Software Engineering
Discover essential terms and theories for product makers.
AB Testing
AB Testing is a method of comparing two versions of a webpage or app against each other to determine which one performs better.
Acceptance Criteria
Acceptance Criteria are specific conditions that a product or service must meet to be considered complete and satisfactory by stakeholders.
Accessible Rich Internet Applications (ARIA)
Accessible Rich Internet Applications (ARIA) is a set of attributes that make web content and applications more accessible to people with disabilities...
Ad Injection
Ad Injection is the unauthorized insertion of advertisements into a website without the website owner's consent.
Agglomerative Clustering
Agglomerative Clustering is a hierarchical clustering method that builds nested clusters by successively merging or splitting them based on distance m...
Agile Methodology
Agile Methodology is an iterative approach to project management and software development that focuses on collaboration, customer feedback, and small,...
Anchor Text
Anchor text is the visible, clickable text in a hyperlink.
Anomaly Detection
Anomaly detection refers to the identification of unusual patterns or behaviors in data that do not conform to expected norms.
App Store Optimization (ASO)
App Store Optimization (ASO) is the process of improving an app's visibility and ranking in app stores to increase downloads and user engagement.
Artificial Neural Network (ANN)
An Artificial Neural Network (ANN) is a computational model inspired by the human brain's neural networks, designed to recognize patterns and solve co...
Audit Trails
Audit trails are records that chronologically detail the sequence of activities or changes made to data or systems.
Backlink Analysis
Backlink analysis is the process of evaluating the quality and quantity of backlinks pointing to a website to improve SEO and site ranking.
Backlog Grooming
Backlog grooming is the process of reviewing and prioritizing items in the product backlog to ensure they are ready for future sprints.
Backlog
Backlog refers to a prioritized list of tasks or items that need to be completed.
Behavioral Biometrics
Behavioral biometrics refers to the identification and authentication of individuals based on their unique behavioral patterns, such as typing rhythm,...
Blockchain
Blockchain is a decentralized digital ledger that records transactions across many computers in a way that the registered transactions cannot be alter...
Bot Traffic
Bot traffic refers to non-human web traffic generated by automated scripts or bots.
Burn Down Chart
A Burn Down Chart is a graphical representation that shows the amount of work remaining versus time in a sprint or project.
Click Injection
Click Injection is a type of mobile ad fraud where a malicious app intercepts app installation broadcasts to claim credit for a click that led to the ...
Clickstream Analysis
Clickstream Analysis is the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits and in what orde...
Cluster Validity
Cluster validity refers to the evaluation of the goodness or correctness of a clustering algorithm's results.
Collaborative Filtering
Collaborative Filtering is a technique used in recommendation systems to predict user preferences by analyzing past interactions and behaviors of a la...
Computer Vision
Computer vision is a field of artificial intelligence that enables computers to interpret and make decisions based on visual data from the world.
Content Filtering
Content filtering is the process of screening and blocking access to specific content based on predefined criteria.
Content Management System (CMS)
A Content Management System (CMS) is software that allows users to create, manage, and modify digital content without needing specialized technical kn...
Content Scraping
Content scraping is the automated extraction of data or content from a website, often without permission.
Cryptographic Algorithm
A cryptographic algorithm is a method used to secure data through encryption and decryption processes, ensuring confidentiality, integrity, and authen...
Customer Relationship Management (CRM)
Customer Relationship Management (CRM) is a strategy and technology used by businesses to manage and analyze customer interactions and data throughout...
Cybersecurity
Cybersecurity refers to the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Data Analytics
Data analytics is the process of examining, cleaning, transforming, and modeling data to discover useful information for decision-making.
Data Anonymization
Data anonymization is the process of protecting private or sensitive information by erasing or encrypting identifiers that connect an individual to st...
Data Blending
Data blending is the process of combining data from multiple sources to create a unified dataset for analysis.
Data Breach
A data breach is an incident where unauthorized individuals gain access to sensitive or confidential information.
Data Cleaning
Data cleaning is the process of detecting and correcting (or removing) corrupt or inaccurate records from a dataset.
Data Clustering
Data clustering is the process of grouping a set of data points into clusters, where points in the same cluster are more similar to each other than to...
Data Encoding
Data encoding is the process of converting data into a different format to make it suitable for processing by machine learning algorithms.
Data Encryption
Data encryption is the process of converting data into a coded format to prevent unauthorized access.
Data Fusion
Data fusion is the process of integrating multiple data sources to produce more consistent, accurate, and useful information than that provided by any...
Data Governance
Data governance refers to the overall management of data availability, usability, integrity, and security in an organization.
Data Harmonization
Data harmonization is the process of integrating and standardizing data from different sources to ensure consistency and comparability.
Data Integration
Data integration is the process of combining data from different sources into a unified view.
Data Lake
A Data Lake is a centralized repository that allows you to store all your structured and unstructured data at any scale.
Data Loss Prevention
Data Loss Prevention (DLP) is a strategy for ensuring sensitive or critical information does not leave a corporate network.
Data Mapping
Data mapping is the process of matching fields from one database to another.
Data Masking
Data masking is a technique used to protect sensitive information by replacing it with fictional but realistic data.
Data Migration
Data Migration is the process of transferring data from one system or storage location to another.
Data Mining
Data Mining is the process of discovering patterns and knowledge from large amounts of data.
Data Normalization
Data normalization is the process of organizing data to minimize redundancy and improve data integrity.
Data Obfuscation
Data obfuscation is the process of hiding original data with modified content to prevent unauthorized access.
Data Privacy
Data Privacy refers to the protection of personal information from unauthorized access and ensuring individuals have control over their data.
Data Profiling
Data profiling is the process of examining, analyzing, and creating summaries of data to understand its structure, content, and quality.
Data Quality Management
Data Quality Management involves processes and practices to maintain and improve the accuracy, completeness, consistency, and reliability of data with...
Data Scrambling
Data scrambling is a technique used to protect sensitive information by rearranging, altering, or masking the original data values.
Data Shuffling
Data shuffling is the process of rearranging data elements within a dataset to protect sensitive information.
Data Standardization
Data standardization is the process of converting data from different sources and formats into a consistent, common format.
Data Transformation
Data transformation is the process of converting data from one format or structure into another.
Data Visualization
Data visualization is the graphical representation of information and data using visual elements like charts, graphs, and maps.
Data Warehousing
Data warehousing is the process of collecting, storing, and managing large volumes of data from different sources for analysis and reporting.
Deep Learning
Deep learning is a subset of machine learning that uses neural networks with many layers to model complex patterns in data.
Descriptive Analytics
Descriptive analytics is the analysis of historical data to understand trends and evaluate past performance.
DoFollow Links
DoFollow links are hyperlinks that allow search engines to follow them and pass on SEO value from the linking site to the linked site.
Domain Spoofing
Domain spoofing is a type of online fraud where malicious actors misrepresent a website's URL to deceive users and advertisers.
Email Filtering
Email filtering is a process that automatically organizes and sorts incoming email messages based on predefined criteria.
Encryption Algorithm
An encryption algorithm is a method used to transform readable data into an unreadable format to protect it from unauthorized access.
ETL Process
The ETL process involves Extracting data from various sources, Transforming it into a suitable format, and Loading it into a destination system, such ...
Gap Analysis
Gap Analysis is a method used to compare actual performance with potential or desired performance.
Heatmaps
Heatmaps are graphical representations of data where values are depicted by color, allowing users to quickly understand complex data patterns.
Human-Computer Interaction (HCI)
Human-Computer Interaction (HCI) is the study and practice of designing, evaluating, and implementing interactive computing systems for human use.
In-App Guidance
In-App Guidance refers to contextual help and instructions provided within a software application to assist users in navigating and using its features...
Internationalization
Internationalization is the process of designing software and products to enable easy adaptation to various languages, regions, and cultures.
Keyboard Navigation
Keyboard navigation refers to the use of a keyboard to move focus and interact with elements on a user interface.
Lean Practices
Lean Practices refer to systematic methods aimed at minimizing waste and maximizing efficiency in production processes.
Lean Tools
Lean Tools are techniques and methodologies used to streamline processes, eliminate waste, and improve efficiency in business operations.
Linguistic Analysis
Linguistic Analysis is the study of language structure and meaning through various methods and approaches.
Link Disavowal
Link disavowal is the process of telling search engines to ignore certain backlinks that may harm a website's ranking.
Link Quality
Link quality refers to the value and relevance of a hyperlink in terms of its ability to positively impact a website's search engine ranking and user ...
Localization
Localization is the process of adapting content, products, or services to meet the cultural, linguistic, and functional requirements of a specific tar...
LSI Keywords (Latent Semantic Indexing)
LSI Keywords (Latent Semantic Indexing) are terms and phrases that are semantically related to a primary keyword, helping search engines understand th...
Machine Learning
Machine Learning is a branch of artificial intelligence where algorithms learn from data to make predictions or decisions without explicit programming...
Malvertising
Malvertising is the use of online advertising to spread malware, often by injecting malicious code into legitimate ads on trusted websites.
Messaging Framework
A Messaging Framework is a structured approach that outlines how a brand communicates its value and key messages to its target audience across various...
Metadata Management
Metadata Management is the administration of data that describes other data, ensuring it is properly organized, accessible, and used effectively.
Metadata
Metadata is data that provides information about other data, helping to describe, manage, and organize content.
Natural Language Processing (NLP)
Natural Language Processing (NLP) is a field of artificial intelligence that enables computers to understand, interpret, and respond to human language...
NoFollow Links
NoFollow Links are hyperlinks with an HTML attribute that instructs search engines not to pass on ranking credit to the target website.
Ontology
Ontology is a structured framework for organizing information and concepts, defining the relationships between them.
Page Speed
Page speed refers to the time it takes for a web page to load completely in a user's browser.
Phishing Protection
Phishing Protection refers to measures and tools designed to detect, prevent, and respond to phishing attacks, which are malicious attempts to deceive...
Plagiarism Check
A plagiarism check is the process of reviewing content to ensure it is original and does not improperly use or copy someone else's work.
Programmatic Advertising
Programmatic Advertising is the automated buying and selling of online advertising space using software and algorithms.
Proprietary Technology
Proprietary technology refers to technology that is owned by an individual or a company and is protected by patents, copyrights, or trade secrets, lim...
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is a framework of policies, technologies, and procedures used to create, manage, distribute, use, store, and revoke di...
Readability Score
A Readability Score is a numerical value that indicates how easy or difficult it is to read and understand a text.
Responsive Design
Responsive design is an approach to web design that ensures web pages render well on various devices and screen sizes.
Root Cause Analysis
Root Cause Analysis (RCA) is a systematic process for identifying the root causes of problems or incidents to prevent their recurrence.
Screen Reader Compatibility
Screen Reader Compatibility refers to the ability of digital content to be effectively read and navigated by screen readers, aiding visually impaired ...
Semantic HTML
Semantic HTML uses HTML5 elements to convey the meaning of web content, making it more understandable for both browsers and developers.
Sentiment Analysis
Sentiment Analysis is the computational process of identifying and categorizing opinions expressed in text to determine the writer's attitude towards ...