null Definitions

Search Definitions
  • N

    native app

    A native application is a software program that is developed for use on a particular platform or device.

  • NIST (National Institute of Standards and Technology)

    NIST is the National Institute of Standards and Technology, a unit of the U.S. Commerce Department.

  • NUnit

    NUnit is an evolving, open source framework designed for writing and running tests in Microsoft .NET programming languages... (Continued)

  • O

    obfuscation (obfu)

    Obfuscation, in general, describes a practice that is used to intentionally make something more difficult to understand. In a programming context, it means to make code harder to understand or read.

  • offshore software testing

    Offshore software testing is a software development model where an organization outsources the software testing process to a service partner team located in a different country with a different time zone.

  • OS commanding

    OS commanding is a method of attacking a Web server by remotely gaining access to the operating system (OS) and then executing system commands through a browser... (Continued)

  • OWASP (Open Web Application Security Project)

    The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.

  • OWASP Top Ten

    The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws.

  • P

    pair programming

    Pair programming is an Agile technique originating from XP in which two developers team together and work on one computer.

  • pattern (design pattern)

    In software development, a pattern (or design pattern) is a written document that describes a general solution to a design problem that recurs repeatedly in many projects.

  • peer review

    Peer review is a process used for checking the work performed by one's equals (peers) to ensure it meets specific criteria.

  • performance testing

    Performance testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.

  • PERT chart (Program Evaluation Review Technique)

    A PERT chart, sometimes called a PERT diagram, is a project management tool used to schedule, organize and coordinate tasks within a project.

  • pigs and chickens

    Pigs and chickens is an analogy used in the Scrum software development model to define the type of role an attendee can play at a daily scrum meeting.

  • planning board

    In agile software development, a planning board is used to track the progress of an project. (Continued...)

  • planning game

    In agile software development, a planning game is a meeting attended by both IT and business teams that is focused on choosing stories for a release or iteration. (Continued...)

  • planning poker

    Planning Poker is a teambuilding activity for achieving group consensus.  It is used by agile software development teams to estimate how long a component of a software project (story) will take to complete.

  • polyglot programming

    Polyglot programming is the practice of writing code in multiple languages to capture additional functionality and efficiency not available in a single language.

  • product backlog grooming

    Product backlog grooming is an Agile software development process in which the development team revisits a pre-defined product backlog, working with stakeholders to prioritize and break the backlog list into user stories for future use.

  • product owner

    The product owner is a role in scrum development of the person who represents the business or user community.

  • program

    In computing, a program is a specific set of ordered operations for a computer to perform.

  • Project Management Professional (PMP)

    Project Management Professional (PMP) certification is a qualification program overseen by the Project Management Institute (PMI)... (Continued)

  • Q

    quality assurance (QA)

    Quality assurance (QA) is any systematic process of determining whether a product or service meets specified requirements.

  • quality gate

    A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to the next phase.

  • R

    rapid application development (RAD)

    Rapid application development (RAD) is a model based on the concept that higher-quality products can be developed faster through more expedient processes, such as early prototyping, reusing software components and less formality in team communications.

  • rapid mobile app development (RMAD)

    Rapid mobile application development (RMAD) uses low-code/no-code programming tools to speed the process of application creation for mobile platforms.

  • Rational Unified Process (RUP)

    Rational Unified Process (RUP) is an object-oriented and Web-enabled program development methodology.

  • regression testing

    Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.

  • regular expression (regex)

    A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.

  • release

    A release is the distribution of the final version of an application. (Continued...)

  • release plan

    In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases. (Continued...)

  • requirements analysis (requirements engineering)

    Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.

  • rescoring

    Rescoring is an Agile software development process in which the development team revisits a pre-defined list of user stories to review story point scores and adjust them up or down based on what the team has learned in previous development iterations.  

  • reuse-oriented model or reuse-oriented development (ROD)

    The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules... (Continued)

  • reverse engineering

    Reverse engineering is taking apart an object to see how it works in order to duplicate or enhance the object.

  • runtime

    Runtime is when a program is running (or being executable).

  • S

    S-HTTP (Secure HTTP)

    S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.

  • Scrum

    Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.

  • session hijacking (TCP session hijacking)

    Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user... (Continued)

  • session ID

    A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session)...

  • session prediction (credential/session prediction)

    Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an authorized visitor to a Web site... (Continued)

  • shift-right testing

    Shift-right testing is a method of continuously testing software while it is in a post-production environment.

  • shotgun debugging

    Shotgun debugging is the debugging of a program, hardware, or system problem using the approach of trying several possible solutions at the same time in the hope that one of them will work.

  • smoke testing

    Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details.

  • soak testing

    Soak testing is a type of performance evaluation that gauges how an application handles a growing number of users or increasingly taxing tasks over an extended period of time.

  • software development life cycle (SDLC)

    The software development life cycle (SDLC) is a framework used in project management to describe the stages and tasks involved in each step of writing and deploying the instructions and data computers use to execute specific tasks.

  • Software Engineering Institute (SEI)

    The Software Engineering Institute (SEI) is a research, development and training center involved in computer software and network security. The SEI works with industry, academic institutions and the United States government to improve the performance and reliability of computer systems by managing pilot programs, conducting tests, offering courses and providing services for licensing and publication... (Continued)

  • Software Process Improvement and Capability dEtermination (SPICE)

    SPICE (Software Process Improvement and Capability dEtermination) is an international framework for assessment of software processes developed jointly by the ISO and the IEC. SPICE is specified in ISO/IEC 15504... (Continued)

  • software requirements specification (SRS)

    A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development. The SRS fully describes what the software will do and how it will be expected to perform... (Continued)

  • software resilience testing

    Software resilience testing is a method of software testing that focuses on ensuring that applications will perform well in real-life or chaotic conditions.

  • source code analysis

    Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold.

  • specification by example (SBE)

    Specification by example (SBE) is a user-driven contextual approach to defining software requirements. This approach encourages communication between a project's business owners and the software development team while also aligning software specifications with user acceptance testing.

  • spike

    A spike is a sharp rise in the frequency for a given variable, usually immediately followed by a decrease. This sort of transient variation is often seen in the measurement of voltage or current in circuits. (Continued...)

  • spike testing

    Spike testing is a type of performance testing where an application is tested with a sudden and extreme increase in load, such as user traffic or system transactions.

  • spiral model

    The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the waterfall model.

  • sprint (software development)

    A sprint is a set period of time during which specific work has to be completed and made ready for review.

  • SQL injection

    A SQL injection (SQLi) is a security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data.

  • SSADM (Structured Systems Analysis & Design Method)

    SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects.

  • SSI injection

    SSI injection is a form of attack that can be used to compromise Web sites that contain SSI (server-side include) statements... (Continued)

  • staging environment

    A staging environment, or staging, provides a nearly exact replica of a production environment for software testing.

  • stand-up

    In agile software development, a stand-up is a daily progress meeting, traditionally held within a development area. Business customers may attend for the purpose of gathering information. (Continued...)

  • Standard Performance Evaluation Corporation (SPEC)

    The Standard Performance Evaluation Corporation (SPEC), originally known as the System Performance Evaluation Cooperative, is a consortium of leading computer hardware and software manufacturers that was founded in 1988 with the goal of defining, establishing, maintaining and endorsing benchmarks applicable to computer systems.

  • static analysis (static code analysis)

    Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.

  • static testing

    Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.

  • story

    In agile software development, a story is a particular business need assigned to the software development team. (Continued...)

  • stress testing

    Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.

  • structured programming (modular programming)

    Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.

  • Subversion

    Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time... (Continued)

  • synthetic monitoring

    Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.

  • system testing

    System testing, also referred to as system-level tests or system-integration testing, is the process in which a quality assurance (QA) team evaluates how the various components of an application interact together in the full, integrated system or application.

  • systems development life cycle (SDLC)

    The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.

  • T

    test harness

    In software development, a test harness is a collection of software and test data used by developers to unit test software models during development.

  • test-driven development (TDD)

    Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

  • timebox

    In agile software development, a timebox is a defined period of time during which a task must be accomplished. (Continued...)

  • Trusted Computing Group (TCG)

    The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks...(Continued)

  • U

    UML (Unified Modeling Language)

    UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology.

  • unit testing

    Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing is often automated but it can also be done manually.

  • use case

    A use case is a methodology used in system analysis to identify, clarify, and organize system requirements.

  • user acceptance testing (UAT)

    In software development, user acceptance testing (UAT)—also called application testing, and end user testing—is a phase of software development in which the software is tested in the "real world" by the intended audience.

  • user story

    A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.

  • V

    V-Model (Vee-Model)

    The V-Model, also called the Vee-Model, is a product-development process originally developed in Germany for government defense projects... (Continued)

  • variable manipulation

    Variable manipulation is a method of specifying or editing variables in a computer program... (Continued)

  • versioning

    Versioning is the creation and management of multiple releases of a product, all of which have the same general function but are improved, upgraded or customized... (Continued)

  • vulnerability scanner

    A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis, also known as vulnerability assessment... (Continued)

  • W

    WAG (estimate)

    A WAG (wild-ass guess) is an estimate for how long it will take to complete a project.  In agile and scrum software development, a WAG is often based upon historical experience. 

  • waterfall model

    The waterfall model is a linear, sequential approach to the software development life cycle (SDLC) that is popular in software engineering and product development and emphasizes a logical progression of steps.

  • Web application (Web app)

    A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface.

  • Web Application Security Consortium (WASC)

    The Web Application Security Consortium (WASC) is a worldwide organization devoted to the establishment, refinement and promotion of Internet security standards.

  • Web development freeware and shareware

    Web development freeware and shareware

  • white box testing

    White box testing is a software testing methodology in which the code structure is known and understood by the tester.

  • whole-team approach (team-based approach)

    Whole-team approach, also called team-based approach, is a strategy for project management in which everyone on the project team is held equally responsible for the quality and success of the project. The term is often used in agile software development, lean manufacturing and creative teams in advertising and other media. 

  • WIP limit

    A WIP (work in progress) limit is a strategy for preventing bottlenecks in software development.  

  • Wirth's Law

    Wirth's Law states that computer software increases in complexity faster than does the ability of available hardware to run it... (Continued)

  • work breakdown structure (WBS)

    A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole.

  • worst-case execution time (WCET)

    Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform... (Continued)

  • WS-SecureConversation (Web Services Secure Conversation Language)

    WS-SecureConversation, also called Web Services Secure Conversation Language, is a specification that provides secure communication between Web services using session keys. WS-SecureConversation, released in 2005, is an extension of WS-Security and WS-Trust. (Continued...)

  • X

    XML bomb

    An XML (Extensible Markup Language) bomb is a small but dangerous message that is composed and sent with the intent of overwhelming the program that parses XML files... (Continued)

  • XPath injection

    XPath injection is an attack targeting Web sites that create XPath queries from user-supplied data... (Continued)

SearchCloudComputing

SearchAppArchitecture

SearchITOperations

TheServerSide.com

SearchAWS

Close