Glossary

   PlatformApplicable to all products in Temenos Journey Manager.  |   All Personas

  • A/B testing (bucket tests or split-run testing) is a randomized experiment with two variants, A and B. It includes application of statistical hypothesis testing or "two-sample hypothesis testing" as used in the field of statistics. A/B testing is a way to compare two versions of a single variable, typically by testing a subject's response to variant A against variant B, and determining which of the two variants is more effective.
  • Any transaction that has been deemed as Abandoned in Manager. When a user leaves the application without explicitly canceling it, the transaction lives in Started status for a period defined in Manager, after which it is considered as an Abandoned transaction.
  • Acquisition is the process of capturing data to start the process of becoming a new customer
  • AcroForms are the original PDF forms technology that accepts input in both Forms Data Format (FDF) and XML Forms Data Format (XFDF). Many 3rd party vendors support AcroForms.
  • Active Directory Federation Services.
  • Adobe Flash is a deprecated multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications, mobile games and embedded web browser video players. Flash displays text, vector graphics and raster graphics to provide animations, video games and applications. It allows streaming of audio and video, and can capture mouse, keyboard, microphone and camera input. Related development platform Adobe AIR continues to be supported.
  • Adobe LiveCycle Enterprise Suite (ES4) is an service-oriented architecture Java EE server software product from Adobe Systems used to build applications that automate a broad range of business processes for enterprises and government agencies. LiveCycle ES4 is an enterprise document and form platform that allows capturing and processing information, delivering personalized communications, and protecting and tracking sensitive information. It is used for purposes such as account opening, services and benefits enrollment, correspondence management, request for proposal processes, and other manual based workflows.
  • Agile software development is an approach to software development under which requirements and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customer/end user.
  • Association for Automatic Identification and Mobility (AIM) is an industry trade group that developed and standardized bar codes, Automatic identification and data capture.
  • The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users).
  • Amazon CloudFront is a content delivery network (CDN). It is integrated with Manager to provide an easy way to distribute static content such as images to end users with low latency, and high data transfer speeds. This improves the speed at which forms load, providing a better customer experience. It also reduces load on theManager servers, resulting in a higher transaction throughput per server.
  • AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs.
  • AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses FIPS 140-2 validated hardware security modules to protect the security of your keys. AWS Key Management Service is integrated with most other AWS services to help you protect the data you store with these services. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.
  • Amazon Redshift is an Internet hosting service and data warehouse product which forms part of the larger cloud-computing platform Amazon Web Services. It is built on top of technology from the massive parallel processing (MPP) data-warehouse company ParAccel to handle large scale data sets and database migrations.
  • An Amazon Resource Name (ARN) is a file naming convention used to identify a particular resource in the Amazon Web Services (AWS) public cloud. ARNs, which are specific to AWS, help an administrator track and use AWS items and policies across AWS products and API calls.
  • Amazon S3 is object storage built to store and retrieve any amount of data from anywhere – web sites and mobile apps, corporate applications, and data from IoT sensors or devices. It is designed to deliver 99.999999999% durability, and stores data for millions of applications used by market leaders in every industry. S3 provides comprehensive security and compliance capabilities that meet even the most stringent regulatory requirements.
  • Amazon Simple Email Service (SES) is a pay-per-use service that allows you to build in email functionality into an application that you are running on AWS.
  • Amazon Simple Queue Service (Amazon SQS) is a pay-per-use web service for storing messages in transit between computers. Developers use SQS to build distributed applications with decoupled components without having to deal with the overhead of creating and maintaining message queues.
  • Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform provided by Amazon. It provides a mix of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings.
  • Angular is a platform that makes it easy to build applications with the web. Angular combines declarative templates, dependency injection, end to end tooling, and integrated best practices to solve development challenges. Angular empowers developers to build applications that live on the web, mobile, or the desktop.
  • AngularJS is a structural framework for dynamic web apps. It lets you use HTML as your template language and lets you extend HTML's syntax to express your application's components clearly and succinctly. AngularJS's data binding and dependency injection eliminate much of the code you would otherwise have to write. For more information, see http://angularjs.org/
  • Anti-Money Laundering (AML) refers to existing laws or procedures meant to reduce illegally obtained income. The legal controls that require financial institutions and other regulated entities to prevent, detect, and report money laundering activities.
  • Apache Ant is a software tool for automating software build processes, which originated from the Apache Tomcat project. It was a replacement for the Make build tool of Unix.
  • Apache HTTP Server is free and open-source cross-platform web server software, released under the terms of Apache License 2.0. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation.
  • Apache Kafka is a distributed event store and stream-processing platform, which provide a unified, high-throughput, low-latency platform for handling real-time data feeds. For more information, see https://kafka.apache.org/intro
  • Apache Velocity Templates are used extensively throughout Temenos Journey Manager platformto define html page layout, email body and subject. A template is combined with model containing a number or objects to produce a String. For more information see http://velocity.apache.org/engine/devel/user-guide.html
  • Application Programming Interface.
  • App. js is the root bootstrapping file for an AngularJS project. It's built to serve makers of static single-page apps, so it keeps all page navigation within the session of the webpage. It defines "pages" as DOM nodes that can be instantiated. Pages are HTML elements that have certain generic components like a topbar and content area.
  • An applicant is a person who uses application forms developed, hosted and managed by a Customer or a Client of Temenos Journey Manager. Other names for an applicant are: a customer end user, end user, form user, staff user, adviser, private banker, contact center.
  • Artifactory is a product by JFrog that serves as a binary repository manager, which is an extension to the source code repository where it stores the outcome of your build process, often denoted as artifacts.
  • Assistive Technology is an umbrella term that includes assistive, adaptive, and rehabilitative devices for people with disabilities while also including the process used in selecting, locating, and using them.
  • Automated Clearing House (ACH) is the electronic network used to transfer money between accounts at different institutions.
  • Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the cloud. It provides cost-efficient, resizable capacity for an industry-standard relational database and manages common database administration tasks.
  • Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers.
  • Azure Blob Storage is Microsoft's object storage solution for the cloud. Blob storage is optimized for storing massive amounts of unstructured data. Unstructured data is data that doesn't adhere to a particular data model or definition, such as text or binary data.
  • Azure Key Vault is a cloud service that provides a secure store for secrets. You can securely store keys, passwords, certificates, and other secrets.
  • Azure Queue Storage provides cloud messaging between application components. In designing applications for scale, application components are often decoupled so they can scale independently. Queue storage delivers asynchronous messaging between application components, whether they are running in the cloud, on the desktop, on an on-premises server, or on a mobile device. Queue storage also supports managing asynchronous tasks and building process work flows.
  • Bank Secrecy Act (BSA)/Anti-Money Laundering (AML) is the BSA requires financial institutions to collaborate with the government in cases of suspected money laundering and fraud. Banks must conduct anti-money laundering checks and keep records of suspicious events.
  • A plug-and-play business model that allows multiple participants (producers and consumers) to connect to it, interact with each other, and create and exchange value. Successful platforms attract both producers and consumers, match producers with consumers, and provide seamless integration among participants. Avoka Platform enables account opening and onboarding.
  • Barcode is a machine-readable code in the form of numbers and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control.
  • Base64 is a binary to a text encoding scheme that represents binary data in an American Standard Code for Information Interchange (ASCII) string format.
  • usiness As Usual (BAU) is the view of an organisation, business unit, work team or team member completing their everyday work in the normal way.
  • Is the electronically matching of a person's unique physical characteristics with their account.
  • Business Intelligence and Reporting Tools (BIRT) is an open source data visualization and reporting platform. For more information, see http://www.eclipse.org/birt/
  • Also known as distributed ledger technology (DLT), is a software that is a shared record of information managed by a network of computers rather than a central authority. It is secured using cryptography.
  • Bounce is when a user views a form but never starts it and simply closes the window immediately or navigates away.
  • Any transaction where the applicant (user) did not interact with the web application (form). Navigation across the form or scrolling the page does not count as an interaction. A legitimate interaction is one where a user inputs data into the form in some way, such as text input, radio button input, clicking on a checkbox, clicking the Save button, attaching a file etc. It typically takes 24-48 hours for a transaction in Open status to transition to Bounced status. This time will vary based on the settings configured in Manager.
  • Business Process Modeling Notation (BPMN) is a method of illustrating business processes in the form of a diagram similar to a flowchart.
  • Business Services Group (BSG)
  • CentOS (Community Enterprise Operating System) is a Linux distribution that provides a free, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL).
  • is a record of changes to a software project or other technology product. This type of record has its own format for various types of projects, but is generally useful in showing when and why changes were made, and who made them.
  • The basic account for easy access to your money.
  • Clam AntiVirus (ClamAV) is a free, cross-platform and open-source antivirus software toolkit able to detect many types of malicious software, including viruses. One of its main uses is on mail servers as a server-side email virus scanner. The application was developed for Unix and has third party versions available for AIX, BSD, HP-UX, Linux, macOS, OpenVMS, OSF (Tru64) and Solaris.
  • A command line interface (CLI) is a text-based user interface (UI) used to view and manage computer files.
  • Cloud computing is shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility.
  • Code reuse aims to save time and resources and reduce redundancy by taking advantage of assets that have already been created in some form within the software product development process. The key idea in reuse is that parts of a computer program written at one time can be or should be used in the construction of other programs written at a later time.
  • Any transaction that has been completed by the user and submitted to Manager.
  • A component is the general name for anything that can be dragged from the Palette onto a form. Components can be anything from a single data entry field, to a large complex re-usable block.
  • A content delivery network or Content Distribution Network (CDN) is a system of distributed servers (network) that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the webpage and the content delivery server.
  • Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context. CSP provides a standard method for website owners to declare approved origins of content that browsers should be allowed to load on that website—covered types are JavaScript, CSS, HTML frames, web workers, fonts, images, embeddable objects such as Java applets, ActiveX, audio and video files, and other HTML5 features. For more information, see https://www.w3.org/TR/CSP/
  • Continuous Integration (CI) is a development practice that requires developers to integrate code into a shared repository several times a day. Each check-in is then verified by an automated build, allowing teams to detect problems early.
  • HTTP cookies are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies serve useful and sometimes essential functions on the web.
  • Coordinated Universal Time (UTC) is the primary time standard by which the world regulates clocks and time.
  • Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell a browser to let a web application running at one origin (domain) have permission to access selected resources from a server at a different origin. A web application executes a cross-origin HTTP request when it requests a resource that has a different origin (domain, protocol, and port) than its own origin.
  • An evaluation of credit-worthiness based on financial resources and credit history. Usually expressed as a letter grade (A, B+, etc.)
  • A report on an individual or organisation identifying credit details such as: defaults, judgments, bankruptcies, etc.
  • In contrast to a credit rating, the credit score is a number (600, 700, etc.) indicating an individual's credit-worthiness.
  • A member-owned financial cooperative, controlled by its members and operated on the principle of people helping people, providing its members credit at competitive rates as well as other financial services. Credit unions offer many of the same financial services as banks, but often using a different terminology.
  • Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.
  • Cron is a time-based job scheduler in Unix-like computer operating systems. People who set up and maintain software environments use cron to schedule jobs (commands or shell scripts) to run periodically at fixed times, dates, or intervals.
  • A digital currency that relies on cryptography to validate and secure transactions.
  • Cross-site request forgery (CSRF), also known as one-click attack or session riding, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.
  • CSS stands for Cascading Styles Sheets and is used to define styles for a Maestro Form, including the design, layout, and variations in the form’s display on different devices and screen sizes. The CSS on a Maestro form is primarily taken care of by the Template Designer. The Template Designer will implement the branding and/or styling of the form’s assets.CSS can be applied to the template of the form, individual components, and any other asset associated with a Maestro form.
  • CSS3 is the latest evolution of the Cascading Style Sheets language and aims at extending CSS2.1. It brings a lot of long-awaited novelties, like rounded corners, shadows, gradients, transitions or animations, as well as new layouts like multi-columns, flexible box or grid layouts.
  • CSV is a comma-separated values fil, which s a delimited text file that uses a comma to separate values. A CSV file stores tabular data (numbers and text) in plain text. Each line of the file is a data record. Each record consists of one or more fields, separated by commas.
  • A transaction account, checking account, demand deposit account, or share draft account (at credit unions) is a deposit account held at a bank or other financial institution.
  • Sometimes it is useful to create a re-usable variant of either a simple or complex component. The main variations are: • A component with a re-usable business rule, particularly a validation rule. An email field is an example of this. • A component (radio button or dropdown list) with a specific set of values. An example of this is a dropdown list of States. • A component with a particular XML binding.
  • A customer is a person who uses Temenos Journey Manager to create, host and manage application forms. Other names for a customer is a client.
  • Customer Experience (CX) is the product of an interaction between an organization and a customer over the duration of their relationship. This interaction is made up of three parts: the customer journey, the brand touchpoints the customer interacts with, and the environments the customer experiences (including digital environment) during their experience. A good customer experience means that the individual's experience during all points of contact matches the individual's expectations.
  • Customer Identification Program (CIP) The CIP is a required provision under the USA PATRIOT Act. CIP is more commonly known as KYC.
  • Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed computer security flaws, where each security flaw has a CVE ID number assigned to it for further reference.
  • Customer Experience (CX) is an aggregate of a customer’s A-Z experience with a brand. It is not a snapshot in time, such as a key touchpoint or a critical interaction.
  • Deposit Account Opening ( DAO). DAO bank forms allow users to open Checking, Savings and Money Market Accounts.
  • A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields. For example, a company database may include tables for products, employees, and financial records. Each of these tables would have different fields that are relevant to the information stored in the table.
  • Direct Deposit Account (DDA) is simply a checking or savings account which offers the ability to send and receive funds electronically.
  • The Data Distribution Service (DDS) is a middleware protocol and API standard for data-centric connectivity from the Object Management Group (OMG). It integrates the components of a system together, providing low-latency data connectivity, extreme reliability, and a scalable architecture that business and mission-critical Internet of Things (IoT) applications need.
  • A design is a generic name for a form, receipt, template, or component that you can create in Maestrousing the Maestro editor
  • Design mode displays the editor window so that Maestro assets can be created and updated
  • DevOps is a software development methodology that combines software development (Dev) with information technology operations (Ops). The goal of DevOps is to shorten the systems development life cycle while also delivering features, fixes, and updates frequently in close alignment with business objectives.
  • Achieving a state in which digital tools are being used as intended, and to their fullest extent. It is about more than just basic functions — digital adoption happens when technology becomes second nature to its user.
  • The move to online banking where banking services are delivered over the Internet. The advantages for banks and customers are providing more convenient and faster banking services.
  • Also known as Digital Credential, is the electronic equivalent of an individual's identity card. A digital ID can be presented electronically to prove an individual's identity and their right to access information or services online.
  • A person that grew-up in the digital age and is comfortable with technology.
  • Disaster-Recovery-as-a-Service (DRAAS) is the hosting of servers by a third party in case of a disaster.
  • The Document Object Model (DOM) is a cross-platform and language-independent application programming interface that treats an HTML, XHTML, or XML document as a tree structure wherein each node is an object representing a part of the document. The objects can be manipulated programmatically and any visible changes occurring as a result may then be reflected in the display of the document.
  • DocuSign is the leader in eSignature transaction management. The Temenos Journey Manager platform uses this solution to speed the rate at which all digital documents are completed, signed, and returned.
  • The Document Object Model is a cross-platform and language-independent interface that treats an XML or HTML document as a tree structure wherein each node is an object representing a part of the document. The DOM represents a document with a logical tree.
  • Domain Transfer Object (DTO)
  • Web accessibility, or eAccessibility, is the inclusive practice of ensuring there are no barriers that prevent interaction with, or access to, websites on the World Wide Web by people with physical disabilities, situational disabilities, and socio-economic restrictions on bandwidth and speed.
  • Enterprise Archive.
  • Electronic Check Presentment (ECP) is an electronic image of a check that can be processed by banks.
  • Electronic Deposit Verification (EDV) is a way to verify an account at another bank that you want to link to from the current institution.
  • Electronic Funds Transfer (EFT) is the transfer of money between accounts through electronic payment systems.
  • Electronic Identity Verification (eIDV) is an electronic method to confirm the identification of an individual.
  • End-of-life (EOL) is a term used with respect to a product supplied to customers, indicating that the product is in the end of its useful life (from the vendor's point of view), and a vendor stops marketing, selling, or rework sustaining it.
  • Endpoint is a web address (URL) at which clients of a specific service can gain access to it. By referencing that URL, clients can get to operations provided by that service.
  • Entity is a generic name for various objects, which Journey Manager uses internally, for example, an organization is an entity that owns forms.
  • Embedded OpenType (EOT) fonts are a compact form of OpenType fonts designed by Microsoft for use as embedded fonts on web pages. These files use the extension . eot
  • Enterprise resource planning (ERP) is the integrated management of main business processes, often in real-time and mediated by software and technology.
  • ECMAScript (ES6) is a general-purpose programming language, standardized by Ecma International according to the document ECMA-262. It is a JavaScript standard meant to ensure the interoperability of Web pages across different Web browsers.
  • Europay, MasterCard, and Visa (EMV) is a payment method based on agreed standards for use with smart payment cards (also referred to as chip or IC cards).
  • FAR is a Form Archive that contains a form and all related resources that can be deployed as a package in various Journey Manager environments.
  • Fast IDentity Online (FIDO) is an industry consortium with the aim to address the lack of interoperability among strong authentication devices and the problems users face creating and remembering multiple usernames and passwords. It comprises a set of technology-agnostic security specifications for strong authentication.
  • A field is a specific type of component used for displaying and entering data into a form application. Examples include the Text Field or Decimal Field. In Journey Analytics only, a field also refers to any field, radio button or component in a form application used to enter data.
  • An institution (public or private) that collects funds (from the public or other institutions) andinvests them in financial assets.
  • Financial Technology, also known as FinTech, is a new industry that uses new technology and innovation to improve activities in finance. It aims to compete with traditional financial methods in the delivery of financial services to customers by improving customer experience, reducing time-to-market, decreasing cost to mention a few.
  • Financial technology, often referred to as FinTech or fintech, is an umbrella term describing new technology used to support or enable banking and financial services.
  • Also known as FinTech Innovation, a demo-focused conference series focused exclusively on showcasing the best and most innovative new financial and banking technologies.
  • Anything that describes Financial Services.
  • Fluent is a programming style that can be applied to a wide range of programming languages. Across the Temenos Journey Manager platform, fluent is commonly associated with the Fluent SDK. The Fluent SDK is intended for use in developer integrated developer environment’s (IDE) and contains libraries and project files for all the different services it supports.
  • Font Awesome is a font and icon toolkit based on CSS and Less.
  • A Form Builder is the role name of the person that creates the form. A Form Builder focuses on the specific form content as well as the journey of the form user.
  • The form user is the person completing the form. They may also be known as "user".
  • Achieved with or involving little difficulty, or effortless. Avoka’s Platform helps to provide frictionless customer onboarding and account opening experiences.
  • Form Transaction Experiences
  • Fully qualified domain name (FQDN), sometimes also referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including at least a second-level domain and a top-level domain.
  • General Availability (GA) is the release of a product to the general public. When a product reaches GA, it becomes available through the company's general sales channel.
  • The General Data Protection Regulation (GDPR) is a European Union regulation on information privacy in the European Union and the European Economic Area.
  • General availability (GA) is the marketing phase when all commercialization activities pertaining to the software product have been completed and it is available for purchase. It is also known as production release.
  • Identifying person or device’s geographical location. This may involve GPS or Global Positioning System.
  • Git is a version control system for tracking changes in computer files and coordinating work on those files among multiple people. It is primarily used for source code management in software development,[8] but it can be used to keep track of changes in any set of files.
  • GitHub Inc. is a web-based hosting service for version control using Git. It is mostly used for computer code. It offers all of the distributed version control and source code management (SCM) functionality of Git as well as adding its own features.
  • GitLab is a web-based Git-repository manager with wiki and issue-tracking features, using an open-source license, developed by GitLab Inc.
  • Google Tag Manager (GTM) is a tag management system (TMS) that allows you to quickly and easily update tracking codes and related code fragments collectively known as tags on your website or mobile app.
  • Gradle is a build automation tool for multi-language software development. It controls the development process in the tasks of compilation and packaging to testing, deployment, and publishing.
  • Groovy is a powerful scripting language which runs on the Java Virtual Machine. Across theTemenos Journey Manager platform, Groovy is used to create services in Manager. These services are primarily used to create plug-in style systems that interact with Manager.
  • The graphical user interface (GUI) is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation.
  • A GUID (global unique identifier) is a term for a number that its programming generates to create a unique identity for an entity such as a Word document. GUIDs are widely used in Microsoft products to identify interfaces, replica sets, records, and other objects.
  • GZIP is a file format and a software application used for file compression and decompression.
  • High availability (HA) is a characteristic of a system which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
  • A happy path is a default scenario featuring no exceptional or error conditions.
  • Home Mortgage Disclosure Act (HMDA) is HMDA requires banks and credit unions to collect and publicly report data on particular types of mortgages and lines of credit.
  • A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.
  • Maestro forms are fundamentally built using HTML 5. The structure of the form and the text displayed in the form are all configured and established using HTML5. HTML is the standard markup language for creating Web pages and stands for Hypertext Markup Language. HTML 5 describes the structure of a Maestro form.
  • HTTP ( HyperText Transfer Protocol) is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
  • The Icon Picker is a selection dialog allowing you to pick an icon from the range of images shipped with Maestro.
  • Integrated Development Environment.
  • Any transaction that is Opened, Started or Saved.
  • IP address is a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
  • iText is a library for creating and manipulating PDF files in Java and .NET.
  • Jakarta EE, formerly Java Platform, Enterprise Edition (Java EE) and Java 2 Platform, Enterprise Edition (J2EE), is a set of specifications, extending Java SE with specifications for enterprise features such as distributed computing and web services.
  • Java is a programming language that produces software for multiple platforms. When a programmer writes a Java application, the compiled code (known as bytecode) runs on most operating systems (OS), including Windows, Linux and Mac OS. Java derives much of its syntax from the C and C++ programming languages.
  • Javadoc is a documentation generator created by Sun Microsystems for the Java language for generating API documentation in HTML format from Java source code.
  • Javascript (JS) is a scripting languages, primarily used on the Web. It is used to enhance HTML pages and is commonly found embedded in HTML code. JavaScript is an interpreted language. Thus, it doesn't need to be compiled.
  • JDBC (Java Database Connectivity) is the Java API that manages connecting to a database, issuing queries and commands, and handling result sets obtained from the database.
  • The Java Development Kit is a distribution of Java Technology by Oracle Corporation. It implements the Java Language Specification and the Java Virtual Machine Specification and provides the Standard Edition of the Java Application Programming Interface. For more information, see https://www.oracle.com/java/
  • A bank account held by more than one person. Joint holders of an account are regarded in law as together making up the ‘owner’ of the account.
  • Journey Workspaces is a business portal designed to support resolution and customer service activities related to account opening and onboarding.
  • jQuery is a JavaScript library designed to simplify HTML DOM tree traversal and manipulation, as well as event handling, CSS animations, and Ajax.
  • JSON (JavaScript Object Notation) is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute–value pairs and arrays.
  • Java Virtual Machine (JVM) is a software-based machine that runs Java programs. It can be installed on several different operating systems, including Windows, OS X, and Linux. JVMs allow Java apps to run on almost any computer.
  • A knowledge base (KB) is a technology used to store complex structured and unstructured information used by a computer system.
  • Know your customer (KYC) requires that banks have a reasonable belief that they know the true identity of customers and establish reasonable and practical risk-based procedures for verifying the identity of each customer. The procedures must include account opening procedures that specify the identifying info that will be obtained from each customer, such as name, date of birth, address, ID number (e.g. SSN).
  • Knowledge-Based Authentication (KBA) aid(s) used for fraud prevention? An example would be a “secret question” users must answer before being granted access to account information.
  • Kofax software enables organizations to Work Like Tomorrow - today. It helps organizations transform information-intensive business processes, reduce manual work and errors, minimize costs, and improve customer engagement.
  • Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs to evaluate their success at reaching targets.
  • A web page that is accessed from another website or software application.
  • Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.
  • LESS is a dynamic preprocessor style sheet language that can be compiled into Cascading Style Sheets (CSS) and run on the client side or server side.
  • Less is a dynamic preprocessor style sheet language that can be compiled into Cascading Style Sheets and run on the client side or server side.
  • LexisNexis is a corporation providing computer-assisted legal research (CALR) as well as business research and risk management services.
  • Linux is a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution (or distro for short) for both desktop and server use.
  • Lifecycle Management Suiteis software designed for lending. For more information, see https://www.temenos.com/us/news/2015/02/10/temenos-purchases-us-based-financial-software-provider-akcelerant/
  • Loan to Value Ratio (LVR) is the amount, as a percentage, borrowed for an asset against the value of the asset.
  • Locale is a set of parameters that defines the user's language, region and any special variant preferences that the user wants to see in their user interface. Usually a locale identifier consists of at least a language code and a country/region code.
  • A multi-field component is made up of more sub-parts than a regular component. For example, a Section consists of the Heading text, sub-text, help text, a collapse/expand button and a significant amount of JavaScript and CSS. An address block contains several different simple data entry fields. A component such as a Driver's License scanning component may have multiple data entry fields, a camera button, descriptive images, and more. Multi-field components can be built as either a native component or a re-usable block.
  • Preview mode displays the form so that you can interact with the components on the form as if it were live.
  • A native multi-field (or complex) component is still a completely self-contained component. There is no fixed boundary between a simple and a complex native component, although any component with more than one visible data entry area within it would usually be considered to be complex
  • The Template Designer is responsible for implementing and maintaining templates which are the starting point for all forms created in Maestro. The key activity of the Template Designer is to implement the template content such as common page components that typically surround specific form content, including header, navigator, and footer. The Template Designer will also create styles that the Form Builder will use in the creation of form content including text field styles, buttons, and section headers.
  • A custom block is a collection of simple components, that can be re-used. An example of a re-usable block is an Address Block, which consists of two lines of text plus City, State, and ZIP Code. Unlike a native multi-field component, each of the sub-elements of the custom block will be visible in the Structure tab and can be modified individually by the person using your block.
  • Maestro form is a device used to collect information from a user. Its purpose will vary depending on the organization that is building and implementing the form. The development technologies and programming languages that are available to Form Builders will vary depending on these purposes. However, there are several development technologies and programming languages that are used in every Maestro form. These development technologies and programming languages are identified below, as well as their role in the development of a form or their place in the Temenos Journey Manager platform.
  • Apache Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
  • Master Demo System (MDS) is the Temenos cloud platform, which hosts demo versions of some Temenos products.
  • Metadata is data that describes other data. Meta is a prefix that in most information technology usages means "an underlying definition or description." Metadata summarizes basic information about data, which can make finding and working with particular instances of data easier. For example, author, date created and date modified and file size are examples of very basic document metadata. Having the abilty to filter through that metadata makes it much easier for someone to locate a specific document.
  • Small deposits (nominal amount) made to verify an account.
  • Microsoft Azure Active Directory (Azure AD) is a system in Microsoft Azure that enables the identity management to configure accessibility of users and groups to services and resources.
  • Microsoft Entra ID (formerly known as Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution. It is a directory and identity management service that operates in the cloud and offers authentication and authorization services to various Microsoft services such as Microsoft 365, Dynamics 365, and Microsoft Azure. Entra ID provides users with single sign-on experience, regardless of whether their applications are cloud-based or on-premises.
  • Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).
  • Microsoft Windows Server OS (operating system) is a series of enterprise-class server operating systems designed to share services with multiple users and provide extensive administrative control of data storage, applications and corporate networks.
  • Minification is the process of removing all unnecessary characters from the source code of interpreted programming languages or markup languages without changing its functionality.
  • Mitek is a software company that specializes in digital identity verification and mobile capture built on artificial intelligence algorithms. The company's technology allows people to deposit checks via their mobile phones and open bank accounts from mobile devices. Additionally, the technology verifies people’s identity with patented algorithms that capture, classify and authenticate photos of identity documents including passports, ID cards, and driver's licenses. The identity of the person holding the document is confirmed through a biometric facial comparison of the photo on the document to a selfie.
  • MongoDB is a cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.
  • Multi-tenancy is a software architecture in which a single instance of software runs on a server and serves multiple tenants. Systems designed in such manner are "shared" (rather than "dedicated" or "isolated"). A tenant is a group of users who share a common access with specific privileges to the software instance. With a multi-tenant architecture, a software application is designed to provide every tenant a dedicated share of the instance - including its data, configuration, user management, tenant individual functionality and non-functional properties.
  • My definition
  • MySQL is an open-source relational database management system (RDBMS). It's an Oracle-backed open source relational database management system (RDBMS) based on Structured Query Language (SQL). MySQL runs on virtually all platforms, including Linux, UNIX and Windows. Although it can be used in a wide range of applications, MySQL is most often associated with web applications and online publishing.
  • A test is non-deterministic when it passes sometimes and fails sometimes, without any noticeable change in the code, tests, or environment. Such tests fail, then you re-run them and they pass. Test failures for such tests are seemingly random.
  • OAuth (Open Authorization) is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
  • In computer science, an object can be a variable, a data structure, a function, or a method, and as such, is a value in memory referenced by an identifier. In the class-based object-oriented programming paradigm, object refers to a particular instance of a class, where the object can be a combination of variables, functions, and data structures. In relational database management, an object can be a table or column, or an association between data and a database entity (such as relating a person's age to a specific person).
  • Office of Foreign Asset Control (OFAC) enforces economic and trade sanctions. Banks must perform an OFAC screen on customers opening an account.
  • Omnichannel is a service delivery model that integrates different interaction points for customers such as online, by phone or in store. Omnichannel Banking offers banking access across these three methods.
  • The steps required to get a new customer integrated into a new program. These steps may vary business to business.
  • Indicated the use of open APIs by banks to enable software developers to create applications using the bank’s data.
  • Open source software (OSS) is software with source code that anyone can inspect, modify, and enhance.
  • All transactions, when created byManager, are considered to be in Open status. From this status, a transaction can either proceed to the Started or Bounced statuses.
  • Open UX is the open API for development of financial customer journeys on the Temenos Journey Manager platform. Teams skilled in use of React, Angular or other Javascript frameworks will find this the fastest path to developing production class applications.
  • OpenSAML is a set of open source C++ & Java libraries used in support of the Shibboleth Project's implementation of the Security Assertion Markup Language (SAML).
  • OpenShift is a family of containerization software products developed by Red Hat. Its flagship product is the OpenShift Container Platform — a hybrid cloud platform as a service built around Linux containers orchestrated and managed by Kubernetes on a foundation of Red Hat Enterprise Linux.
  • Oracle Linux (OL, formerly known as Oracle Enterprise Linux) is a Linux distribution packaged and freely distributed by Oracle, available partially under the GNU General Public License since late 2006. It is compiled from Red Hat Enterprise Linux (RHEL) source code, replacing Red Hat branding with Oracle's. It is also used by Oracle Cloud and Oracle Engineered Systems such as Oracle Exadata and others.
  • Oracle Database is a multi-model database management system produced and marketed by Oracle Corporation. It is a database commonly used for running online transaction processing (OLTP), data warehousing (DW) and mixed (OLTP & DW) database workloads.
  • Origination is the process of setting up the approved customer (new or existing) with specific products and features, and get them completely configured in the core.
  • Platform as a Service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
  • A web page’s content as defined in the form space in Manager.
  • A person or business to whom a check is written.
  • Payment Card Industry Compliance (PCI Compliance) is a set of security standards designed to protect card information during and after financial transactions.
  • A service provider that authorizes card payments.
  • PCI policy is a type of security policy that covers how an organization addresses the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS). A PCI policy is required of all merchants and service providers who store, process or transmit credit card holder data.
  • Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in, either virtually or for real, and reporting back the findings.
  • Personal identification Number (PIN) is a number issued with your debit or credit card.
  • Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII.
  • Personally Identifiable Information (PII) is information about an individual that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and any other information that is linked to an individual.
  • PGP (Pretty Good Privacy) is the technology for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more.
  • PhantomJS is a scripted, headless browser used for automating web page interaction. PhantomJS provides a JavaScript API enabling automated navigation, screenshots, user behavior and assertions making it a common tool used to run browser-based unit tests in a headless system like a continuous integration environment. PhantomJS is based on WebKit making it a similar browsing environment to Safari and Google Chrome (before Chrome's fork of WebKit evolved into Blink). It is open-source software released under the BSD License.
  • Personally Identifiable Information (PII) is information about an individual that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and any other information that is linked to an individual. In Europe, PII is known as personal data.
  • A Project Object Model or POM is the fundamental unit of work in Maven. It is an XML file that contains information about the project and configuration details used by Maven to build the project. It contains default values for most projects.
  • A proxy server is a server (a computer system or an application) that acts as an intermediary (a gateway) for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.
  • Puppeteer is a Node library which provides a high-level API to control headless Chrome or Chromium over the DevTools Protocol. It can also be configured to use full (non-headless) Chrome or Chromium.
  • QR Code (Quick Response Code) is a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone.
  • RAF is an RAF file is a digital photograph captured by select Fuji digital cameras, such as the high-end FinePix models. It contains an image in the uncompressed RAW Fuji (RAF) format. RAF files may also include a .JPG version of the same image within the file for thumbnail preview purposes.
  • ReactJS is a JavaScript library for building user interfaces.
  • Recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down as a result of a hardware, program, or communications failure.
  • Recovery Time Objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.
  • is a distribution of the Linux operating system developed for the business market.
  • A reference number is a unique identifier assigned to each transaction.
  • The Referer HTTP request header contains an absolute or partial address of the page that makes the request. The Referer header allows a server to identify a page where people are visiting it from. This data can be used for analytics, logging, optimized caching, and more.
  • A regular expression (regex) is a sequence of characters that define a search pattern. Usually such patterns are used by string-searching algorithms for "find" or "find and replace" operations on strings, or for input validation.
  • REST or RESTful API design (Representational State Transfer) is designed to take advantage of existing protocols. While REST can be used over nearly any protocol, it usually takes advantage of HTTP when used for Web APIs.
  • The numbers that appear at the bottom of a check to identify the financial institution.
  • RSA is a public-key cryptosystem that is widely used for secure data transmission.
  • Software as a service (SaaS) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
  • Salesforce is the customer relationship management (CRM) platform.
  • Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). SAML transactions use Extensible Markup Language (XML) for standardized communications between the identity provider and service providers. SAML is the link between the authentication of a user’s identity and the authorization to use a service.
  • Any transaction that has explicitly been saved by the user. When a user resumes a saved transaction, it can move to the completed status, if the user submits the form. Or it can move to abandoned status, if the user abandons the application.
  • Source Code Control System (SCCS) is a version control system designed to track changes in source code and other text files during the development of a piece of software. This allows the user to retrieve any of the previous versions of the original source code and the changes which are stored.
  • Software Development Kit (SDK) brings together a group of tools that enable the programming of mobile applications.
  • Software Development Life Cycle (SDLC) is a process used by the software industry to design, develop and test high quality softwares.
  • Applications built in Maestro or Composer are divided into sections. A section can be a page or modal page or modal dialogue.
  • Security managers are the Journey Manager's components that are responsible for User Authentication, User Authorization, User Self-Registration, and Session Management. Security mangers are designed to handle various sets of users requiring access to different form spaces and can be associated with one or more form spaces. Users can be external or internal, and they can require access to form spaces or a combination of form spaces and modules in different environments. You can find security managers under Security > Security Managers.
  • The Selenium testing software tool is used to automate tests across browsers for web applications. It's used to ensure high-quality web applications — whether they are responsive, progressive, or regular. Selenium is an open-source tool.
  • Semantic Versioning is a formal convention for specifying compatibility using a three-part version number: major version; minor version; and patch. The patch number is incremented for minor changes and bug fixes which do not change the software's application programming interface (API). The minor version is incremented for releases which add new, but backward-compatible, API features, and the major version is incremented for API changes which are not backward-compatible. For example, software which relies on version 2.1.5 of an API is compatible with version 2.2.3, but not necessarily with 3.2.4.
  • System Event Publisher
  • A service-level agreement (SLA) is a commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user.
  • Session ID is a unique number that a Web site's server assigns a specific user for the duration of that user's visit (session). The session ID can be stored as a cookie, form field, or URL (Uniform Resource Locator). Some Web servers generate session IDs by simply incrementing static numbers.
  • Session management is the rule set that governs interactions between a web-based application and users. Browsers and websites use HTTP to communicate, and a web session is a series of HTTP requests and response transactions created by the same user. Since HTTP is a stateless protocol, where each request and response pair is independent of other web interactions, each command runs independently without knowing previous commands. In order to introduce the concept of a session, it is necessary to implement session management capabilities that link both the authentication and access control (or authorization) modules commonly available in web applications.
  • SharePoint is a web-based collaborative platform that integrates with Microsoft Office.
  • A single-page application (SPA) is a web application or website that interacts with the user by dynamically rewriting the current web page with new data from the web server, instead of the default method of a web browser loading entire new pages.
  • The service delivery model that limits customers to a single interaction point or pathway. Customers are restricted to just online, phone, or in store/branch access, for example.
  • A service-level agreement (SLA) is a commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user.
  • A SmartForm is a dynamic electronic form with capabilities beyond a traditional paper or PDF form, allowing electronic completion, dynamic sections, database calls and electronic submission.
  • SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, sendmail is the most widely-used SMTP server for e-mail. A commercial package, Sendmail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support.
  • Systems of Engagement (SoE) is the technology used by an organization to help facilitate and orchestrate the customer journey via more personalized, seamless interactions across the various touchpoints. These include social media channels, email marketing platforms, mobile apps, and content management systems.
  • Software as a Service (SaaS) is a software distribution model where logical support and data are stored in the servers of an IT company, and customers access the service online. This model is common in FinTech services because of scalability and security.
  • Salesforce Object Query Language (SOQL) is used to construct simple but powerful query strings in the queryString parameter in the query() call, in Apex statements, in Visualforce controllers and getter methods, or in the Schema Explorer of the Force.com IDE.
  • System of Record (SOR) is an ISRS (information storage and retrieval system) that is the authoritative source for a particular data element in a system containing multiple sources of the same element. To ensure data integrity, there must be one -- and only one -- system of record for a given piece of information.
  • A statement of work (SoW) is a document routinely employed in the field of project management. It defines project-specific activities, deliverables and timelines for a vendor providing services to the client.
  • SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between networked computers. Although the SSL protocol was deprecated with the release of TLS 1.0 in 1999, it is still common to refer to these related technologies as “SSL” or “SSL/TLS.”
  • Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
  • Started Transaction is any transaction where a user interacted with a form application by inputting some data. A started transaction is a progressive step towards completion. Started transactions and Bounced transactions are mutually exclusive. For instance, a started transaction can never become a bounced transaction and vice versa.
  • Static Content Externalization (SCE).
  • A submission is an event when a form user clicks a submit button when the form is completed. A submission is another name for a transaction, so they are treated interchangeably in Manager
  • An SVG font is a new version of the OpenType format, with SVG standing for Scalable Vector Graphics. The SVG glyph format allows the characters to be displayed in multiple colors and different transparencies, and some may even be animated.
  • Subversion (SVN) is a software versioning and revision control system.
  • A task in Journey Manager consists of a form that needs to be filled in by a user.
  • A task corresponding to processing a submission.
  • A thread of execution is the smallest sequence of programmed instructions that can be managed independently by a scheduler, which is typically a part of the operating system.
  • Transact Integration Gateway
  • TTCV
  • Top Image Systems (TIS) is a global innovator of on-premise and cloud-based applications that optimize content-driven business processes such as procure to pay operations, remittance processing, integrated receivables, customer response management and more.
  • Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.
  • Token signing certificates are standard X509 certificates that are used to securely sign all tokens that the federation server issues. Token decryption certificates are standard X509 certificates that are used to decrypt any incoming tokens. They are also published in federation metadata.
  • Topic-based authoring is a modular approach to content creation where content is structured around topics that can be mixed and reused in different contexts.
  • A Journey Application is what the applicant or user interacts with to submit their application. It is a Maestro or Transact Composer form, possibly with some Journey Exchange components, as well as other configuration information and services code. Once the user submits the form application, it becomes a completed transaction in Manager.
  • A Journey Application Version is a version of a form application as published by Manager.
  • Journey Analytics Field Name is another version of a form application field name configured in the Maestro Data tab to improve readability of the analytics data on Journey Analytics.
  • Transact Integration Agent is a software appliance hosted inside the client organization’s data center, which receives form submission deliveries and file attachments from the Journey Manager server.
  • Journey Manager is a server application, deployed in the cloud or on-premise, that hosts forms, controls interaction with customers, calls on specialized services like identity verification or risk analysis and exchanges data with back office systems of record.
  • A transaction is created when a user opens a form application.
  • Ttranspiler is a source-to-source translator, source-to-source compiler, transcompiler, which is a type of translator that takes the source code of a program written in a programming language as its input and produces an equivalent source code in the same or a different programming language.
  • Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. It's the most widely deployed security protocol used today, and is used for Web browsers and other applications that require data to be securely exchanged over a network, such as file transfers, VPN connections, instant messaging and voice over IP.
  • A typical form bundle asks users to provide their basic details, such as a name and address, and select a product or products they wish to apply for. The initial form in the is used to determine the overall flow of the based on the products the customers selected, so it is basically triaging initial users. Therefore, this form is referred to as a triage form or a product selector form.
  • TrueType (TTF) is an outline font standard developed by Apple in the late 1980s as a competitor to Adobe's Type 1 fonts used in PostScript. It has become the most common format for fonts on the classic Mac OS, macOS, and Microsoft Windows operating systems.
  • Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Two-factor authentication provides a higher level of assurance than authentication methods that depend on single-factor authentication (SFA), in which the user provides only one factor -- typically a password or passcode. Two-factor authentication methods rely on users providing a password as well as a second factor, usually either a security token or a biometric factor like a fingerprint or facial scan.
  • User acceptance testing (UAT) is the last phase of the software testing process. During UAT, actual software users test the software to make sure it can handle required tasks in real-world scenarios, according to specifications.
  • Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software.
  • People who have limited or no access to proper banking or services.
  • Unicode is an information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.
  • is a software development life cycle (SDLC) component in which a comprehensive testing procedure is individually applied to the smallest parts of a software program for fitness or desired operation. Unit Testing is a software testing method by which individual units of source code are tested to determine whether they are fit for use. For more information, see http://docs.groovy-lang.org/next/html/documentation/core-testing-guide.html.
  • URI is A Uniform Resource Identifier, which is a unique sequence of characters that identifies a logical or physical resource used by web technologies.
  • The purpose of the USA PATRIOT Act is to deter and punish terrorist acts in the United States and around the world and strengthen U.S. measures to prevent, detect and prosecute international money laundering and financing of terrorism.
  • User agent is software (a software agent) that is acting on behalf of a user. One common use of the term refers to a web browser that retrieves, renders and facilitates end user interaction with Web content.
  • User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user's authenticity.
  • User authorization is interested in who the user is, and is used to determine what functions, actions, data, or other parts of an application the user has access to.
  • Universal Time Coordinated. Prior to 1972, this time was called Greenwich Mean Time (GMT) but is now referred to as Coordinated Universal Time or Universal Time Coordinated (UTC). It is a coordinated time scale, maintained by the Bureau International des Poids et Mesures (BIPM). It is also known as "Z time" or "Zulu Time".
  • User experience (UX) design is the process of creating products that provide meaningful and relevant experiences to users. This involves the design of the entire process of acquiring and integrating the product, including aspects of branding, design, usability, and function.
  • A user experience platform (UXP) is an integrated set of technologies used to provide interaction between a user and a set of applications, processes, content, services or other users. A UXP has several components, including portals, mashup tools, content management, search, rich Internet application (RIA) tools, analytics, collaboration, social and mobile tools. It may be delivered as a suite of products or as a single product.
  • Virtual Data Centre (VDC) is an automated and scalable Infrastructure as a Service (IaaS) cloud platform providing compute, network and storage.
  • A virtual machine (VM) is a software program or operating system that not only exhibits the behavior of a separate computer, but is also capable of performing tasks such as running applications and programs like a separate computer. A virtual machine, usually known as a guest is created within another computing environment referred as a "host." Multiple virtual machines can exist within a single host at one time.
  • Virtualization is the creation of a virtual resource such as a server, desktop, operating system, file, storage or network to manage workloads by radically transforming traditional computing to make it more scalable.
  • Virus Scanning Engine is Antivirus software (AV software), also known as anti-malware, which is a computer program used to prevent, detect, and remove malware.
  • Value Object (VO)
  • A virtual private network (VPN) is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.
  • WAR file (Web Application Resource or Web application ARchive) is a file used to distribute a collection of JAR-files, JavaServer Pages, Java Servlets, Java classes, XML files, tag libraries, static web pages (HTML and related files) and other resources that together constitute a web application.
  • WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection.
  • White-label software is software that is purchased by a company from a service provider and re-branded as its own.
  • A wireframe is a diagram or a set of diagrams that consists of simple lines and shapes representing the skeleton of a website or an application's user interface (UI) and core functionality. In Maestro, it's the central part of the Design mode interface.
  • The Web Open Font Format (WOFF) is a font format for use in web pages. WOFF files are OpenType or TrueType fonts, with format-specific compression applied and additional XML metadata added.
  • WOFF2 font is a web font file created in the WOFF (Web Open Font Format) 2.0 format, an open format used to deliver webpage fonts on the fly. It is saved as a compressed container that supports TrueType (. TTF) and OpenType (. OTF) fonts. WOFF2 files also support font licensing metadata.
  • A workflow is progression of steps (tasks, events, interactions) that comprise a work process, involve two or more persons, and create or add value to the organization's activities. In a sequential workflow, each step is dependent on occurrence of the previous step; in a parallel workflow, two or more steps can occur concurrently.
  • The Workspaces REST API provides the integration with Journey Manager that Journey Workspaces needs.
  • WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation.
  • X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame>, <iframe>, <embed> or <object> . Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.
  • XML Data Package (XDP) format is a file format developed by Adobe Systems for packaging PDF data into XML files; contains the entire PDF document contents including form and template data; may also include character-encoded sections for binary content.
  • is a file extension for a spreadsheet file format created by Microsoft for use with Microsoft Excel. XLS stands for eXceL Spreadsheet. Microsoft Excel files use a proprietary format for storing Microsoft Excel documents.
  • XML (Extensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
  • XPath (XML Path Language) is a query language for selecting nodes from an XML document. In addition, XPath may be used to compute values (e.g., strings, numbers, or Boolean values) from the content of an XML document. XPath was defined by the World Wide Web Consortium (W3C).
  • XQuery is a specification for a query language that allows a user or programmer to extract information from an Extensible Markup Language (XML) file or any collection of data that can be XML-like.
  • XSD (XML Schema Definition) is a World Wide Web Consortium (W3C) recommendation that specifies how to formally describe the elements in an Extensible Markup Language (XML) document.
  • Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.