24/7 adj always available: 24 hours per day. 7 days per week. Implies permanence, stability, and quality.
3G adj (see also G3 n) Third generation of wireless services. 3G technologies are expected to bring many new services to the wireless marketplace, making high-Speed Internet connectivity available virtually everywhere, all the time.
ADSL A DSL line where the upload speed is different from the download speed. Usually the download speed is much greater.
analog adj 1: Of or relating to a device that stores, manages or detects information on a variable scale.
2: Not digital. Often implies old, inferior, or outdated.
API n Acronym for application programming interface. A way for an application program to access services from either another program or an operating system. Implies flexibility and customisability.
n A software program that provides services directly to a user or to another program. Usually refers to a program that is not part of a computer’s operating system, but uses the services of the operating system.
Server software that manages one or more other pieces of software in a way that makes the managed software available over a network, usually to a Web server. By having a piece of software manage other software packages it is possible to use resources like memory and database access more efficiently than if each of the managed packages responded directly to requests.
architecture n 1: The plan by which a structure is assembled and held together.
2: a bewildering PowerPoint slide consisting of colourful, oddly juxtaposed geometric shapes interspersed among clouds, all connected by lightning-bolt ligatures and said to depict the way a product works.
3: a strategy for diverting attention from the apparent lack of foresight in earlier, less-complete versions of the project depicted in the PowerPoint slide
ASP n 1: Acronym for application service provider. A company that offers customers access to application programs or data services through the Internet that otherwise would only be available on the customer’s own computers.
2: Acronym for Active Server Pages: a Microsoft technology for customising a Web page delivered by a Microsoft Windows – based Web server before it is sent to a client browser.
ATOM An evolving protocol for syndication and sharing of content.

Atom is being developed as a succesor to and improvement over RSS and is
more complex than RSS while offering support for additional features
such digital signatures, geographic location of author, possibly
security/encryption, licensing, etc.

Like RSS, Atom is an XML-based specification

autonomation Stopping a line automatically when a defective part is detected


B2B adj Acronym for business-to-business. Referring to business exchanges of products or services carried out over the Internet between two businesses. Implies that it s more likely to be profitable than B2C.
B2C adj Acronym for business-to-consumer. Referring to a retail exchange of products or services carried out over the Internet between a business and a non-business consumer. Implies that it is less likely to be profitable than B2B.
back end n A hardware or software system that supplies date and/or other services upon request to a front-end system or application. Usually refers to a database or a server that hosts a database or other application.
bandwidth n The speed at which data moves through a transmission medium. Eg the speed that data moves from one computer to another over an Internet connection such as a telephone modem or an Ethernet. Can also refer to the Speed at which data moves from one part of a computer system to another within the same computer.
best of breed n 1: Superiority in a defined category.
2: Defining an area narrowly enough so anyone can claim superiority in a category.
3: A really expensive pet
beta, or beta test n A final (usually second) prerelease test of a system of software application carried out by a sample of the intended user community. Used to ensure that a product is ready for release to a user
blog (weB LOG) A blog is basically a journal that is available on the web. The activity of updating a blog is “blogging” and someone who keeps a blog is a “blogger.” Blogs are typically
updated daily using software that allows people with little or no technical background to update and maintain the blog
botnet An army of infected computers controlled remotely by hackers and used for distributing spam and viruses to hijack other computers.
broadcast n A directed one-way communication from one person, system, or application to many others. At the user level, it often refers to an e-mail sent to many recipients. In a more technical setting, it may refer to a message sent by one component of a system or network to others for purposes of coordination.
adj Indicates that a company claims in its marketing literature that its product supports whatever industry standard or management fad is currently in vogue.


Carding Theft and fraud committed using a credit card.
certification authority, or certificate authority n An organisation that issues and verifies digital certificates as part of a public key infrastructure; a method of securing communications over the Internet.
CIO n Acronym for chief information officer. Usually the title given to the head of an internal information systems department.
circa Less than 🙂
CKO n Acronym for chief knowledge officer. A title given to a manager of executive charged with overseeing knowledge management within an organisation.
CLERP The Corporate Law Economic Reform Program (Audit Reform and Corporate Disclosure) Act 2004 (also known as CLERP 9) became law on 1 July 2004. You need to put in place adequate measures, processes and procedures to meet the new obligations of the Act, especially if you’re involved in auditing and company financial reporting.
Client n A software application or system that requests services from a server application or system.
cold fusion An application development tool from Allaire Corporation, Cambridge, MA, (, for writing Web pages that interact with databases.  Instead of writing tedious CGI and Perl scripts, operations are coded in the Cold Fusion Markup Language (CFML) which uses HTML-like tags embeddedin the Web pages. The Cold Fusion engine, which interfaces with a Windows-based Web server, interprets the codes, accesses the database and delivers the reulsts as HTML pages for the Web browser.
CM n Acronym for contract manufacturers. Electronically linked, non-affiliated organisations that manufacture (or assemble) components based on ECO and MCO specifications.
compatible adj Not incompatible. Indicates that a system or application will continue to work with other systems that support a particular technical standard, but will not take advantage of the standard. Contract with –compliant
compiler n A software application that translates source code (programmer-readable instructions) into object code (computer-readable instructions).
compliant adj Indicates that a system or application supports a particular technical standard. Eg This new application is completely XML-compliant. Antonym –compatible.
configure v 1: To select the specific functions contained in the software that you want to use.
: To completely rewrite those functions so that they don’t destroy your company.
content n 1: Data or information that may be stored, retrieved, or searched, including text, audio, or video. Usually refers to material that either is or may be stored on a computer system.
2: Information that is part of a system that is not a component of the system’s infrastructure. One analogy would be water pipes, faucets, and drains being part of the infrastructure of a water system, and the water itself is the content of the system.
cookie n The most common meaning of “Cookie” on the Internet refers to a piece  of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. Depending on the type of Cookie used, and the Browsers’ settings, the Browser may accept or not accept the Cookie, and may save the Cookie for either a short time or a long time. Cookies might contain information such as login or registration information, online “shopping cart” information, user preferences, etc.When a Server receives a request from a Browser that includes a Cookie, the Server is able to use the information stored in the Cookie. For example, the Server might customize what is sent back to the user, or keep a log of particular users’ requests.Cookies are usually set to expire after a predetermined amount of time and are usually saved in memory until the Browser software is closed down, at which time they may be saved to disk if their “expire time” has not been reached.Cookies do not generally read your hard drive and send your life story to the CIA, but they can be used to gather more information about a user than would be possible without them
CRM n Acronym for customer relationship management. Sometimes called sales force automation (SFA). A category of software applicants designed to collect, store, and use information about the customers of an organisation. The typical uses of the information include marketing, support, sales, and customer service.
Cross Docking In warehouse management, the method of sending parts from receiving directly to shipping to be placed in outgoing orders. Cross docking allows orders to be filled quickly and precludes parts from staying in a warehouse long enough to be counted as inventory
CXO n A term used to refer to a group of executives or executives in general with titles such as chief information officer, chief financial officer, chief executive officer, chief knowledge officer, etc.


database n A system or software application that stores, collects, orders, and provides access to digital data such as text, numbers, pictures, audio, or video. Database systems may be categorised by how they store and retrieve data, how many users may simultaneously use the system, or what languages may be used to access the data. Categories include relational, object-oriented, hierarchical, flat, multiuser, and
single-user. Most databases today support the industry standard language SQL (structured query language).
DB n Database
deployment n 1: Putting new software onto the PCs of the people who will use it.
2: A “scaled deployment” where consultants install the new software only on the computers of people they really dislike.
digital adj 1: Of or relating to a system or device that stores and processes data as binary digits.
2: Not analog. Often implies new, improved or superior.
digital certificate n A component of a public key infrastructure that allows users to secure communications over the Internet. Digital certificates are issued by certificate authority organisations to
disaster recovery adj Relating to planning or carrying out of activities to help an organisation manage a major system failure. A disaster recovery plan, sometimes called a business continuity plan, is intended to prepare an
organisation for rapid restoration of technical operations in the event that a disaster impairs the current computing facilities. Usually intended to prepare for events such as fire, flood, or earthquake affecting computer facilities.
disintermediation The term used to describe the process whereby channel partners are cut out of the sales cycle via the Internet. Re-intermediation describes how these important players are brought back into the process by means of the same technology. e-Business and inter-company integration offer the promise of further productivity gains from information technology use
Domino n The name of the messaging server product that is the hub of a Lotus Notes installation.
dynamic adj 1: Capable of change or customisation.
2: Not static or fixed. Often refers to a Web page that may be programmatically altered to automatically adjust the content for a specific user rather than one that looks the same for every user.
The management all run around like chooks with their heads cut off


E-Procurement E-procurement is the business-to-business purchase and sale of supplies and services over the Internet. An important part of many B2B sites, e-procurement is also sometimes referred to by other terms, such as supplier exchange. Typically, e-procurement Web sites allow qualified and registered users to look for buyers or sellers of goods and services. Depending on the
approach, buyers or sellers may specify prices or invite bids.Transactions can be initiated and completed. Ongoing purchases may qualify customers for volume discounts or special offers.E-procurement software may make it possible to automate some buying and selling. Companies participating expect to be able to control parts inventories more effectively, reduce purchasing agent overhead, and improve manufacturing cycles. E-procurement is expected to be integrated with the trend toward computerised supply chain management.
ITBA Acronym for Earnings Before Interest, Taxes, Depreciation, and Amortisation
ECO n Acronym for engineering change order. A document that describes changes to engineering specifications of a product or system.
EDI n Acronym for electronic data interchange. An industry standard message format for electronically exchanging information between suppliers and buyer. The EDI standard predates the popularity of the Internet.
End-to-end adj 1: Encompassing the whole process or methodology from back office to the end user.
2: Often confused with “There’s no end-to-end in sight”
enterprise adj Of or relating to interconnected systems throughout a large, multisite organisation. Usually used to imply big, large, pervasive, stable, and safe.
ERP n Acronym for enterprise resource planning. A category of software applications designed to automate many of the common functions of a manufacturing organisation. The typical users of the information include product planning, production scheduling, inventory control, purchasing, r processing, and customer service.
expert system A computer program that uses knowledge and reasoning techniques to solve problems that normally require the abilities of human experts. Software that applies human-like reasoning involving rules and heuristics to solve a problem.
exploit A tool used by hackers to take advantage of vulnerabilities in software.
extensible adj Describes a language, protocol, or system that is designed in such a way that it may be easily extended or enhanced in future versions.
extranet An intranet that is accessible to computers that are not physically part of a companys’ own private network, but that is not accessible to the general public, for example to allow vendors and business partners to access a company web site. Often an intranet will make use of a Virtual Private Network. (VPN.)


failover adj Refers to the ability of a hardware or software ystem to respond to a systems failure by automatically switching functions to a backup system without interruption in service or loss of data.
FAQ n Acronym for frequently asked question. Usually refers to a list of commonly asked questions and answers about a specific subject.
firewall n A system designed to secure an organisation’s network against unauthorised outside access. Usually implemented using hardware or software including routers or security applications running on servers.
front end n A hardware of software system that requests data and/or other services from a back-end system or application. Usually refers to a system or application that supplies a direct user interface to a server-based system.
FTP n Acronym for file transfer protocol. A protocol used to transfer files from one computer to another across a network using TCP/IP, the networking language of the Internet.
functionality n Either the totality or a subset of what a software or hardware product can do.


G3 n (see also 3G adj) A central processor used in some Apple osh computers.
gateway n A network device or computer that connects networks together and allows data to flow through between them.
Google It v. (GOO.gul)  To search for information on the Web, particularly by using the Google search engine; to search the Web for information related to a new or potential girlfriend or boyfriend.
GUI n Acronym for graphical user interface. Invented in the late 1970’s at Xerox, popularised by Apple with the introduction of the Macintosh in 1984, and now available as part of most major operating systems, including Microsoft Windows. A GUI is a command interface that allows users to interact with a computer through the use of a pointing device, keyboard, and video monitor, as opposed to earlier test-based, command-line interfaces. Currently GUIs use graphical on-screen elements such as windows, pointers, scroll bars, menus, icons, and buttons for user interaction.


hire-purchase System for financing the purchase of plant and equipment, where the ownership is vested with the lender until the final payment is made. The borrower is required to place a deposit and make periodic (usually monthly) repayments at a flat rate of interest.
hosting, or Web hosting n The business of housing and maintaining data, software applications, or physical servers and a connection to the public Internet for one or more customers
HTML n Acronym for hypertext markup language. The language in which Web pages are transmitted from servers to clients. HTML provides instructions to browser software on how to display text, graphics, sound and other elements of Web pages.
hyperlink n Within a Web page, a hyperlink is connection from any text or graphical element to another document, image, script, or Web page. A user clicks the mouse button with the cursor positioned over the hyperlink to automatically open the linked element.


Implementation n 1: A word that in reality does not appear in any dictionary, making it impossible for users to understand it without going to consultants for an explanation.
2: The work leading up to a new icon appearing on your PC’s Screen.
Infrastructure n 1: The assorted basic subsystems, often unseen, that compose the underlying support for a complex structure or system.
2: decades of mismatched errors in judgement, seen from a distance;
3: all of the stuff you will have to buy from others in order to make something else you’ve already bought work as promised.
Integration n 1: Getting your new software to “talk’, or exchange information, with other computer systems you already have.
: “back-end” integration connects the new software to software used by the anal-retentive types in finance.
3: “front-end” integration is a highly passive-aggressive attempt to use software to prevent customer service representative and salespeople from doing their jobs.
Interactive adj Of or related to a hardware or software system that supports a dialogue between the user and the system. Usually intended to imply exciting, engaging, or superior.
nternet n A worldwide network of millions of computers that communicate with each other using TCP/IP. Often confused with the World Wide Web, which is the most popular way to view information transmitted over the Internet.
IRC Stands for Internet Relay Chat, the key online software used by those who trade in illegal data.
ISP n Acronym for Internet service provider. An organisation that offers Internet connectivity services. An ISP may provide many types of connections to the Internet including telephone modem, cable modem, T-line, DSL, or wireless.
IT n Acronym for information technology.
ITIL ITIL is a framework outlining worldwide accepted best practices for IT Service Management. The concepts within ITIL support IT service providers in the planning of consistent, documented, and repeatable processes that improve service delivery to the business. Logical Partition (LPAR) – The division of a computer’s processors,  memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and applications.


Java n An object-oriented programming language developed by Sun Microsystems that is intended to allow the same code to run on any operating system platform.
JavaScript n A programming language originally developed by Netscape Communications that is loosely related to Java; meant to be easy to use for small tasks.


Key Performance
Indicator (KPI)
Key performance indicators are measurements believed by an organisation to be indicative of its business performance. A KPI for a company concerning production monitoring and control for example, might include inventory record accuracy expressed as a percentage.
Keylogger A Trojan or software that records every computer keystroke to capture personal details, including passwords


LAN n Acronym for local area network. A data network that connects computers and other devices together in a small geographic area, eg one building, or one floor of one building.
legacy n 1: something old.
2: something blue (IBM, that is).
3: some stuff you have previously bought from a vendor now trying to sell you something else that will actually make what you bought before more useful.
legacy system n A hardware system, software application, or data that is still in use but built with technology that is no longer considered current. Usually refers to systems on mainframe or minicomputers
Linux n A free, open-source operating system based on Unix that has been developed by programmers all over the world as part of a project started by Linus Torvalds at the University of Helsinki in Finland.


MCO n Acronym for manufacturing change order. A document that describes changes to the manufacturing specifications for a product
methodology n A set of practices, procedures, and principles that govern the delivery of a service. In technology projects, a methodology is intended to guide participant activity and ensure predictable outcomes. In systems development and deployment projects, methodologies are frequently discussed, but rarely followed rigorously.
middleware n 1: Software that enables one application to communicate with another.
2: An extra layer of something that a vendor insists you need – you buy it, but you’re still unsure of what it does.
money mules People who cash out credit card accounts in exchange for a share of the proceeds.


next generation n 1: a stage or period of sequential technological development and innovation.
2: stage after the first generation is a flop.
3: the best of the Star Trek series – except for the ones featuring Wesley
NOS n Acronym for network operating system. An operating system developed to allow a computer to offer services to other devices on a network including file sharing, print, database, and security.


object code


n A machine-readable version of source code after it has been translated by a compiler.
object-oriented adj A popular programming concept that allows software to be designed around objects.
open adj An open system maintains a publicly available set of interfaces that may be accessed by other software. Not to be confused with open source systems.
open source adj Open source software not only makes interfaces publicly accessible, but also makes the source code of an application or operating system publicly available for inspection and sometimes modification. The most famous example of open source software is the Linux operating system.
open standards n 1: When the design of a program is made freely available to the technology community.
2: Proponents of open standards tend to be ageing hippies who can’t understand why other people are trying to make money off their work.
3: The result of 10 years of blind dates, family fix-ups and the bar scene.
operationalise v 1: To complete an implementation.
2: More specifically, when an implementation is completed by consultants who got rejected for medical school and decided to attend business school instead.
OTE On Target Earnings




n Acronym for personal digital assistant. A small mobile computer that may or may not be wirelessly networked. Current models usually offer such services as calendar, to-do lists, notes, and address book function with many additional features available as add-on software.
phishing Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them
PL/SQL (Procedural language/SQL) n A programming language from Oracle that is used to write triggers
and stored procedures that are executed by the Oracle DBMS. It is also
used to add additional processing (sorting and other manipulation) of the
data that has been returned by the SQL query. A PL/SQL program is
structured as a “block,” which is comprised of a declaration, executable
commands and exception handling section.
platform n 1: A firm foundation or place to stand. 2: The elemental
technology (often a flavour of Microsoft Windows) under whose auspices a
piece of application software is engineered to run. 3: A rigid
technological standard that constrains interoperability of systems and
which the “open source” ideology seeks to overthrow (see open standards)
portal n A website that serves or is capable of serving as a starting
point for many users. Some portals provide general interest information to
the public, such as Yahoo, Netscape, and MSN. Others offer information and
guides to specific subject matter such as financial information. Still
others are private portals devoted to organisation information.


Describes a system that is owned and controlled by a
single company or organisation. May or may not provide public interfaces
for other systems and software to access.

n A set of rules by which communication is structured. For example,
the TCP/IP collection of protocols includes HTTP and FTP. Both the sender
and receiver systems or applications must recognise and observe a protocol
for it to function correctly. Protocols may be publicly recognised
industry standards or may be proprietary.
proxy server A buffer between the hacker and the open internet that connects to web
pages on behalf of hackers, helping them to cover their tracks.

n Acronym for professional services automation. A category of
software applications designed to automate the operations of a
professional services organisation. The typical uses of the information
include project management, personnel resource allocation, expense
tracking, invoicing, and knowledge management.

public key infrastructure
n Allows users to secure communications over the
Internet through the use of public key encryption, a method of
encoding messages such that only the intended recipient can
read them. Public key is the most commonly used form of
Internet security. Components of the infrastructure include
digital certificates that are issued by certificate
authorities after being authorised by a registration



registration authority
n A component of a public key infrastructure that
allows users to secure communications over the Internet. A registration
authority verifies a request for a digital certificate and authorises the
certificate authority to issue a digital certificate to an applicant.
relation database n The most common form of database software application
that provides the storage and retrieval of information. Relation databases
use tables to store data that can be accessed using the SQL language.
robust adj 1: strong and healthy; full of vigour; sturdy; origin “roe” – fish
eggs; “bust” – to break; to make penniless, as in “This ERP system stinks
like broken fish eggs”
router n A physical device on a computer network designed to connect parts of
the network and to forward digital messages from one segment of a network to
another. Some routers can also be configured to filter messages providing
security services.


Sarbanes-Oxley (SOX) The Sarbanes-Oxley Act (officially titled the Public Company Accounting
Reform and Investor Protection Act of 2002), signed into law on 30 July 2002
by President Bush, is considered the most significant change to federal
securities laws in the United States since the New Deal. It came in the wake
of a series of corporate financial scandals, including those affecting
Enron, Arthur Andersen, and WorldCom. The law is named after sponsors
Senator Paul Sarbanes (D-MD) and Representative Michael G. Oxley (R-OH). It
was approved by the House by a vote of 423-3 and by the Senate 99-0.The act was designed to review dated legislative audit requirements. The
goal of the act was to protect investors by improving the accuracy and
reliability of corporate disclosures. The act covers issues such as
establishing a public company accounting oversight board, auditor
independence, corporate responsibility and enhanced financial disclosure.
scalable adj 1: refers to newer versions of software of hardware that can easily be
added later. 2: refers to newer versions of software or hardware that the
salesperson claims can easily be added later.
self-starter n: the middle management were all retrenched recently.
server n: A hardware or software system that provides data or other services upon
request of a client application or system. Usually refers to centralised
systems that provide database, network, file, or print services.

service level agreement
n 1: A contract that stipulates the degree to which consultants will be held
responsible for problems they have when running your software for you.
sexy adj 1: exciting; glamorous, erotic. 2: term used by vendors to
describe their hot technology offerings as in “Our CRM package is sexy; your
IS people will drool over the functionality of this sassy little package”.
3: let’s get real: technology products are about as sexy as Benny Hill in a

n Acronym for sales force automation. Sometimes called customer
relationship management (CRM). A category of software applications designed
to collect, store, and use information about the customers of an
organisation about he customers of an organisation. The typical uses of the
information include marketing, support, sales and customer service
shareware n 1: Copyrighted programs made freely available for a limited time,
after which a fee is expected for continued use. 2: A source of infinite
frustration to IT staffers who frequently find employee computers clogged
with disabled programs; 3. What happened at uni when your roommate ran out
of laundry coins.
skimming Stealing credit card information during a legitimate
transaction, often using a device hidden in a store’s card

software application integration
n The process of design, analysis, programming, and
testing of software and hardware systems necessary to allow two or more
software applications to work together, eg exchanging data and taking
Solution n 1: the state of being solved. 2: an explosive mixture of two or
more substances, such as “vendor” and “tech budget” 3: if it actually solves
a narrowly defined problem, it is bound to create many more headaches.

, or source code
n Programmer-readable instructions written in a high-level language
that can be compiled into machine-readable object code.

n Acronym for structured query language. An industry standard
language for interacting with relational databases.


taylorism The study of work and job performance as advocated by F.W. Taylor (1856 – 1915).

According to Taylor, work comprises of two fundamental steps. Firstly, the planning and articulation of work including job content and performance standards. Secondly, the conduct of job tasks laid down by company-wide standards. In order for maximum benefit, workers must be trained for tasks for which they are required to perform, while a close co-operation between management and workers must be maintained. Taylorism is also known as “scientific management”.

TCP/IP n Acronym for Transmission Control Protocol/ Internet Protocol. A suite of protocols originally developed for the US Department of Defence to transmit data between computers over a network.
to $85K They will pay up to (dollar remuneration), k = thousand
total cost of ownership (tco) In supply chain management, the total cost of ownership of the supply delivery system is the sum of all the costs associated with every activity of the supply stream. The main insight that TCO offers to the supply chain manager is the understanding that the acquisition cost is often a very small portion of the total cost of ownership.
transaction n A sequence of programmatic actions that are grouped
together as a single unit. Transactions are used in many sophisticated
applications to ensure that operations that are started are completed rather
than partially completed. If any part of a transaction fails, the entire
transaction set of instructions is rolled back.
trojan Malicious software that can hijack a computer or alter an otherwise safe web page.
turn around time This term is often used to mean the total elapsed time to repair or refurbish a machine from the time the repair or refurbishment is initiated to the time the machine is ready again for use.
turn key adj 1: describes a system that can be started up with the proverbial turn of a key.
2: describes a system that when key is turned, sputters, sparks and groans like the engine of a 1972 Valiant, or
3:type of outsourcing method that turns over to the subcontractor all aspects of manufacturing including material acquisition, assembly and testing. Its opposite is consignment, where the outsourcing company provides all materials required for the products and the subcontractor provides only assembly equipment and labour.


UNIX n An operating system originally developed at Bell Labs in 1969. Today
there are many variants of Unix, including versions from Sun Microsystems
and the popular free version Linux.

n Acronym for
uniform resource locater. An address that indicates a resource, location,
and protocol for accessing information, over the Internet. Eg is a URL for a
specific resource, in this case a file (x.html) on the server (www) located in
the domain ( that can be accessed using the http protocol
(indicated by
Http://). URLs can indicate locations
of many resources on the Internet, including files and Web pages.

usability testing
n 1: A process by which software companies improve the look and feel
of their software by asking users to try beta copies of the product and give
feedback on things like ease of use, task time and so on. 2: A well-known
myth of the software world that no humans were harmed in the testing of this



Acronym for value-added reseller. A company that buys computer
hardware and software and resells it to consumers or companies along with
services such as design, support, or customisation.

n Acronym for
Visual Basic. An object-oriented programming language developed by
VoIP Voice over Internet
Protocol. The technology used to transmit voice
conversations over a data network using the Internet Protocol. Such data
network may be the Internet or a corporate Intranet.
vulnerability A security hole in a piece of software that
makes the computer susceptible to infiltration by hackers.



Acronym for wide area network. A communication system that
interconnects geographically separated computers or local area networks

n Acronym for
wireless access protocol. A protocol to standardise how wireless devices
communicate with each other and with wired devices.
webinar A
Webinar is a Web-driven workshop. It is “asynchronous,” meaning that it does
not takeplace in real time. Instead, you log in when you have the time in order to
wi-fi Short for ‘wireless
fidelity’. A term for certain types of wireless local area networks (WLAN)
that use specifications conforming to IEEE 802.11b. WiFi has gained
acceptance in many environments as an alternative to a wired LAN. Many
airports, hotels, and other services offer public access to WiFi networks so
people can log onto the Internet and receive emails on the move. These
locations are known as hotspots


A GUI element that sections off part of a screen and contains an
application, document, or message.

n Microsoft
Windows. A series of operating systems designed by Microsoft that provides a
GUI for personal computers and servers


Refers to computer hardware and software designed around the
standard established by Microsoft (which supplies the Windows operating
system) and Intel (Which supplies microprocessors and other electronic
components of the hardware).

adj Refers to
communication, usually digital, via electromagnetic waves rather than via
copper wires or fibre optics. Can refer to Internet connectivity, cell
phones, pagers, radio, television, or other broadcast or bidirectional

world wide web

A massive collection of hundreds of millions of HTML
documents and applications stored on computers connected to the Internet and
delivered to browsers by Web-server applications. Often confused with the
Internet, which contains much more than just the Web. The most popular way
to view information delivered over the Internet.

n A small
program that secretly infiltrates a computer system and replicates itself,
often with the intention of crashing the system or damaging the data within
the system.



Acronym for extensible markup language. An emerging industry standard
widely expected to revolutionise business use of the Web by standardising
many forms of business transactions. XML offers a way of providing context
for data by attaching tags to data that can be read by any program that
understands XML. It is extensible because it is an open-ended standard that
allows nearly unlimited extensions to be defined.



  • CareerCafé is always on the hunt for ICT (Information Technology & Computing) specialists.

    Equipped with a good resume, we can approach clients who have an “open” specification lodged with us as a requirement.

    All applications are treated with dignity, respect, and privacy.

    Please note: we cannot assist those without a full “work-ready” visa - not a holiday visa or a variant of a 457 – sorry!