications physically or functionally.  

  • T

  • Tech Debt

    Accumulation of suboptimal code requiring future rework.

  • Tech Stack

    The combination of programming languages, tools, and frameworks used in software development.  

  • Technology And Sovereign Power

    The relationship between technological advancements and national sovereignty and power.

  • Technology For Circular Economy

    Technologies that support the circular economy by promoting reuse, recycling, and sustainability.

  • Telehealth

    The use of digital communication technologies, such as video conferencing and mobile apps, to provide healthcare services remotely, including consultations, diagnostics, and follow-ups.

  • Telemedicine

    The remote diagnosis and treatment of patients by means of telecommunications technology.

  • Telemetry

    The remote monitoring of a patient’s vital signs, such as heart rate and rhythm, often used in critical care settings.

  • Telepharmacy

    The delivery of pharmaceutical care through telecommunications to patients in locations where they may not have direct contact with a pharmacist.

  • Template

    The layout and design of the platform that can be replicated.  

  • TensorFlow

    Open-source platform for machine learning.

  • Test Case

    A set of conditions under which a tester will determine whether a software application or system is working correctly.  

  • Texture

    The surface quality or feel of an element in a design.  

  • Thumbnail

    A small, low-resolution preview of an image or design.  

  • Tint

    The shade of color that is created when white is added to lighten the hue.  

  • Tokenization

    The process of substituting a sensitive data element with a non-sensitive equivalent, called a token, which can be used in a database or internal system without bringing it into scope.

  • Touchless Interactions

    User interfaces that allow interaction without physical contact, often using gestures or voice commands.

  • Trunk-Based Development

    Development practice with a single shared branch.

  • Trustworthy Data

    Data that is accurate, reliable, and secure, ensuring confidence in its use.

  • TypeScript

    Typed superset of JavaScript enhancing code quality.

  • Typography

    The art and technique of arranging type in a visually appealing way.  

  • U

  • UAT (User Acceptance Testing)

    The process of verifying that a software solution works for the user.  

  • Ubiquitous Connectivity

    The widespread availability of network connections, enabling seamless communication and data exchange.

  • UI (User Interface) Design

      Designing the visual elements of software or websites  

  • UI/UX (User Interface/User Experience)

    Designing user-friendly interfaces.  

  • Understandable Consent

    Clear and transparent mechanisms for obtaining user consent for data collection and usage.

  • Unit Test

    Testing individual components of a software application.

  • Unity

    Game development platform for creating 2D and 3D games.

  • Unreal Engine

    Tool for creating high-quality games and interactive 3D experiences.

  • Uptime

    Percentage of time a website is available.  

  • URL (Uniform Resource Locator)

    Web address for accessing content.  

  • Usability

    The ease with which users can navigate a website.  

  • Usability Testing

    Evaluating user experience.  

  • User Flow

    Path users take through a website.  

  • User Stories

    Simple descriptions of a feature from the perspective of the end user or customer.  

  • User-Centered Design (UCD)

    A design process that focuses on usability and user needs at every stage.  

  • UX Research

    Gathering user feedback and insights.  

  • V

  • Validation

    Ensuring software meets requirements and specifications.

  • Value-Based Care

    A healthcare delivery model in which providers are paid based on patient health outcomes rather than the volume of services provided.

  • Vector

    Graphics created using mathematical equations, scalable without loss of quality.  

  • Vector Databases

    Databases optimized for storing and querying high-dimensional data, often used in AI and machine learning.

  • Verification

    Checking that software correctly implements specified functions.

  • Version Control

    A system that records changes to a file or set of files over time so that you can recall specific versions later.  

  • Virtual Machine (VM)

    A software-based emulation of a physical computer.

  • Virtual Nursing Assistants

    AI-powered virtual assistants that provide patients with basic nursing support, such as answering questions, monitoring symptoms, and providing medication reminders.

  • Virtual Reality (VR)

    Simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way.  

  • Visual Hierarchy

    The arrangement of elements to guide the viewer's attention.   

  • Visual Identity

    The overall look and feel of a brand's design elements.  

  • W

  • Watermark

    A semi-transparent mark or logo placed on an image for copyright protection.  

  • Wearable Technology

    Electronic devices worn on the body that can collect data, track activities, or provide real-time feedback on health metrics.

  • Web 3.0

    Decentralized web with enhanced data privacy and user control.

  • Web Application

    An application program stored on a remote server and delivered over the Internet through a browser interface.  

  • Web Security

    The practice of protecting websites and web applications from cyber threats.  

  • Web Server Configuration

    Customizing server settings.  

  • Web Services

    Software systems designed to support interoperable machine-to-machine interaction over a network.  

  • Webhooks

    Automated messages sent from apps when something happens, acting as triggers for other actions.

  • Website Architecture

    Structure and organization of a website.  

  • Website Maintenance

    Ongoing updates and improvements.  

  • Website Migration

    Moving a website to a new host or platform.  

  • White Label App

    A fully customizable application developed by one company that other companies can rebrand and resell as their own. 

  • White Space

    The empty or unmarked areas in a design, used for balance and clarity.  

  • Widget

     A component of a graphical user interface (GUI) that displays information or provides a specific way for a user to interact with the operating system or an application.  

  • Wireframe

    A simplified, non-graphic representation of a web page or interface.  

  • Wireframing Tool

    Software for creating wireframes.  

  • X

  • X-height

    The height of lowercase letters in a font.  

  • X-Ray Imaging Software

    Advanced software used to enhance, analyze, and share x-ray images, enabling better diagnosis and treatment planning in radiology.

  • Xamarin

    Framework for building cross-platform mobile applications.

  • XML (eXtensible Markup Language)

    A data format for structured content.  

  • XR-enabled Hybrid Working

    Using Extended Reality technologies to facilitate remote and hybrid work environments.

  • Y

  • Y-axis

    The vertical line in a coordinate system used for positioning elements.  

  • YAML

    A human-readable data format for storing and transmitting information  

  • Z

  • Z-axis

    The depth or three-dimensional aspect of a design.  

  • Zero Knowledge Proofs

    Cryptographic methods that allow one party to prove to another that a statement is true without revealing any additional information.

  • Zoom

    Enlarging or reducing the view of a design or image.  

  • Zoonotic Disease Monitoring

    The use of technology, including biosensors and data analytics, to monitor diseases that can be transmitted from animals to humans, crucial for public health surveillance.