Mobile app

A mobile app is a software application that is designed to run on a mobile device, such as a smartphone or tablet. Mobile apps are typically developed for a specific operating system, such as iOS or Android, and are available through an app store or marketplace. Some mobile apps are designed to provide a service, … Read more

Knowledge process outsourcing (KPO)

Knowledge process outsourcing (KPO) is the outsourcing of knowledge-based processes, such as research and development, technical support, and product development. KPO is a subset of the broader category of business process outsourcing (BPO). KPO is a relatively new phenomenon, having only emerged as a distinct industry in the early 2000s. However, it has rapidly grown … Read more

Ad hoc testing

Ad hoc testing is a type of software testing that is performed without any formal planning or preparation. Ad hoc testing can be used to find bugs or errors in a software application. It is often used to test software that has not been thoroughly tested before release. Ad hoc testing is usually performed by … Read more

DNN Platform (DotNetNuke)

DNN Platform (formerly “DotNetNuke Community Edition” content management system) is an open source web application framework ideal for creating, deploying and managing interactive web portals, websites and web-based applications. The DNN Platform is written in C# and utilizes a number of features of the Microsoft .NET Framework. DNN provides a number of features out-of-the-box including: … Read more

Accessibility testing

Accessibility testing is the process of testing how well a website or web application can be accessed by people with disabilities. This includes testing for things like how well the site can be navigated using a screen reader, how easy it is to find and use the site’s features, and how well the site works … Read more

Business logic attack

A business logic attack is a type of attack that targets the underlying logic of a web application or service. This type of attack can bypass traditional security controls, such as authentication and authorization mechanisms, and allow an attacker to access and modify data or functionality that they should not have access to. Business logic … Read more

Mobile deep linking

Mobile deep linking is a technique used to link to specific content within a mobile app. This is done by creating a URL that points to the content within the app. When a user clicks on this URL, they will be taken directly to the content within the app, bypassing the app’s homepage or any … Read more

Software agent

A software agent is a computer program that is designed to autonomously perform tasks on behalf of a user or another program. In some cases, a software agent may be designed to operate without any direct interaction with a user, instead carrying out its tasks in the background in response to changes in its environment … Read more

SMIL (Synchronized Multimedia Integration Language)

SMIL (Synchronized Multimedia Integration Language) is a World Wide Web Consortium (W3C) recommended XML markup language for describing multimedia presentations. SMIL enables authors to write time-based, interactive multimedia presentations. The SMIL specification is part of the W3C’s Synchronized Multimedia Activity. A SMIL document is composed of three parts: A head, which contains metadata and other … Read more

IAP (Internet access provider)

An IAP (Internet access provider) is a company that provides customers with access to the Internet. IAPs can be either residential or business-focused, and they typically offer a variety of services such as email, web hosting, and broadband Internet access. Many IAPs also provide value-added services such as online security and parental controls. What are … Read more