Professional Documents
Culture Documents
Bombora Topic Taxonomy Oct 2019
Bombora Topic Taxonomy Oct 2019
that are generally invisible to the naked eye, similar to smoke in air. The measurement of turbidity is a key test of water quality.
t of domestic, industrial, commercial or agricultural activities. Wastewater can contain physical, chemical and biological pollutants.
groundwater. This form of environmental degradation occurs when pollutants are directly or indirectly discharged into water bodies witho
r. It is a measure of the condition of water relative to the requirements of one or more biotic species and or to any human need or purpose
ers (account management), buying advertising (media), and creating advertising (creative).
and profit for a specified period of time. The assortment plan considers the financial objectives and seasonality of merchandise to ensure
mpanies, that exploit gaps and mismatches in tax rules to artificially shift profits to low or no-tax locations where there is little or no econo
combination of physical store and digital experience, supply chain, varied payment options and providing the capability to employees to co
pts are developed by designers and/or design teams. Design thinking is also associated with prescriptions for the innovation of products and
carried out at a high level of aggregation for example for GDP, inflation, unemployment or the fiscal deficit or at a more disaggregated leve
tions. This figure indicates the ability of a business to sell goods and services, but not its ability to generate a profit.
in a business or government entity referred to as an enterprise to maximize financial value.
al business capabilities (such as finance, HR, purchasing, manufacturing and distribution) with appropriate levels of integration that balanc
hod that some organizations use to make flexible long-term plans[1]. It is in large part an adaptation and generalization of classic methods u
plans, usually by company department or function.
mensional displays in order to maximize sales.The purpose of such visual merchandising is to attract, engage, and motivate the customer to
ction and benefits with minimal operational costs and supported by integrated technologies, cross-functional processes and shared objectiv
mitment to a set of regulatory guidelines or its adherence to a specific contract or terms of agreement.
ces to all shared services and outsourcing activities across the enterprise.
tion's approach across these three areas: Governance, risk management, and compliance.
ghout its life cycle, from the time of creation or subscription to its eventual disposition.
Instead of putting up collateral such as your house or your business assets, you use the item you're purchasing as collateral.
to finance slow-paying accounts receivable. There are two ways to finance invoices. The first way is through a sale. Invoices can be sold to a
activities that involve the potential return of capital within an established time frame. PRIs include financing methods commonly associate
ervices to be procured without using a traditional purchasing process.
net of marketing spending), divided by the marketing 'invested' or risked. ROMI is not like the other 'return-on-investment' (ROI) metrics be
tual trust and the sharing of common core values between its participants. Coworking involves a shared workplace, often an office, and ind
ting business processes in enterprise computing. The scope of an enterprise services is important because if too much functionality is includ
n a rental basis while ownership rests in the hands of the financial institution or leasing company, while the business has the actual use of
mon carrier (NVOCC), is a person or company that organizes shipments for individuals or corporations to get goods from the manufacturer o
on, help organizations evaluate performance, and motivate and inspire employees.
ndles inbound calls as well, although calls may be made from employees rather than customers.
nd processing customer sales orders for goods and services and their payment.
uture. Recurring revenue is revenue that is predictable, stable and can be counted on in the future with a high degree of certainty.
phical area. An organization may have a main office, as well as remote offices in another city, country or continent. ROBO data system stora
hysician's request for an mri for a patient or a demand from shareholders to a board of directors, requiring them to vote on any resolutions
e executive/leadership team continually achieves focus, alignment and synchronization among all functions of the organization.
and placing them in boxes or envelopes for shipment to customers. Picking requires a great deal of coordination, organization, and attentio
tries called contacts.
erification and CASS certification) is the process used to check the validity and deliverability of a physical mailing address. ... Credit card AV
nd nature to one of agility .
l identifiers which operators (airlines, but also governments, air forces and occasionally private and corporate owners) apply to their aircraft
ment in the criminal enterprise of identity theft. In the case of a business, a criminal will hijack a business's identity and use that identity to
o help teams set direction, communicate, execute tasks, track progress, and achieve goals.
stomers, vendors, partners, or employees. The personnel involved in contract administration required to negotiate, support and manage e
orporate conscience, corporate citizenship or responsible business) is a type of international private business self-regulation where a corpor
tect and defend an individual, company, or organization facing a public challenge to its reputation.
C, for chief, as in chief executive officer (CEO), chief financial officer (CFO), chief operating officer (COO), and chief information officer (CIO)
ta for public benefit.[1] There are multiple uses of data philanthropy being explored from humanitarian, corporate, human rights, and acad
ulness, attention, caution, and prudence that a reasonable person in the circumstances would use. If a person's actions do not meet this st
el of engagement among its employees.
ression with a comparable meaning in a target language either simultaneously in 'real time' or consecutively when the speaker pauses afte
maintained in pre-determined conditions of airworthiness to safely transport passengers and cargo.
cations and are connected by computers, smartphones and other devices via the global Internet.
nts for a specific project along with its performance and design expectations. The main purpose of the SOW is to define the liabilities, resp
echnology or technological field.
ups, and constant iteration, and applies them to selling.
d-on products that you can buy in addition to the purchase you're making already.
terms and conditions related to the purchase and sale of a company's assets.
ogical needs.
ensation packages. Compensation management systems are used to manage salaries through an administrative dashboard, develop merit m
ervices by an entity. It is also commonly known as the cost of goods sold (COGS) . Cost of sales measures the cost of goods produced or se
e objective performance and improvement measures, higher funnel conversion rates, faster revenue growth, smarter decisions, more prec
hed between a buyer and supplier to accelerate payment for goods or services in return for a reduced price or discount.
retail outlets.
ee that, if a buyer is not satisfied with a product or service, a refund will be made.
ronment based on customer behavior.
g and sales data to enable decision making and goals based on revenue. Pipeline marketing is inclusive of all channels and campaigns.
fficiently as possible.
p to development and implementation teams. The product manager investigates, selects, and drives the development of products for an or
t define a product's feature set. Product planning serves as the basis for decisions about price, distribution and promotion.
oduct requirements document.
anies to make informed business decisions and predict short-term and long-term performance. Companies can base their forecasts on pas
ation, analysis, and presentation of information to help salespeople keep up to date with clients, prospect data and drive business.
zation and help them gain the skills, knowledge and behaviors needed to perform effectively and reach their goals.
ffectively, efficiently and in support of business strategies and objectives. Sales operations may also be referred to as sales, sales support or
a customer. A sales order may be for products and/or services.
nts the selling unit as a legal entity.
oducts or services by using a third party.
ne or more sales methodologies that are aimed at finding and connecting with customers.
und emails to leads in hopes of creating opportunities for account executives. Instead, they can spend their time selling to sales-ready pros
tas can be set in dollar figures or in the number of goods or services sold.
ve been sold during a particular time frame by a salesperson or the management.
cts and/or services over a period of time.
vices and increasing profits. Sales strategies are typically developed by a company's administration, along with its sales, marketing and adv
on, territory design, account and lead assignments, and more.
mprove sales performance by aligning the resources that relate to sales, management, marketing and customer service, or improving sales t
stems used in customer relationship management (CRM) marketing and management that help automate some sales and sales force mana
ften takes place via social networks such as LinkedIn, Twitter, Facebook, and Pinterest, but can take place either online or offline.
nited States Air Force Materiel Command dedicated to leading the discovery, development, and integration of affordable aerospace warfigh
military aeronautical products worldwide.
wide interests
tenance, completions, repair, and overhaul (MRO) services for aircraft, and maintenance, repair, and MRO services for engines and compo
manufacturing concentrations in weapons and military and commercial electronics.
e manufacturer and space transportation services company headquartered in Hawthorne, California.
ces corporation headquartered in Shanghai, China.
ide enterprise products, services, and technical support for the open-source web content management platform Drupal.
tter performance, insights, and outcomes on premise, in the cloud, or both.
enterprise resource planning software for small and medium-sized businesses.
company headquartered in Palo Alto, California founded in 2003. Its Business Planning Cloud lets people in companies collaborate, gain in
management services
RM for small businesses with full sales, marketing and service automation functionality.
oving the customer experience through increased agent efficiency and personalization capabilities.
ement company headquartered in Jersey City, NJ.
y analytics software built for modern product teams
cs and cloud collaboration solutions for business groups.
. AppFolio initially focused on Property Management. With the acquisition of MyCase in 2012, it expanded into the Law Practice Managem
or software developers, project managers, and content management.
new level of trusted insight and decision making by connecting their data and people via a network of analytics services. Birst scales from i
tions. Its products focus on fundraising, website management, CRM, analytics, financial management, ticketing, and education administrati
decrease donor attrition and increase revenue.
nd DHCP solutions for organizations in Canada and internationally.
eams to create brilliant messaging experiences.
d engagement. BrightEdge's award-winning SEO platform is powered by a sophisticated big-data analysis engine and is the only company ca
eadquartered in Boston, Massachusetts, providing cloud-based, real estate software solutions
trolling costs, optimizing services, boosting efficiency and productivity, and enhancing information security.
nia. The company is best known for its cloud-based solutions for sales effectiveness, sales performance management and sales execution s
uting, Office 365, application development, enterprise, business intelligence, user centered design, web, custom application, mobile, infras
structure, and customer services for the delivery of Internet content and applications.
ng, trade and retail sectors.
es of all sizes.
nd offline sales.
workforce intelligence consulting and predictive/prescriptive analytics in the non-employee workforce space.
your traffic into qualified meetings using our bots 24 hours a day
ncrease efficiency and save money.
points real-time from malware and breaches.
ffers recruiting automation[1] solutions to help talent teams more efficiently discover and qualify talent so you can get to your next hire fas
that specializes in enabling global interconnection between organizations and their employees, customers, partners, data and clouds.
n for personal and business use.
services for mobile applications to market their apps through mobile messaging channels, including push notifications, in-app messages, an
ed in Ottawa, Canada.
analytics capabilities.
oducts. Headquartered in Westford, Massachusetts, NETSCOUT serves enterprises community, government agencies and telecommunicatio
rnet, telecommunications, entertainment, and marketing industries
the financial services industry
s an American market research company
ti-tenant clouds by delivering a massively scalable SDN solution that seamlessly connects the data center and wide area network.
rsities, non-profits, and government agencies in the United States and internationally.
ou can focus on what matters most, your business.
ystems and add your own code when needed.
sation information.
to help companies measure and elevate the customer experience within their applications.
blog articles, social media, videos, eBooks into a responsive interface with CTAs.
s enable service providers and large enterprises to transform the WAN and branch networks to achieve unprecedented business advantage
g people globally for over 164 years. As one of the world's leading providers of cross-border business payments, Western Union Business S
businesses in the United States.
heir independent contractor and freelance workforce.
d-size and large businesses.
a. It offers credit card payment processing, debit card payment, mobile payment, charity donation, MircoPayment, and payment security so
uct assortments, promote and sell on the channels that perform, and offer rapid, on-time customer delivery.
ments for merchants. eWay works through eCommerce. Headquartered in Canberra, Australia.
merchants by offering activities, travel, goods and services in 15 countries.
do in their city. Formerly headquartered in Washington, D.C., LivingSocial had roughly 70 million members around the world in 2013.
where and easily manage all on one platform.
multichannel listing capabilities to retailers who want to grow.
m a complete suite of enterprise management applications targeting companies of all sizes.
nded in 1997 by Hiroshi Mikitani. Its B2B2C e-commerce platform Rakuten Ichiba is the largest e-commerce site in Japan and among the wo
nded in 2008, its POS system is used by more than 23,000 small businesses in the United States and Canada, most of which are retail shops
te individuals and businesses to accept payments over the Internet. Stripe focuses on providing the technical, fraud prevention, and bankin
te Commerce as a Service platform.
ovides technology for electronic payment transactions and value-added services at the point-of-sale.
with a subscription business model.
veloper of the Canvas learning management system, which is a comprehensive cloud-native software package that competes with such sys
earning and pathway programs
able, and unbiased content and events.
ate legislators and private sector representatives who draft and share model state-level legislation for distribution among state government
engages in business through its subsidiaries, providing financial planning, products and services, including wealth management, asset man
st bank by market capitalisation in Australia, after the Commonwealth Bank and Westpac Banking Corporation.
ncial services, energy and construction industries.
nt, and other financial services
ale and investment banking, as well as wealth management, mortgage lending and credit cards
solutions Basware supports businesses in their digital transformation and helps shaping the future of finance.
na. Its bank operates over 2,100 branches in 15 states and Washington, D.C., and offers consumer and commercial banking, securities broke
worldwide banking and financial services holding company headquartered in New York City.
e tools needed to accept payments and enable commerce.
e the world's fastest stock exchange, with a median trade speed of 6 microseconds.
banks in Canada.
g and savings products
s New Zealand, Asia, the United States and the United Kingdom.
is headquartered in San Mateo, California with offices throughout the Europe, Latin America, and Asia Pacific.
nce, across the globe and around the clock.
rporations and advisors. The company offers editorial content on cafeteria plans, COBRA, HIPAA, ERISA, 401(k) plans, and other benefits ma
ments, helps financial institutions issue credit, debit and prepaid cards, and assists in routing secure transactions between merchants and c
onal provider of financial services technology and outsourcing services.
Headquartered in Atlanta, its stock is a component of the S&P 500 stock market index.
ment management, securities, and other financial services, primarily with institutional clients
ses and governments in industries such as financials markets; aerospace, defense and security; automotive; chemical; energy; maritime an
y provides funding directly to small businesses and consumers through an automated lending platform.
o, and is the only major bank based in Cleveland. KeyBank is on the list of largest banks in the United States.
e working capital
ants, issuers & governments around the world
account management, and retirement plans and services for individuals, institutions, and financial intermediaries
n, analytics and reporting solutions for corporations.
f the Currency
ho work in the academic, research, medical and cultural fields
to plan, budget, analyze and forecast project outcomes.
t card issuer.
eadquartered in Switzerland.
dit cards, online banking and more.
ancial services group of companies including a Texas Department of Insurance-regulated reciprocal inter-insurance exchange and subsidiar
Delaware. It is the parent company of US Bank National Association, known as US Bank, which is ranked 7th on the list of largest banks in th
pany of US Bank National Association, known as US Bank, which is ranked 7th on the list of largest banks in the United States. The company
n Francisco, California
o users can deliver the desirable end-to-end user experiences.
nancial-services provider headquartered in Westpac Place, Sydney. It is one of Australia's 'big four' banks.
lthcare providers with practice management and electronic health record technology.
d point-of-care mobile apps to drive clinical and financial results for its hospital and ambulatory clients in the United States.
claims to be the largest privately held company of its kind in the United States.
d in a range of interventional medical specialties
are services and products company, providing customized solutions for hospitals, health systems, pharmacies, ambulatory surgery centers,
s, devices and hardware.
and services
that produces the Clarisonic line of skin care products.
mber of acute care facilities
d in Woonsocket, Rhode Island.
ns be healthier.
esigned by medical device professionals specifically to meet the unique needs of medical device companies.
offers Mobile Heartbeat software suite that allows clinicians to find and contact other caregivers in and out of the hospital; push lab results
ennsylvania, USA. The company develops and sells electronic health record software and practice management systems to the healthcare i
es by both market cap and sales
nabled health services business.
oarding, coaching, video roleplay, just-in-time, skill development, communication, analytics, and message certification services.
uman resource consulting firm headquartered in Diemen, Netherlands.
arning management, performance management, goal tracking, succession planning, and recruiting.
resource management software and services to private and public sector organizations.
dent professionals connect and collaborate remotely.
rce management.
ce for businesses to manage freelancers, contractors, and consultants.
ess leaders focused on attracting, motivating, and retaining employees.
o companies for managing their human resources, with a particular focus on helping them with health insurance coverage.
th care insurance plans and related services, such as medical, pharmaceutical, dental, behavioral health, long-term care, and disability plan
nce in the United States. The company was founded in 1955 and is based in Columbus, Georgia
wn as WellPoint, Inc. It is the largest for-profit managed health care company in the Blue Cross and Blue Shield Association.
ment and health consulting.
ment and health consulting.
offices worldwide, that specializes in loss prevention services primarily to large corporations.
any in the United States and Europe. The company offers credit protection insurance, warranty and service contract products, and persona
ated services.
management businesses through subsidiary companies
ce brokerage, risk management, reinsurance services, talent management, investment advisory, and management consulting
nd vision insurance
ory company.
ogistics. The company offers freight transportation, transportation management, brokerage, and warehousing. It offers truckload, less than
vices in the United States and Canada.
ontract logistics with 7 billion USD in revenues. It's head office is in Baar, Switzerland and it was founded in 2007, as a merger of TNT Logisti
s. The company was acquired by Deutsche Bahn as Schenker-Stinnes in 2002. It comprises divisions for air, land, sea freight, and Contract L
y, electronics, healthcare, and consumer goods industries.
tional courier, parcel and express mail services.
air, sea, and train.
ace model. The SaaS component, called AcceleRate, provides logistics companies with freight rate management and instant freight quoting
the SNCF Group.
ge of products and value-added services to approximately 500,000 professional customers in maintenance, repair and operations, infrastru
nd operations (MRO) products.
Johnnie Bryan Hunt, and based in the Northwest Arkansas city of Lowell.
lutions for automotive, fashion and hospitality industries.
des freight intelligence & meets the requirements of every supply chain.
stics and overland businesses.
s core business offerings include third-party logistics and supply chain management.
al supply chain management solutions including transportation, warehousing, customs brokerage, freight forwarding, and import and expo
ercontinental air and ocean freight and associated supply chain management.
sing, truck fleet maintenance, truck rentals, and used truck sales.
n today's complex marketplace.
ce, trading, energy and real estate sectors.
, and is especially known for its fleet of rental trucks.
nline retailers to manage their order fulfillment operations.
tform of e-commerce services
products based on analog and digital semiconductor technologies within four primary markets: wired infrastructure, wireless communicati
, automotive and life science industries.
uson, Missouri, United States. This Fortune 500 company manufactures products and provides engineering services for a wide range of ind
ries and electronics and HVAC equipment for Buildings.
acquisition products
Nagaokakyo, Kyoto.
ering process from sensors to robotics and healthcare.
tate cooling and heating systems.
y and easily find reliable answers and identify opportunities through award-winning search technology, integrated research, expert guidanc
nd maintenance of undersea communication systems and services. Connect With Us. SubCom is a pioneer in undersea communications, de
pplies and factory automation equipments.
or products for harsh environments in a variety of industries, such as automotive, industrial equipment, data communication systems, aeros
cilloscopes, logic analyzers, and video and mobile test protocol equipment
nds, United States, and United Kingdom
gest computer hard disk drive manufacturers in the world, along with its main competitor Seagate Technology.
markets in the United States. It publishes content through various platforms that include print, digital, online, events, and a range of marketi
arch Marketing.
lized online display advertisements to consumers who have previously visited the advertiser's website.
, United States
social media.
optimization.
eos into brand assets for use in marketing channels and e-commerce environments.
ng platform.
ates audiences
nt for niche digital marketers
utomation solutions.
me consumer conversations.
e firm was founded in Toronto, Ontario, Canada, where it is headquartered at 333 Bay Street in Downtown Toronto.'
several different Internet databases and media sites
erformance application security and networking solutions that help organizations ensure that business critical applications are protected, r
mmunications service providers.
the Netherlands.
s, United States, which sells network security and network monitoring software, used according to the company's claims by over 90% of a
data platforms such as Apache Hadoop and the cloud.
urity analytics and intelligence software for security information and event management and log management solutions.
ca Holdings S.A.
rtered in Omaha, Nebraska, United States.
roducts for enterprises and governments.
isation which aims to improve the exchange of information between software applications used in the construction industry.
Minnesota, a Minneapolis suburb, and incorporated in Wilmington, Delaware.
agement to secure access across computer network and cloud computing environments.
re products for IT security, including network security, endpoint security, mobile security, data security and security management.
mpanies of Standard Oil, it is headquartered in San Ramon, California, and active in more than 180 countries.
ud services adoption while ensuring security, compliance and control. CipherCloud develops secure gateways that locally encrypt sensitive
f dining, entertainment, retail, travel, and professional services in cities throughout the United States.
vailable as a SaaS.
g and internet service providers, and enterprises.
ications and automotive services company.
rovides co-location and peering services. It is headquartered in Dallas, Texas.
ers and provides co-location and peering services.
an Francisco, California. Its main product provides bot detection and mitigation.
provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era.
marily travel fare aggregators and travel metasearch engines, include Expedia.com, Hotels.com, Hotwire.com, CarRentals.com, CheapTickets
Irving, Texas.
y owned by U.S. defense contractor Raytheon and private equity firm Vista Equity Partners.
a Clara, California and claims to be the world's largest dedicated security technology company.
intelligence delivering complete protection from cyber threats.
businesses and other organizations.
airline service providers under one online platform.
ir. It is listed on the London Stock Exchange, and is a constituent of the FTSE 100 Index. It operates under various brands including Betfair, P
s and non-profit organizations.
t known for its instant messaging application.
st known for its instant messaging application.
e, Houston, Texas. It debuted as an independent energy company when ConocoPhillips executed a spin-off of its downstream and midstrea
3, with headquarters in Carpinteria, CA.
cure communication solutions.
orporate headquarters are located in Mahwah, New Jersey and international headquarters are located in Tel Aviv, Israel.
ance risks across their public cloud infrastructure.
ast & media, cybersecurity, radio monitoring and radiolocation, and radiocommunication
ed in Suwon, South Korea
sure the microbiology quality of your products is maintained.
support teams serving an international customer base of Global 2000 enterprises and government agencies.
munication endpoint, encryption, network security, email security, mobile security and unified threat management.
a center facilities and provides co-location, telecommunications, cloud services, and content ecosystems.
e full range of modern computing assets.
urity software for servers, cloud computing environments, consumers, and small, medium and enterprise businesses.
network company headquartered in San Francisco, California, with operations in 633 cities worldwide.
am, Netherlands and London, United Kingdom
y to connect products, manage connected devices and the data they produce, and integrate that data into other systems.
eb security, next generation firewalls, sandboxing, SSL inspection, antivirus, vulnerability management and granular control of user activity
retailing company headquartered in London, United Kingdom.
em's user interface takes the form of a dashboard, and supports social network integrations for Twitter, Facebook, Instagram, LinkedIn, Goo
r in China. It is the exclusive operator of Microsoft Azure and Office 365 services in China, and also houses data centers for IBM and others.
t security and always-connected IT asset management to protect devices, data, applications and users — on and off the network. Bridging
er recovery, and secure file sync and share and data access.
adquartered in Milpitas, California, with 17 additional offices worldwide. The company was founded in 2006 and provides wireless network
adquartered in Milpitas, California, with 17 additional offices worldwide.The company was founded in 2006 and provides wireless networki
r gaming and can be identified by their alien-themed designs.
omer lifecycle
ent center in Broomfield, Colorado. The company's products are used for data blending and advanced data analytics.
products and semiconductors, as well as to create simulations that test a product's durability, temperature distribution, fluid movements, a
based in San Francisco. The company focuses on managing the performance and availability of applications across cloud computing enviro
tform for running every stage of your app business.
ftware, designed to help large, consumer-facing businesses reduce the risk of any new initiative by systematically testing the idea with a su
zes programmatic online advertising
g and optimization of app UX.
ities and inefficiencies that plague data center network operations today. Apstra's core mission is to deliver on the vision of a Self-Operatin
ce & Revenue Management
lifecycle management (PLM) software.
for enterprises.
The company specializes in distribution and value added services relating to electronic components and computer products.
and businesses worldwide.
as natural language processing, machine learning, and knowledge graphing
se data solutions.
o accept credit card and electronic check payments through their website and over an Internet Protocol connection.
ecture, engineering, construction, manufacturing, media, and entertainment industries.
roduct, Automation Anywhere Enterprise, caters to enterprises looking to deploy a digital workforce composed of software bots that comp
on the Microsoft platform with business analytics, business applications, cloud, digital marketing, technologyand managed services offerin
lutions and is headquartered in Phoenix, Arizona.
e extended workforce.
and exchange benefits program.
race the cloud while ensuring data security and regulatory compliance. Bitglass secures your data across any cloud app and any device. Bitg
deo platform.
storage networking products.
ntain relationships with customers.
analytics, and IoT applications.
ctive analytics, AI, and IoT software applications.
American multinational publicly held corporation headquartered in New York City. It ranks as one of the largest independent software corpo
develops endpoint security software that detects malicious behavior and prevents malicious files from attacking an organization.
dquarters in New York City and in France, near Paris. CAST markets Software intelligence to insight complex software with its experience in
es, and sells networking hardware, telecommunications equipment, and other high-technology services and products
raining solutions.
anagement products. The company headquarters is in Colorado Springs, Colorado. It also has offices in Swindon, UK.
olutions include wireless, switching, security, enterprise mobility management, communications, and security cameras, all centrally manag
a, USA. The company designs and sells a Linux operating system for industry standard network switches to deliver networking solutions for
meetings, events, and hospitality management technology. The company offers web-based software for meeting site selection, online even
process online payments, streamline online fraud management, and simplify payment security
ftware that prevent, rather than reactively detect viruses and malware. The company is based in Irvine, California.
any providing threat detection and security analytics such as spam classifications, Uniform Resource Locator categorization, and malware d
provider, hybrid cloud, cyber security and analytics solutions.
cloud-based big data processing using Spark.
legal management software and services designed for law departments.
rithms and human analysts verify insights on millions of businesses to provide reliable company data for you to use wherever it's needed.
learning on any (dirty) data.
hoices and buying signals.
s the cloud or an enterprise.
science teams to organize work, access data and computing resources, and build, train, deploy, and manage models in the Oracle Cloud.
-based e-commerce platform and related services for retailers and brand manufacturers around the world
businesses to market and sell their products online.
members of corporations, government organizations and not for profit groups to share and collaborate information for board meetings.
rvices including IT consulting, technical and support services, and managed services.
s Corner, Virginia. DXC provides information technology and consulting services to businesses and governments.
information technology departments and digital business owners of medium and large businesses.
lfillment and channel performance optimization solutions.
ess-to-consumer sales.
re modernization; all through a single SaaS solution. Founded in 2007, Egnyte is privately held, headquartered in Mountain View, CA and su
xperience for brands.
marketing software products in the niche of account-based marketing and account-based sales.
s founded in 1972. Its products are aimed at the manufacturing, distribution, retail and services industries. Epicor provides enterprise resou
content and marketing for better customer experience.
s ESET NOD32. ESET is headquartered in Bratislava, Slovakia.
f embedded systems for the automotive industry and other sectors of the embedded industry.
e applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and busines
gton. ExtraHop sells network appliances that perform real-time analysis of wire data for performance troubleshooting, security detection,
ovides software-driven networking solutions for Enterprise and Service Provider customers.
king (ADN) technology for the delivery of web applications and the security, performance, availability of servers, data storage devices, and
des a content delivery network, Internet security services, load balancing, and video & streaming services.
are. It was acquired by Oracle Corporation in 2011.
t businesses worldwide. It offers data center and network services. The company also provides cloud services, such as public cloud, private
View, California with additional offices in New York, Tel Aviv, London, Paris, Hamburg, and Sydney.[1] It offers a customer identity managem
features, using an open-source license, developed by GitLab Inc.
g, desktop sharing, and video conferencing software that enables the user to meet with other computer users, customers, clients or colleag
ment solution for businesses based in the United States.
oup, which works in servers, storage, networking, consulting and support, and Financial Services.
value business data protection and prevents sensitive data theft from hackers and malicious insiders by securing data across three main ar
ry network to provide web application security, DDoS mitigation, content caching, application delivery, load balancing and failover services.
o retailers, brands and consumers.
uartered in New York City, Infor focuses on business applications for organizations and delivered via cloud computing as a service.
tion platform that creates high-performance sales teams with breakthrough technology.
online news, and social media and customer CRM data
tform that improves cloud, web, application and mobile performance, consumer experience and security.
ounded in 1998 in the Netherlands, the firm was publicly listed on the New York Stock Exchange on January 28, 2011.
ll and medium sized businesses, financial institutions, consumers, and accounting professionals. The Company provides software for small
ning, building, hosting and managing corporate websites and online annual reports, to app development, webcasting, and social media solu
chnical business analysts to perform application, data, and business process integration between on-premise and cloud systems.
boration software and an intranet back-end
alization and cloud computing.
me name. The player, for embedding videos into web pages, is used by news, video-hosting companies and for self-hosted web videos.
w, Russia and operated by a holding company in the United Kingdom.
ffers Kentik Detect, a big data-based SaaS that turns network data into valuable intelligence.
P address through its LIVE Leads, API and Prospector products.
stem using graphics processing units (GPUs). The software it markets is also called Kinetica.
high definition videoconferencing endpoints and accessories, touchscreen conference room phones and a cloud-based video collaboration
sed for delivery of digital media content and software. Headquartered in Tempe, AZ.
doop projects, including apache Hbase, Apache Hive, Apache Zookeeper and Apache Pig.
e processes across the product lifecycle from concept to commercialization.
ent and related services and partner with enterprises to provide clarity, control, compliance, and cost savings across their global technolog
Experience Management (CEM) and Enterprise Feedback Management (EFM) software and services to hospitality, retail, financial services
ng a cloud-based platform of applications and data analytics to address operations throughout clinical trials.
me transactions and analytics.
business performance by helping people find and use information more effectively.
d in Newbury, Berkshire, England.
nd sells computer software, consumer electronics, and personal computers and services.
dsize to large enterprises. The solution has particular strengths in manufacturing and distribution but is also capable of serving buyers acros
re, and cloud-based services.
ed to stay one step ahead of disruption
ying real-time big data scale statistics, signal processing, and machine intelligence to process telemetry, using cloud managed Access Points
semiconductor and pharmaceutical sectors.
esign and standard web technologies such as CSS3, HTML5 and JavaScript
us International. The company provides products for identity and access management, security and data center management.
h-performance data warehouse appliances and advanced analytics applications for uses including enterprise data warehousing, business in
infrastructure management, disaster recovery and application hosting.
data and protect against threats in cloud applications, cloud infrastructure, and the web. Netskope is in a category of technology classified
roup of software services used to manage a business's financials, operations and customer relations.
in early 2008.
S) is an open logical device interface specification for accessing non-volatile storage media attached via a PCI Express (PCIe) bus.
d customer engagement
ased software that enables marketers to test, target and personalize what a customer sees on a Web page or mobile app, substantially incre
rive more pipeline and close more deals utilizing Outreach.io software
T departments
stem designed for advanced analytics for business intelligence. It was acquired by Actian.
velops self-service data preparation software that gets data ready for data analytics software
d business process management.
tegration, OLAP services, reporting, information dashboards, data mining and extract, transform, load capabilities.
ns, supply chain management, customer relationship management, and enterprise performance management software, as well as softwar
ongoDB and RocksDB users. They state that all of their software is ˜fully open source and entirely free'.
erencing and collaboration solutions.
one calls to detect fraud and authenticate callers. Pindrop Security technology analyzes 147 different features of a phone call that helps ide
prises, while offering secure access to any application from any device. The company offers identity management, multi-factor authenticati
ntelligence, customer engagement and customer information management solutions
ring companies.
service solution to eliminate waiting lines. The queue management system allows customers to wait in a virtual line rather than a physical
QlikView and Qlik Sense, business intelligence & visualization software.
Utah and Seattle, Washington, in the United States.
al world, SAP S/4HANA removes common obstacles associated with legacy ERP applications, such as batch latency, complex landscapes, an
mpany headquartered in Newcastle upon Tyne, United Kingdom.
dentity management software for the most complex challenges.
n their product, their process, and their people.
o Alto, California.
telligence (BI). BusinessObjects was acquired in 2007 by German company SAP AG
Carolina. SAS develops and markets a suite of analytics software, which helps access, manage, analyze and report on data to aid in decision
ices such as online catalogs, targeted email, video, and image management
, protecting its customers' computers, networks and information assets from malicious activity such as cybercrime.
nse into a complete, end-to-end security operations platform.
ti-tenant contact center solutions.
nagers and executives.
ng, error reporting, struggle & anomaly detection.
pplications from malicious automated cyber-attacks. Headquartered in Mountain View, California.
ocument-centric tasks and workflow needs of small and large businesses.
for online stores and retail point-of-sale systems.
oint-of-sale systems.
ights into both their own and competitor's website traffic volume; referral sources, including keyword analysis; and website stickiness, amo
polymerase chain reaction (PCR). It monitors the amplification of a targeted DNA molecule during the PCR, i.e. in real-time, and not at its e
s allowing companies to store and manage virtual databases.
ired by IBM in 2013.
70 countries.
ses to help manage their networks, systems, and information technology infrastructure.
diary from 2012 to 2016 that sells a range of Internet appliances primarily directed at content control and network security.
ctronics, gaming, entertainment and financial services.
ge, data integration, data management, master data management, data quality, data preparation and enterprise application integration so
quired to connect and enrich data sources.
oud expense management software and solutions.
pany, created in 2006 by the merger of Thermo Electron and Fisher Scientific
ware developers to programmatically make and receive phone calls, send and receive text messages, and perform other communication fu
ology products.
acets of their business in real-time.
wallet solution.
wherever they are—so you can protect your brand, boost conversions, and provide amazing experiences.
ybersecurity companies.
nterprise environments.
er recovery and virtualization management software for Vmware and hyper-V virtual environments.
and improving performance over private, broadband Internet, and LTE links for today’s increasingly distributed enterprises, as well as servic
m for preparing, delivering, and displaying content. Headquartered in Los Angeles, CA.
er data storage products.
cost effective WANs.
ownship, New Jersey, the company was founded in 2001 as a provider of residential telecommunications services based on voice over Inte
and technical support services for international brands.
e workforce in North America and Europe.
ark for the detection of SIVT (digital ad fraud). White Ops was the first company to receive MRC-accreditation for digital ad fraud detection
ng and system integration services and solutions.
ement and human capital management software vendor.
zing in DevOps and continuous delivery tooling.
software platform for small and medium-sized businesses.
, and document technology products in more than 160 countries.
perty management software and investment management solutions for all real estate verticals allowing owners, managers, investors and o
er, Colorado, with European headquarters in London. The company provides communications infrastructure services, including fiber and ba
nd large businesses.
ireless telecommunications businesses. It operates through its subsidiaries, Charter Communications, Inc and TruePosition, Inc
pany headquartered in Murray Hill, New Jersey, in the United States.
tions including Telecom Services, Data Center Services, Cloud & Managed services, Transformation Integration Services and Application Inte
augments or replaces Multiprotocol Label Switching (MPLS) networks with secure Internet connectivity, marketed as an SD-WAN.
rvices to the air transport industry. The company provides its services to over 430 members and 2,800 customers worldwide which is aroun
et service provider.
. It consists of a group of microphones also called microphone array that are simultaneously acquired to form a representation of the loca
Global Mobile Commerce Forum, to mean the delivery of electronic commerce capabilities directly into the consumer's hand anywhere vi
ords, often in shortened form.
separate values (many implementations of CSV import/export tools allow other separators to be used).
management (CRM) applications announced by Microsoft in July 2016 and on general release November 1, 2016, as a part of the Microsoft
caling and management of containerized applications that was originally designed by Google and now maintained by the Cloud Native Com
, credentials and groups throughout the lifecycle of their membership of an enterprise computer system.
mote employees and business partners.
soft Office) is an office suite for Microsoft Windows, Linux,[1] iOS[3] and Android OS,[4] developed by Zhuhai-based Chinese software deve
full-text search engine with an HTTP web interface and schema-free JSON documents.
instituted to reduce the incidence of credit card fraud.
e software for Microsoft Windows, macOS, and Android that finds and removes malware. Made by Malwarebytes Corporation, it was first r
oped by Symantec
based (terrestrial) television stations broadcast television content by radio waves to televisions in consumers' residences in a digital format
isk drive, USB flash drive, SD memory card, SSD or other local or networked mass storage device.
orm media player and streaming media server developed by the VideoLAN project.
air conditioning, lighting and other systems through a building management system or building automation system (BAS).
case with other painting equipment. And the price of commercial painting is usually more than residential painting. This means that comm
ployed by either a city, township or county and is usually certified in one, or more disciplines qualifying them to make professional judgmen
intervention or well workover activities and helps the oil well in optimizing the production levels and maintain a continuous flow from a res
ed to lift loads.
with the end user and manages the life cycle of the oil and gas operations automation solution.
where multiple separate housing units for residential inhabitants are contained within one building or several buildings within one complex
menities including information on parking availability, bathroom and concession lines, seat upgrades, special offers, and more.
road category of mining in which soil and rock overlying the mineral deposit (the overburden) are removed, in contrast to underground min
and reorient agricultural systems to effectively support development and ensure food security in a changing climate
and data structures to solve and analyze problems that involve fluid flows.
ot from the exhaust gas of a diesel engine.
at are directly connected to a local distribution system or connected to a host facility within the local distribution system.
ons transform voltage from high to low, or the reverse, or perform any of several other important functions.
usiness' energy usage, as well as the sources from which the actual energy is derived. Energy consulting is often centered on reducing oper
rgy-related software [1] applications which may provide utility bill tracking, real-time metering, building HVAC and lighting control systems
ermal infrared range. This process is the fundamental cause of the greenhouse effect.
gly enabling smart, connected infrastructure to be installed at or near the edge of the electric power grid.
arating impurities and various non-methane hydrocarbons and fluids to produce what is known as pipeline quality dry natural gas.
parties, one which generates electricity (the seller) and one which is looking to purchase electricity (the buyer).
nd unit operations refining certain materials or converting raw material into products of value.
SEM is often deployed via programs that target the businesses or other organizations within a utility territory or a government area.[2] SEM
ce of light on the edge of a road or path.
automation capabilities within the substation, and control commands from remote users to control power-system devices.
esentation of any surface of an object (either inanimate or living) in three dimensions via specialized software.
or water, from a production well. Generally this is achieved by the use of a mechanical device inside the well (known as pump or velocity s
cteristics of a facility.
eal-world forces, vibration, heat, fluid flow, and other physical effects.
pproach used to control project expenses and thoroughly plan a project before a fix bid quote is submitted.
avior of earth materials.
and test of complex real-time embedded systems.
e.g., buildings, roads, and power supplies) needed for the operation of a society or enterprise.
ary field that involves the discovery and design of new materials, with an emphasis on solids
h shows the piping and vessels in the process flow, together with the instrumentation and control devices.
ering software produced by Pixar Animation Studios.
ng to the load to the apparent power in the circuit, and is a dimensionless number in the closed interval of ?1 to 1.
pecially continuous ones such as the production of petrochemicals.
image from a model by means of application programs. Rendering is mostly used in architectural designs, video games, and animated mov
t compares the level of a desired signal to the level of background noise.
ained to understand, predict, and calculate the stability, strength and rigidity of built structures for buildings[1] and nonbuilding structures
ess. When designed with a safe human-machine interface, they should increase car safety and more generally road safety.
rounding space.
d maintaining aircraft, aircraft parts, missiles, rockets, or spacecraft.
st of the raw materials, sub-assemblies, intermediate assemblies, sub-components, parts, and the quantities of each needed to manufactu
actured by Boeing Commercial Airplanes in the United States.
nufactured by Boeing Commercial Airplanes.
r made by Boeing Commercial Airplanes.
rs. The spelling 'fibre' is common in British Commonwealth countries. CFRPs can be expensive to produce but are commonly used whereve
enance is performed after one or more indicators show that equipment is going to fail or that equipment performance is deteriorating.
tworks (information technology) while securely connecting people, processes, and technologies.
products. It is a form of outsourcing. A contract manufacturer performing packaging operations is called copacker or a contract packager.
components into a complete enclosed or sub-plate control package. This package is then provided to a second party for incorporation with
ay that they are easy to manufacture.
e general engineering practice of designing products in such a way that they are easy to manufacture.
threads are used to create traceability from the digital twin back to the original design requirements.
orporated into larger systems.
ers to food products for consumers. Raw fruits, vegetables, grains, meats, seafood and dairy products fresh from the supplier undergo a ser
ous sectors in an economy such as mineral mining, electricity and manufacturing. The all India IIP is a composite indicator that measures th
n used in industrial production technology.
nufacturing and industrial processes.
sing automation and data in manufacturing technology.
sociated with holding excess raw materials or finished products. There are many approaches to reduce inventory, including reducing dema
n System (TPS), is a methodology aimed primarily at reducing flow times within production system as well as response times from suppliers
s to processing of materials into the shapes and forms needed for specific applications.
n your organization.
anufacturing process Availability, Performance and Quality. After the various factors are taken into account the result is expressed as a perc
d manufacturing technology to increase workforce and process flexibility and agility to adapt to market needs.
pany with cross functional teams tasked with maximizing the value created for the customers of each Value Stream.
urpose or task. It may also mean that the equipment stopped working, is not performing as desired, or is not meeting target expectations.
nd use, and it can be customized to fit the needs of other participants in the supply chain.
th refrigeration or air conditioning, which is stocked with products (goods) to be redistributed to retailers, to wholesalers, or directly to con
in stock but instead transfers customer orders and shipment details to either the manufacturer, another retailer, or a wholesaler, who then
ompanies and larger operations typically are equipped to handle customer order fulfillment themselves, ecommerce companies and smalle
ment Center.
s are processed and filled. These centers may also work independently of specific companies where orders are outsourced for the purpose
eps on behalf of another party, such as an online seller.
cross water.
o customers via multiple channels, such as directly through physical stores, an online marketplace like Amazon, or through another large re
o end customers.
ervices. An order management system (OMS) automates and streamlines order processing for businesses. An OMS provides constantly upd
rcel post at different points of time during sorting, warehousing, and package delivery to verify their provenance and to predict and aid de
nd use. Packaging also refers to the process of designing, evaluating, and producing packages. Packaging can be described as a coordinated
er. These shipments are not sent on pallets and often move through a small package shipping system with carriers such as UPS, FedEx, Cou
in the retail distribution of goods. It entails processing small to large quantities of product, often truck or train loads and disassembling the
tion (RGA) is a part of the process of returning a product to receive a refund, replacement, or repair during the product's warranty period. T
cess of moving goods from their typical final destination for the purpose of capturing value, or proper disposal.
acturers, retailers, financial services companies and government agencies where the organization is highly dependent on suppliers to achie
transportation operations.
ogether. The backplane connectors are parallel to each other in order to link each pin to its relative pin on each connector, forming a comp
nation of chemical and mechanical forces. It can be thought of as a hybrid of chemical etching and free abrasive polishing.
circuit from damage caused by excess current from an overload or short circuit.
tional to armature voltage and inversely proportional to motor flux (which is a function of field current), either armature voltage or field cu
assembled together to build any number of applications.
ool the electrical core and coils. Dry type transformers are voltage changing (Step-up or Step-down) or isolation device that is air cooled rat
s one or more of the electrical systems or subsystems in a vehicle.
cted energy to control the spectrum, attack of an enemy, or impede enemy assaults via the spectrum.
actors in sectors such as mining, chemical, power, oil, gas and manufacturing.
chip) is a set of electronic circuits on one small flat piece of semiconductor material, normally silicon.
oMechanical or microelectronic and microelectromechanical systems and the related micromechatronics) is the technology of microscopic
magnetic spectrum. Radio waves are electromagnetic waves within the frequencies 30KHz-300GHz and include microwaves.
n power bus and principally containing motor control units. Motor control centers are in modern practice a factory assembly of several mo
e-ended output.
imulation model of an industrial process, usually integrated with an emulator of the process plant's Distributed Control System (DCS).
n oscillator paired with a phase detector that constantly keeps its input and output in phase with each other.
drive monitors the feedback signal from the servomechanism and continually adjusts for deviation from expected behavior.
og or the digital domain.
t complicated coding. These apps allow the creation of branded mobileapplications with the information attendees need, such as schedule
d around us and online learning for Autodesk users to learn about our latest innovations and industry trends.
ucational panels, and sessions all about marketing and sales
x-offenders, aimed at persuading employers to remove from their hiring applications the check box that asks if applicants have a criminal re
and Canada that promotes the bicycle as an option for commuting to work.
g customers in an inbound way. Our annual event and year-round media platform inspire and educate hundreds of thousands of people so
chnology students
l steel industry, bringing together structural engineers, structural steel fabricators, erectors and detailers.
et, present papers, and discuss issues and trends or make recommendations for a certain course of action.
and analytics.
s Ideas (WOBI)
atic procedures
nting transactions within functional modules such as accounts payable, accounts receivable, journal, general ledger, payroll, and trial balanc
ny to suppliers and other creditors.
ally have terms that require payments due within a relatively short time period, ranging from a few days to a fiscal or calendar year.
to ensure that appropriate attention is devoted to important areas, potential problems are promptly identified, work is completed expediti
d/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a sp
provide a product or service. In turn, the associated expense is assigned to internal clients' cost centers that consume the products and ser
ness incurs. The concept can be defined in smaller units, such as by product, service, product line, customer, division, or geographic region
his credit when it's due. This is the function within a bank or company to control credit policies that will improve revenues and reduce finan
be settled in cash within the fiscal year or the operating cycle of a given firm, whichever period is longer.
y to estimate their average collection period.
ultiple sites, countries, or institutions.
gically implementing communication strategies with nonprofit supporters to maintain and grow those relationships.
entry to an account requires a corresponding and opposite entry to a different account.
er they are a true and fair reflection of the company's financial position.
ods removed from inventory for sale
mmary, analysis and reporting of financial transactions pertaining to a business.
andards and procedures that companies must follow when they compile their financial statements.
ue. Gross margin is expressed as a percentage.
the opposing hedge are treated as one.
particular period.
Often abbreviated as OPEX, operating expenses include rent, equipment, inventory costs, marketing, payroll, insurance and funds allocated
costs sold and operating expenses are considered.
f a best alternative cost while making a decision.
ct outlay of cash that may or may not be later reimbursed from a third-party source.
rendered by them to a business.
ller, indicating types, quantities, and agreed prices for products or services.
ome due with only quick assets.
GAAP) that determines the specific conditions under which revenue is recognized or accounted for.
rt of, a certain level into a higher interest-earning investment option at the close of each business day.
er across various touch points in the journey through an organisation's web presence.
on of the reduced or zero value of an asset. In income tax statements, this is a reduction of taxable income, as a recognition of certain expe
t comes in every year for the life of a subscription (or contract).
personal or corporate assets.
cluding potential cash-out opportunities.
twork processor. Co-branded cards are branded with the logo of the network processor and retailer.
budgeting process.
ement is filed in advance of the annual meeting. The firm needs to file a proxy statement, otherwise known as a Form DEF 14A (Definitive P
da. It's not the same as your average business report with a client, so you can't expect to prepare for it the same way.
neral public, rather than to companies, corporations or other banks, which are often described as wholesale banking.
iers to finance its receivables more easily and at a lower interest rate than what would normally be offered.
well-defined situation and a recognized threat (also called hazard). Quantitative risk assessment requires calculations of two components o
mine the direct and indirect costs of a product or system. It is a management accounting concept that can be used in full cost accounting or
monitor and utilize the two components of working capital, current assets and current liabilities, to ensure the most financially efficient op
ctrical conductivity.
uel and as a commodity.
d rolled oats.
abolizable energy.
d cooking oils.
l level, which the Organisation for Economic Co-operation and Development (OECD) developed in 2014
rganization that establishes financial accounting and reporting standards for public and private companies and not-for-profit organizations
. The PCC advises the FASB on the appropriate accounting treatment for private companies for items under the active consideration on the
egulations to determine whether an interest in a corporation is to be treated for purposes of the Code as stock or indebtedness.
ducted from revenues. These expenses include interest charges paid on loans, general and administrative costs and income taxes.
r an organization's long term investments such as new machinery, replacement of machinery, new plants, new products, and research deve
rating company, alongside a financial sponsor or other private equity investor, in a leveraged buyout, recapitalization or growth capital tran
services normally concern services performed in connection with the issuance, redemption, transfer, or recordkeeping for debt or equity se
, which rate a debtor's ability to pay back debt by making timely interest payments and the likelihood of default.
estic firms in the target country.
in accrual accounting, money received for goods or services which have not yet been delivered.
et using the concepts of the time value of money. All future cash flows are estimated and discounted by using cost of capital to give their p
given to the latest data.
ccepted by creditors
collecting, processing and delivering relevant, timely and accurate information. It provides strategic, financial and operational feedback on
a bankruptcy.
and accounting, as a measure of the profitability and value-creating potential of companies after taking into account the amount of initial
cases in each EU jurisdiction FVC, financial vehicle corporation) is a legal entity (usually a limited company of some type or, sometimes, a li
nd treated for bankruptcy purposes as belonging to a single enterprise
evices, including smartphones and other mobile devices, that use radio-frequency identification (RFID) or near field communication (NFC)
se and a list of overdue invoices. It then matches money coming into those invoices and if an invoice remains unpaid for a specified amoun
or group sends its bills over the internet, and customers pay the bills electronically.
and a buyer in an integrated electronic format.
mpete with traditional financial methods in the delivery of financial services.
ransmit the check images to a bank for deposit, usually via an encrypted Internet connection.
nd and receive information about financial transactions in a secure, standardized and reliable environment.
d by the United States Federal Communications Commission (FCC) intended to promote universal access to telecommunications services in
g institution, corporation, or other customer (originator) authorization to debit directly from the customer's checking or saving account for
ns, credit cards and items of value from one location to another.
ment and financial professionals.
sufficient enough to service the borrower's debt. It is also referred to as 'defease.'
netary cooperation
ses that application.
nsaction, from the cardholder all the way through to the settling of transaction funds.
rchasing power is the same in each of the two countries
ffers various tax options
ng, mobile banking, NEFT, ECS, or RTGS.
e to both consumers and business owners outside of a traditional bank loan.
nd sometimes to an effective APR (or EAPR), is the interest rate for a whole year (annualized), rather than just a monthly fee/rate, as applie
o extend credit.
manage money.
ke a series of fixed annuity payments to the annuitant for the duration of the contract
ors a higher rate of interest than a regular savings account, until the given maturity date.
om the sale of real or personal property (including market discount and option premiums, but not including original issue discount), or item
tizing mortgage loan where the interest rate on the note remains the same through the term of the loan, as opposed to loans where the in
o has stopped making payments to the lender, by forcing the sale of the asset used as the collateral for the loan
nrolled in a high deductible health plan.
he collateral is the borrower's equity in his/her house.
s collateral. The loan amount is determined by the value of the property, and the value of the property is determined by an appraiser from
s paid off, allowing the second loan to be created instead of making a new mortgage.
tting it into financial schemes, shares, or property, or by using it to develop a commercial venture
nt portfolio.
of kin after death, usually organized by a financial advisor
omises made by each party.
on a mortgage loan application in order to obtain a loan or to obtain a larger loan than could have been obtained had the lender or borrow
of U.S. dollars.
ction of stocks, bonds, and other securities
ally with a cellular or mobile device
nce premium.
mpanies, such as Visa, MasterCard, Discover or American Express. Money is loaded on to the prepaid card much like a gift card.
f the mortgage is paid down or paid off within a certain time period.
ecurities authorities
ount from a remote location, such as an office or home, without having to physically deliver the check to the bank.
qualified plan participants must begin withdrawing from their retirement accounts by April 1 following the year they reach age 70 1/2.
o installment credit. Credit cards are an example of revolving credit used by consumers.
in their employer-sponsored retirement plant
counts, investment accounts, and other consumer or business accounts, into a single place.
ated card-on-file account data.
ng ACH files with a convenient, secure ASP-hosted solution
sors to businesses and high net worth individuals who require specialized advice on capital formation, cash flow and wealth management.
enda issues facing businesses, governments, and institutions around the globe.
legal change in ownership that is recorded by the United States Patent and Trademark Office (USPTO) as an assignment.
yer and a seller.
he securities to customers.
management, accountancy, law, human resources, marketing, finance, engineering, or other specialized fields.
ost-effectively or ineffectively.
ability and availability while reducing unnecessary maintenance.
es the total market value of all the financial assets which a financial institution such as a mutual fund, venture capital firm, or brokerage ho
ppreciation. The amounts this type of mutual fund invests into each asset class usually must remain within a set minimum and maximum
can be contrasted with stock funds and money funds. Bond funds typically pay periodic dividends that include interest payments on the fu
trading volume.
apital through an initial public offering.
e middle sized and large business loans are pooled together and passed on to different classes of owners in various tranches. A CLO is a typ
pooled trust accounts.
ut to provide a work space rather than a living space.
pts to eliminate possible loss arising from default by the issuer of the bonds.
d at a future date; the contracts allow investors to hedge against foreign exchange risk.
ments, and their related interest and dividend payment streams, especially those securities denominated in foreign currency.
nkfurt Stock Exchange.
y. The higher priced option is purchased and the lower premium Is sold - both at the same time.
contracts or options, which are derived from other forms of assets.
es or securities and periodically buys and sells those securities in order to keep the allocations in their original proportions.
rices fully reflect all available information. A direct implication is that it is impossible to 'beat the market' consistently on a risk-adjusted ba
ading securities (such as stocks, and bonds), foreign exchange or financial derivatives electronically.
d include exchange traded funds, exchange traded vehicles, exchange traded notes and certificates.
ssets deducted each fiscal year for fund expenses, including 12b-1 fees, management fees, administrative fees, operating costs, and all oth
y mode of business and generate revenues.
that has debt, if the company's cash flow proves inadequate to meet its financial obligations.
et capitalization.
reventive maintenance, and theft deterrence.
in interest rates.
solute level of interest rates, in the spread between two rates, in the shape of the yield curve, or in any other interest rate relationship.
re interest payments is exchanged for another based on a specified principal amount.
ssess an acquisition target.
re liabilities.
r commodity cannot be traded quickly enough in the market without impacting the market price.
ouncements.
elation to open-end or mutual funds, since shares of such funds registered with the U.S. Securities and Exchange Commission are redeeme
nce. Offshore jurisdictions are a commonly accepted means of reducing the taxes levied in most countries to both large and small-scale inv
kerage's internet-based propriety trading platforms.
twork, typically with a brokerage firm.
r more of the options' variables.
t offers the buyer the right, but not he obligation, to buy or sell a security or other financial asset at an agreed-upon price during a certain
ated by the Financial Industry Regulatory Authority (FINRA) for its subscribing members.
r-dealer quotation services such as OTC Link and the OTC Bulletin Board.
rs displayed to four decimal places, on pip is equal to 0.0001.
mmon-stock dividends.
anks and securities firms to hedge funds which need the ability to borrow securities and cash in order to be able to invest on a netted basis
ors that directly invest in private companies, or that engage in buyouts of public companies, resulting in the delisting of a public equity.
ed elsewhere.
an owned stock through false and misleading positive statements, in order to sell the cheaply purchased stock at a higher price.
n as a primary residence.
magnitude of recent gains and losses over a specified time period to measure speed and change of price movements of a security.
tock Exchange.
ure or junior debt) is a debt which ranks after other debts if a company falls into liquidation or bankruptcy.
ng) means making loans to people who may have difficulty maintaining the repayment schedule, sometimes reflecting setbacks, such as un
if a second party fails to meet some obligation, such as fulfilling the terms of a contract.
ed on the operations of a wholly owned subsidiary of a diversified firm.
ces. Trade credit facilitates the purchase of supplies without immediate payment.
planned maintenance can be conducted and capital assets (pumps, motors, pipes, etc.) can be repaired, replaced, or upgraded on time an
me countries (like the Philippines) use WPI changes as a central measure of inflation. But now India has adopted new CPI to measure inflatio
er in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches.
money from a mobile device or desktop computer at no cost to either sender or receiver.
encies, is a means of raising capital that has been prone to scams and securities law violations.
g the products, quantities, and agreed prices for products or services the seller had provided the buyer
e for payments made to a specified person under specified conditions
MIT/X11 license.
on debit and credit card transactions. The merchant must setup this service and agree to the rate prior to accepting debit and credit cards a
der MACRA; the other is the Advanced Alternative Payment Model (AAPM) track.
that occurs online. A number of micropayment systems were proposed and developed in the mid-to-late 1990s, all of which were ultimatel
r or electronic point of saleterminal (POSint-of-sale terminal).
nal is a device which interfaces with payment cards to make electronic funds transfers.
stake and proof-of-work systems. Peercoin is based on an August 2012 paper which listed the authors as Scott Nadal and Sunny King.
tific computing proof-of-work system. Primecoin's proof-of-work system searches for chains of prime numbers.
able payment terms with their suppliers. ensure suppliers' invoices are approved and paid within agreed terms. encourage adoption of the
processes that cover activities of requesting (requisitioning), purchasing, receiving, paying for and accounting for goods and services.
with their Rakuten ID.
money or securities[1] takes place from one bank to another on a 'real time' and on a 'gross' basis.
rvice where payments are charged to the same payment method for a pre-determined duration of time.
ers make payments using compatible phones and other Samsung-produced devices
andise and multi-format retailers
ems they'd like to purchase.
minated in euro.
y the user alone, or multiple payment cards of different parties involved in the transaction.
stomers to perform a range of financial transactions over the telephone, without the need to visit a bank branch or automated teller mach
w secure and efficient transactions to be processed.
and their transactions.
partment of Defense responsible for the development of emerging technologies for use by the military.
, is an independent, non-governmental, voluntary organization governed by and representing farm and ranch families united for the purpo
ncing Administration (HCFA), is a federal agency within the United States Department of Health and Human Services (HHS) that administer
United States Government that reviews the national security implications of foreign investments in U.S.
der House Speaker Newt Gingrich as Subtitle E of the Contract with America Advancement Act of 1996 (Pub.L. 104 121) and signed into law
t responsible for consumer protection in the financial sector.
r simply Corrective Action) are improvements to an organization's processes taken to eliminate causes of non-conformities or other undesir
ng the flow of goods, including animals, transports, personal, and hazardous items, into and out of a country.
partment of Defense responsible for the development of emerging technologies for use by the military.
y (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and con
a's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
ers the Federal Bureau of Investigation, prosecutes violations of federal law, and is responsible for enforcing all civil rights legislation.
under the U.S. Department of Justice, tasked with combating drug smuggling and use within the United States.
ting new companies, supporting the success of existing companies, a and assisting newly forming companies, to diversify the economy and
enforcement agencies, as well as private organizations, that are charged with taking action against terrorism which includes the investigati
rily concerned with administration of the Companies Act 2013, the Companies Act 1956, the Limited Liability Partnership Act, 2008 & othe
pace program.
onsibilities for enforcing US labor law in relation to collective bargaining and unfair labor practices.
intercity passenger railroad system through contracts with existing railroads.
itoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes.
om a nearby Weather Forecast Office of the service's operator, the National Weather Service.
y in development. It was announced in July 2013 by APCA.
marily focused on enforcing civil rights laws prohibiting schools from engaging in discrimination on the basis of race, color, national origin, se
anning and execution of economic and trade sanctions in support of US national security and foreign policy objectives.
state agency aimed at preventing inefficient or illegal operations within their parent agency.
d States Department of the Treasury that was established by the National Currency Act of 1863 and serves to charter, regulate, and supervi
mic organisation with 35 member countries, founded in 1960 to stimulate economic progress and world trade.
dia. It was established in the year 1988 and given statutory powers on 30 January 1992 through the SEBI Act, 1992.
cy responsible for protecting investors, maintaining fair and orderly functioning of securities markets and facilitating capital formation.
he traveling public.
ion is to detect and prevent illegal aliens, terrorists and terrorist weapons from entering the United States, and prevent illegal trafficking of
deral government of the United States charged with coordinating and supervising all agencies and functions of the government concerned
es Government concerned with the United States' policies regarding energy and safety in handling nuclear material.
ed States federal government with responsibilities in public security, roughly comparable to the interior or home ministries of other countri
cy under the U.S. Department of Homeland Security, charged with conducting criminal investigations and protecting the nation's leaders.
icknamed Obamacare, is a United States federal statute enacted by the 111th United States Congress and signed into law by President Bara
nt involving infrastructure development and investments in 152 countries and international organizations in Asia, Europe, Africa, the Middl
h is called Criminal Justice Information Services) then the agency has to comply with the CJIS Security Policy. This is a type of Info sec compl
A, and now produced by Lockheed Martin.
uded in a criminal record and the existence of a criminal record varies between countries and even between jurisdictions within a country.
r vehicle agency (DMV, BMV, OMV - and so on) maintains driving records for all licensed drivers within the state.
ce Fund, which is administered by the Universal Service Administrative Company (USAC) under the direction of the Federal Communication
chools worldwide for executives, business leaders and functional managers.
e government.
re, and networks for the processing and distribution of data.
comers and their children.
or more governments in cooperation to solve problems of mutual concern.
e who live there.
pendent agencies of the United States government wishes to add, remove, or change a rule or regulation as part of the rulemaking process
s campaign contributions from members and donates those funds to campaign for or against candidates, ballot initiatives, or legislation.
vernments to achieve political goals. Many groups and individuals believe that their political systems will never respond to their demands.
been entrusted with a prominent public function. A PEP generally presents a higher risk for potential involvement in bribery and corruption
processing, exploitation, and dissemination systems in direct support of current and future operations.
l U.S. laws and regulations. It is the goal of the Customs Service to maximize trade compliance while facilitating the importation of legitima
nt) to residential, commercial, and industrial sectors of the economy.
fined water polices and regulations.
umber (e.g., WS-110), military experimental (MX)[1] weapons prior to official naming (e.g., under a military aircraft designation system.
as the city's point person for resilience building, helping to coordinate all of the city's resilience efforts.
al services, and standardized services.
f knowledge, skills, values, and motivation to make that difference.
nhancing citizen communications, improving government infrastructure, and general improving the public good.
When you think of connected cities, you might think of large cities that have more high-profile smart cities initiatives like London, New Yor
tarian aspects of emergencies, in particular preparedness, response and recovery in order to lessen the impact of disasters.
g sustainable, resilient, accessible, and affordable solutions to the challenges faced by the urban poor and vulnerable groups by enhancing
ccupational health, or workplace health and safety, is a multidisciplinary field concerned with the safety, health, and welfare of people at w
omic, and technical systems and infrastructures so as to still be able to maintain essentially the same functions, structures, systems, and id
t without compromising the ability of future generations to meet their own needs.
road disruption, thus ensuring the safety of emergency response teams, construction workers and the general public.
ommunity, and also refers to the accesibility of that network to citizens
treets, water distribution, and sewers.
mission, protection and use of the environment, including air, water, and the infrastructure passing into and out of urban areas.
urvive, adapt, and grow no matter what kinds of chronic stresses and acute shocks they experience.
and be able to power itself with renewable sources of energy.
des both health care services and a health insurance plan to patients in a particular geographic area.
apolation of present or known needs.
mitting, and following up on, claims with health insurance companies in order to receive payment for services rendered.
universal medical alphanumeric codes.
s, survivors, and carers. The patient advocate may be an individual or an organization, often, though not always, concerned with one specifi
ent care episodes from registration and appointment scheduling to the final payment of a balance.
the enrollees in an insurance plan when looking at their health care outcomes or health care costs.
l law that requires employers of 20 or more employees who offer health care benefits to offer the option of continuing this coverage to ind
nt, a type of US employer-funded health benefit plan that reimburses employees for out-of-pocket medical expenses.
ers in the United States who are enrolled in a high-deductible health plan (HDHP). The funds contributed to an account are not subject to f
nt and that arose during a stay in a hospital or medical facility.
ed infection, a practical (rather than academic) sub-discipline of epidemiology.
kill in order to effect a change in behavior.
nalysis of that data into a single, actionable patient record, and the actions through which care providers can improve both clinical and fina
ent Doc Fix, is a United States statute. It changes the payment system for doctors who treat Medicare patients. It revises the Balanced Budg
vision of health care, or payment for health care that is created or collected by a Covered Entity (or a Business Associate of a Covered Entit
your expenses if you suffer a covered accidental injury.
give coordinated high quality care to their Medicare patients.
a severe injury or episode of illness, an urgent medical condition, or during recovery from surgery.
episodes of care.
mitted because the payment determination has already been decided upon.
make a lump sum cash payment if the policyholder is diagnosed with one of the specific illnesses on a predetermined list as part of an insura
ealth care providers must be seen within a predetermined network.
of procedures, therapies, and medications.
of desired health outcomes and are consistent with current professional knowledge.
families in a particular geographic area by member physicians with limited referral to outside specialists and that is financed by fixed perio
o save, and how laws affect you.
an that pays you benefits when you are confined to a hospital, whether for planned or unplanned reasons, or for other medical services, de
yer that has 51 or more employees. In some states large groups are defined as 101 or more.
al expenses.
e the doctors and hospitals they want to visit.
ctor or nurse for treatment.
undiagnosed health concern as well as continuing care of varied medical conditions, not limited by cause, organ system, or diagnosis.
cing it in a visual context.
o help address the problem of prescription drug abuse in the United States. The rule Electronic Prescriptions for Controlled Substances , p
is a type of content management system for the pharmaceutical industry, providing a formalized means of organizing and storing docume
o maintain consistent, accurate and current demographic and essential medical data on the patients seen and managed within its various d
nd prescriptions to a participating pharmacy electronically instead of using handwritten or faxed notes or calling in prescriptions.
national body that defines a set of standards, which governments can then transpose into regulations for clinical trials involving human sub
ommunity or hospital system.
o manage with traditional software and/or hardware; nor can they be easily managed with traditional or common data management tools a
ate, exchange data, and use the information that has been exchanged.
l analysis and medical intervention, as well as visual representation of the function of some organs or tissues.
eases or medical conditions affecting humans.
ticularly hospitals, and are one of the core components of a hospital's IT infrastructure.
ssing, monitoring and mitigating the risks that could affect the quality or safety of a study.
anization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performan
ations of e-health and telemedicine. In this field, telecommuncation technologies are being used to transfer medical information over vary
pically describes the delivery of psychiatric assessment and care through telecommunications technology, usually videoconferencing.
nutrition, exercise,
ross the continuum of care.
ved in a fluid called the mobile phase, which carries it through a structure holding another material called the stationary phase. The various
ng several different scientific disciplines into one for the sake of diagnosis and treatment of human disease.
on explains a person's symptoms and signs. It is most often referred to as diagnosis with the medical context being implicit.
polymerase chain reaction (PCR). It monitors the amplification of a targeted DNA molecule during the PCR, i.e. in real-time, and not at its e
easuring the intensity of light as a beam of light passes through sample solution.
y causing viruses to becom non-infective, but still remain within the product.
emoving them from the sample.
elopment, general ranging from the last years of elementary school until graduation from high school.
ch as herbalism, homeopathy, and acupuncture.
stic services in an outpatient setting.
es to denote a health care provider of emergency medical services. EMTs are clinicians, trained to respond quickly to emergency situations
injury and are adept at discerning life-threatening problems, prioritizing the urgency of care, rapidly and effectively carrying out resuscitati
ensic health care in the scientific investigation of trauma and/or death related to abuse, violence, criminal activity, liability, and accidents.
roductive organs.
seases that affect the liver, gallbladder, biliary tree and pancreas.
(ITU) or critical care unit (CCU), is a special department of a hospital or health care facility that provides intensive treatment medicine.
with the laboratory examination of body tissue for diagnostic or forensic purposes.
r to repair or restore body parts to look normal, or to change a body part to look better.
immune disorders that affect many tissues and organs throughout the body (systemic) and is most often used as one of the tests to help d
sess blood-borne disease progression
. The PCC advises the FASB on the appropriate accounting treatment for private companies for items under the active consideration on the
wide range of disorders, including anemia, infection and leukemia.
men, of blood vessels and organs of the body, with particular interest in the arteries, veins and the heart chambers.
n previously used to treat them.The term includes the more specific antibiotic resistance (AR or ABR), which applies only to bacteria becom
rioration and in some cases to the destruction of such tissue.
ny carbohydrates.
th type 2 diabetes.
to improve glycemic control in adults with type 2 diabetes mellitus when treatment with both linagliptin and metformin is appropriate.
ed by a physician, which is primarily and customarily used to serve a medical purpose and includes ostomy supplies, catheters, oxygen, and
hysicians for their patients.
ch have radioactivity.
or have spread to other parts of the body.
than 2,500 years of Chinese medical practice that incudes various forms of herbal medicine, acupuncture, massage and other treatments.
n the body produces after eating.
ng to another, or to home.
re indicative of increased injury risk and inefficient movement that causes reduced performance.
known as the CAHPS Hospital Survey or Hospital CAHPS, is a standardized survey instrument and data collection methodology that has be
chronic health problems that affect their ability to perform everyday activities.
n which the cost of treatment is monitored by a managing company.
duce health disparities.
o the patient.
values and ensuring that patient values guide all clinical decisions.
health and care with interventions designed to increase activation and promote positive patient behavior.
r something else associated with an individual that can be used to identify them.
ources match and belong to the same patient to obtain a complete record of the patient's health history and medical care. If they match, th
mp-sum on retirement that is predetermined by a formula based on the employee's earning history, tenure of service and age.
company for the benefit of each of its employees.
loyee benefit options who can help you narrow down your offerings by providing their input and expertise on the matter.
d keeping them engaged on their benefits year round.
n the company.
ration can purchase the corporation's stock, often at a discount.
nditions, to care of a sick family member, or to care for a newborn or adopted child.
tain amount of their gross income to a designated account or accounts before taxes are calculated.
sion of medical services.
er-sponsored benefit plans that allow employees to withdraw tax-free money to pay for qualified medical expenses. Unlike other types of e
avior by a specific group of people during a defined period of time.
inary income tax.
s for retirement purposes.
seminars, tobacco-cessation programs and health screenings that are designed to help employees eat better, lose weight and improve their
nd life were in competition, but integration connotes the real-world experience where career-minded employees are committed to managi
w job, promotion, or other job benefits.
fe activities.
ntity, sexual orientation, age, social class, physical ability or attributes, religious or ethical values system, national origin, and political beliefs
individuals in a group, among groups in a population, or among countries.
and opportunities regardless of gender, including economic participation and decision-making; and the state of valuing different behaviors
ticipate in the community, and is the liaison between the community and the company behind it all.
an agreement resolving it.
s and difficulties, especially by a professional.
onal problems, that may be adversely affecting the employee's performance.
procedures.
nt high-performing employees from becoming a weak performer.
the relationship between a company and its employees.
e groups of employees who join together in their workplace based on shared characteristics or life experiences.
appy or content with their jobs and work environment. Compare that with this definition of employee engagement.
out job vacancies and to employers information about availability of perspective workers.
nclusive growth in the workplace. This has become increasingly important with the expansion of automation in manufacturing and other fie
pliers, technical failures, material shortages these might all have a negative impact on your project.
the work of his/her subordinates or employees.
t provided by the employer directly, or through a specialist service.
achieve those goals.
gh automating the manual human resource processes and eliminating information-centered risks.
requirements of an organization's human resources management, payroll and bookkeeping operations.
manage, develop, and optimize human capital.
and also to get employee feedback to be used for the betterment of the organization.
vity levels on a group of employees, or individual employees
of educational courses or training programs.
ng of employee taxes.
st practices, research, support and/or training for a focus area. The focus area might be a technology (e.g. Java), a business concept (e.g. BP
viduals for the purpose of achieving a key result or group of aligned results.
us on the organization's core competencies.
programs, compensation, pensions, etc.
uitability made by an independent Operational Test Agency (OTA), with user support as required, on other than production systems.
and the factors that affect performance.
cture or cultural changes within an enterprise.
hieve success. This lesson explains what proactive management is, its benefits, and strategies for becoming a more proactive manager.
main components: quality planning, quality assurance, quality control and quality improvement.
tiatives taken by an organization's top management on behalf of owners, based on consideration of resources and an assessment of the inte
ees on the individual, departmental, and entity-wide levels.
workforce to ensure it can meet its legislative, regulatory, service and production requirements and organizational objectives.
from work and primarily not to engage in work-related electronic communications such as e-mails or messages during non-work hours.
lving the making of unwanted sexual advances or obscene remarks.
employees' terms and conditions when a business or undertaking, or part of one, is transferred to a new employer.
and controlling the direct and indirect payments employees receive for the work they perform.
ed automatically from an employee's paycheck. The contributions are generally pretax dollars that are transferred to a retirement account l
of Labor Day, hosted by the American Payroll Association (APA) in the United States, the Chartered Institute of Payroll Professionals (CIPP) in
ages. Once an employer deposits funds into the employee's account, the employee can then use the paycard to purchase items, withdraw
tests, such as employee benefits, payroll and workers' compensation, recruiting, risk/safety management, and training and development.
form them to the standard required by the business. Employers sometimes confuse underperformance or poor performance with miscond
rticular issue among the people to exchange their views freely and fairly weighs each other.
of an employed person (or student) in a way that makes workloads or class loads comparable across various contexts.
ed payment.
activity or to reach a goal.
g, medical or any other purpose that qualifies for a deduction.
ating, managing, and ultimately improving your sales process so you can close more deals.
o reach its long-term goals and typically published in a booklet or other form that is widely accessible.
ery aspect of vehicle maintenance, fuel costing, routing and mapping, warehousing, communications, EDI implementations, traveler and ca
ndors, day-to-day operation of the corporate travel program, traveler safety and security, credit-card management and travel and expenses
establishment to the place where work is actually done for which compensation may be demanded or paid.
hat restricts the ways in which the network, website, or system may be used and sets guidelines as to how it should be used.
me allocated for work and other aspects of life. Areas of life other than work-life can be, but not limited to personal interests, family and soc
h the analysis of existing organizational problems and the development of plans for improvement.
determined price.
fill out as a part of the process of informing an employer of the applicant's availability and desire to be employed.
nd, often discovered through background checks.
d candidates for senior-level and executive jobs.
uiter that alerts current employees or the public of immediate or future job openings within a company.
ess when an employee leaves the company, for which he has previously worked within the scope of a work or service contract.
customer or client with one's products or services.
finding, attracting, assessing, interviewing and hiring new personnel.
tinuous socialization process in an organization.
ls, physical and motor abilities, personality, emotional intelligence, language proficiency and even integrity.
ng the organization. In other words, it can also be termed as cost per recruitment or placed candidate.
nt process to an external service provider.
more detailed examinations of the resumes. The objective is to locate the most qualified candidates for an open job.
solutions for a growing portfolio of clients.
y of clocking in to work and managing your hourly/salary wage.
s, or apparatus, or to the production, sales, shipments, purchases, transfers, identification of customers, inventories, or amount or source o
planned strategies and tactics to shape the enrollment of an institution and meet established goals.
d is not necessarily committed to a particular employer long-term.
urs of service per week, or 130 hours of service per month.
easure the success of HR initiatives.
e, retire or die
nd are replaced by new employees. Measuring employee turnover can be helpful to employers that want to examine reasons for turnover o
nd training, and which results in the acquisition of new knowledge and skills
om lessons run smoothly without disruptive behavior from students compromising the delivery of instruction.
es together (for instance, a company and a group of customers), in order to jointly produce a mutually valued outcome.
n and development of the behaviors in individual employees.
eir day-to-day job responsibilities
place regarding a subject of a common interest, usually people working in a particular industry.
the positive aspects of conflict.
ness, or entertainment for a period of time, usually paid for by the company.
organizational activity aimed at bettering the job performance of individuals and groups in organizational settings.
tivities that foster individual and organizational learning and knowledge
e or over the Internet, without the student's needing to attend a school or college
l learning intended to help administrators, teachers, a and other educators improve their professional knowledge, competence, skill and eff
ctor and learners, either individuals or groups.
d potential, build human capital and facilitate employability, enhance the quality of life and contribute to the realization of dreams and asp
ss of people to accomplish more successful organizational change and performance.
rea or topic. The term domain expert is frequently used in expert systems software development, and there the term always refers to the d
op, motivate, and retain productive, engaged employees. The goal of talent development is to create a high-performance, sustainable orga
cially by means of activities and events designed to increase motivation and promote cooperation.
bility to perform through learning, usually by changing the employee's attitude or increasing his or her skills and knowledge.
illegal activities
needed] by Basel III), which are recommendations on banking laws and regulations issued by the Basel Committee on Banking Supervision
d to creditors
encouraging depository institutions to help meet the credit needs of surrounding communities (particularly low and moderate income nei
uarding a firm's or individual's financial assets and is not engaged in traditional, commercial, or consumer/retail banking such as mortgage
08 159) is a United States federal law, passed by the United States Congress on November 22, 2003, and signed by President George W. Bus
enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies.
agency body composed of five banking regulators that is empowered to prescribe uniform principles standards and report forms to promot
ed banks that provide reliable liquidity to member financial institutions (not individuals) to support housing finance and community investm
the Fed), is charged under the United States law with overseeing the nation's open market operations (e.g., the Fed's buying and selling of
ore flexible, and more stable monetary and financial system.
l law that requires certain financial institutions to provide mortgage data to the public. Congress enacted HMDA in 1975.
hase toxic assets and equity from financial institutions to strengthen its financial sector that was signed into law by President George W. Bu
ciety, workers, the community and the environment in addition to profit as its legally defined goals.
, social security and retirement benefits, and protection against elder abuse.
the rules of inheritance.
nces in which they a re no longer able to express informed consent, especially an advance directive.
ormed use of consumer credit, by requiring disclosures about its terms and cost to standardize the manner in which costs associated with b
sing to repair or replace it if necessary within a specified period of time.
vide compensation to the firm based on a structure other than hourly billing.
hedge funds, private equity, or real estate funds.
sible (with respect to all elements of responsibility, including but not limited to capability, competency, capacity, credit, integrity, perseveran
ability on persons and companies (typically federal contractors) who defraud governmental programs.
hreatening or invading the legal right of another, or that compels a person to carry out a certain act, e.g., to make restitution to an injured p
s agree to most of the terms that will govern future transactions or future agreements.
l disclosure agreement (CDA), hush agreement, proprietary information agreement (PIA) or secrecy agreement (SA), is a legal contract betw
This is in contrast to a written contract, where the contract is a written document.
tractors to carry out specific parts of the contract.
oods, securities, and other personal property.
nd seller being directly written into lines of code.
on solutions and escrow consulting.
are or operating system platforms.
opment or any other piece of work in which the employer agrees to pay the contractor based upon the time spent by the contractor's emp
to the arbitrator.
t give them an opportunity to hear the strength and weaknesses of one's own case as well as the cases of the other parties involved, befor
naturalized.
ility Verification, to data from US Department of Homeland Security and Social Security Administration records to confirm employment elig
people entering that country.
on Services to petitioners for residency, citizenship, family visas, and employment visas.
specified period of time in a country.
beneficiary if the cause of death is an accident. This is a limited form of life insurance which is generally less expensive.
tting into an auto accident.
bilities. Casualty insurance includes vehicle insurance, liability insurance, theft insurance and elevator insurance.
ms management and processing support for a variety of claims types in a single system.
nefits to employees and their families upon the occurrence of certain qualifying events where such coverage would otherwise be terminate
e plan. The monthly premium is usually lower, but you pay more health care costs yourself before the insurance company starts to pay its s
house itself, or to possessions in the home.
eclaiming your identity. Typically, these expenses are limited to things like postage, copying, and notary costs. Less often, the expenses mig
om the continuous existence, without impairment or damage, of the insured object (or in the case of a person, their continued survival).
s guarantee to pay on covered claims. In return, the buyer agrees to pay a monthly premium cost.
D theft protection, legal services and financial counseling that is offered through an employer but paid for partially or solely by workers thro
s insurance payable to a lender or trustee for a pool of securities that may be required when taking out a mortgage loan.
uirement for having health coverage. To avoid the penalty for not having insurance you must be enrolled in a plan that qualifies as minimum
savings portion.
ed pet. Some policies will pay out when the pet dies, or if the pet is lost or stolen.
ttlement of claims.
ainst political risk the risk that revolution or other political conditions will result in a loss.
health insurance premiums with tax-free dollars.
liability claims
f public or private property caused either by a person who is not its owner or by natural phenomena.
me weather damage.
eye care (eye exams) and prescription eyewear (eyeglasses and contact lenses).
s from other target groups with significant barriers to employment. Employers claim about $1 billion in tax credits each year under the WO
ays during which the majority of employees at a particular company are not allowed to make alterations to their retire
t appears on an official list.
all information that has been made available to the public in any form before a given date that might be relevant to a patent's claims of orig
nal tools to curb access to 'rouge websites dedicated to the sale of infringing or counterfeit goods.
non-profit organizations)
the government of Ontario, Canada for the purpose of improving accessibility standards for Ontarians with physical and mental disabilitie
to employment or education, positive discrimination.
loyees 40 years of age and older from discrimination on the basis of age in hiring, promotion, discharge, compensation, or terms, condition
principal fact-finding agency for the U.S. government in the broad field of labor economics and statistics and serves as a principal agency of
aw to generally mirror the federal the Family and Medical Leave Act (FMLA). However, with the enactment of various California laws, differe
up to 4 months off for any disability related to pregnancy and childbirth. This leave is unpaid and is not 'maternity leave' or pregnancy leave
tion, sexual harassment, discrimination, invasion of privacy, false imprisonment, breach of contract, emotional distress, and wage and hour
n, religion, or mental or physical disability.
ncluding minimum wages, requirements for overtime pay and limitations on child labor.
on established in 1993 to promote responsible management of the world's forests.
intiff from a defendant. Garnishment allows the plaintiff (the 'garnishor') to take the money or property of the debtor from the person or i
ry's domestic law.
ding threats and demands.
their rights and interests.
state and federal.
enforcement of the standards developed under the Act; by assisting and encouraging the States in their efforts to assure safe and healthful
till entitled to FLSA overtime pay if, when and to the extent that they actually work more than 40 hours in a work week. FLSA overtime pay
ecting full-time and part-time workers in the private sector and in Federal, State, and local governments.
the course of employment in exchange for mandatory relinquishment of the employee's right to sue their employer for the tort of negligen
erpetrators. It is abusive conduct that is threatening, humiliating, or intimidating or also work interference in the form of sabotage, which
nt Richard Nixon ordering him to deliver presidential tape recordings and other subpoenaed materials to the District Court.
records, billing and bookkeeping, schedules and appointments, deadlines, computer files and to facilitate any compliance requirements su
ethics control, accurate matter opening, day-to-day matter work, business intelligence, and marketing.
ed to circumvent or otherwise avoid the purpose, implied or explicitly stated, of the system.
rtments, insurance claims departments, and government legal and contract management departments.
resents the practice carried out by Law Practice Optimizers of improving the efficiency and client/attorney relationships within a law firm an
trol and management of legal cases or matters. Practitioners of legal-project management apply it to the mechanics and business of provid
ed to determine whether a party has a specific stake in the legal issue that the court is hearing.
ompanies into a new entity.
d with the USPTO to prepare, file, and prosecute patent applications on behalf of his or her clients.
nd representing clients in legal negotiations and court proceedings such as lawsuits, and is applied to the professional services of a lawyer
e deemed not to violate a given rule.
es set aside funds for future college costs
when cash is exchanged.
a transaction or of property.
federal government required in addition to baseline income tax for certain individuals, corporations, estates, and trusts that have exemptio
bulk taxpayer information by the source country to the residence country concerning various categories of income (e.g. dividends, intere
registration charges, as well as advertising, promotional activities, and employee training.
cash is actually received or paid out.
ependent children in a family. The credit may depend on other factors as well, such as income level.
e (in the case of income taxes), asset (in the case of capital taxes), or financial transaction (in the case of sales taxes).
purposes of identification.
centage of the salaries that employers pay their staff.
ent in the US.
and the amount of estimated tax liability that will be incurred as a result.
n the employee's marital status, number of exemptions and dependents and other factors. A change in status can result in the employers
s of your business and other deductions as well as details about your tax refund or tax liability.
GST)) is a tax collected by an intermediary (such as a retail store) from the person who bears the ultimate economic burden of the tax (suc
n the estate (money and property) of a person who has died.
and oversees the collection of federal income taxes.
s an ad valorem levy on the unimproved value of land.
de LITC services to taxpayers who are low income or who speak English as a second language.
, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as 42 U.S.C. § 405(c)(2). The number is iss
hat are, by statute, tax-reduced, tax-deferred, or tax-free. Governments establish the tax advantages to encourage private individuals to con
o reduce the amount of tax that is payable by means that are within the law.
udget for fiscal year 2018, is a congressional revenue act originally introduced in Congress as the Tax Cuts and Jobs Act (TCJA).
nses, particularly those incurred to produce additional income.
s paying his true tax liability.
rovide complete relief from taxes, reduced rates, or tax on only a portion of items.
m used to describe any of the governmentally provided numbers that can be used in the US as a unique identifier when interacting with the
o a taxing authority like the Internal Revenue Service (IRS).
nt and is usually undertaken to improve tax administration or to provide economic or social benefits.
xation of passive and active income.
the payer of the income rather than by the recipient of the income. The tax is thus withheld or deducted from the income paid to the recip
axpayer Advocate.
erprises under common ownership or control.
tax that is assessed incrementally, based on the increase in value of a product or service at each stage of production or distribution. VAT e
me taxpayers.
cost that must be incurred by a new entrant into a market that incumbents do not have or have not had to incur.
policies that guide the administration and religious ceremonies of the Roman Catholic Church.
ht prohibitions that a nation's government can use to regulate flows from capital markets into and out of the country's capital account.
scribe traders that use the futures market primarily to hedge their business activities.
c activity more efficiently than another activity.
interests, financial or otherwise, and serving one interest could involve working against another.
o or more entities beyond the territorial limits of a country or a transaction in a domestic trade in which at least one of the party is located
ods into a country.
s between parties including negotiation, mediation, arbitration, collaborative law, and litigation.
s or family of a household in the context of their personal daily activities in running a house.
other parties without this being reelected in the cost of the goods or services involved, such as the pollination of surrounding crops by be
mination and prevention of anticompetitive business practices, such as coercive monopoly.
s federal law known primarily for two of its main provisions, one that addresses accounting transparency requirements under the Securitie
rce that promotes United States exports of non agricultural US services and goods.
s and services are guided solely by the aggregate interactions of a country's individual citizens and businesses; there is little government int
level of treatment accorded by one state to another in international trade.
rm other than a tariff.
ds) with some common policies on product regulation, and freedom of movement of the factors of production (capital and labour) and of e
e rest of the country. SEZs are located within a country's national borders, and their aims include: increased trade, increased investment, jo
ernative goods are not locally produced or manufactured.
of trade between nations. At its heart are the WTO agreements, negotiated and signed by the bulk of the world's trading nations and rati
m a webpage, website, or a mobile app. Ad blockers are available for a range of computer platforms, including desktop and laptop compute
m multiple ad networks
y representing online advertisement impressions, clicks, conversion or data events in order to generate revenue.
h great transparency and performance in global display media buying across ad exchanges.
fficiently manage some of the largest search marketing campaigns in the world, across multiple engines and media channels.
o clients, it is creative or expert lead, it's made up primarily of creative professionals, and it's often strongly defined by values.
ts and services.
nd the public
of promotion and marketing for its clients.
d by doing so help to increase brand awareness and sales
tedly now and in the future from the same brand, regardless of a competitor's actions or changes in the environment
ke product bundling, where several products are combined into one group, which is then offered for sale as a units, product lining involves
thereof is created for an established brand with the intention of developing a new, differentiated identity in the minds of consumers, inves
t response to a marketer.
on considers and communicates with individual prospect or customer accounts as markets of one.
g to targeted and highly valued accounts rather than focusing your prospecting efforts at the contact level.
. They empower company's fans, turning a one-way marketing channel into multiple promotional conversations.
ose elements are augmented by computer-generated perceptual information ideally across multiple sensory modalities.
more effectively market on multiple channels online such as email, social media, websites, etc. and automate repetitive tasks.
se in general business operations, or for resale to other consumers, such as a wholesaler selling to a retailer.
age of visitors who enter the site and then leave ('bounce') rather than continuing to view other pages within the same site. Bounce rate is
n or business in a building or other structure. The term brick-and-mortar business is often used to refer to a company that possesses or lea
ociated with the purchase, use and disposal of goods and services, including the consumer's emotional, mental and behavioral responses t
appeal to businesses.
.g., online social games.
m consumers.
he Internet, but also including mobile phones, display advertising, and any other digital medium.
rand/enterprise; it attempt to meld all aspects of marketing communication such as advertising, sales promotion, public relations, direct m
omers and prospects.
x dependent on localized specifications including the consumer, competition, and store characteristics.
keting muscle with other like-minded companies to accomplish much more than you might be able to do on your own.
nd tools in combination: Marketing communication channels focuses on any way a business communicates a message to its desired market
eve your marketing objectives. Your marketing objectives are strategic sales goals that fit your strengths and are a good way to stretch your
includes advertising and non-price promotion.
come, and then assigning a value to each of these events.
a market sector.
mart phone, tablets, or any other related devices through websites, E mail, SMS and MMS, social media or mobile applications
h customers, adapting continuously the new digital landscapes, and marketing across multiple channels to reach different consumers.
direct and indirect, in order to sell them goods and services.
g to a conversion.
the platform upon which it appears.
ng a network manager to display targeted information to a specific audience at a specific place and time.
at seek to determine the audience size and composition of television programming in the United States.
er individualized messages and product offerings to current or prospective customers.
a third party.
from simple information to sophisticated advertising.
television sets tiled together contiguously or overlapped in order to form one large screen.
eting in a physical location.
-depth look at government programs, technologies and spending priorities, as well as management issues, case studies M&A, and trends th
server. This form of online advertising entails embedding an advertisement into a web page.
t news story or photograph is often located. Papers are often displayed to customers folded so that only the top half of the front page is vis
ntent gets created and published. At its most basic level, it can help you avoid getting sued or embarrassed, or both.
ge or deletion.
n used to support multiple users working in a collaborative environment.
ogs, and social media posts) that does not explicitly promote a brand but is intended to stimulate interest in its products or services.
motivations.
ks that delivers the content to the audience.
ivers the content to the audience.
n other media. The term has been particularly common in web development since the late 1990s.
dissemination of information to key constituencies, the execution of corporate strategy and the development of messages for a variety of
her message. In marketing and advertising, it is a particular group of consumers within the predetermined target market, identified as the t
lly with an accompanying sound signal.
specially in terms of how easy or pleasing it is to use.
nto many different languages.
n in forms that can be read or looked upon.
k like while the interface or document is being created. WYSIWYG is an acronym for 'what you see is what you get'.
manipulate, print and manage files in Portable Document Format.
ibers access to a collection of software used for graphic design, video editing, web development, photography, along with a set of mobile a
by Adobe Systems.
anizing them, serving the same role for images as a normal text index does for words.
a video camera or DVD player to digital video.
pically measured from the customer's initiation of the call and including any hold time, talk time and related tasks that follow the transacti
nce before and after the sale in order to drive repeat business, customer loyalty and profits.
ultimately culminating in a purchase.
f individuals or items moving out of a collective group over a specific period. It is one of two primary factors that determine the steady-stat
links or their viewer's link in a 'Live Pitch'.
analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customer
n online display advertising by using your offline customer database.
is deemed to be best for the customer. It is a change in a company's culture that is supported by customer-focused customer service and m
stomer turnover, customer churn, and customer defection.
use and dispose of products, services, experiences, or ideas to satisfy their needs and wants.
er experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
se objectives by providing a tool to advance the way they communicate with their customers.
including names, contact details, and buying habits.
luding contact details, customer valuation data, and information gathered through interactions such as direct marketing.
er base in order to obtain feedback.
unified customer database that is accessible to other systems.
ir relationship.
n by a customer. A key customer relationship management (CRM) component, a customer facing solution is designed to deliver satisfying us
ct or service for the consumer, as well as increased sales for mutual benefit.
ir activities, in order to build deeper and more effective customer relationships and improve strategic decision making.
particular purchasing event.
teraction between an organization and its customers.
any and brand.
ts with, across multiple channels and over time. It connects millions of events into journeys from your customers' point of view and is a dat
whether it be a product, an online experience, retail experience, or a service, or any combination.
urchasing, using, and maintaining loyalty to a product or service.
time value (LTV) is a prediction of the net profit attributed to the entire future relationship with a customer.
cts, rather than use other shops or buy products made by other companies.
ions concerning your service.
he best source of new business is a referral from a satisfied customer.
companies use to manage and analyze customer interactions and data throughout the customer life cycle, with the goal of improving custo
ustomer defections.
nd used, or had experience with, the product or service. Customer reviews are a form of customer feedback on electronic commerce and o
Professional Services, Training and Support into a new profession to meet the needs of recurring revenue model companies.
ponse time, satisfaction rating, etc.
uently make purchases. A loyalty program may give a customer free merchandise, rewards, coupons, or even advance released products.
on. Often seen in people during periods of depression or stress, it is normally a short-lived habit.
ur at the micro-market level and optimize product availability and price to maximize revenue growth.
te and streamline sales inventory, leads forecasting, performance and analysis.
onship management product.
haviors. In economics, price sensitivity is commonly measured using the price elasticity of demand.
DTC to enforce its provisions.
rnational audiences.
and manage email newsletters to individual recipients.
al name; subscription business model) or an organization (institutions, societies, associations) that is sent by mail regularly to all its membe
product or service information. This ability is usually associated with direct marketing campaigns such as, e-mail marketing, or direct mail.
ofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authoriz
erry or Windows Phoneapp) in an app store (such as iTunes for iOS, Google Play for Android, Windows Store for Windows Phone or BlackB
p advertisers pay each time a user installs their app from their ad.
ng customers.
essages to their customers while they are using other mobile apps or mobile websites.
take while on a mobile platform, be it an application or a mobile website. It can be utilized to help identify which element of the app is tur
es, social networking services and, increasingly mobile apps. Typically, metrics are measured by counting the number of unique users durin
gh tests that are easy to execute so you can deliver the right experience to the right customer.
services by individuals or families. It is the largest part of aggregate demand at the macroeconomic level.
er (consumer) and an organization (company or brand) through various channels of correspondence. This connection can be a reaction, int
time value (LTV) is a prediction of the net profit attributed to the entire future relationship with a customer.
to satisfy needs, then needs provoke customers to buy products.
volumes. Large retailers are able to demand price discounts from suppliers and make a discount pricing strategy effective as they buy in bu
ine marketing technique to encourage engagement with a product or service.
ukkah, and Kwanzaa.
rotocol implemented by Apple Inc.
MF tones input via keypad.
costs or a publisher's earnings. Invalid traffic covers intentionally fraudulent traffic as well as accidental clicks.
equired sale
e to take immediate action, thereby driving some form of brand interaction that leads to a current or future purchase
o as natural or organic search, SEO is the process used to improve website rankings in the Search Engine Results Pages.
ty in search engine results pages primarily through paid advertising.
te appears high on the list of results returned by a search engine.
ous searches they conduct on other websites.
round how public sector organizations promote participation in policymaking.
different languages.
gging services, allowing users to apply dynamic, user-generated tagging which makes it possible for others to easily find messages with a sp
rand/enterprise; it attempt to meld all aspects of marketing communication such as advertising, sales promotion, public relations, direct m
r arriving on your site.
ely, evangelists.
ganization, particularly online.
ring on various social media platforms.
rs. In short, it is a model or representation of a social network, where the word graph has been taken from graph theory.
a brand and industry online.
al networking.
w organizations to monitor social channels and conversations, respond to social signals and synthesize social data points into meaningful tre
consisting of existing and potential customers, into sub-groups of consumers (known as segments) based on some type of shared characte
ted for by a specific entity.
ors (KPIs) are one of the most over-used and little understood terms in business development and management. They are too often taken t
unding programme) is having on people, organisations or their external physical, economic, political or social environment.
more audiences of a specific ethnicity typically an ethnicity outside of a country's majority culture, which is sometimes called the 'general
ting, is a marketing strategy for the sale of products or services where the revenue of the MLM company is derived from a non-salaried wo
han the competition.
ss-sell and upsell existing customers.
tions, trade margins and input costs, amongst others.
procurement process.
d vision of the product, particulars on achieving the product strategy and the big picture context in terms of what the product will become.
market fit has been identified as a first step to building a successful venture in which the company meets early adopters, gathers feedback a
rrency coins.
sperson focuses on the customer's problems and addresses the issue with appropriate offerings (product and services).
and services.
rough an Internet advertising or search system, navigating an e-commerce website and finally converting to a sale. The metaphor of a funn
cebook ads, optimize ads based on collected data, build targeted audiences for future ads, and remarket to qualified leads people who have
eders, veterinarians, nutritionists and allied industries, covering production, animal health, nutrition, finance and marketing issues.
gy to professionals involved in plumbing, heating, specialty piping and fire protection systems.
keting solutions for measurable ROI.
tech, operations, leadership, supply chain & workforce management.
mes or workplaces.
ng a certain passage or entrance. Examples include simple manual clickers, infrared beams, thermal imaging systems, WiFi trackers and vide
owners and property managers enabling shopping centers and malls to increase revenue and improve profitability.
n or information that gives enough insight into the future that the actions that should be taken become clear for decision makers.
ng sophisticated techniques and tools, typically beyond those of traditional business intelligence (BI), to discover deeper insights, make pre
uce the time it takes for traditional BI to show value to the organization, and to help in quickly adapting to changing business needs.
h web-delivered technologies. These types of solutions offer businesses an alternative to developing internal hardware setups just to perfo
or insights from data in various forms, either structured or unstructured, similar to data mining.
lacing it in a visual context.
g now but haphazardly and is often only a relocation of the paper assessment.
ss applications. It provides relevant information and analytical tools designed for the task at hand so users can work smarter and more effic
d business applications. BI tools support an enhanced user experience with visualization, real-time analytics and interactive reporting.
t provides a toolset for reporting, analytics, scorecarding, and monitoring of events and metrics.
on and analysis with simple instructions.
data when requested.
to help individuals or businesses have an idea of how to boost the effectiveness of the account's purpose.
er science that involves studying how humans interact with computers to create graphic illustrations of information and how this process c
integration platform.KNIME integrates various components for machine learning and data mining through its modular data pipelining conc
wo variables.
y is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success at reaching targets.
s with tools for aggregating, analyzing, visualizing and sharing data.
analyze data with greater speed, efficiency, and understanding.
d predict future outcomes and trends.
ial machines.
fferent prices for its products and services through different channels.
on from datasets that are high-dimensional, incomplete and noisy is generally challenging.
hat will resonate with your target audience.
n analytical reasoning facilitated by interactive visual interfaces.
cation deployment.
Fewer requests also means less overhead and improves the user experience.
a secure, scalable environment.
lp monitor API traffic and enforce API policies, including key validation, quota management, transformation, authorization, and access cont
PI products, creating a transaction recording policy, and development of rate plans for each API package.
nvironment, proper security controls need to be put in place to only allow access on 'need to have' basis through use of authentication pro
nother application program.
s and the data they use provide all of the value that information technology brings, and virtually every application depends on an applicatio
particular software application using a standard protocol.
provision resources for a programming function on a pay-per-use basis without having to be concerned about what amazon storage or com
d intelligence into applications.
h allows one company to send information to another company electronically rather than with paper.
registering data reports, conveniently accomplished through the Internet.
ending messages between two or more clients. It is an implementation to handle the Producer-consumer problem.
ocesses and transactions.
ompanies to unlock and accelerate their web services channel.
res an application as a collection of loosely coupled services, which implement business capabilities.
cially on a network.
run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing a
m or process runs upon.
traints to be used for creating Web services. Web services that conform to the REST architectural style, called RESTful Web services, provide
ST and DELETE data.
2] It provides all the information necessary to describe RESTful or practically RESTful APIs.
on SAP's technology platform called NetWeaver. SAP Fiori enables applications to be used on desktop computers, tablets and smartphones
icate using HTTP and its XML.
t the subsystems function together as a system, and in information technology as the process of linking together different computing system
hybrid PBX that is legacy digital technology at the core, but adds on VoIP and SIP support.
ems through firewalls from their computer or mobile device.
s mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems.
omer problem, managing a workflow, establishing a supply chair or designing a new product that requires integrating many different source
n experience to life.
ng them to the cloud.
, storage, retrieval and distribution of digital assets.
site template types you find in a collaboration portal site definition template.
sing organization, without the need to commission custom-made, or bespoke, solutions.
e company Atlassian. Atlassian wrote Confluence in the Java programming language, and first published it in 2004.
g a person by comparing and analyzing patterns based on the person's facial contours.
fied API, and software defined intelligence, HPE Synergy provides infrastructure for traditional and cloud native apps at cloud like speeds.
ies selling high-ticket items. Put simply, inside sales is sales that is handled remotely.
ng, extracting, and analyzing information often, complex information such as human speech or unstructured text.
e tracking, and project management functions.
ften incorporating a n interactive display screen or screens.
f any product or services. A logistics supply chain person is focused on the logistical cost and efficiencies within the supply chain of an orga
e of human intelligence to perform tasks that computers are currently unable to do.
and permissions.
phone or tablet, and no coding experience is required.
. The service integrates with the company's Office 365 subscription office productivity suite, including Microsoft Office and Skype, and feat
d services and business analytics tools that can impact operational capabilities and productivity, and provide competitive insights.
manage employees working outside the company premises; the term is often used in reference to field teams.
ams work together. It is a simple, but intuitive, tool that enables people to manage work, meet deadlines and build a culture of transparenc
nes of external code) that are used in a product or exist in the code inventory of an organization.
anger and risk inherent to an open-source software system.
s private platform as a service product, built around a core of application containers powered by Docker, with orchestration and manageme
d other services.
to manage partner relationships.
eckout terminals
binding, and service.
ality and content on the right device at the right time for the right person by continuously learning about them.
ning the output of a specific process within a desired range.
hin an organization for optimization and to meet new quotas or standards of quality.
mical plants, chemical processes, environmental systems, power stations, complex manufacturing operations, biological processes, and sim
igence that can be leveraged to make informed decisions faster.
oject management and resource management for client projects.
projects, often with the intention of improving an organization's performance.
ds of a small business.
he user senses as immediate or current.
aneous output. The processing is done as the data is inputted, so it needs a continuous stream of input data in order to provide a continuo
d/or control a remote users machine over the network to resolve issue.
process, by an agency or company interested in procurement of a commodity, service, or valuable asset, to potential suppliers to submit b
ching, monitoring, and analyzing machine-generated big data via a web-style interface.
h as a product or service, and all attributes associated with the item type that distinguish it from other item types.
2011, that was spun out to form the basis of a separate company in 2014 and later sold to Atlassian in January 2017.
provides certain information to a supplier (vendor) of that product and the supplier takes full responsibility for maintaining an agreed inve
acts as a mechanism for business to manage and procure staffing services temporary, and, in some cases, permanent placement services
r of users with specific skill sets and job responsibilities within an organization.
ses use to manage all aspects of the contingent labor ecosystem.
ry out spoken commands.
warehouse functionality and distribution center management.
evelopment so you can derive more value from your IoT data.
he movement of information as well as to the interaction of business processes and human worker processes that generate the informatio
mation or documents are passed from one participate to another for action, according to a set of procedural rules.
ocess or processes.
2016. It may be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environme
y be used to communicate via groups, to chat with colleagues and offers the social networks features in a corporate environment.
ting, Web experience management and content management products[2] aimed at the advertising industry and hosted on Amazon Web S
atform, Amazon Web Services (AWS), by allowing users to rent virtual computers on which to run their own computer applications.
s a virtual private cloud, by 'provision[ing] a logically isolated section of Amazon Web Services (AWS) Cloud'.
esources in a secure networking environment.
ng, is a method used in cloud computing, whereby the amount of computational resources in a server farm, typically measured in terms o
et up on the Amazon Web Services infrastructure.
ible for those devices to collect and analyze data closer to the source of information, while also securely communicating with each other o
ith cloud applications and other devices.
Web Services (AWS) that manages infrastructure deployment for cloud administrators.
nd cloud hosting.
y over the internet , as cloud hosted services.
based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies.
app and some characteristics of a pure Web app.
er's servers as opposed to being provided from a company's own on=premises servers.
e, edit, manage and restore data, services or application backup.
ng and storage are hosted by a third-party outside of the organization using them, and they are accessed over the public Internet.
ata from your internal storage to someone else's you are forced to examine closely how that data will be kept so that you remain compliant
process data, rather than a local server or a personal computer.
rules and protect information, data applications and infrastructure associated with cloud computing use.
er's servers as opposed to being provided from a company's own on-premises servers.
oud services on behalf of one or more consumers of that service via three primary roles including aggregation, integration and customizatio
CloudSuite can include highly specialized applications such as product life-cycle management, compliance management, customer relation
ly the amount of hardware, software, and support that it needs for an agreed-on monthly fee.
applications and services through a global network of Microsoft-managed data centers.
ications in the context of the Internet of Things.
vendor—public or private.
by cloud computing providers such as amazon EC2 or Force.com.
oduced by Oracle Corporation in 2012. Oracle ERP Cloud manages enterprise functions including accounting, financial management, proje
and self-service, but through a proprietary architecture.
ch as applications and storage, available to the general public over the internet.
r for best practices.
procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if
nd enterprise businesses.
ite that includes integrated functionality for financial management, sales, customer service, distribution, inventory, and manufacturing, an
an integrated platform that incorporates marketing, lead generation, sales, customer service and business analytics and provides access to
merce solution. It offers best-in-class features and functionality developed and refined over many years to provide a highly optimized eCom
partners, and employees with experts, information, and each other.
ervice and support, based on the company's CRM software for sales professionals.
efine IT services and manage IT processes in one system.
twork cabling and other passive physical infrastructure within an enterprise data center.
pport, switching fabric, and management software introduced in 2009 by Cisco Systems.
ervers, storage systems and network devices while also reducing costs for cabling, cooling, power and floor space.
uter tower by various hardware such as CPU, video card or even the hard drive.
y used by various organizations for the remote storage, processing, or distribution of large amounts of data.
rage, processing, or distribution of large amounts of data.
ge one or more facilities in order to reduce overall operating costs and reduce IT footprint.
tire infrastructure.
anages, and disseminates its data.
ets and resources in the data center to obtain a single pane view of the entire infrastructure.
rieve client-facing data. The data mart is a subset of the data warehouse and is usually oriented to a specific business line or team.
re and after the time an anticipated disastrous event occurs.
n the event of a disaster.
alities of air within a specific range in order to allow the equipment housed in a data center to perform optimally throughout its lifespan.
perature, humidity, and water leakage as well as smoke, fire, and unauthorized entry alarms.
ety or enterprise.
rise operations.
ata, human resources, and external contacts for overall effectiveness.
oblems tat take different types of compute workload that does not require to traditional facilities.
d in a single facility.
ynchronization, and providing group services. All of these kinds of services are used in some form or another by distributed applications.
re that leverages Massively Parallel Processing (MPP) to quickly run complex queries across petabytes of data.
ween businesses, rather than between businesses and consumers.
data recovery due to data loss.
xact copies of files, databases or entire computers. These programs may later use the supplementary copies to restore the original content
vior using a range of devices connected to the Internet, such as a PC, tablet, or smartphone.
are introduced into the system when data is transmitted.
that govern which data is collected, and how it is stored, arranged, integrated, and put to use in data systems and in organizations. Data is
ollecting, processing, and storing data which is obtained from a source, utilizing devices such as optical scanners, bar code readers, or mag
e object definitions like base tables, synonyms, views or synonyms and indexes.
cient use. A well-planned data classification system makes essential data easy to find and retrieve. This can be of particular importance for
or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleti
ingle destination.
evelopment within the 3rd Generation Partnership Project.
m multiple sources. The information technology market research firm Gartner promoted it in 2012.
the data and how often the occur.
improve raw data.
an electronic or mechanical device.
aning assigned to the data is not altered during the transmission.
essing or data storage.
ces into meaningful and valuable information.
over its entire life-cycle,[1] and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrie
ct in storage, transmission, or processing.
he corporate network.
nces across all consuming applications and storing devices. It ensures that the same copy or version of data is used in all devices - from sou
leansing to ensure they have data quality, that is, that they are both correct and useful.
rical storage of data coming in from multiple operational systems. It is also a method of looking at historical data that deals with issues such
use. Data that do not possess that right are not considered assets.
s, so it is necessary for DAM software to accommodate a broad spectrum of creative files.
njunction with Google Storage.
em, Chubby Lock Service, SSTable and a few other Google technologies.
of extremely large data sets in a distributed computing environment.
-based cooling that is deployed as a unit.
ite and IBM InfoSphere.
ite and IBM InfoSphere.
rt and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an
an electronic communications service indicating the geographical position of the terminal equipment of a user of a public electronic comm
dded systems and other networked devices.
mation shared across an organization. It can cover relatively static reference data, transactional, unstructured, analytical, hierarchical and m
a' is generally referred to as content data.
d to other storage architectures like file systems which manage data as a file hierarchy, and block storage which manages data as blocks wi
mming technique for converting data between incompatible type systems using object-oriented programming languages.
cally for data entry and retrieval transaction processing on a database management system.
rator can restore or recover a set of data or a particular setting from a time in the past.
nd sell products through distribution channels.
ssing tools to more easily read and write data on the grid.
h can be run multiple times to import updates made to a database since the last import.
ase system supports three important data models (key/value, documents, graphs) with one database core and a unified query language AQ
for managing data at planet-scale' launched in May 2017.
base for key/value data. Berkeley DB is written in C with API bindings for C++, C#, Java, Perl, PHP, Python, Ruby, Smalltalk, Tcl, and many oth
When searching electronic databases, you can use Boolean operators to either narrow or broaden your record sets. The three Boolean op
lications for uses including enterprise data warehousing, business intelligence, predictive analytics and business continuity planning.
use it by default. It provides the standard ACID-compliant transaction features, along with foreign key support.
ing, and managing associative arrays, a data structure more commonly known today as a dictionary or hash. Dictionaries contain a collectio
the ones used, sold or disposed of first; LIFO assumes an entity sells, uses or deposes of its newest inventory first.
bases. NetWeaver was created by SAP AG and it enables the integration of information and processes from many geographical locations.
able performance of NoSQL systems for online transaction processing read-write workloads while still maintaining the ACID guarantees of a
he tabular relations used in relational databases.
ccessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating
2001 with Oracle9i - provides software for clustering and high availability in oracle database environments.
odel database, supporting graph, document, key/value, and object models,[2] but the relationships are managed as in graph databases wi
tion such as sorting, averaging, or summing to data in the first table, typically including grouping of the data. A trivial example is a column
y-value store with optional durability. Redis supports different kinds of abstract data structures, such as strings, lists, maps, sets, sorted set
of IBM's San Jose Research Laboratory.
d by the company of the same name. The database stores JSON documents with dynamic schemas, and is designed to facilitate pushing rea
amounts of real-time data in a short time.
nce, data warehousing, and data marts
o the computer. It can be any storage device beyond the primary storage that enables permanent data storage.
ned manner.
and PostgreSQL), Sam Madden, and Daniel Abadi. It is an ACID-compliant RDBMS which uses a shared nothing architecture.
computer operating system, which share a common graphical user interface, sometime described as a graphical shell.
d run Microsoft Windows desktops that are installed at a centralized location separate from the devices from which they are being accesse
ets you replace paper and ink signature processes with fully automated electronic signature workflows.
aphics images, popular among graphic artists, the publishing industry,[1] and photographers.
on e-commerce Web sites, live chat on messaging apps, chat-bots on messaging apps or Web sites, via voice assistants.
product or service information is provided by multiple third parties, whereas transactions are processed by the marketplace operator. Onl
annels such as credit cards and debit cards for merchant acquiring banks.
onym such as platform or engine) is a subclass of information filtering system that seeks to predict the 'rating' or 'preference' a user would
f the email transport system with verifiable information about their origin.
uman intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
automate and enhance IT operations by using analytics and machine learning to analyze big data collected from various IT operations tool
gital images or videos. From the perspective of engineering, it seeks to automate tasks that a human can do.
processing, fraud detection and more.
ember 2015 by the linux foundation and supported by big industry players like IBM, Intel and SAP to support the collaborative developmen
ge, developed in IBM's DeepQA project by a research team led by principal investigator David Ferrucci.
ters can use machine vision technologies in combination with a camera and artificial intelligence software to achieve image recognition.
n to perform particular tasks, like customer service. Virtual Assistants are proliferating because of deep neural networks, machine learning
c computing with operational technology (OT) systems used to monitor events, processes and devices and make adjustments in enterprise
nd improve from experience without being explicitly programmed.
by MAXON Computer GmbH in Germany.
orlds to produce new environments and visualizations where physical and digital objects co-exist and interact in real time. Mixed reality take
f machines in a controlled manner.
r rotation, and are usually combined with audio for use in multimedia projects.
E the ledger and respond to queries by executing smart contract code the business logic that runs on the blockchain.
turn objects, often irregularly shaped, into a display surface for video projection.
gular grid of pixels, or points of color, viewable via a monitor, paper, or other display medium. Raster images are stored in image files with
like in print, on the computer, in the cinema or on TV.
jects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telem
obots or artificial intelligence workers.
onto. Side Effects adapted Houdini from the PRISMS suite of procedural generation software tools. Its exclusive attention to procedural gen
d modern communication infrastructure fuel sustainable economical development and a high quality of life, with a wise management of na
or the purpose of pre-visualizing a motion picture, animation, motion graphic or interactive media sequence.
and perception. The immersive environment can be similar to the real world or it can be fantastical, creating an experience not possible in
de the context of a live action shot in film making.
form the pillars of an enterprise architecture (EA).
mand for products and services. This can be at macro-levels as in economics and at micro-levels within individual organizations.
its 0 and 1, also called bits, which represent words and images. Digital technology enables immense amounts of information to be compre
iness or government.
aboration platform, enterprise social networking tools, a corporate intranet and the public internet.
's operations.
specializes in finding solutions for optimal use of information within organizations, for instance to support decision-making processes or d
erform basic tasks such as a workforce support, business transactions and internal services and processes.
ng mobile devices and cloud services to perform business tasks.
a re trying to accomplish, align the day-to-day work that everyone is doing with strategy, prioritize projects, products, and services, and m
vice oriented architecture.
of an organization rather than individual users.
ormation technology resources in-house but uses cloud-based services for others.
ollowed the process of video game development, as a company attempts to finish a new video game in time for shipment.
for educational, exercise, or experimental purposes.
ild and design their game.
h large numbers of players, typically from hundreds to thousands, on the same server.
such as a monitor.
input devices.
ering them directly into computer systems, without human involvement.
lder version of the same product.
lies are often used for transmitting power or informational signals and provide the power of several individual cables and organize them in
ransistors within an integrated circuit.
ard to provide a basic function within a computer. An example might be an inverter or flip-flop, which would require two or more transistor
sor (the CPU). Operations performed by the coprocessor may be floating point arithmetic, graphics, signal processing, string processing, en
nal screens.
nd storage devices to detect accidental changes to raw data.
ge format invented and developed by Philips and Sony in 1995. The medium can store any kind of digital data and is widely used for softwa
rs and standardized by the Video Electronics Standards Association.
ng edges of the clock signal (double data rate)
e and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.
more hard disks, inside a sealed unit/
es and related equipment used to develop, test, operate, monitor, manage and/or support information technology services.
are that advances or improves on existing hardware.
ommunicate with each other.
yboard that connects to and works with the computer in some way.
tting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a displ
devices together. Unlike a network switch or router, a network hub has no routing tables or intelligence on where to send information and b
hat stores energy in a magnetic field when electric current flows through it.
aking it ideal for computer vision, robotics, drones, industrial IoT, VR, AR, micro-servers and other applications that require high-end edge c
a set of contacts. When an object comes into contact with the actuator, the device operates the contacts to make or break an electrical co
affic across a number of. servers.
-end DGX Station, mid-tier DGX-1 and high-end DGX-2. These products can be used to create and train an application that would augment y
paper, usually to standard size sheets of paper.
gh contrast ratio and fast response time for sports and action movies.
eld together with an overall sheath. The assembly is used for transmission of electrical power.
ppliances, satellites, and even equipment that sits on the ocean floor.
ing devices that are turned on and off at high frequencies, and storage components such as inductors or capacitors to supply power when
or 'chip') that integrates all components of a computer or other electronic systems.
ns on screen.
ormation processing system.
ircuits through electromagnetic induction.
eractive information on a transparent surface glass.
ting properties of liquid crystals.
alysis, and recording data.
ad categories: transmitters, receivers and transceivers.
er to a computer network.
t electric signals. These wires are clipped together by ties, laces, tape or a conduit strung together or in a combination thereof.
work connections.
ms throughout their entire lifecycle.
ormer employees or contractors.
whatever the cause and ensures that users remain connected to their documents, data files and business applications.
ithout the need for setting up physical hardware, installing software or configuring for performance.
ns between them.
signed to operate as a fundamentally distinct data processing system without exchanging data or interacting with other computer data pro
accountant is an expert in the domain of accountancy, for example. The development of accounting software requires knowledge in two d
s and manages some information technology resources in-house but uses cloud-based services for others.
s from happening, to eliminate recurring incidents, and to minimize the impact of incidents that cannot be prevented.
through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools
ution and governance of integration flows connecting any combination of on premises and cloud-based processes, services, applications an
tion technology, telecommunications, and consumer technology markets.
ife cycle management and strategic decision making for the IT environment.
uter-based information systems.
in achieving their goals.
of a business.
tion can reduce or replace physical employees.
ation, often in the context of a business or other enterprise.
es and related equipment used to develop, test, operate, monitor, manage and/or support information technology services.
rastructure and applications that enable and drive the overarching business strategy and goals.
an organization's priorities and needs.
external clients and used by themselves, to run themselves as a business.
pport application deployment to internal and external customers, including the network infrastructure; server and device management; co
r invested in information technology, every resource allocated, and every application in development or production meets business goals.
he needs of business.
ion, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system.
d a strategic method for improving operations and cutting expenses.
g help for IT professionals.
developed and commercially available mobile apps used in business settings on both company-provided and bring your own smartphones
r external or internal) located in a different country from the one where the software will be used.
ware, rather than at a remote facility such as a server farm or cloud.
ich a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a brea
evice address, and a router, which forwards packets by locating a next hop address.
hat an IT department needs to do to keep their SaaS applications running effectively and securely
ment, deployment, operation and retirement of services delivered by a service provider with a view to offering a consistent service experien
r manufactures products for another company -- functions that could have been or is usually done in-house.
ontrol or source control, is the management of changes to documents, computer programs, large web sites, and other collections of inform
ssistance to users of technology products such as mobile phones, televisions, computers, software products or other informatic, electronic
and guidelines within a coherent IT architecture framework, following both formal and informal IT solution, enterprise, and infrastructure a
create a web or mobile application. Applications have two software components: client-side and server-side, also known as front-end and b
esources like systems, devices, applications, storage systems, networks, SaaS services, and more. User management is a core part to any dir
ed out via technology-mediated communication. Virtual collaboration follows the same process as collaboration, but the parties involved in
Web Services. It provides a low-cost infrastructure for the mass delivery of messages, predominantly to mobile users.
essage Service (JMS) client. It provides 'Enterprise Features' which in this case means fostering the communication from more than one clie
rriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook po
agement vendor.
on and online meetings, including instant messaging, presence, voice over IP, voicemail, file transfers, video conferencing, and web confere
ncing applications.
bile wallets are a convenient way for a user to make in-store payments and can be used at merchants listed with the mobile wallet service
obile phones to work. The aim of mobility management is to track where the subscribers are, allowing calls, SMS and other mobile phone
the direct monitoring and/or control of physical devices, processes and events in the enterprise.
are performing, along with identifying potential areas of risk 7 days a week, 24 hours a day. Monitoring can apply to applications, networks
al contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and look
with a website or client interacting with a server or cloud-based application.
t their user require in their present operating context.[1] It is generally used to achieve improvements in fields such as the establishment of
re measurement through an electrical signal. A thermocouple (T/C) is made from two dissimilar metals that generate electrical voltage in d
ct issues with complex machines, electronics, computers and software systems.
chnology. It is the upgrade for 2G and 2.5G GPRS networks, for faster internet speed.
em must provide capabilities defined by ITU in IMT Advanced. Potential and current applications include amended mobile web access, IP t
oposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.[
the Internet Protocol.
onnect to I and, as a result, optimize their functioning as well as that of other applications or systems that they control.
and interface methods used by hosts in a communications network.
data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem
nteractive multimedia software titles. Authoring systems can be defined as software that allows its user to create multimedia applications f
rk, or backbone network and the small subnetworks at the 'edge' of the entire hierarchical network.
e geographic locations of the user, the origin of the webpage and the content delivery server. CDns also provide protection from large surg
t is deemed objectionable.
ciated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ('d
ver a computer network and usually takes action by blocking, re-routing, or logging it accordingly.
tion on a person's computer desktop through a graphical Terminal emulator.
DP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a
ocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
uter to a modem for Internet access.
mability with physical hardware to create carrier class virtual services and functions.
uses twisted pair copper telephone wire.
sists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics has several a
nes and provides speeds of 1000Mps, which is also referred to as 1Gbps or Gigabit internet.
s per second. GBPS is commonly used to measure data transfer speeds between hardware devices.
y that enables transactions between travel industry service providers, mainly airlines, hotels, car rental companies, and travel agencies.
ographical area.
r political message. The person who carries out the act of hacktivism is known as a hacktivist.
ity to balance traffic across two WAN links without using complex routing protocols like BGP.
w or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble.
ame, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of c
nage, control and monitor one or more networks. The overall function is to maintain optimal network operations across a variety of platform
nment. It is considered an important component of effective information systems management.
cess to traffic from across the network.
er network by using packet switching to receive, process, and forward data to the destination device.
uter systems over packet-switched, variable-latency data networks.
etwork. Network topology is the topological structure of a network and may be depicted physically or logically.
he purpose of performance, security and/or general network operations and management.
chnology infrastructure, focusing on cost reduction, performance improvement, and cloud enablement.
the terminals.
visibility, and acceleration.
hat started as a technology consulting firm.
a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous syste
) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
onnected by optical fiber links, able to provide the functionality of transport, multiplexing, switching, management, supervision and surviv
net access to an outdoor area.
es a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for t
k operational activities through the use of remote devices known as monitors or probes.
over an unsecured network.[1] The best known example application is for remote login to computer systems by users.
ations for converting between serial data and parallel interfaces in both directions.
Common Internet File System (CIFS, /s?fs/), operates as an application-layer network protocol mainly used for providing shared access to fi
VoIP) networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down
multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well a
sion. First defined by RFC 821 in 1982, it was last updated in 2008 with Extended SMTP additions by RFC 5321, which is the protocol in wid
nd organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices th
s are typically deployed to densify or increase the capacity of the overall network. Small Cells are typically installed on a very smal area su
nitialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality.
which are used to connect enterprise networks - including branch offices and data centers - over large geographic distances.
zed protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitti
ering data into, and displaying data from, a computer. In networking, a terminal is a personal computer or workstation connected to a main
der type of terminal so that a user can access programs originally written to communicate with the other terminal type.
nt occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.
such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's prese
nternet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, computer applicati
nd transmits real-time data via satellite.
(VDSL2)[2] are digital subscriber line (DSL) technologies providing data transmission faster than asymmetric digital subscriber line (ADSL).
the data link layer. LAN is the abbreviation for local area network and in this context, virtual refers to a physical object recreated and altere
ter-aided design (CAD), computer-automated design (CAutoD) and computer-aided engineering (CAE) software to validate a design before
CP client for Microsoft Windows. Its main function is secure file transfer between a local and a remote computer.
lysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark
ating most of the manual labor involved with adding them to a network.
rent network resources in a unified manner.
rogramming to align it more closely with current business needs.
ee, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux
ware devices such as networking routers and switches. A command-line interface governs a series of trains defined as tools for delivering
stributed system built upon the Apache Mesos project.
after they're deployed. If something needs to be updated, fixed, or modified in any way, new servers built from a common image with the a
hanisms an operating system provides to allow the processes to manage shared data.
eased in 2010. The app, in its original incarnation, was deprecated in 2015 and integrated into LinkedIn.
, the proprietary Cocoa and Carbon runtime environments, and a host of open source, Web, scripting, database and development technolo
le Inc.'s desktop and server operating system for Macintosh computers.
graphical user interface (GUI), multitasking functionalities, virtual memory management capabilities, and support for several peripheral de
plications, and controlling peripherals.
Inc.'s desktop and server operating system for Macintosh computers.
.'s desktop and server operating system for Macintosh computers.
Inc.'s desktop and server operating system for Macintosh computers.
erating system or software application to gain elevated access to resources that are normally protected from an application or user.
plications that process data as it comes in, typically without buffer delays.
m administrators to deploy and manage Red Hat Enterprise Linux hosts.
ary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.
ssor Architecture-based processors as well as for Intel-based processors.
part of the Microsoft Surface family. The Surface Hub is a wall-mounted or roller-stand-mounted device with either a 55-inch (140 cm) 108
V digital media player. tvOS was announced on September 9, 2015 at the Apple September 2015 event, alongside the 4th generation Apple
lming Windows 8.
ly of operating systems.
tion. It is used for creating and using maps, compiling geographic data, analyzing mapped information, sharing and discovering geographic i
ting software can be implemented completely or partly as library, as computer application, as Web application or as a loadable kernel modu
of the value of a mathematical function is proportional to the function's current value, resulting in its value at any time being an exponenti
ctive fires. It involves the study of the behaviour, compartmentalisation, suppression and investigation of fire and its related emergencies,
er when the effects of a fire have been detected, such as when a predetermined temperature has been exceeded.
ain number of outputs that meet certain constraints, and a designer that will fine tune the feasible region by changing minimal and maxim
aphical data.
ation, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world.
namic range. The term is often used in discussing display devices, photography, 3D rendering, and sound recording including digital imaging
human-machine interactions. The interface consists of hardware and software that allow user inputs to be translated as signals for machin
es to draw one in, transport them to another place, and enhance an everyday experience to make it more realistic, engaging, and satifying.
and transmission of information or data and the systems and processes used for those purposes.
d metadata from creation and initial storage to the time when it becomes obsolete and is deleted.
content is content that requires the participants' active engagement more than simply reading or watching. In return for that engagement
ottery tickets to consumers after money or a credit card is inserted into the machine.
MF tones input via keypad.
d by applications made by autonomous companies in the periphery.
nce, enterprise rick management and corporate compliance with regard to regulatory requirements.
is reasonably anticipated.
ulsed laser light and measuring the reflected pulses with a sensor. Differences in laser return times and wavelengths can then be used to m
s and GPS systems, and thus aid machine operators to e.g. control the position of a road grader's blade
tic services, supply chain management, fleet management and telemedicine.
f a part of the surface of the Earth.
ess of separating commercially valuable minerals from their ores.
or the mobile ecosystem including mobile-influenced industries. It was founded in 2003 by ARM, Intel, Nokia, Samsung, STMicroelectronics
d with a range of photographic, radar, laser, LiDAR or any number of remote sensing systems.
requirement to attribute and share alike.
action in Linux as a key element of open source software. OIN acquires patents and licenses them royalty-free to its community members
ific topic area.
vering the exact positions of surface points.
d of paperless picking, putting or sorting and assembling products.
nd consulting services. Before you can make your own app or service publicly available to potential customers, you must be a Salesforce pa
y that allow data to be exchanged between the product and it environment, manufacturer, operator/user, and other products and systems
ditionally implemented in hardware are instead implemented by means of software on a personal computer or embedded system.
ertain risks associated with utility mapping at appropriate quality levels, utility coordination, utility relocation design and coordination, utilit
omputer systems and all related services are working well.
proposed by NHK Science and Technology Research Laboratories.
tructure management available to the customer as needed, and charges them for specific usage rather than a flat rate.
or the warehouse and distribution center (DC).
cking orders through a headset.
a touch. You'll get enterprise-grade security without having to type in a password.
nd output of text, often plus other features.
e for your business. This could mean everything from your business cards or the flyers at your local gym to the magazine you read during th
other documents) are not printed until the company receives an order, allowing prints of singular or small quantities.
nted information.
can be considered to be a number of satellites with coordinated ground coverage, operating together under shared control, synchronized s
tain all the essential information about the data without compromising its security.
ay be tailored to fit the unique data warehouse/business intelligence (DW/BI) project demands found in your organization.
t the life-cycle of the project, close collaboration between the development team and business side, constant communication, and tightly-k
and manage all your agile software development projects from a single tool.
tion and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability.
urable human interaction (as in architectural blueprints, engineering drawings, business processes, circuit diagrams, and sewing patterns).
d practitioner certification programme. PRINCE2 emphasises dividing projects into manageable and controllable stages.
zation, is an activity of customizing a product to meet the needs of a particular customer.
very broad concept, it is essentially the efficient and effective generation and development of ideas through a process that leads to new pr
products through distribution channels.
inception, through engineering design and manufacture, to service and disposal of manufactured products.
planning, forecasting, and production, or marketing of a product or products at all stages of the product lifecycle.
d monitor the project they are working on. This collaborative process works across departmental, corporate and national boundaries and h
he work of a team to achieve specific goals and meet specific success criteria.
esources of the organization will perform the work and the timeframes in which that work needs to be performed.
asibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential.
ally by means of attention to every stage of the process of delivery or production.
ed to expedite software application development.
part or assembly using three-dimensional computer aided design data.
greeing on requirements and then controlling change and communicating to relevant stakeholders.
aluate the project and obtained experience, which can be used in the next project.
e-base of integrated patterns intended for enterprise-scale Lean-Agile development.
or managing product development.
ns throughout the product lifecycle, from planning and development through manufacturing and support.
e software bugs.
ss) and aimed at developing tools and test equipment and procedures, and at providing solutions to specific technical problems.
y testing it on users. This can be seen as an irreplaceable usability practice, since it gives direct input on how real users use the system.
quential stages and a fixed plan of work.
n application, as opposed to its functionality.
iverable-oriented breakdown of a project into smaller components.
r libraries. The framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces an
n for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human ope
authentication and authorization services.
nging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
antic query language for databases, able to retrieve and manipulate data stored in Resource Description Framework (RDF) format.
Inc. for iOS, macOS, watchOS, tvOS, and Linux.
such breach of law, thereby helping in the prevention and mitigation of fraud-related activities.
he Time-based One-time Password Algorithm and HMAC-based One-time Password Algorithm, for authenticating users of mobile applicatio
s digital keys for strong authentication and provides cryptoprocessing.
use it for one's own purposes.
rating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.
the right individuals to access the right resources at the right times and for the right reasons'.
ting and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restr
a person for the purpose of account opening or issuing credentials to that person.
dentity information for principals while providing authentication services to relying party applications within a federation or distributed net
, especially electronic data, or the measures taken to achieve this.
anization, such as employees, former employees, contractors or business associates, who have inside information concerning the organizati
acks over the Internet.
tems for malicious activity or policy violations.
eats and respond to them swiftly.
ng (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being
which seeks to prove the identity of someone accessing a service, such as a financial institution or website.
and property through a hosting websites.
mpact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor.
, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
r to spread the bug onto other people's devices and profiles.
m vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing s
alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-m
detect and respond to cyber-attacks.
n with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and
grams in a separate environment so that if errors or security issues occur, those issues will not spread to other areas on the computer.
ct developer did not intend to introduce and should fix once it is discovered.
rception of a threat in order to manipulate users into buying unwanted software.
and a browser.
etworked data communications and graphical user interfaces for high-level process supervisory management, but uses other peripheral de
on of voice communication over a range of communication types such as radio, telephone or IP.
ng an internal network of an organization.
es difficult to process using on-hand database management tools or traditional security data processing applications.
involved in a certain scenario or environment.
ces into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their o
cess of executing these tasks, such as scanning for vulnerabilities, without human intervention.
ent manager can be measured.
es, networks and/or devices by bypassing their underlying security mechanisms.
d in the field of information security to denote the fact that after performing a qualified analysis of necessary features of the system, the sy
of It components is formalized and subsequently verified against the actual state of security configurations.
service indicating that a security policy may have been violated or a security safeguard may have failed.
serve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
ts and services combine security information management and security event management.
inside threats as well as the processes, policies and tools designed to gather and analyze that information.
ment, documentation, and implementation of policies and procedures for protecting these assets.
ecurity data to provide reporting, analysis and management capabilities to support operational security teams.
anizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data proces
ty systems. It is the connected layer that streamlines security processes and powers security automation.
ty to hacking or viral infection.
olution of the payment card industry data security standard.
tems and ecosystems and the data that resides on these systems.
serious harm to a computer system.
re that provides security for a computer or network.
s to sensitive data should be safeguarded. Protection of sensitive data may be required for legal or ethical reasons, for issues pertaining to p
requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
protect and safeguard information.
atic way. The treats that threat intelligence attempts to defend against include zero-day threats, exploits and advanced persistent threats (A
IBM and Oracle to encrypt database files. TDE offers encryption at the file level.
hibited from use by the Internet Engineering Task Force (IETF) are cryptographic protocols that provide communications security over a co
on' that requires not only a password and username but also something that only, and only, that user has on them.
uters, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
ces which integrates a range of security features into a single appliance.
ft's Windows Vista[1] and Windows Server 2008 operating systems, with a more relaxed[2] version also present in Windows 7, Windows Se
of insider threats, targeted attacks, and financial fraud.
's vCloud Networking and Security and Nicira Network Virtualization Platform intellectual property.
es, and classifies the security holes in a computer, network, or communications infrastructure.
tigating vulnerabilities, particularly in software.
er system. Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers att
application. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regu
orized access and modification.
all of it should not be displayed to the user.
a webpage. These are typically the work of defacers, who break into a web server and replace the hosted website with one of their own.
erability on the same day that the vulnerability becomes generally known.
wall products. ZoneAlarm was developed by Zone Labs, which was acquired in March 2004 by Check Point.
ene project. Its major features include full-text search, hit highlighting, faceted search, real-time indexing, dynamic clustering, database inte
Although initially available both as an on-premises and cloud computing service, in May 2016 it was announced that the cloud version wou
uction capacity of a company.
s whose computers are attached to the LAN to send and receive fax messages.
la Server. Client binaries are available for Windows, Linux, and macOS, server binaries are available for Windows only. Both server and clien
ker model ported from Ruby's Unicorn project. The Gunicorn server is broadly compatible with a number of web frameworks simply imple
server for TCP and HTTP-based applications that spreads requests across multiple servers.
est enterprises and service providers, for instant application provisioning and high levels of service.
puter to improve searching performance on PCs and corporate computer networks.
and workstations.
rver created by Microsoft for use with the Windows NT family.
-human part of software development process, with continuous integration and facilitating technical aspects of continuous delivery.
affic across a number of servers. Load balancers are used to increase capacity and reliability of applications.
oftware, ranging from an enterprise-class machine providing video on demand, to, more commonly, a small personal computer or NAS (Ne
p. The goal is to integrate all of the server motherboard functions onto a single microchip, except DRAM, boot FLASH and power circuits.
mate business processes, through the use of adapters which are tailored to communicate with different software systems used in an enterp
ng, requirements management, project management, automated builds, lab management, testing and release management capabilities.
ent and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking.
local-area network.
operating systems.
omputing server.
ervice in a network.
Management Server (SMS)[2] is a systems management software product developed by Microsoft for managing large groups of computers r
rial interface to a local area network (LAN).
pecialized software.
n made by Autodesk.
on of access to a place or other resource.
nd delivering essential quality products.
r data science and machine learning related applications, that aims to simplify package management and deployment.
Software Foundation written in Scala and Java. The project aims to provide a unified, high-throughput, low-latency platform for handling re
of text within document files.
ns of distributed or otherwise scalable matching learning algorithms focused primarily in the areas of collaborative filtering, clustering and
application availability, security, visibility, and acceleration.
ware is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones.
software applications.
or update of an application from development, across various environments, and ultimately to production.
achine code.
s are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attrib
onsistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throug
ommand processing options.
rmation , such as names, addresses and telephone numbers.
ort cycles, ensuring that the software can be reliably released at any time. It aims at building, testing, and releasing software faster and mor
copies to a shared mainline several times a day.
cess in a single cloud-based platform that works on both Mac and PC.
sers the freedom to run, study, share and modify the software.
t with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typ
o engage in collaborative computer programming.
y preliminary design intent in a real-world, contextual environment, increasing stakeholder buy-in and team decision-making made by Auto
g multiple servers.
facilities to computer programmers for software development.
mputer systems.
evices, such as personal digital assistants, enterprise digital assistants or mobile phones.
any Unix-like systems as well as on Microsoft Windows, and includes its own declarative language to describe system configuration.
presentations, and responses to RFPs.
by Autodesk.
m working.[1] SPOFs are undesirable in any system with a goal of high availability or reliability, be it a business practice, software applicatio
cit context dependencies only.
are, part of the larger cross-disciplinary field of configuration management.
eneral deployment process consists of several interrelated activities with possible transitions between them.
ntended to accomplish goals, using a set of primitive components and subject to constraints.
ncluding the research, design, programming, and testing of computer software.
g fixing involved in creating and maintaining applications and frameworks resulting in a software product.
allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game
e software development process.
her, minimizing reengineering.
a business context. This involves both the functional quality and the structural quality of the software.
nder the control of software with no operator or human intervention.
es that compose the system and its boundary. More generally, the system configuration is the specific definition of the elements that defin
cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, tes
e to manage employees as a competitive advantage.
esting, tracking, and reporting.
e in the field of software engineering, that is intended to provide a standard way to visualize the design of a system.
use of input devices and software.
rations well organized.
ical user interface to choose and modify preselected sections of code written in the BASIC programming language.
vers and are delivered to the user's device over the Internet.
nstead of spinning hard disk drives.
d to take advantage of solid-state memory technology.
on EC2 instances. These block devices can then be used like any raw block device.
tvOS 10.2 and later, and watchOS 3.2 and later, developed and deployed by Apple Inc.
e, typically external to the computer system and having a greater storage capacity.
integrate with cloud-based platforms such as Internap, Amazon EC2, Google Cloud Platform, Oracle Cloud, OpenStack, SoftLayer, Microsoft
computer or device.
mpany and used to guide management decisions.
sed to storage accessed over a computer network.
ectronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks.
onents into a single logical unit for the purposes of data redundancy, performance improvement, or both.
e organization.
a USB or Firewire connection, or wirelessly.
hannel frames over Ethernet networks. This allows Fibre Channel to use 10 Gigabit Ethernet networks (or higher speeds) while preserving
f business activities and the records they generate and grouping them, if applicable, into files to facilitate retrieval, description, control, lin
transferring it to or from a computer, digital camera, etc.
an extended period of time.
code that cannot be deciphered easily by unauthorized people.
applications. It employs a NameNode and DataNode architecture to implement a distributed file system that provides high-performance ac
e of the company developing the product. The Hazelcast company is funded by venture capital.
a backup device.
e measurement used to characterize computer storage devices like hard disk drives (HDD), solid state drives (SSD), and storage area netwo
computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The con
retain data. An important goal of NAND flash development has been to reduce the cost per bit and to increase maximum chip capacity so t
Greenplum Database.
e code currently being used. A random-access memory device allows data items to be read or written in almost the same amount of time i
sers, arrangers, performers, and producers of music.
f disk space can be expanded through the addition of devices in connected arrays with their own resources.
storage device that is an alternative to a hard disk.
to what appears to be a single storage device that is managed from a central console.
storage device which contains one or more tape drives, a number of slots to hold tape cartridges, a barcode reader to identify tape cartridg
here, from any device. Unlike files in My Drive, files in a Team Drive belong to the team instead of an individual.
A, or virtual receptionist) allows callers to be automatically transferred to an extension without the intervention of an operator/receptionis
hony device that answers and distributes incoming calls to a specific group of terminals or agents within an organization.
to ARPU, is a measure used primarily by consumer communications, digital media, and networking companies, defined as the total revenu
usiness model, allowing the tracking of phone calls to be associated with performance-based advertising.
technologies.
nventional business telephone equipment, such as Private branch exchange, with third-party VoIP service.
ch as a wire or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networkin
tronically for example, a telecommunications service provider.
etworks, transmission systems, relay stations, tributary stations, and data terminal equipment usually capable of interconnection and intero
n name for any technology that allows interactions on a telephone and a computer to be integrated or coordinated.
ports 2G, 3G, 4G and future wireless communication standards.
companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of netwo
a transfer to an existing cable TV system. It is employed by many cable television operators to provide Internet access over their existing hy
medium that provides wireless service within a geographic area or structure. DAS antenna elevations are generally at or below the clutter
re a medium in order to propagate, unlike mechanical waves such as sound and vibrations.
rs can read the messages. In principle, it prevents potential eavesdroppers including telecom providers, Internet providers, and even the p
patchers the location of callers to 911, the universal emergency telephone number in the region.
ers and related devices across departments and workgroup networks, facilitating insight and data accessibility.
ss telecommunications networks.
o connect the remote radio head (RRH) to the base station in new antennas, or retrofitted in existing ones, to replace all or part of the coax
perator's switching equipment all the way to a home or business, thereby replacing existing copper infrastructure such as telephone wires a
the customer premises, with the final connections being copper. FTTN is often an interim step toward full FTTH and is typically used to del
er to provide all or part of the local loop used for last mile telecommunications.
r a cable television system. The headend facility is normally unstaffed and surrounded by some type of security fencing and is typically a bu
nd managed by a third-party service provider.
or commercial buildings.
echnology (IT) which stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wirele
fax machine.
al framework for delivering IP multimedia services. Historically, mobile phones have provided voice call services over a circuit-switched-styl
ched connections to exchange voice, fax, and other forms of information that have traditionally been carried over the dedicated circuit-swit
periodic signal, often in relation to a reference clock signal.
ore locations provide in exchange for a monthly rent.
00 and 1,000 miles above the earth's surface.
VoIP calls are properly terminated to the PSTN.
at allows the connection of smartphones, tablets, and other portable consumer electronics devices to high-definition televisions (HDTVs) a
ompany, Etihad-Estisalat consortium.
tent to and from a mobile phone over a cellular network.
mmunications networks.
field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each oth
communication facilities, which can integrate fiber splicing, fiber termination, fiber optic adapters & connectors and cable connections toge
e end consumer, both domestic and commercial. A PON's distinguishing feature is that it implements a point-to-multipoint architecture, in
acceptance of an incoming call through the final disposition of the call.
e branch exchange system utilized by large businesses.
ommunication signal or overall quality of service. It is mainly used to control the transmitting power of a communication device to achieve
r AC electric power transmission or electric power distribution to consumers.
n local lines while allowing all users to share a certain number of external phone lines.
re it pays a service fee for.
to allow it to provide (new) services to its users.
ne networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecomm
ulti-megahertz range. RF connectors are typically used with coaxial cables and are designed to maintain the shielding that the coaxial desig
ur without transmission delays. RTC is nearly instant with minimal latency.
nd putting the PHY circuit at the end of a network.
eless interface. The RRH contains the base station's RF circuitry plus analog-to-digital/digital-to-analog converters and up/down converters.
and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling, a
VoIP) networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down
nitiation Protocol by which Internet telephony service providers deliver telephone services and unified communications to customers equip
et via a computer.
ists of a number of standardized smaller elements (hence structured) called subsystems.
e communications and multimedia sessions over Internet Protocol networks, such as the Internet.
nd deals with start ups and extensions to their networks.
ion or country.
in the target market.
ent such as text, multimedia, ebooks, or apps into a different (target) language by simply substituting words from one language to anothe
ng and managing expensive video conferencing systems, providing immersive telepresence opportunities for agencies on a pay-as-you-go b
onsists of video clips, tb shows, and movies streamed on the internet.
onvert, store and play back video content on the Internet, often via a structured, large-scale system that can generate revenue. Users gener
e the appearance of being present, or to have an effect, via telerobotics, at a place other than their true location.
bilities over an IP network by a managed service provider.
ent server, is a component of a security camera system that in general: Collects video from cameras and other sources; Records / stores tha
ubscriptions or pay-per-view.
onsumer viewing experience by reducing video start times or rebuffering events.
ptical discs, as well as from files of appropriate formats such as MPEG, AVI, RealVideo, and QuickTime.
cation channel.
n real time or download programs and view them later.
age guest operating systems.
er to automate a process, or synchronize data in real-time.
s containerization.
free and open-source hypervisor for x86 computers currently being developed by Oracle Corporation.
perating system, a server, a storage device or network resources.
ch one performs better
o create asynchronous Web applications.
headquartered in the US.
ity level and/or posture of a Web application.
main Name System (DNS) used to specify that a domain name is an alias for another domain (the 'canonical' domain).
our full guide to content syndication and get started.
on a web page to be requested from another domain outside the domain from which the first resource was served.
data using various protocols.
eir local area networks with the public internet and streamline the performance of their wide area network.
of attribute value pairs and array data types (or any other serializable value)
Web 2.0 community sites
ddle (MITM), is a proxy Trojan horse[1] that infects a web browser by taking advantage of vulnerabilities in browser security to modify web
e page itself, but only in the page's code. We all know tags from blog culture, and meta tags are more or less the same thing, little content d
s 10 Mobile and Xbox One, replacing Internet Explorer as the default web browser on all device classes.
d running rich Internet applications, similar to Adobe Flash.
ailable articles, methodologies, documentation, tools, and technologies in the field of web application security.
to audio, video, and other media transmitted via the Internet as a standalone product.
brand. The purpose of an online portfolio is to give a prospective client, like an art director, a sense of who you are, what you can do and w
o another network.
an communicate with a wired network.
eless connection.
nstallations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.
ess networks.
evices through radio frequency signals rather than through end-to-end wire communication.
ng the transfer of genes within and across species boundaries to produce improved or novel organisms.
opportunity to flourish.
n-producing proteins that are non-harmful to humans.
disadvantage.
o perform sterilization and in the chemical industry to cure coatings and vulcanize rubber and for hydrothermal synthesis.
by cooling to very low temperatures.
rials, and electronic devices and components.
organic or inorganic substances.
rature-sensitive reactions, including restriction enzyme digestion or rapid diagnostics.
used as a substitute for one of the burners from an oven range or a kitchen stove.
individual customization.
ving electromagnetic waves) and respond by producing an electromagnetic signal with a frequency characteristic of the magnetic field at th
Applications of GC-MS include drug detection, fire investigation, environmental analysis, explosives investigation, and identification of unk
ppq) on non-interfered low-background isotopes. This is achieved by ionizing the sample with inductively coupled plasma and then using a
mass spectrometry.
t') of the charged particles.
d product to be unsafe and designs measures to reduce these risks to a safe level.
bial cultures are foundational and basic diagnostic methods used extensively as a research tool in molecular biology.
n mammals, including tuberculosis and leprosy in humans.
or the innovation of products and services within business and social contexts.
t or at a more disaggregated level, for specific sectors of the economy or even specific firms.
levels of integration that balance the benefits of vendor-delivered integration against business flexibility and agility.
ng methods commonly associated with banks or other private investors, such as loans, loan guarantees, linked deposits, and even equity in
-on-investment' (ROI) metrics because marketing is not the same kind of investment.
costs, process improvements or efficiencies, culture change, increased profitability, increased word of mouth, increased conversion, and m
zed organizational structure are more flexible and open to change.
t goods from the manufacturer or producer to a market, customer or final point of distribution.
s of the organization.
ational risk. Treasury Management includes a firm's collections, disbursements, concentration, investment and funding activities. In larger
ers in a particular environment and related to a particular goal.
nation, organization, and attention to detail in order to move the pickers through warehouses smoothly so they can fill the greatest number
mailing address. ... Credit card AVS does not determine deliverability of an address.
identity and use that identity to establish lines of credit with banks or retailers.
egotiate, support and manage effective contracts are often expensive to train and retain.
ss self-regulation where a corporation assess and takes responsibility for their effects on environmental and social well being.
son's actions do not meet this standard of care, then the acts are considered negligent, and any damages resulting may be claimed in a law
W is to define the liabilities, responsibilities and work agreements between two parties, usually clients and service providers.
ative dashboard, develop merit matrices, and report on company compensation data.
e GPO members.
ds. Simply put, this organization is tasked with setting up qualified meetings between a salesperson and a potential buyer with a high proba
s can base their forecasts on past sales data, industry-wide comparisons, and economic trends.
he value that drives your customers to make decisions. As a result, it enables your salespeople to have sales conversations that are focused
r time selling to sales-ready prospects that have been qualified by sales development reps.
with its sales, marketing and advertising managers.
arketing more profitable services or products,[1] it can be simply exposing the customer to other options that were perhaps not considere
n of affordable aerospace warfighting technologies, planning and executing the Air Force science and technology program, and provide war
atform Drupal.
ytics services. Birst scales from individuals to the enterprise in a manner that is smart, connected, and scalable.
eting, and education administration.
ngine and is the only company capable of web-wide, real-time measurement of digital content engagement across all digital channels, inclu
archlight, a cloud-based content intelligence platform that collects global search data to provide insights into what people search for online
ow-latency, high-throughput, fault-tolerant publish and subscribe pipelines and is able to process streams of events. Kafka provides reliable
ments, Western Union Business Solutions is transforming how businesses can expand globally through one of the largest and most diverse p
cal, fraud prevention, and banking infrastructure required to operate on-line payment systems.
age that competes with such systems as Blackboard Learning System, Moodle, D2L and Sakai Project.
those who plan and attend them, ” the company has created a collaborative web-based event planning platform.
mercial banking, securities brokerage, asset management, mortgage, and insurance products and services.
1(k) plans, and other benefits matters.
ctions between merchants and customers. First Data serves customers worldwide.
on in deposits, operates about 650 retail banking offices and over 2,000 ATMs, and employs approximately 9,800 people. It offers an array
surance exchange and subsidiaries offering banking, investing, and insurance to people and families who serve, or served, in the United Sta
h on the list of largest banks in the United States. The company provides banking, investment, mortgage, trust, and payment services produ
the United States. The company provides banking, investment, mortgage, trust, and payment services products to individuals, businesses,
tional aspects of procurement - eProcurement, eInvoicing, Spend Analysis, eSourcing, Contract Management, Supplier Management and Fi
e United States.
es, ambulatory surgery centers, clinical laboratories and physician offices worldwide.
XT, a technology that improves cancer detection, diagnosis, and treatment; and Digital Pathology Cockpit, a multi-screen configuration with
Utah and Idaho and also offers integrated managed care under the insurance brand SelectHealth.
of the hospital; push lab results through instant alerts and notifications; and receive real time telemetry and nurse call alarms along with p
ment systems to the healthcare industry.
porting, as well as services for benefits that include medical, vision, and dental insurance.
ndustries. It also offers professional services, including human resource and management consulting, outsourcing, recruitment, career tran
e worldwide.
ertification services.
rance coverage.
ong-term care, and disability plans
hield Association.
gement consulting
ing. It offers truckload, less than truckload, air freight, intermodal, and ocean transportation.
repair and operations, infrastructure and power and specialty construction sectors.
mer markets.
a communication systems, aerospace, defense, medical, oil and gas, consumer electronics, energy and subsea communications.
e, events, and a range of marketing services through which it provides information, insight, and analysis for IT managers and professionals,
mpany's claims by over 90% of all Internet service providers. The company's products are used to protect networks from denial-of-service a
ent solutions.
struction industry.
security management.
ays that locally encrypt sensitive information before it is stored in cloud environments.
m, CarRentals.com, CheapTickets (Expedia's only provider of event tickets), trivago, Venere.com, Travelocity, Orbitz, and HomeAway.
ndling, fasteners, plumbing, tools, and safety supplies, along with inventory management services and technical support.
ers in London, UK.
ents: Homeland Security Investigations (HSI) and Enforcement and Removal Operations (ERO).
ne unified platform including DNS, DHCP, and IPAM (DDI).
ty of legal and journalistic documents.
other systems.
granular control of user activity in cloud computing, mobile and Internet of things environments.
r on the vision of a Self-Operating Network that delivers log scale improvements in CapEx, OpEx and capacity.
omputer products.
Appointment Booking, Events Management, Queue Management, Call Center and Insights with a scheduling engine at its core.
cking an organization.
x software with its experience in software quality and size (automated function points counting) measurement technology and expertise as
eeting site selection, online event registration, event management, email marketing, and web surveys.
rvers, data storage devices, and other network and cloud resources.
es, such as public cloud, private cloud, and recovery cloud services.
rs a customer identity management platform for managing profiles, preference, opt-in and consent settings
curing data across three main areas: databases, file systems, and web applications.
d balancing and failover services.
computing as a service.
any provides software for small business management and payroll processing, personal finance, and tax preparation and filing.
ebcasting, and social media solutions
trumentation software. Common applications include data acquisition, instrument control and machine vision.
achines, check processing systems, barcode scanners, and business consumables.
achines, check processing systems, barcode scanners, and business consumables.
enter management.
se data warehousing, business intelligence, predictive analytics and business continuity planning.
es of a phone call that helps identify the uniqueness of a device and attaches it to a caller.
ement, multi-factor authentication, and single sign-on tools for its clients.
tion in 2011.
ment, edge computing, Wi-Fi and wide area networks (WANs), including SD-WAN and WAN optimization.
ting, Wi-Fi and wide area networks (WANs), including SD-WAN and WAN optimization.
network security.
on for digital ad fraud detection and is the leading authority on the global cost of ad fraud as a result of its ground-breaking reports with A
wners, managers, investors and other stakeholders access to information specific to their needs.
e services, including fiber and bandwidth connectivity, colocation and cloud services. Zayo's primary customer segments include data cente
nd TruePosition, Inc
painting. This means that commercial painting in Wellington is more demanding than household painting.
m to make professional judgment, about whether a building meets building code requirements.
f steel or concrete.
c management and enable various users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.
ral buildings within one complex.
d, in contrast to underground mining, in which the overlying rock is left in place, and the mineral removed through shafts or tunnels.
bution system.
often centered on reducing operational costs, though this is not always the main goal.
VAC and lighting control systems, building simulation and modeling, carbon and sustainability reporting, IT equipment management, dema
-system devices.
ell (known as pump or velocity string) or by decreasing the weight of the hydrostatic column by injecting gas into the liquid some distance d
video games, and animated movies, simulators, TV special effects and design visualization.
gs[1] and nonbuilding structures, to develop designs and integrate their design with that of other designers, and to supervise construction
but are commonly used wherever high strength-to-weight ratio and rigidity are required, such as aerospace, automotive, civil engineering,
erformance is deteriorating.
posite indicator that measures the short-term changes in the volume of production of a basket of industrial products during a given period
entory, including reducing demand variability, improving forecast accuracy, reducing lead times, etc.
ng processes.
g for production management, performance analysis, quality and compliance, and human machine interface (HMI).
t the result is expressed as a percentage. This percentage can be viewed as a snapshot of the current production efficiency for a machine, li
e structure is to be located.
e likelihood of it failing. Preventive maintenance is planned so that any required resources are available.
izing throughput and/or efficiency.
order to serve different customers.
lines, or robotic devices, or any activity that requires high reliability control and ease of programming and process fault diagnosis.
tics the subjects can be separated by physical distance (e.g., Earth-Moon).
s chemicals to which they are exposed, by means of a hazard communication program, labels and other forms of warning.
etailer, or a wholesaler, who then ships the goods directly to the customer.
ommerce companies and smaller businesses often hand over that aspect of the business to companies that specialize in fulfillment.
s are outsourced for the purpose of fulfilling customer orders.
An OMS provides constantly updated inventory information, a database of vendors, a database of customers, a record of customer returns
nance and to predict and aid delivery.
n be described as a coordinated system of preparing goods for transport, warehousing, logistics, sale, and end use. Packaging contains, pro
clude microwaves.
sheet layers of copper laminated onto and/or between sheet layers of a non-conductive substrate.
pected behavior.
ttendees need, such as schedules, maps, attendee information, exhibitor information, speaker bios, and more.
hnologies and business models to the latest trends in consumer behaviors, preferences and expectations.
ecutives to discuss how alignment between their disciplines can solve business problems.
al ledger, payroll, and trial balance.
will exist for only specified items of tangible capital expenditure, and the expensing is usually spread over a fixed period of years.
usiness model.
monly used to describe a variety of small business financing options characterized by short payment terms (generally under 24 months) and
over time, in monthly increments.
are exchange (marketplace) in the tax year. It can be paid in advance directly to a healthcare insurance company to offset the cost of month
n as a Form DEF 14A (Definitive Proxy Statement), with the U.S. Securities and Exchange Commission.
lculations of two components of risk (R): the magnitude of the potential loss (L), and the probability (p) that the loss will occur.
e used in full cost accounting or even ecological economics where it includes social costs.
ock or indebtedness.
new products, and research development projects are worth the funding of cash through the firm's capitalization structure (debt, equity or
of some type or, sometimes, a limited partnership) created to fulfill narrow, specific or temporary objectives.
ements of the funding source. It is the phase of the grantsmanship process that begins when an applicant signs an agreement with a grant
ust a monthly fee/rate, as applied on a loan, mortgage loan, credit card, etc.
d as payment in full.
nclude principal, taxes, fees, and insurance premiums as well.
or tax deduction.
n assignment.
pes of clients.
egrated research, expert guidance, news, productivity tools and more
ge for convertible debt or ownership equity. A small but increasing number of angel investors invest online through equity crowdfunding o
ure capital firm, or brokerage house manages on behalf of its clients and themselves.
lude interest payments on the fund's underlying securities plus periodic realized capital appreciation.
nvestment value if you assume that the investment has been compounding over the time period.
n foreign currency.
nal proportions.
onsistently on a risk-adjusted basis since market prices should only react to new information.
ees, operating costs, and all other asset-based costs incurred by the fund.
er interest rate relationship.
movements of a security.
account to vendors. Automatic payments can be made from a checking account or credit card.
1 million coins.
India to transfer funds between any two NEFT-enabled bank accounts on a one-to-one basis.
application, each individual's account is linked to one or more of the user's bank accounts.
urity Standards Council (PCI SSC).
ck and mortar.
ansfer, and real-time bank transfer based on online banking.
rms. encourage adoption of the same practices throughout their supply chain.
ng for goods and services.
ch families united for the purpose of analyzing their problems and formulating action to achieve educational improvement, economic opp
n Services (HHS) that administers the Medicare program and works in partnership with state governments to administer Medicaid, the Chil
b.L. 104 121) and signed into law by President Bill Clinton on March 29, 1996.
on-conformities or other undesirable situations.
es, to diversify the economy and have a positive impact on the quality of life in Reno-Sparks NV.
annie Mae and Freddie Mac, as well as the 11 Federal Home Loan (FHL) banks.
and government contractors.
or man-made threats.
et [1] to use to ensure security is in place when accessing cloud computing products and services.
omestic and international money laundering, terrorist financing, and other financial crimes.
m which includes the investigation of crimes such as wire fraud and identity theft.
ity Partnership Act, 2008 & other allied Acts and rules & regulations framed there-under mainly for regulating the functioning of the corpo
s of race, color, national origin, sex, disability, age, or membership in patriotic youth organizations.
y objectives.
to charter, regulate, and supervise all national banks and thrift institutions and the federal branches and agencies of foreign banks in the U
acilitating capital formation.
s part of the rulemaking process. It is an important part of United States administrative law which facilitates government by typically creatin
allot initiatives, or legislation.
ever respond to their demands.
vement in bribery and corruption by virtue of their position and the influence that they may hold.
s initiatives like London, New York, Chicago, Rio de Janeiro, or Amsterdam. However, small towns can also benefit from connecting people,
pact of disasters.
vulnerable groups by enhancing their access to urban services and infrastructure through targeted investments.
ealth, and welfare of people at work.
tions, structures, systems, and identity.
es rendered.
f continuing this coverage to individuals who would otherwise lose their benefits due to termination of employment.
o an account are not subject to federal income tax at the time of deposit.
nning, performing and reporting functions, along with participant contact information, tracking deadlines and milestones.
-based data collection methodology to streamline data collection and expedite the time to market for drugs and medical devices.
vider, including demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and
ns for Controlled Substances , provides practitioners with the option of writing and transmitting prescriptions for controlled substances el
f organizing and storing documents, images, and other digital content for pharmaceutical clinical trials that may be required for compliance
put and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations.
er medical information over varying distances through audio, visual and data communication.
usually videoconferencing.
he stationary phase. The various constituents of the mixture travel at different speeds, causing them to separate. The separation is based o
xt being implicit.
s to analyze proteins.
of the function, structure and interactions of the proteinof interest.
quickly to emergency situations regarding medical issues, traumatic injuries and accident scenes.
sed as one of the tests to help diagnose systemic lupus erythematosus (SLE).
nd metformin is appropriate.
ection methodology that has been in use since 2006 to measure patients' perspectives of hospital care.
nd medical care. If they match, those patient's records are combined to eliminate duplication and confusion.
ugh extraction from medicinal plants, but more recently also by organic synthesis.
bing and patient behaviors that contribute to the epidemic and facilitate a nimble and targeted response.
a or guidelines.
ons may make changes to their elected fringe benefit options, such as health insurance.
on the matter.
xpenses. Unlike other types of employer-sponsored healthcare benefits, the employer owns the HRA and completely funds it; employees d
ncludes an applicant tracking system (ATS) and HRIS tools to manage all aspects of the employee lifecycle.
e same page.
a service model.
ment law compliance and risk reduction. ... TriNet partners with organizations between 1 and 2,500 employees.
ava), a business concept (e.g. BPM), a skill (e.g. negotiation) or a broad area of study (e.g. women's health).
es and an assessment of the internal and external environments in which the organization operates
ational objectives.
ages during non-work hours.
sferred to a retirement account like such as a 401(k) Plan or 403(b) Retirement Plan.
of Payroll Professionals (CIPP) in the UK and the Canadian Payroll Association in Canada.
ard to purchase items, withdraw cash and pay bills. Paycards also eliminate the need for paper paychecks.
mplementations, traveler and cargo handling, carrier selection and management, accounting.
gement and travel and expenses data management.
it should be used.
g employees to select and recruit the suitable candidates from their social networks.
kers compensation claims, or employer sanctions.
or service contract.
o examine reasons for turnover or estimate the cost-to-hire for budget purposes.
ed outcome.
wledge, competence, skill and effectiveness.
permitted by the United States Citizenship and Immigration Services (USCIS) to work for one year on a student visa towards getting practica
re the term always refers to the domain other than the software domain.
h-performance, sustainable organization that meets its strategic and operational goals and objectives.
ls and knowledge.
quired for a safety instrumented function (SIF).
retail banking such as mortgage or personal lending, branch banking, personal accounts, automated teller machines (ATMs) and so forth.
ned by President George W. Bush on December 4, 2003,[2] as an amendment to the Fair Credit Reporting Act.
onsumer reporting agencies.
ards and report forms to promote uniformity in the supervision of financial institutions
g finance and community investment.
., the Fed's buying and selling of United States Treasury securities).
HMDA in 1975.
s to a partnership agreement.
aws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an ind
acity, credit, integrity, perseverance, and tenacity) for the purpose of receiving and performing a specific Government contract.
gn, procurement, construction, to commissioning and handover of the project to the End-User or Owner.
ment (SA), is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wis
me spent by the contractor's employees and subcontractors employees to perform the work, and for materials used in the construction (plu
ss expensive.
or other criminal who has gained access to the firm's electronic network.
ral programs that provide benefits for retirees, disabled people, and children of deceased workers.
ance company starts to pay its share (your deductible).
ts. Less often, the expenses might include lost wages or legal fees. The insurance generally doesn't reimburse you for any stolen money or
rson, their continued survival).
value, consequent to an adverse or potentially criminal event even if the company is not found guilty.
d people. In the United States, benefits are funded by a compulsory governmental insurance system, not taxes on individual citizens.
the debtor from the person or institution that holds that property (the 'garnishee').
orts to assure safe and healthful working conditions; by providing for research, information, education, and training in the field of occupati
a work week. FLSA overtime pay is time and one-half of the employee's regular rate of pay.
an American citizen and therefore had no standing to sue in federal court, and that the federal government had no power to regulate slave
ower to regulate navigation.
cases to represent defendants who are unable to afford to pay their own attorneys.
he District Court.
any compliance requirements such as with document retention policies, courts' electronic filing systems and, in the UK, the Solicitors' Acco
relationships within a law firm and improves the client intake of the firm.
mechanics and business of providing legal services rather than to the substantive legal work itself.
rofessional services of a lawyer or attorney at law, barrister, solicitor, or civil law notary.
es, and trusts that have exemptions or special circumstances allowing for lower payments of standard income tax.
of income (e.g. dividends, interest, etc.).
atus can result in the employers withholding more or less tax.
. § 405(c)(2). The number is issued to an individual by the Social Security Administration, an independent agency of the United States gov
ourage private individuals to contribute money when it is considered to be in the public interest.
om the income paid to the recipient. In most jurisdictions, withholding tax applies to employment income.
production or distribution. VAT essentially compensates for the shared services and infrastructure provided in a certain locality by a state an
least one of the party is located outside the country of the transaction.
equirements under the Securities Exchange Act of 1934 and another concerning bribery of foreign officials.
es; there is little government intervention or central planning.
d media channels.
e user's mouse passes over it.
defined by values.
a units, product lining involves offering the products for sale separately.
n the minds of consumers, investors, competitors, and other stakeholders.[
ry modalities.
ate repetitive tasks.
hin the same site. Bounce rate is basically calculated by how much time a person spends on your site.
a company that possesses or leases retail stores, factory production facilities, or warehouses for its operations.
oviders (MSPs), consultants, systems integrators (SIs), original equipment manufacturers (OEMs), independent software vendors (ISVs) and
motion, public relations, direct marketing, and social media through their respective mix of tactics, methods, channels, media, and activitie
n your own.
a message to its desired market, or the market in general.
d are a good way to stretch your business in its current situation.
mobile applications
reach different consumers.
manages services in hotels amenities solutions.
case studies M&A, and trends that impact the contractor community.
target market, identified as the targets or recipients for a particular advertisement or message.
phy, along with a set of mobile applications and also some optional cloud services.
ed tasks that follow the transaction. AHT is a prime factor when deciding call center staffing levels.
ect marketing.
designed to deliver satisfying user experiences via all customer touch points.
ion making.
omers' point of view and is a data-driven approach to discovering, analyzing and influencing your customers' journeys.
with the goal of improving customer service relationships and assisting in customer retention and driving sales growth.
model companies.
which element of the app is turning down the users or which screen are they using before leaving the app.
he number of unique users during a specific measurement period, such as within the previous 30 days.
connection can be a reaction, interaction, effect or overall customer experience, which takes place online and offline.
rategy effective as they buy in bulk.
here are certain core skills that most marking positions require.
ate repetitive tasks.
at a company's procedures adhere to the MRC's Minimum Standards for Ratings Research and to applicable measurement guidelines issue
esults Pages.
to easily find messages with a specific theme or content; it allows easy, informal markup of folk taxonomy without need of any formal taxo
motion, public relations, direct marketing, and social media.
graph theory.
al data points into meaningful trends and analysis based on the user's needs.
an organization.
ment. They are too often taken to mean any metric or data used to measure business performance.
ial environment.
f what the product will become. Companies utilise the product strategy in strategic planning and marketing to identify the direction of the
arly adopters, gathers feedback and gauges interest in its product(s).
s positive, negative, or neutral.
and services).
and cognitive psychology,[1] the subject mainly applies to businesses such as fashion and design.
y entails conducting extensive telephone interviews with new clients or lost prospects.
is a competitor to Facebook's Instant Articles,[1] and includes several other large search, social and web publishing platforms around the w
o a sale. The metaphor of a funnel is used to describe the way users are guided to the goal with fewer navigation options at each step.
qualified leads people who have already taken some kind of action on your website.
can work smarter and more efficiently in the applications they use every day.
cs and interactive reporting.
red) and shareholders (preferred and common). Enterprise value is one of the fundamental metrics used in business valuation, financial m
ormation and how this process can be made more efficient.
its modular data pipelining concept.
t reaching targets.
ng or a basic analysis of retweets or 'likes' to develop an in-depth idea of the social consumer.
sed by an end user with a secure Internet connection.
ed RESTful Web services, provide interoperability between computer systems on the Internet.
ether different computing systems and software applications physically or functionally, to act as a coordinated whole.
ntegrating many different sources of information from many different enterprise systems.
t the information is stored in the cloud and is accessible by a wide range of systems and devices.
ith orchestration and management provided by Kubernetes, on a foundation of Red Hat Enterprise Linux.
n computer applications.
m, typically measured in terms of the number of active servers, scales automatically based on the load on the farm. It is closely related to, a
g, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time communication services
d other services.
plication development for organizations providing cloud services (IaaS, PaaS, and/or SaaS) to multiple independent groups and their users
ed network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remot
plans for migrating the existing data center to a new facility or site.
er by distributed applications.
ms and in organizations. Data is usually one of several architecture domains that form the pillars of an enterprise architecture or solution a
nners, bar code readers, or magnetic stripe readers.
be of particular importance for risk management, legal discovery, and compliance.
en replacing, modifying, or deleting the dirty or coarse data.
l data that deals with issues such as auditing, tracing of data, loading speed and resilience to change as well as emphasizing the need to tra
usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital lan
user of a public electronic communications service, including data relating to the latitude, longitude or altitude of the terminal equipment,
ed, analytical, hierarchical and metadata. It is the primary focus of the information technology (IT) discipline of master data management (M
ms designers a limit to work to. For instance, if the RPO is set to four hours, then in practice, off-site mirrored backups must be continuousl
ddition, it should be considered that concept drift may happen in the data which means that the properties of the stream may change over
s, a sequence of database operations that satisfies the ACID properties, and thus can be perceived as a single logical operation on the data,
h. Dictionaries contain a collection of objects, or records, which in turn have many different fields within them, each containing data.
database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and serve
ings, lists, maps, sets, sorted sets, hyperloglogs, bitmaps and spatial indexes.
phical shell.
erve led by American computer scientist Steve Wilhite on June 15, 1987.
d operating systems.
terchange with Microsoft products.
e assistants.
y the marketplace operator. Online marketplaces are the primary type of multichannel ecommerce and can be a way to streamline the pro
ng' or 'preference' a user would give to an item.
artners of money.
ndeed authorized by the owner of that domain.
ften used in phishing and email spam, such as emails with forged sender addresses that appear to originate from legitimate organizations.
n languages.
d from various IT operations tools and devices, in order to automatically spot and react to issues in real time.
ics of how an Internet of Things device operates and lives throughout its life cycle.
ith and known as Foundry.
ct in real time. Mixed reality takes place not only in the physical world or the virtual world, but is a mix of reality and virtual reality, encomp
on) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control conne
sive attention to procedural generation distinguishes it from other 3D computer graphics software.
, with a wise management of natural resources, through participatory action.
vidual organizations.
nts of information to be compressed on small storage devices that can be easily preserved and transported.
file streaming.
me for shipment.
rticipate in its activities and communicate with others.
dual cables and organize them in an easier to install package that is also easier to replace and maintain.
d require two or more transistors and a small number of additional supporting devices.
ta and is widely used for software and other computer files as well as video programs watched using DVD players.
rs) are regulated by a set of rules known as the hours of service (HOS).
problems' through reprogramming.
hnology services.
nt source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
where to send information and broadcasts all network data across each connection.
ons that require high-end edge computing.
pplication that would augment your workforce by automatically/constantly scouring all available information regarding any given topic.
oping countries.
n 'reduced instructions' led to the resulting machine being called a 'reduced instruction set computer' (RISC).
combination thereof.
applications.
guration tools
ocesses, services, applications and data within individual or across multiple organizations.
hnology services.
ver and device management; computer operations; IT infrastructure and library management.
oduction meets business goals.
ormation system.
tion of a system, organized in a way that supports reasoning about the structures and behaviors of the system.
up and recovery, printer spooling, job scheduling, virus protection and performance and capacity planning.
e alternative.
s richer, provides phonebook polling (for service discovery), and transmit in-call multimedia.
conferencing, and web conferencing.
m developer-run servers to applications that target the Google Android Operating System, as well as applications or extensions developed f
mended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, and 3D television.
they control.
waves. Fiber optics has several advantages over traditional metal communications lines. Fiber optic cables have a much greater bandwidth
nternet backbone.
ators since the early 1990s. In a hybrid fiber-coaxial cable system, the television channels are sent from the cable system's distribution faci
er nodes as possible and cooperate with one another to efficiently route data from/to clients.
sion keys. Forward secrecy protects past sessions against future compromises of secret keys or passwords.
ne quadrillion (short scale) bytes, or 1 billiard (long scale) bytes. The unit symbol for the petabyte is PB.
for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.
p, conducting, and tearing down telephone calls or other interactive media communications.
e IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks.
321, which is the protocol in widespread use today.
ange device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and m
y installed on a very smal area such as a cabinet.
f lower-level functionality.
graphic distances.
essly discover each other's presence on the network and establish functional network services for data sharing, communications, and enter
8. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) ne
rom a common image with the appropriate changes are provisioned to replace the old ones.
m an application or user.
th either a 55-inch (140 cm) 1080p or an 84-inch (210 cm) 4K 120 Hz touchscreen with multi-touch and multi-pen capabilities, running the
ongside the 4th generation Apple TV.
ing and discovering geographic information, using maps and geographic information in a range of applications, and managing geographic in
tion or as a loadable kernel module.
ular consumer market technologies and devices at home and then introducing them in the workplace.
rotection best practices. It is currently observed in the United States, Canada, India and 47 European countries.
as a 'DUNS number' to a single business entity. It was introduced in 1963 to support D&B's credit reporting practice.
e at any time being an exponential function of time, i.e., a function in which the time value is the exponent.
fire and its related emergencies, as well as the research and development, production, testing and application of mitigating systems.
by changing minimal and maximal values of an interval in which a variable of the program meets the set of constraints, in order to reduce
g. In return for that engagement, participants receive real-time, hyper-relevant results they care about.
velengths can then be used to make digital 3-D representations of the target.
free to its community members who, in turn, agree not to assert their own patents against Linux and Linux-related systems and application
mers, you must be a Salesforce partner.
n a flat rate.
r shared control, synchronized so that they overlap well in coverage, the period in which a satellite or other spacecraft is visible above the
ur organization.
ant communication, and tightly-knit teams.
eously feeds back information that aids the operators' decision-making process.
e and national boundaries and helps especially with projects as they grow in complexity.
fic technical problems.
orm. Microsoft also produces an integrated development environment largely for .NET software called Visual Studio.
gramming high level, similar to that of SQL for relational database management systems.
uted one-by-one by a human operator.
nd a service provider.
ramework (RDF) format.
plex world. Cognitive robotics may be considered the engineering branch of embodied cognitive science and embodied embedded cognitio
roller, and a system of communications between the two
ng, painting, assembly, pick and place for printed circuit boards, packaging and labeling, palletizing, product inspection, and testing; all acco
to the nanotechnology engineering discipline of designing and building nanorobots, with devices ranging in size from 0.1 10 micrometres
erver resources.
h, publisher, or hash.[1] AppLocker can be configured for an enterprise via Group Policy.
own as (ISC)².
ng on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pa
employees of the United States Coast Guard (USCG), civilian employees of the Department of Defense (DoD) and other DoD and USCG con
n from Protection Profiles (PPs).
ecure cloud services — which are being adopted at a significantly increased rate — and access to them from users both within and outside
for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the cyberthief.
e scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
ining or other similar mining efforts.
he collection of intelligence using open source intelligence, social media intelligence, human intelligence, or intelligence from the deep and
sified as personal identifiable data, personal sensitive data or commercially sensitive data.
n strategy and implementation to ensure compliance with GDPR requirements.
mation concerning the organization's security practices, data and computer systems.
malicious programs.
m - typically at least two of the following categories: knowledge, possession, and inherence.
all using in-line deep packet inspection (DPI), an intrusion prevention system (IPS).
payment card data are required to implement the standard to prevent cardholder data theft.
d can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based secu
ent, but uses other peripheral devices such as programmable logic controllers and discrete PID controllers to interface to the process plant
rporations can provide on their own, when total cost of ownership is considered.
ary features of the system, the system in question has been recognized to be configured in a way that is in line with all of the requirements
esent in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012 and Windows 10.
dynamic clustering, database integration, NoSQL features and rich document handling.
unced that the cloud version would be discontinued by end of January 2017.
over telecommunication links.
ndows only. Both server and client support FTP and FTPS (FTP over SSL/TLS), while the client in addition also can connect to SFTP servers.
of web frameworks simply implemented
ts of continuous delivery.
l personal computer or NAS (Network Attached Storage) for the home, dedicated for storing various digital media (meaning digital videos/m
oot FLASH and power circuits.
ftware systems used in an enterprise.
ase management capabilities.
ging large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symb
erprise-scale messaging and similar functions.
deployment.
w-latency platform for handling real-time data feeds.
any type of attributes (user attributes, resource attributes, object, environment attributes etc.).
of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning cu
s, such as e-mail, customer relationship management tools, company information, workgroup systems, and other applications.
be system configuration.
ness practice, software application, or other industrial systems.
m, computer system, video game console, operating system, or similar development platform.
nition of the elements that define and/or prescribe what a system is composed of.
rocess for planning, creating, testing, and deploying an information system.
OpenStack, SoftLayer, Microsoft Azure and Rackspace to automatically provision and configure new machines
higher speeds) while preserving the Fibre Channel protocol.
etrieval, description, control, links and determine their disposition and access status.
ease maximum chip capacity so that flash memory can compete with magnetic storage devices, such as hard disks.
most the same amount of time irrespective of the physical location of data inside the memory.
e reader to identify tape cartridges and an automated method for loading tapes (a robot).
ntion of an operator/receptionist.
n organization.
nies, defined as the total revenue divided by the number of subscribers.
r of each call, the type of network a consumer subscribes to, and any other information that appears on the consumer's telephone bill.
net access over their existing hybrid fiber-coaxial (HFC) infrastructure.
generally at or below the clutter level and node installations are compact. A distributed antenna system may be deployed indoors (an iDAS)
ternet providers, and even the provider of the communication service from being able to access the cryptographic keys needed to decrypt
urity fencing and is typically a building or large shed housing electronic equipment used to receive and re-transmit video over the local cab
tions (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual syst
vices over a circuit-switched-style network, rather than strictly over an IP packet-switched network.
d over the dedicated circuit-switched connections of the public switched telephone.
-definition televisions (HDTVs) and audio receivers.
verters and up/down converters. RRHs also have operation and management processing capabilities and a standardized optical interface to
er, provides phonebook polling, and transmit in-call multimedia.
p, conducting, and tearing down telephone calls or other interactive media communications.
mmunications to customers equipped with Sip-based private ranch exchange and Unified Communications facilities.
he radio spectrum.
eo conferencing, fixed-mobile convergence, desktop sharing, data sharing, call control and speech recognition with non-real-time commun
d of computational linguistics that investigates the use of software to translate text or speech from one language to another.
n generate revenue. Users generally will upload video content via the hosting service's website, mobile or desktop application, or other inte
oy virtual machines and services to private clouds that you have created.
access their documents and have a consistent desktop experience, such as applications remembering toolbar positions and preferences, or
organization of the design - construction - operation team in order to support explicit and public business objectives.
ivery model.
individual user.
browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invis
ss the same thing, little content descriptors that help tell search engines what a web page is about.
you are, what you can do and whether you are the person they should hire to execute their project.
f Internet traffic.
ed by third-party users and developers who may not necessarily be affiliated with the originating website or application.
iency Wireless.
sually, fixed wireless is part of a wireless LAN infrastructure.
vironment. Human activity and natural processes can both generate air pollution.
mal synthesis.
service providers.
potential buyer with a high probability of purchasing a product.
ology program, and provide warfighting capabilities to United States air, space, and cyberspace forces.
t across all digital channels, including search, social, and mobile.
to what people search for online. Conductor also provides recommended actions for optimizing digital marketing metrics and increasing re
of events. Kafka provides reliable, millisecond responses to support both customer-facing applications and connecting downstream system
of the largest and most diverse payment networks in the world.
y 9,800 people. It offers an array of financial services and products including retail banking, mortgages, corporate banking, cash manageme
erve, or served, in the United States military.
rust, and payment services products to individuals, businesses, governmental entities, and other financial institutions. It has 3,106 branche
ducts to individuals, businesses, governmental entities, and other financial institutions.
nd nurse call alarms along with pharmacy requests and doctors orders.
sea communications.
nical support.
es visibility they can act on to protect every endpoint, remediate vulnerabilities, and ensure compliance in the face of insider and external t
ck record of innovation and execution.
ment technology and expertise as well as bench-marking in software industry, and offers software, hosting and consulting services in suppo
ures, Kleiner Perkins, Caufield & Byers, CenturyLink and Seagate Technology.
reparation and filing.
ground-breaking reports with ANA on digital ad fraud in 2014 and 2015. White Ops' innovative technology protects digital advertisers, pub
mer segments include data centers, wireless carriers, national carriers, ISPs, enterprises, and government agencies.
arter' use of transport networks.
hrough shafts or tunnels.
equipment management, demand response, and/or energy audits.
as into the liquid some distance down the well.
e, automotive, civil engineering, sports goods and an increasing number of other consumer and technical applications.
products during a given period with respect to that in a chosen base period.
uction efficiency for a machine, line or cell. OEE = Availability x Performance x Quality
process fault diagnosis.
rms of warning.
at specialize in fulfillment.
rs, a record of customer returns and refunds, information on billing and payments, order processing records, and general ledger informatio
end use. Packaging contains, protects, preserves, transports, informs, and sells. In many countries it is fully integrated into government, bu
generally under 24 months) and small regular payments (typically paid each business day) as opposed to the larger monthly payments and
tions for controlled substances electronically. The regulations also permit pharmacies to receive, dispense, and archive these electronic pres
may be required for compliance with government regulatory agencies.
regulations.
parate. The separation is based on differential partitioning between the mobile and stationary phases.
completely funds it; employees do not make contributions.
ent visa towards getting practical training to complement their education.
machines (ATMs) and so forth.
ngle person, or to identify an individual in context.
overnment contract.
information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties.
als used in the construction (plus the contractor's mark up on the materials used), no matter how much work is required to complete cons
rse you for any stolen money or financial loss resulting from the theft.
t had no power to regulate slavery in the federal territories acquired after the creation of the US.
ore and during questioning and of the right against self-incrimination before police questioning, and that the defendant not only understoo
nd, in the UK, the Solicitors' Accounts Rules as defined by the Solicitors Regulation Authority.
agency of the United States government.
in a certain locality by a state and funded by its taxpayers that were utilized in the elaboration of that product or service.
ent software vendors (ISVs) and distributors to recommend or sell the vendor's products and associated services.
s, channels, media, and activities.
nnel or product.
e measurement guidelines issued by the Interactive Advertising Bureau (IAB).
ed backups must be continuously maintained a daily off-site backup on tape will not suffice.
s of the stream may change over time.It is usually used in the context of big data in which it is generated by many different sources at high
rms, both on the client and server side, with few changes to the data access code.
e cable system's distribution facility, the headend, to local communities through optical fiber subscriber lines. At the local community, a box
nodes on a network.
inspection, and testing; all accomplished with high endurance, speed, and precision. They can help in material handling and provide interf
n size from 0.1 10 micrometres and constructed of nanoscale or molecular components
m users both within and outside the traditional enterprise perimeter, plus growing direct cloud-to-cloud access.
he cyberthief.
ine with all of the requirements as demanded by the particular security policy.
o can connect to SFTP servers.
s well as Windows Phone, Symbian, iOS and Android mobile operating systems.
o the perceived steep learning curve of command-line interfaces (CLIs),[1][2][3] which require commands to be typed on a computer keybo
d other applications.
e consumer's telephone bill.
ransmit video over the local cable infrastructure. One can also find head ends in power line communication (PLC) substations and Internet
re, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information.
ber to serve multiple end-points.
desktop application, or other interface (API). The type of video content uploaded might be anything from short video clips to full-length TV
integrated into government, business, institutional, industrial, and personal use. Package labeling is any written, electronic, or graphic com
he larger monthly payments and longer payment terms associated with traditional bank loans.
ch and pool their investment capital, as well as to provide advice to their portfolio companies.
standards. In addition to these programs, CMS has other responsibilities, including the administrative simplification standards from the He
and archive these electronic prescriptions.
ss to or by third parties.
ork is required to complete construction.
e defendant not only understood these rights, but voluntarily waived them.
duct or service.
y many different sources at high speed.
ables are less susceptible than metal cables to interference. Fiber optic cables are much thinner and lighter than metal wires. Data can be t
es. At the local community, a box called an optical node translates the signal from a light beam to electrical signal, and sends it over coaxial
erial handling and provide interfaces,
king directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
to be typed on a computer keyboard.
n (PLC) substations and Internet communications networks
hort video clips to full-length TV shows and movies.
d many multicellular parasites.
roximately 72,400 employees.
ritten, electronic, or graphic communication on the package or on a separate but associated label.
plification standards from the Health Insurance Portability and Accountability Act of 1996 (HIPAA), quality standards in long-term care faciliti
r than metal wires. Data can be transmitted digitally (the natural form for computer data) rather than analogically. The main disadvantage o
signal, and sends it over coaxial cable lines for distribution to subscriber residences. The fiberoptic trunk lines provide adequate bandwidt
tandards in long-term care facilities (more commonly referred to as nursing homes
ogically. The main disadvantage of fiber optics is that the cables