Skip links

Glossary

Numbers

2D barcode – two-dimensional barcodes look like a square or rectangle and contain many small, individual dots. A single 2D barcode can contain a significant amount of information and can remain legible even when printed at a small size or engraved on a product. 2D barcodes are used in a wide range of industries, from manufacturing and warehousing to logistics and healthcare.

A

AD (Active Directory) – Microsoft directory service for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only responsible for centralized domain management, but today it is the umbrella name for a wide range of directory and identity-based services.

Advanced electronic signature – ensures provability by being uniquely linked to an identifiable signer. It is unique to the signatory and under his sole control and attached to the document, so it becomes invalid if the content is changed. Most often, biometric and HTML5 signatures are used.

Agile methodology – a way of managing the project by dividing it into several phases. It implies constant collaboration with stakeholders and continuous improvement at every stage. In software development, agile practices include the discovery of requirements and the development of solutions through the joint cooperation of self-organizing and cross-functional teams on the one hand and clients or end users on the other. It advocates adaptive planning, evolutionary development, early delivery and continuous improvement, and encourages flexibility in adapting to change.

AI (Artificial Intelligence) – artificial intelligence is a broad branch of computer science that involves the use of computers to do things that traditionally require human intelligence. This means creating algorithms to classify, analyze and draw predictions from data. It also includes acting on data, learning from new data, and improving over time.

Alfresco – an IT company that provides content management solutions through its business platform. In 2020, they were acquired by Hyland.

API (Application Programming Interface) – an application programming interface is a set of functions that enables applications to access data and interact with external software components, operating systems or micro-services.

Archive – physical or digital space for permanent or temporary storage of documents, records and information. Most often, both forms of data are used, united in a hybrid archive that brings universal access to documents, regardless of the form and location of storage.

Artificial Intelligence – a broad branch of computer science that involves using computers to do things that traditionally require human intelligence. This means creating algorithms to classify, analyze and draw predictions from data. It also includes acting on data, learning from new data, and improving over time.

Audit – an examination and assessment of the information technology infrastructure, policies and operations of the organization. An audit can determine whether IT controls protect corporate assets, ensure data integrity, and align with overall business goals.

Authentication – the process of verifying the identity of a person or device. A common example is entering a username and password when logging into a website. By entering the correct login information, you let us know who you are and that you are accessing that website.

B

Backend – Any part of a website or software program that is not visible to users. In programming terminology, the backend is the data access layer, while the frontend is the presentation layer.

Back office – a part of the company that consists of administrative and support staff, and refers to clients. Back-office functions include settlements, approvals, record keeping, regulatory compliance, accounting and IT services.

Database – a collection of data that is electronically stored in a computer system. It is designed to store significantly larger amounts of data that can be accessed, filtered and managed quickly and easily by any number of users at once.

Biometrics – is a set of automated methods for unique recognition of people, based on one or more of their physical characteristics and behavior. In information technology, biometric authentication refers to technologies that measure and analyze physical (fingerprints, cornea, facial recognition, etc.) and behavioral characteristics (handwriting, typing, walking, etc.) of a person. Although biometrics is primarily used for authentication purposes, it is also applied in other areas such as recognizing the user’s speech for faster typing.

Blockchain – is a type of database that is often used to manage how transactions take place. Data is stored in blocks which are then connected by chains. As new data arrives, it is entered into a new block. Once a block is filled with data, it is chained to the previous block, which puts the data in chronological order. The data that is stored inside a block depends on the type of blockchain. For example, a Bitcoin block contains information about the sender, the recipient, the number of bitcoins being transferred.

BoardPoint – a solution that enables digitization of the process of making strategic decisions. Management of proposals, meetings or sessions, tasks and their implementation takes place from one central place. Decisions are made faster and easier and with lower costs, and they are based on relevant information.

BPM (eng. Business Process Management) – a set of methodologies, strategies and models used to analyze, measure, automate and manage business processes.

BPMN (eng. Business Process Management and Notation) – business process model and notation is a graphic representation for specifying business processes in the business process model.

C

CAdES (Cryptographic Message Syntax for Advanced Electronic Signatures) – a cryptographic message syntax that provides a framework for digitally signed documents.

Camunda – is an open source platform (Java) for process management and automation.

Captiva – formerly – known as OpenText Intelligent Capture software for scanning and retrieving documents and converting paper documents, faxes and other electronic documents into information that can be automatically used by dedicated departments within an organization.

Cloud Computing – a term that encompasses the availability of computer system resources on demand, especially data storage and computing power, without direct active management by the user.

CMS (content management system) – a system that enables content management. In the broadest sense, it refers to any solution that enables classification, organization, linking and any other form of content editing. Although the term can be used for manual content management processes, today it is primarily applied to various software solutions that enable advanced management of a large amount of information. CMS systems are used to synchronize data from multiple sources, to execute collaborative projects, to organize work in corporate environments, and the like. The fundamental application of CMS today is in the dynamic creation of new generation websites.

Commit – an operation that sends the last changes in the source code to the Repository.

CRM (Customer Relationship Management) – customer relationship management is a combination of strategy and technology for building and improving business relationships with customers. The goals of the CRM system are threefold – acquiring and nurturing potential customers, increasing sales conversion, and improving customer satisfaction and retention.

Cross-browser compatibility –compatibility that describes the possibility of displaying and operating a website or application in an identical way in different Internet browsers and ensures an adequate replacement of functionalities that are not available in a certain browser.

CSS (Cascading Style Sheets) is a language that describes the presentation styles of documents most often written in HTML. CSS edits the very appearance and layout of the page and allows it to separate presentation and content, including layout, colors and fonts.

D

DataCap – IBM software and a key component of the IBM Cloud Pak platform for business automation. It simplifies the collection, recognition and classification of business documents. Its natural language processing, text analytics and machine learning technologies identify, classify and extract content from unstructured or variable paper documents.

DevOps – a set of practices that combines software development (Dev) and IT operations (Ops). Its goal is to shorten the life cycle of system development and ensure continuous delivery with high software quality.

DMS (eng. Document Management System) – a system for receiving, tracking, managing and storing documents. One of the purposes is to reduce the amount of physical documents within an organization or business.

DNS (eng. Domain Name System) is a distributed hierarchical structure of Internet servers that contains information related to domain names, i.e. about the connection between IP addresses and their logical (symbolic) names.

Docs4ECM – a platform that transforms your organization’s content management and enables management, processing, editing, digital signing, storage and printing of all documents, regardless of whether they are received in physical or digital form.

Domain – a unique name, that is, a name for an Internet address.

DPI (eng. Dots Per Inch) – is a measure of spatial resolution, the density of dots of video or image scans, that is, the number of individual dots that can be placed in a line in a range of 2.54 cm (1 inch).

E

ECM (Enterprise Content Management) – a set of defined processes, strategies and tools that enable more efficient organization, storage and search of content – documents, records and information of an organization.

EDI (Eng. Electronic Data Interchange) – electronic data exchange, is a synonym for optimized procedure in the supply chain and refers to the exchange of electronic business documents (orders, invoices, etc.) between business partners based on several standards (X12, EDIFACT, ODETTE ).

eIDAS (eng. electronic Identification and Trust Services) – regulation of the European Parliament and the Council on electronic identification and trust services for electronic transactions in the internal market, which all EU members must apply from July 1, 2017. According to this regulation, we distinguish between 3 types of e-signature: simple, advanced and qualified electronic signature.

Elasticsearch – is a distributed, free and open source search and analytics engine for all types of data, including text, numeric, geospatial, structured and unstructured.

Embeding (eng. to embed) – embed something into an HTML page. Most often, we embed external content in a specific place in a document or HTML page. The content we embed is generated by an external application or is another source of interactive content such as a YouTube video.‎

EOL (eng. End of Life) – the end of the product’s useful life. It indicates the moment when the manufacturer stops providing support for a specific product (system, application, software component).

eStamp – a trust service for the verification of electronic documents in which an electronic signature is not required, but the authenticity and integrity of the document must still be ensured (ensures the authenticity and completeness of the data of an e-document).

ERP (Enterprise Resource Planning) – integrated management of key business processes with the help of technology. It most commonly refers to software that helps companies plan and implement the resources needed to manage business and integrate planning, procurement, sales, marketing, finance, human resources, and other departments.

ESB (Enterprise Service Bus) – an enterprise service bus is a middleware tool used to distribute tasks between connected application components.

EULA (Eng. End User License Agreement) – an agreement on the terms of use of the license of the software solution between the manufacturer and the end user.

eTimestamp – a trust service that marks and associates data in electronic form with a specific time and thereby guarantees that exactly that data existed at that exact time.

Exclusion – the procedure by which the units whose storage period has expired are separated from the whole of the material.

F

Frontend – refers to the user interface of a program or website. In programming terminology, the backend is the data access layer, while the frontend is the presentation layer.

Functional specification – a document that describes the functionalities that will be implemented as part of the solution. The document highlights everything that is required for the solution to function within the given framework, additionally describing the inputs and outputs required for the processes to be completed successfully. The functional specification combines the results of the requirements analysis and the existing state analysis.

G

GUI (Graphical User Interface) – a graphical user interface is a way of human interaction with a computer through the manipulation of graphic elements and accessories, with the help of text messages and notifications. The graphical interface was introduced as a response to the text-based (CLI) interface, which controlled the computer exclusively through text and the command line. The CLI was less usable than the GUI and was much more complicated to learn because it used text commands (like in a DOS operating system). Some operating systems today contain both interfaces, although graphical is used more.

H

HA (High Availability) – a high availability strategy that helps improve system availability due to hardware, software or network failures.

High Availability – A strategy that helps improve system availability due to hardware, software, or network failures.

Hybrid archive – a system of permanent or temporary storage of documents, records and information that provides universal access to documents regardless of the form and location of storage.

HTML (eng. HyperText Markup Language) – a programming language for creating documents designed for display in an Internet browser. With it, we usually connect additional technologies such as CSS and JavaScript that enable us to create web pages.

HTTP (eng. Hypertext Transfer Protocol) – is a request/response protocol for communication between the server (server) and the client. An HTTP client, such as a web browser, usually initiates data transfer after establishing a TCP (see TCP/IP) connection with a remote web server on a specific port.

HTTPS (eng. HyperText Transfer Protocol Secure) – is a combination of the hypertext transfer protocol (HTTP) with the Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocol. TLS is an authentication and security protocol widely used in browsers and web servers.

Hyland – one of the leading ECM companies that supplies software for managing content, business processes and records.

I

ICR (Intelligent Character Recognition) – technology that enables machine reading of handwriting.

Indexing – is the process of browsing files, emails and other content on a computer and cataloging their data, such as words and metadata in them. When you search, the computer looks through the index of terms after indexing to find results faster.

Input management is a strategy for managing the content that enters the organization. It helps optimize incoming information flows by automating the collection, issuance and processing of documents and data.

Internet browser – (web browser, web browser, Internet browser) is a program that allows the user to view web pages and multimedia content related to them.

Intranet – a computer network for the exchange of information, collaboration tools, operating systems and other computer services within an organization, with disabled access outside the local network. However, today it is becoming normal that access can also be granted to external users such as clients, project collaborators and the like – then we are already talking about an extranet.

IoT (Internet of Things) – refers to a system of objects – interconnected and connected to the Internet, which are able to collect and transmit data via an IP network without human intervention.

ISIS (eng. Image and Scanner Interface Specification) – is an industry standard interface for image scanning technologies, developed by Pixel Translations in 1990 (later it becomes EMC Corporation’s Captiva software, and is taken over by OpenText). ISIS is an open standard for scanner control and a complete image processing framework. It is currently supported by many application and scanner vendors.

K

K2 – a software company for the automation of digital processes whose solutions help companies in the development and implementation of process applications. Owned by Nintex since 2020.

Kanban – is a workflow management method for defining, managing and improving services that contribute to the development of business knowledge. Its goal is to help you visualize your work, increase efficiency and continuously improve your business. From Japanese, kanban is translated as billboard or sign.

Kofax – one of the leading American companies that supplies solutions for process management, their automation and for retrieving, managing, digitally signing and archiving documents.

KPI (Key Performance Indicator) – a measurable value that shows how effectively the organization achieves key business goals.

L

LCDP (Low-Code Development Platform) – a platform that provides a development environment for creating application software through a graphical user interface, instead of traditional hand-coded computer programming. In addition to helping you reduce the amount of traditional manual coding, it also enables accelerated delivery of business applications. The main advantage is that a wider range of people can contribute to the development of the application – not just developers.

LDAP (Lightweight Directory Access Protocol) – an industry standard application protocol (open type and vendor independent) for accessing and maintaining distributed directory information services via the Internet Protocol network.

License – when we talk about a software license, it is a legal instrument (usually through contract law, with or without printed material) that regulates the use or redistribution of software. A typical software license grants the licensee, usually the end user, permission to use one or more copies of the software.

Life cycle of a document – the sequence of stages through which a document goes from creation to possible archiving or destruction

LOB applications (eng. Line of Business) – applications necessary for business. They are most often divided by industry and business department or sector.

M

MD (eng. Man/Day) – service defined as the work done by one person within one working day.

Migration – in IT refers to a process that converts data processing or information systems into different technologies. The components affected by the migration can be, for example, software, data, hardware and applications.

MoRe – a modular platform for the digitization of your business, with which you can safely and efficiently manage business content, processes and repositories. The platform fully adapts to the specifics of your business, from forms, searches, templates to business processes with high performance. It seamlessly integrates with any of your existing platforms, applications, systems or repositories.

N

Nintex – software company and market leader in the field of process management and their automation. It enables easy management, automation and optimization of processes without the use of code.

Nuxeo – a software company that develops an open source content management system.

O

OAuth (eng. Open Authorization) – an authentication protocol that allows you to authorize the interaction of one application with another application, on your behalf, without providing a password.

OCR (Optical Character Recognition) – technology that recognizes text within a digital image. It is most often used to recognize text in scanned documents and images.

OfficePoint – the central place of your electronic office business, the implementation of which ensures the standardization of business processes related to the lifetime of all documents received or created within the organization. Also, the management of business content becomes simpler, faster and safer, and the need for physical circulation of paper is reduced to a minimum.

OMR (Optical Mark Recognition) – technology that enables machine reading of human input on structured documents and forms (eg surveys, application forms, etc.).

On-Prem (On-premises software) – a form of software that is run and used from the computer of the person using the software.

Open source – software with source code that anyone can review, modify and improve.

ORM (eng. Object-Relational Mapping) – programming technique for converting data between incompatible type systems using object-oriented programming languages. This creates a “database of virtual objects” that can be used within the programming language. Among the better-known examples of ORM libraries is certainly Hibernate, while MyBatis is one of the better-known mapping layers.

OTP (eng. One-time Password) – a one-time password, also known as a one-time PIN or dynamic password, is a password that is valid only for one login session or transaction on a computer system or other digital device.

Out of the box – refers to product features and functionalities that work immediately after implementation without additional configurations and modifications.

Output management – a strategy based on which organizations manage, shape and distribute data from their systems and applications.

P

PAdES (PDF Advanced Electronic Signatures) – a set of restrictions and extensions to PDF and ISO 32000-1 that make it suitable for advanced electronic signatures. PAdES specifies precise profiles making it compliant with ETSI (European Technical Standards Institute) standards for advanced and qualified digital signatures.

PDF/A format – ISO standardized version of Portable Document Format (PDF) specialized for use in archiving and long-term storage of electronic documents. PDF/A differs from PDF by prohibiting features unsuitable for long-term archiving, such as font linking (as opposed to font embedding) and encryption.

PPI (Pixels Per Inch) – refers to both the fixed number of pixels that the screen can display and the pixel density within the digital image.

Q

QSCD (Qualified Signature Creation Device) – is a special combination of hardware and software that securely manages cryptographic keys and thanks to which qualified electronic signatures, i.e. seals, can be created.

QTSP (Eng. – Qualified Trust Service Provider) – in accordance with the EU eIDAS regulation, it is a seal of quality with strict requirements for the quality and security of transactions. The aim of these requirements is to increase the trust of consumers and businesses and to promote the use of qualified trust services. Indicates a qualified trust service provider such as a qualified timestamp.

Qualified electronic signature – it is equivalent to a handwritten signature and is indisputable. It requires the signatory to possess a personal qualified certificate and pass certain identity checks by the Certification Authority. The signature must be stored and used with a secure signature creation device (QSCD – Qualified Signature Creation Device).

R

RDBMS (eng. Relational Database Management System) – a database management system that includes a relational data model, which usually includes a structured query language (SQL) programming interface. In a relational database, relationships between data items are expressed using tables.

Records management – records and information management is an organizational function dedicated to the management of information in the organization during its life cycle, from the moment of creation or receipt to its final release. It includes identifying, classifying, storing, securing, locating, tracking and destroying or permanently preserving records.

Repository – in the context of source code management (see source code management) refers to a data structure that is usually stored on a server, and may contain a set of files and directories, a historical record of changes to the repository, and a set of commit objects. In the context of DMS, it is a central place where data, documents, records are stored… according to a certain organized system.

REST API or RESTfulAPI (Representational State Transfer) – an architecture style for an API that uses HTTP requests to access and use data. This data can be used for GET, PUT, POST, and DELETE data types, which refer to read, update, create, and delete operations related to resources. In the context of RESTful web services, it is a style of architecture and communication approach that is often used in the development of web services.

S

SaaS (Software as a Service) is a software licensing and delivery model in which the software is licensed on a subscription basis. SaaS applications are also known as software on demand and web-based software.

SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between parties, especially between identity providers and service providers. SAML is a markup language (based on XML) for security assertions—statements that service providers use to make access control decisions.

Scrum – a framework that uses agile thinking to develop, deliver and maintain complex products, with an emphasis on software development, although it is also used in other fields. It is designed for teams of ten or fewer members, who divide their work into goals that can be achieved within time-limited iterations, so-called. sprints, no longer than a month, and usually two weeks. The Scrum team evaluates progress through daily meetings of 15 minutes or less. At the end of the sprint, the team holds two further meetings: a sprint review, which presents the work done to stakeholders, to get feedback, and a sprint retrospective, which provides the team with space for reflection and improvement.

SDK (eng. Software Development Kit) – a collection of software development tools in one installation package, which facilitate the creation of applications by having a compiler, a debugger and mainly a software framework. They are usually specific to a combination of hardware platform and operating system.

SharePoint – Microsoft SharePoint is a web platform used to share files and information. It is designed to provide teams with the ability to collaborate, such as project management, messaging, shared storage and document work, and is often used for intranet solutions.‎

Shell – the name for the interface between a person and the core (kernel) of the operating system. The classic shell is a text shell, that is, a command shell, which justifies its second name – command prompt. It is a text-based computer interface as opposed to a graphical (GUI) interface, i.e. a GUI shell.

Signature screen – a device that electronically records a person’s hand signature on an LCD touch pad using a special pen. Once retrieved, digital signatures can be imported into and used by most ID software and security programs. Signatures can also be digitally stored for future reference.

A simple electronic signature – any signature in electronic form (e.g. a signature in an email), has no special legal requirements and is considered an e-signature with a placebo effect.

Single sign on is an authentication scheme that allows a user to log in with a single password and username to any of several connected but independent software systems, without the need to re-enter authentication factors.

SLA (Service Level Agreement) – Service Level Agreement. It is most often associated with maintenance contracts that define required service level objectives such as: response time, resolution time, support time, and the like.

Smart form (K2 Smartforms) – a flexible and powerful platform for creating forms without coding, on which you can build your own user interface, configure rules and integration using drag and drop functions.

Software Assurance – software assurance is defined as the level of confidence that the software has no vulnerabilities and that it functions as intended. It also provides for free upgrades to newer versions of the software.

Source code management (source code versioning) – a software procedure in which the source code is stored in a central database, that is, a repository where every code change throughout history is recorded.

T

TCP/IP (Transmission Control Protocol/Internet Protocol) – a standard Internet communication protocol that enables computers to communicate over long distances. The Internet Protocol Suite provides end-to-end data communication, specifying how data should be packaged, addressed, transmitted, routed, and received.

Token – hardware or software that provides the right to perform operations such as session token – a unique identifier of an interaction session. A security token or hardware token, authentication token or cryptographic token, is a physical device for authenticating a computer.

TWAIN (Technology Without An Interesting Name) – a standard used to pull images from a scanner or digital camera directly into a software application that supports this method.

U

UAT (User Acceptance Testing) is one of the last stages of the software development life cycle. It is performed after the software has been thoroughly tested. It is sometimes described as end-user testing.

UML (eng. Unified Modeling Language) – a development language for general-purpose modeling in the field of software engineering, the goal of which is to provide a standard way of visualizing system design.

Use Case – a specific situation in which a product or service could potentially be used.

UX (eng. User Experience) – user experience is a person’s perceptions and reactions resulting from the use or intended use of a product, system or service. It encompasses a person’s perception of usefulness, ease of use, and effectiveness. Improving the user experience is important for most companies, designers and creators when creating and improving products, because a negative user experience can reduce the use of the product and, therefore, any desired positive effects.

X

XAdES (eng. XML Advanced Electronic Signatures) – a set of extensions for XML digital signatures that make them suitable for advanced electronic signature.

XML (Extensible Markup Language) – a simple text-based format for representing structured information: documents, data, configuration, ledgers, transactions, invoices, etc. It is derived from an older standard format called SGML (ISO 8879), to be more suitable for web usage.

V

Value Stream Mapping is a lean management method for analyzing the current state and designing the future state, for the series of events that are required to bring a product or service to the end user. It is also a visual tool that shows all critical steps in a certain process and easily quantifies the time and volume required at each stage.

Value Stream Transformation – a systematic approach to achieving sustainable improvements in workforce, quality, delivery and costs, while simultaneously developing a culture of continuous improvement within the business.

Virtualization – virtualization refers to the way of creating a virtual version of computer resources. This may include virtual computing hardware platforms, storage devices, and computing network resources. From the outside, for the user (human or program) there is no difference between the real and the virtual version. There are virtualizations of memory, applications, workspace, data storage, network, etc.

Virtual machine – the so-called a virtual machine is an emulation of a computer system. Virtual machines are based on computer architecture and provide the functionality of a physical computer. Their implementations may include specialized hardware, software, or a combination thereof. In other words, it is an efficient duplicate of a physical computing machine. There are system and process virtual machines.

W

Workflow – a sequence of activities or a path that describes the order in which certain activities necessary to perform a task take place.

Make digital transformation your cup of tea.

Subscribe to our newsletter and find out how technology can improve your business.

    I hereby agree to receive commercial information by electronic means from Asseco South Eastern Europe Group.

    Providing information in a form and expressing consent to receive commercial information by electronic means from Asseco South Eastern Europe Group is voluntary, but also necessary to receive it. I have the right to access and correct my personal data. Asseco South Eastern Europe S.A. seated at 14 Olchowa St., Rzeszów, Poland is the administrator of personal data. The data are available to other companies within Asseco South Eastern Europe Group (including those based outside the EEA).
    The personal data contained in the above form will be processed in order to respond to enquiries, send offers and for marketing purposes. Click here to see our Privacy Policy. If you want your contact information to be deleted, please send a request to dpo@asseco-see.hr, indicating the data provided in a form during a registration.

    Home
    Account
    Cart
    Search