IT Glossary
What is an Accelerated Processing Unit (APU)?
An accelerated processing unit (APU) is a microprocessor that combines the central processing unit (CPU) with the graphics processing unit (GPU) on a single computer chip. It makes a computer a bit faster than if the processors were set far apart from each other because, in that case, it would take more time for them to communicate.
You can compare an APU to a pencil with an eraser at the other end. There’s no need to drop the pencil and grab an eraser, erase the mistake, and then exchange the eraser back. Instead, you can easily and quickly make corrections to your work with a single tool. The APU works like that for today’s powerful gaming computers.
What is Agile Methodology?
Agile methodology is a practice used to develop software quickly and efficiently. In essence, the developers are in a loop that starts with the requirements of the intended end-users. The programmers build the product based on these requirements, then pass it on to the users. They provide feedback, which the developers use to make adjustments to the software. The process then repeats itself for as long as there is a need for the software product.
Agile implies that the working team and client are in constant consultation every step of the way, allowing them to develop new requirements and apply changes to the project based on their current situation.
What is an Algorithm?
An algorithm is a procedural plan for solving mathematical and computer problems such as sorting data, for example. It’s not a computer program yet. It’s merely a description of how you want the program to perform a task.
You can think of an algorithm as an outline, such as one a writer prepares before writing a piece. Similarly, a developer can plan how to solve a problem before writing an actual program.
In computing, algorithms serve as a set of instructions that determines the “what” but also address the “how.” Using algorithms makes it easier for programmers to gain a better understanding of the processes that would help them solve problems.
What is an Application Gateway?
An application gateway is a program that serves as a firewall proxy. It runs between computers in a network to tighten security. It is responsible for filtering incoming traffic that contains network application data.
To illustrate, think of a program that wants to connect with another. Before it can establish a connection, it must first connect to an application gateway, which then accesses the desired system on its behalf. That way, the computer on the receiving end is protected from possible malicious attacks.
So, what is an application gateway in simple terms? It provides an additional layer of protection against unwanted network traffic. It is also sometimes known as an “application-level gateway” or “application proxy.”
What is Application Programming Interface (API)?
An Application Programming Interface (API) is a piece of software that acts like a messenger between two applications. If you are using one application but require information from another one, the API will go fetch it for you. You can also think of it as an intermediary that enables two computer applications to interact with each other and enable a particular function.
When you use an application on your smartphone to send a text message, it’s the API that tells a server what you want to do. The server then performs the action and sends back the data to your phone, which is then able to proceed and send the text message.
What is Backend Development?
Backend development is that area of web development that focuses on how a website or web application works. It is what happens behind the scenes, the same way that a restaurant’s chef and his/her staff handles all orders without the customers sitting at their tables seeing them. Instead of cooking food, though, backend developers write codes that enable web browsers to communicate with databases and servers.
The primary role of a backend developer is to ensure that end-users get the data or services they requested without a glitch and on time. As such, backend development requires a comprehensive set of programming skills and knowledge.
What is a Backend System?
A backend system refers to any structure or setup that runs and supports corporate back-office applications. Backend systems could take the form of servers, mainframes, and other systems that offer data services. Simply put, they are computers and devices that end-users don’t see since they work in the background. Nevertheless, a backend system plays a critical role in any organization’s operation.
When you think about a backend system doing several things in the background, you might think of a chaotic scene in a fast-food chain’s kitchen. Someone is in charge of preparing the drinks while another operates the fry station. Instead of several pieces of equipment, though, a backend system could include a single computer only.
Separating the frontend from the backend makes everything simpler. After all, you seldom see a waitress prepare the meals that he/she serves.
What is a Backup?
Have you ever poured all your energy in preparing a report or an assignment, but discovered that it had been accidentally deleted moments before submission? Creating a backup would have prevented this catastrophe.
A backup is the extra copy or duplicate of your data as a safeguard against the loss or damage of the original. It can be used to recover information in case it gets deleted or corrupted. You can also use it to recover data from an earlier time.
What is Binary Code?
Binary code is the language of computers. It consists of combinations of zeroes and ones, hence the term "binary". Each combination represents a specific set of instructions for the computer to carry out.
Here's an example. The word "HELLO", when written in binary code looks like this: 01001000 01100101 01101100 01101100 01101111 00100001
The operating system then converts the binary code into the corresponding letters of the English alphabet, and instructs the system to display it on the screen as "HELLO".
What is a Computer Bug?
In computing, a bug is an error in the source code that causes a program to produce unexpected results or crash altogether. Computer bugs can affect an application’s performance, so developers need to make sure they are corrected before the software gets sold to customers.
Back when mainframe computers were still state-of-the-art, some programmers kept getting wrong results from their programs. When they checked under the hood, they discovered that a moth got into the circuitry, causing errors in computations. That’s why programming errors are called “bugs.”
What is a Bug Bounty Program?
In the Wild West, sharp-shooting bounty hunters tracked down wanted criminals and brought them to justice in exchange for reward money from the authorities.
Fast forward to the 21st century — there’s a similar reward incentive in the Wild Web called bug bounty program.
This time, websites or business organizations are the ones offering attractive rewards in the form of money or recognition to any individual who reports a software bug, especially the types that pertain to exploits and vulnerabilities.
A bug bounty program, also called a vulnerability rewards program, is usually launched through a crowdsourcing initiative.
What is a Central Processing Unit (CPU)?
The computer's central processing unit (CPU) refers to the electronic circuitry that processes instructions and tells each part of the system what to do. It's arguably the most critical and defining component of a computer. Without it, your PC will not be able to do anything.
If your PC were a restaurant, the CPU would be its head chef. The quicker the chef works, the faster the food can be served to customers. Similarly, a CPU with higher processing power can perform more tasks faster.
What is Cloud Portability?
Cloud portability is the ability to move an application or data from one cloud service provider to another without the need to rewrite or restructure them. For cloud data portability, the information can be moved to another service provider without reentering it. On the other hand, cloud application portability also refers to transferring an application from an enterprise’s premises to a cloud provider’s.
What is Codeless Programming?
Codeless programming is alternatively known as “no-code software development” or “low-code software development.” It basically allows practically anyone (even those with no programming or development background) to create their own applications using templates and modules on graphical user interfaces (GUIs).
Simply put, “codeless” in “codeless programming” translates to “no coding.”
What is Coding?
You’ve read somewhere that “coding” is one of the highest paying jobs these days. Suddenly, everyone seems eager to learn how to do it. But what exactly is it?
The term refers to writing a computer program. The series of instructions programmers create is known as the “source code” of the program. They soon shortened the term to “code.” So when they are working on the source code of a software, an app, or a website, they refer to it as “coding.”
What is a Computer Network?
Imagine if human beings could share thoughts, plans, emotions and more through their minds alone. This ability would let people understand one another easily and thus accomplish more things because of the mutual connection.
A computer network can be thought of as a form of telepathy. But instead of people, it is made up of computers and other devices that are all interconnected.
Many things can be shared between connected computers such as access, files, and more. Basically, a computer network can let one computer do many things with the help of others which it wouldn’t be capable of doing by itself.
What is a Computer Server?
Imagine that you live in a mansion, with a butler to assist you with everything you need. Just let him know what you want and he'll take care of it.
A server or computer server is a computer that acts like a butler for you, giving you the information or computer process you need. You send a request to the server, for example, by using a browser to connect to a web page. The server then passes your request to the software you need the data from, in this case a web server. It then serves that information back to you in the form of the web page you wanted to access.
What is Concurrent Computing?
Concurrent computing is the process where a single or multiple systems do several calculations simultaneously or within overlapping time frames. The idea is to run various threads or instruction sets based on a given schedule. As such, the program should run independently of the parent or main process. Systems or components can work together without one or all waiting for the other tasks to be completed.
Imagine a car assembly line. Each system is programmed to manufacture a car part. Let’s say there are 10 different parts and a device for each piece. But there are 11 machines running simultaneously; the eleventh assembles the car. All 11 machines can work at the same time. Every time any of 10 parts assemblers are done, it can pass on the completed car part to the eleventh device. The last machine can then just wait for all 10 systems to finish and thus achieve its task as well.
What is Contiguous Memory Allocation?
Contiguous memory allocation is a way to allocate adjacent parts of memory to a process or file that needs it. Since all of the available partitions of the memory space are in the same place, the unused sections are not distributed randomly.
Think of contiguous memory allocation as a means of forming a group where you don’t get to choose who you will work with. Instead of having the option to work with office mates from different floors in your office, for example, you end up with the people you’re on the same floor with.
What is Decoding?
Decoding is the process of unlocking the contents of a coded file that has been transmitted. Media files, like movies and music, are normally encoded so that that they do not take up much bandwidth during transmission. They must be decoded back to their original form in order for you to view the video or listen to the music.
It's like receiving a locked gift box. You need to unlock it to find out what's inside.
What is Development Environment?
The development environment is a collection of tools and procedures used by a software developer to create computer programs. It includes any hardware and software ( (i.e., debugger, source code editor, automation tools, etc.) the developer needs to do his work, and access to additional resources that may be needed during the course of developing the product.
The development environment is comparable to a workshop where a craftsman toils away at his creation.
What is DevOps?
DevOps. Sounds like a cool name for a spy movie, doesn’t it?
In reality, it’s a set of practices that are meant to help a company’s software development (Dev) and IT teams (Ops) to work better based on the culture of close collaboration.
Applied to a company that relies on its ability to provide products to its customers faster than the competition, DevOps motivates the working teams to put out innovative features, updates, and fixes that satisfy the needs of their customers. This isn’t possible when following a traditional software development approach.
What is an Embedded System?
An embedded system refers to a combination of hardware and software or a fully functional computing system that performs a specific task within a larger system. Its capabilities can be programmable or customizable or fixed. An embedded system can be seen within industrial machines or robots, consumer electronics, agricultural and process industry devices, vehicles, medical equipment, cameras, household appliances, airplanes, vending machines, toys, and mobile devices.
In a car, an embedded system can be the airbag system that performs a specific function—deploy the airbags during a collision. The car is the big system that contains the embedded airbag system, along with many others.
What is Encoding?
When you convert temperature readings from Celsius to Fahrenheit or money from Japanese yen to U.S. dollars, the original values remain the same. They are just represented in a different form.
In the world of computers, encoding works in the same way. The computer converts data from one form to another. It does this to save on storage space or make transmission more efficient.
One example of encoding is when you convert a huge .WAV audio file to a tiny .MP3 file that you can easily send to a friend via email. The files are encoded in different formats but will play the same song.
What is a Field Programmable Gate Array?
A field programmable gate array, more popularly referred to as “FGPA,” is a semiconductor device that uses a matrix of configurable logic blocks (CLBs) and is connected via programmable interconnects. A CLB is simply a single set of interconnected programmable logic devices. A programmable interconnect, meanwhile, is the device that connects all the elements of a programmable logic device, such as an FGPA, together.
What is Firmware?
Firmware is software that has been permanently installed in a machine, a device or a microchip, usually by the manufacturer. Without it, the electronic device will not be able to work. Unlike standard software, firmware is meant to control, operate or maintain the hardware in the background, and not interact with human users.
It usually requires special equipment to embed the firmware into a device, and you normally will not be able to alter or erase it without help from the manufacturer. Because it is planted into the hardware, firmware is also called "embedded software", or an "embedded system".
What is a Floating-Point Unit (FPU)?
A floating-point unit (FPU) is that part of a computer’s processing unit that allows it to perform floating-point calculations. Floating-point numbers contain fractions or decimal points, such as 8.565 and 0.0158, and operations that include them are called “floating-point calculations.” These calculations could range from simple ones, such as addition and multiplication, to complicated processes, such as trigonometric and exponential calculations.
Computers in the early 1990s used to have a separate FPU to handle these types of calculations. However, starting with the Motorola 68000 and Intel Pentium series, computer manufacturers made FPUs a part of the microprocessor chip. Today, FPUs have become a standard addition to the central processing unit (CPU).
What is Fog Computing?
Fog computing is a type of network architecture (i.e., how the systems are connected within a network and to the Internet) that links cloud computing (storage of data and programs over the Internet) to the Internet of Things (IoT). It allows data transmitted between IoT devices and cloud services to be processed faster because it brings them closer to one another. At the same time, it also determines which information is stored in the cloud and local hosts (i.e., the computers or servers within a network).
Fog computing puts resources like applications and data strategically in the network edge or closer to the cloud. As such, it limits bandwidth use, lowers latency, and promotes optimal network performance as the data does not have to be transferred or moved long distances to reach its intended destination.
What is Frontend Development?
Frontend development refers to that area of web development that focuses on what the users see on their end. It involves transforming the code built by backend developers into a graphical interface, making sure that the data is presented in an easy-to-read and -understand format.
Without frontend development, all you would see on a website or web application are undecipherable codes (unless you’re a developer, too, of course). But because of frontend developers, people with no coding background can easily understand and use web applications and websites. Everything you see when you visit Google Apps, Canva, Facebook, and other web applications are products of backend and frontend developers work together.
What is a Golden Image?
A golden image is a preconfigured template for various virtual machines (VMs) (e.g., virtual servers, desktops, or disk drives) used in network virtualization. Some organizations also consider it a master image that users can copy multiple times. A golden image makes it easier for IT managers to develop a consistent environment for all users.
What is a Graphics Processing Unit (GPU)?
Were you good at drawing or painting during your childhood? Perhaps you’re that right-brained person in class who’s artistically inclined and excelled at visual art. If that’s the case, then you’re pretty much like a graphics processing unit (GPU).
A GPU is a computer component that excels in rendering graphical content. It allows a system to display visually intense videos, images, and animations from software or video games.
GPUs can handle complex calculations needed by a computer so it can show high-quality graphics outputs.
What is Grid Computing?
Grid computing refers to a group of networked computers that work together to achieve a common goal. It allows users to split tasks across different machines, reducing the processing time and increasing efficiency. Grid computing is what enables normal system setups to function like supercomputers. In a sense, the process allows any network to perform a high volume of functions, including analyzing substantial datasets and weather modeling.
Grid computing works by executing specialized software on computers included in the network. The software serves as a system manager responsible for coordinating and assigning various tasks and subtasks to different machines.
Unlike other high-performing computing systems, grid computers have a node dedicated to an application or task. A node is a server or group of servers that manages and monitors the resources in a network.
What is Humanware?
Humanware is the method of adding a human facet into the development of computer programs. The main goal of developing humanware is to make hardware and software as functional as possible.
A computer system is made up of three major components—hardware, software, and humanware. While software and hardware make up an actual computer, humanware is necessary for enhancing user experience (UX) by making improvements in the system’s user interface (UI). Humanware is the combination of hardware and software elements that make human interaction with a device as good as possible. Often, developing humanware begins by defining who the computer’s potential users are, what they are interested in, and what they need before designing the infrastructure.
You can think of hardware as cooking utensils in a kitchen. Software, meanwhile, can pertain to a recipe. The humanware component in this scenario is the chef. All the utensils and recipes in the world will be useless if you do not have a chef to bring food to life.
Much like the comparison, a computer cannot work with just hardware and software. It needs humanware to serve its intended purpose.
What is a Hybrid Cloud?
The cloud is a place where data can be stored and accessed over the Internet. More specifically, the term “hybrid cloud” refers to a combination of both private and public cloud services in one package.
It’s used by organizations that want to be as efficient as possible by making use of public cloud services for non-sensitive operations while using the private cloud only when needed.
We can think of the hybrid cloud as public and private transportation services. We usually take the bus (public cloud) when we still have time to spare and because it’s cheap. But if we’re in a rush or have sensitive items that need to be transported soon, we often take a cab (private cloud).
What is Hypertext Preprocessor (PHP)?
Do you remember how websites used to be very static and boring to look at not too long ago? In contrast, today’s websites are more dynamic, interactive and easier to use overall. One of the things that made this possible is a programming language called PHP.
PHP, or Hypertext Preprocessor, is a popular scripting language used to create the attractive, user-friendly and interactive Web pages that we see today. PHP is open-source which means that it is well-documented and can easily be downloaded for free from the Web.
What is an Industrial Control System?
The term “industrial control system,” or “ICS” for short, refers to a collection of various types of control systems and associated instruments that operates and automates industrial processes. It includes all related devices, systems, networks, and controls.
Each ICS has a different function depending on the industry it’s used in. In general, ICSs are built to manage electronic tasks efficiently. Today, ICS devices and protocols are used in nearly every industrial sector and critical infrastructure, such as the manufacturing, transportation, energy, and water treatment industries.
What is an IT Infrastructure?
An IT Infrastructure is like a natural ecosystem. Every part has its own role and contributes to the whole and the accomplishment of its goals and purposes.
IT Infrastructure is made up of software, hardware, network components, and services that are needed for an enterprise’s IT environment to exist and operate. It gives an organization the capability to deliver IT products and services either for itself or for other companies.
What is Java Programming Language?
Java is a general-purpose programming language used to create software applications for computers, smartphones, tablets, and even websites. Programmers use it to write instructions that can be understood by computers. It is one of the most widely used languages, and software and apps created in Java are running on many devices today.
What is a Legacy System?
A legacy system refers to an old process, piece of technology, system, or application that has become outdated and yet remains in use. Examples include factory equipment that run on MS-DOS or office computers that still use Windows 2000 and servers that continue to run Windows 2003 Server.
In general, it is not advisable to use legacy systems as these are no longer supported by their respective vendors. As such, they no longer receive critical patches, especially for cybersecurity. In case they get attacked, retrieving data or even the mere act of rebooting them may be impossible.
What is a Lights Out Data Center?
A lights out data center is simply a set of servers that is physically isolated from an organization’s headquarters. Its primary purpose? It prevents unauthorized human access and limits the effects of environmental changes (e.g., energy fluctuations, blackouts, etc.) on a company’s productivity.
Interestingly, the term “lights out data center” has to do with blackouts caused by lightning strikes.
What is a Markup Language?
A markup language is a computer language for clarifying the contents of a document. It was designed to process, define, and present computer text in a form that humans can read. It specifies the code used to format text, including the style and layout the programmer wants the document to appear. It uses tags to define these elements.
You can think of using markup language like a teacher grading student exams. The teacher “marks” mistakes, so students know why they were given a particular score.
What is Middleware?
Middleware refers to a type of software that connects different programs and databases to ensure that they can communicate, manage data, and work together seamlessly. It is a program that allows an operating system (OS) to communicate with the various applications that run on it like a bridge.
You can compare a middleware to a translator that helps different individuals who speak various languages to communicate with and understand one another.
What is a Native App?
A native app is a software that was created to run on a specific device. For example, some apps were written specifically for Android phones. They have access to features that may not be found on other platforms, such as on an iPhone.
Native apps are like the locals in a city or town. They know all the ins and outs and can get to places that visitors may not even know about.
What is Network Virtualization?
Network virtualization refers to consolidating hardware and software functionality into a single network controlled via one virtual machine (VM). The VM simulates traditional hardware, albeit only limited to forwarding packets that contain instructions the virtual network carries out.
Network virtualization can either be implemented externally or internally. External virtualization involves combining a host of local networks or parts of them into a single host to improve efficiency. Internal virtualization, meanwhile, uses software containers (software units that house code and related programs) to provide network-like functionality through a single server.
To answer the question “What is network virtualization?” therefore. We can say it gives administrators the capability to run a network even if it is disconnected from the hardware.
What is On Premises?
“On premises” also referred to as “on-premise,” “on-premises,” or “on-prem,” is a method of deploying software. With on-prem, the computer programs are installed right on the user’s computer through CDs or USB drives. Whereas with off-premise, the installer can be anywhere on the Web.
Many companies opt for on-prem because it doesn't require third-party access, gives owners physical control over the server hardware and software, and does not require them to pay month after month for access.
Think of how you buy your fast food meal. You could buy it and eat it "on premise" at the fast food restaurant. Or you can call and order your meal, and have it delivered to your home.
What is Open Source Software?
Open source software is any computer program whose source code is made available for anyone to inspect and modify. Open source is basically a philosophy of being able to share and modify something because its design is made accessible to everyone.
Normally, only the original software developers get to see and make changes to a program's source code. Open source software removes this restriction so that anyone can improve that program by adding features to it or fixing parts that don't always work correctly.
Say, the special stew they serve at a nearby restaurant is really good, although it's just a little bit too salty for you. If you had access to the recipe you could prepare your own version of the stew with a little less salt in your own kitchen. That's the essence of open source.
What is an Operating Environment?
An operating environment is the place where users run application software or programs. It is not necessarily a full operating system (OS) but it does act like a middleware, that is, the software that makes the OS work with a specific application.
Initially, operating environments helped an OS improve and extend its capabilities to more than just providing a reliable user interface (UI).
What is an Operating System?
The operating system is a piece of software that makes sure all the processes and functions of a computer system perform properly. It controls all of the computer's hardware components, coordinates with other computers on the network, oversees all the software that runs on it and communicates with the human who uses it.
You can compare it to a traffic officer at an intersection who controls the flow of vehicles and lets drivers know when to stop and when to proceed. In short, this person makes sure that everything goes smoothly and that the intersection is trouble-free.
What Is Orchestration?
Orchestration is the practice of automatically configuring, coordinating, and managing applications, computer systems, and services. It primarily helps IT teams manage complicated workflows and perform tasks with ease.
Orchestration often requires identifying and understanding the many processes involved in accomplishing tasks and tracking the steps involved across various environments. These include mobile devices, applications, and databases.
In sum, orchestration refers to automating a series of tasks to work together seamlessly.
What is Peer-to-Peer (P2P)?
Do you remember back in high school when your teachers used to divide you and your classmates into groups to work on projects together? Everyone is ideally equally important in the group and each member is expected to contribute to the final output.
This is how P2P or Peer-to-Peer works. It refers to a group of computers that are interconnected to each other and sharing the same workload, rights, and duties without a central server to manage them.
Much like your high school group, the main purpose of a P2P network is to share its resources and let everyone involved work together to accomplish a specific task or service.
What is Pervasive Computing?
Pervasive computing is a software engineering concept that espouses the use of computerized technology anytime and anywhere. Also known as “ubiquitous computing,” the idea is that computing can be done using any device and format wherever the user may be.
Pervasive computing can exist in several forms, stemming from the use of laptops to household appliances. Some of the technologies that make it possible are microprocessors, mobile codes, sensors, and the Internet.
In short, pervasive computing happens every time people use digital devices to connect to technological platforms.
What is a Plug-In?
What if you could add another arm to your body so you can carry more, or give yourself another pair of legs so you can move in ways previously not possible? In the world of technology, a plug-in works the same way.
A plug-in is a software component that’s added to another computer program to give it new functions. An example of a plug-in is a virus scanner used in a Web browser in order to keep an eye on malicious software. By itself, the browser is not able to stop malware. But with the plug-in, it is secure and protected.
What is a Private Cloud?
A private cloud is a network of servers owned by a single organization. Functionally, it provides the same services as a public cloud. The software and applications are installed on these servers, but access to them is restricted only to designated people.
Think of a private cloud as an exclusive VIP lounge at the airport. Only those with million-miler status can come in and enjoy the amenities.
What is a Private Key?
A private key is one of a pair of codes used to access files encrypted using a process known as public-key cryptography. This type of encryption system uses two keys — a public key that is available to the general public, and a private key which only the recipient of an encrypted file has. You need both keys to be able to access the encrypted file.
To access a bank safety deposit box, some banks require two keys — one held by the bank manager and the other carried by the customer. This is somewhat how private keys work in the digital world.
What is Production Environment?
A production environment is the setting where the latest working version of a computer program is installed and made available to end-users. Therefore it must always be in working condition, bug-free and available when the end-user needs it.
A production environment is different from a testing environment where company developers test the codes and updates but have the luxury of going back to the drawing board if any problem is encountered. In a production environment, everything is assumed to be perfect, and there’s no chance to undo the bad press if anything goes wrong.
What is a Programmable Logic Controller?
A programmable logic controller (PLC) refers to an industrial computer control system that monitors input devices’ state. It then makes decisions on a custom program to control the state of output devices.
Nearly any production line, machine function, or process can use a PLC. But, probably its most significant benefit is its ability to change and replicate an operation or a process while collecting and communicating vital information.
A PLC is also modular, which means you can mix and match various input and output devices to best suit your needs.
What is a Programming Language?
A programming language is a system for instructing the computer how to solve a computing problem or perform a specific task. It consists of specific commands, basic logic, and a formal way to combine all of these elements into directives for the computer to execute.
Programming languages can be classified into two categories. The first is called 'high-level languages,' and programmers use them to write source code. The second category is called 'compiled languages' since the code must be compiled first before it could run.
A programming language is just like any human language. It has its own vocabulary and syntax, although the scope of what it can communicate is limited to what the computer can do.
What is a Public Cloud?
Imagine having a computer that never breaks down, or that never needs to be upgraded. What if you never had to install any software, or had access to all the data storage space you can ever need? All you need to do is plug your computing device into a public cloud and simply pay for what you use.
The public cloud is a facility with a lot of processing capacity, virtually unlimited data storage, microprocessing power and Web bandwidth — that they sell to anyone who needs it.
Its main idea is that you do not need to buy, upgrade or maintain your own server computers. Public clouds also have capabilities to protect users from the dangers of losing their files and help avoid paying for expensive high speed Internet access for any software applications users want to make available online.
What is Rapid Application Development?
Rapid Application Development is a model for app development where functions are built in a parallel style. This is done in a way that each section appears like a subproject. The subprojects are then gathered and joined into a model, also known as a prototype. In between the processes, it is easier for application developers to make, adjust or even change elements of the model quickly.
Besides, RAD gives more priority to the rapid release and review of prototypes. Also, rapid application development puts more emphasis on the use of software together with user feedback mechanisms over requirements recording and strict planning.
Other interesting terms…
What is Reliability Engineering?
Reliability engineering is a subfield of systems engineering that focuses on making devices carry out intended tasks without fail. The built-in failsafe mechanisms make the systems “reliable” given certain conditions over a specified period.
Reliability engineering involves predicting, preventing, and managing potential uncertainties and failures. As such, reliability engineers have to go through a stringent process of reliability testing for their creations.
Reliability engineering is often applied when a customer buys a product. There is an unwritten acceptance that the product will fail after some time. The manufacturer ensures the product’s reliability with a warranty. So if, for instance, the product bought continually fails before the warranty expires, the manufacturer needs to rethink its reliability engineering process to prevent future failures.
What is Ruby Language?
If you’ve used a Web app that enables managing projects online, real-time collaborations, getting funds for a startup idea, and the like, then you’ve probably already made acquaintance with Ruby.
It’s a programming language that was designed and developed in Japan back in the 90s. It has some similarities to other general purpose programming languages which make it easy to understand for programmers. Aside from that, it is also capable of supporting numerous features once it is applied.
What is a Runtime Error?
A runtime error is an error that occurs when a program you’re using or writing crashes or produces a wrong output. At times, it may prevent you from using the application or even your personal computer. In some cases, users need only refresh their device or the program to resolve the runtime error. However, sometimes, users may have to perform a particular action to fix the error.
Runtime errors are of various types, including logic and encoding errors. Such errors are caused by unpatched bugs in the software build or used up memory. Simple fixes include reinstalling the affected program, updating it with a newer iteration, or operating it in Safe Mode.
Before a runtime error shows up on your computer, you may have noticed its performance slowing down. When runtime errors occur, your computer will always display a prompt stating the specific type of error you’ve encountered.
What is a Scripting Language (Script)?
When you follow the step-by-step instructions in a recipe, you'll end up cooking a delicious meal.
A scripting language or script is like a recipe. It’s a series of instructions that tells the computer what to do. Like a programming language, the script automates the computer’s tasks. The main difference between a scripting language and a programming language is that scripts need to run within other programs, such as browsers. Programs, on the other hand, are created through a more complex process that involves compiling the program into a binary file that can run by itself on a computer without the help of other programs.
What is Scrum Project Management?
Scrum project management is an agile project management approach. The agile project management approach is, of course, one where projects are completed in small sections. In the process, insights gained from analyzing the results of a preceding step are used to determine the next step.
Scrum project management is typically employed in software development. Leadership is taken on by a point person or the scrum master whose main task is to ensure project completion within an allotted time frame.
In scrum project management, each task should be completed within a short and fast cycle called a “sprint.” You can think of scrum project management as a hurdle race that team members aim to finish within a specified time frame.
What is Seat Management?
Seat management is the process of managing an entire set of workstations, including all related hardware and software, in one network. The method also refers to having a single service provider manage all of a company’s information technology (IT) requirements. In such a case, organizations pay on a per-seat basis where each seat represents one terminal or workstation.
Seat management involves installing, operating, and maintaining an organization’s hardware and software to ensure improved overall performance.
What is Small Form-factor Pluggable (SPF)?
An SFP or a small form-factor pluggable is a small metal hardware that you plug into a device to allow it to communicate with another device. It acts as a transceiver (a transmitter and receiver), which enables data transmission between two devices that are as far as 6–7 feet away from each other.
As a transceiver, an SFP is like a telephone that transmits and receives data at the same time—you don’t need other equipment to do those processes separately. However, SFPs are mostly used in computer networks to allow the flow of high-speed Internet connection. And since it works with copper and fiber optics, an SFP is compatible with a variety of connection options.
What is Smoke Testing?
Smoke testing refers to trying out software to determine its usability and stability. It serves as a confirmatory step that a quality assessment (QA) team does before doing other software tests. It involves doing several runs to test primary functionalities and identify system stability and conformance issues early.
Smoke testing thus verifies if all of a software’s important features work and are not flawed. It helps lessen wasting time and resources incurred from back-and-forth testing.
The term was inspired by hardware testing, which primarily checks for smoke coming out of a hardware component when it is turned on. In the context of software testing, the system will not undergo further testing until it passes the smoke test.
What is Software Delivery?
Software delivery is the process of deploying an application to the market.
Proper software delivery follows various steps performed by different contributing groups to ensure all goes well.
Software delivery typically involves business and product owners who must deliver a written program based on a client’s specifications. All of the application’s features are described in great detail. After programming is done, the software should undergo several quality assurance tests to ensure it meets the specifications. All these are done before the completed program is produced.
What is a Software Development Process?
A software development process is the process of creating a computer software product. It is a systematic operation that includes designing, preparing the specifications, programming, testing, bug fixing and documentation. These stages are also referred to as the software development lifecycle.
It's very similar to building a house. You need to plan, create the building specs, build the structure and then inspect it to make sure it complies with standards.
What is Software Licensing?
Any license is a document that grants permission and clarifies in detail the terms and conditions for which the permission is given.
A software license states who can use a software, and for what purpose. The software developer or creator is the one who decides on the terms involved in the license. The terms listed can answer questions, such as “Can I use this software to earn money?” or “Can I give this software to others?”
What is a Software Patch?
A software patch is an update that revises the underlying structure of a computer program. It addresses vulnerabilities in the program, such as unfixed bugs or unaddressed security risks. Also called a bugfix, a patch plugs the problem areas and improves the software’s performance.
A software patch does for programs what a cloth patch does for clothing – it covers up holes and can keep you from getting cold.
What is a Software Protection Dongle?
A software protection dongle is a device used to protect content from unauthorized access. It is a hardware key that comes with protection mechanisms, such as the user’s own product key. When attached to a computer or an electronic appliance, it decodes sensitive content or unlocks software functionalities.
Software protection dongles are usually attached to a personal computer (PC) through parallel ports. On Macs, that translates to the Android Debug Bridge (ADB) port.
Software protection dongles provide security by making computers inaccessible or inoperable when they are not plugged in. In some cases, protected software can operate without the dongle but only in restricted mode.
What is Software Testing?
Software testing is the process of evaluating whether a software application meets high standards of functionality and reliability in actual use. Besides measuring quality, software testing aims to find out if there are any defects or bugs in the application. This is to make sure that consumers get the best product and manufacturers are safe from damage arising from any defect.
You can compare software testing to taking a car on a road test to determine if it will perform according to its design and will be safe to drive.
There are different types of software testing such as interface testing, integration testing, and system testing to name a few. Each of them seeks to find out if the test results match the desired results.
What is a Supercomputer?
A supercomputer is commonly used in high-performance systems because it can operate at the fastest possible rate. It comprises thousands of connected processors to accommodate users’ heavy computational needs.
A supercomputer is used in most scientific studies and engineering applications since these industries often work with high volumes of data and high-speed computational activities. It is an integral part of computation science, including weather forecasting, quantum mechanics, climate research, molecular modeling, and brain simulation projects.
What is a Terminal Node Controller?
A terminal node controller is a piece of equipment amateur radio operators use to send and receive data on their computers through radio frequency. Radio operators that utilize a terminal node controller can only participate in Amateur X.25 (AX.25) packet radio networks. AX.25 is a communication protocol specifically designed for amateur radio operators that helps with efficient data transfer.
Think of a terminal node controller as a modem someone uses to connect to the Internet. It acts as a translator between your computer or phone and Internet cables. The difference is that a terminal node controller facilitates communication through an assigned radio frequency, not over the Internet.
What is a Traceability Matrix?
A traceability matrix is a document that aims to establish the relationship between two documents that usually comes in tabular form. It usually consists of many-to-many relationship comparisons, which means that multiple records in one document are related to various data points in another document. In other words, there is no exclusivity in the relationship between records in each document.
A traceability matrix is commonly used in software development and testing to ensure that client requirements are met. For this reason, the document is also referred to as the “Requirements Traceability Matrix (RTM).”
What is a Transaction Processing System?
A transaction processing system helps users process data transactions within a database system that tracks transaction programs. It maintains balance and control of a particular organization’s process of purchasing goods and services. It is responsible for coordinating the inventory and distribution of products, managing transactions from payment accounts, and processing sales and payrolls. As such, it is highly beneficial when monitoring online transactions, as it allows for a momentary delay between when a product is purchased to when it was sold.
An example of a transaction processing system at work is when a customer buys a concert ticket. While the customer fills out his/her payment details, the system holds the ticket for him/her so no other customers can buy it. In short, the system is critical in ensuring that each ticket will not have two different owners.
What is Troubleshooting?
During the 1800s California gold rush, mines hired tough, no-nonsense guards to shoot troublemakers. They were referred to as “troubleshooters”.
Another story tells of technicians dispatched by the 19th-century telephone and telegraph companies to hunt for problems in the infrastructure. They were instructed to “shoot” these troublesome problems down.
Regardless of which story you believe, troubleshooting today is an important component of technical support and refers to searching for the source of the problem and solving it. It is an approach that is used to deal with problems in computer systems, machines, and electronic devices.
What is User Experience (UX)?
User experience (UX) describes how using a product or service affects the customer. It includes the person's opinions, feelings, and attitude about the experience. If the UX is pleasant, productive, and memorable for the user, there is a good chance that they will continue patronizing the product.
A UX that anyone can relate with is the dining experience offered by a posh restaurant. If they pay attention to all the details and you leave the place with a smile on your face, then you've just had a positive UX.
What is a User Interface (UI)?
Imagine walking into a posh hotel. Whatever you see in front of you — the lush carpet, the luxurious lounge chairs, the amazing chandeliers — these are all part of the hotel's user interface. They all work together to set and define what you are about to experience.
For electronic devices and computers, the user interface consists of elements you can see, touch, and control to let the device know what you want done. Switches, buttons, levers, boxes, screens and audio speakers are among many user interface elements that let you issue commands to the computer and receive feedback from it.
What is a Virtual Server?
A virtual server refers to a network server located in an offsite data center. As such, it can be shared by several users, all of whom have varying levels of control over the server. Using it allows copying resources onto virtual machines (VMs) within a user’s premises. Virtual machines are, of course, computers that mimic dedicated hardware or software.
Virtualization is often done to gain access to higher-capacity servers’ processing capabilities at lower costs than maintaining and running an internal data center. A virtual server can increase an organization’s server capacity by over 80% as well.