• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.


Glossary of Collaboration Technology

Page history last edited by PBworks 12 years, 4 months ago
Glossary of Collaboration Technology


Back to Main Page

Adware – Software that has advertising integrated into or bundled with it, often displaying automatically.  Sometimes referred to as "pop-up ads"
AJAX (Asynchronous JavaScript and XML) – A web development technique associated with Web 2.0 that refreshes only the portion of a web page being changed, allowing for a user experience similar to that of a desktop program.
Applet – A software component with limited functionality that does not run independently of another program; often installed and running in a web browser.
Asynchronous – Not occurring at the same time; the opposite of synchronous.
Authentication – A process for confirming a user's identity.
Authorization – A process that protects computer resources by limiting their use to only those who have been granted specific permission.
Blog – A frequently updated website based on a template produced by easy-to-use content management or "blogging" software and characterized by certain common elements, including the display of content in the form of individual "posts," reverse chronological entries, RSSfeeds, archives, and comments.
Click-wrap agreement – An online contract accepted without negotiation by clicking an Accept button or taking a similar action. Also called click-through agreement
Conference calls – A telephone call with more than two separate participants calling from more than two phones. Sometimes refers to a traditional one-to-one call where one or both sides have several people participating via a speakerphone in the same room.
Cookies - Small text files sent by a web server to the web browser of a visitor on each visit to provide authentication, tracking, and/or personalization.
Cracking - A process for breaking passwords or otherwise defeating computer security systems.
Dashboard - A management tool that creates visual displays of data pulled from a variety of underlying sources and presents them in unified fashion, commonly as a box that appears on a home page or portal page.
Deal rooms – Extranets used for transactions.
Document Management System – A computer program for managing, identifying, tracking, and searching documents and files.
ECM (enterprise content management) - Broadly refers to all technologies used to capture, manage, store, preserve, and deliver content and documents related to organizational processes, including document management, records management, and knowledge management.
Electronic discovery – The discovery process in a litigation matter or case that deals with electronically stored information.
Email blast - A form of email sent to many recipients at the same time for a specific purpose, often to announce an event.
Emoticon – A symbol consisting of a typed character or combination of characters designed to express emotion in a text-based message. The best-known emoticon is the smiley face (colon, hyphen, right parenthesis). :-)
Enterprise 2.0 – A general term applying to the use of Web 2.0 services and concepts in the enterprise setting.
Extranet – A private, secure website, often designed for a specific purpose that is the basis for many online collaboration tools. Extranets can also be thought of as external versions of intranets.
Fob – A small hardware device that is synchronized with a network's password on a minute-by-minute basis.
Freeware – Computer software made available at no charge, generally subject to click-wrap license terms similar to commercial software licenses.
FWIW (For What It's Worth) – A commonly used term in instant messaging an online message boards.
Gartner's Magic Quadrant – Gartner Inc.'s well-known system for evaluating vendors in industry segments to identify leaders, challengers, niche players, and visionaries and plotting those vendors on a quadrant to help organizations choose vendors.
Hacking – Can mean either the work of a computer enthusiast to understand a technology or system, or the act of trespassing into a system beyond the permitted authorization.
HTML (Hyper Text Markup Language) – The predominant language in which Web pages are written.
Identity theft – Criminal or other activity relating to the use of another person’s identification materials.
IM (instant messaging) – A form of real-time text-based communication by means of computer or telephone.
IMHO (In My Humble Opinion)-A commonly used term in instant messaging and message boards.
Intranet – A private, secure, internal website used to share information within an organization.
JavaScript - A scripting language commonly used in web development; a key component of AJAX and Web 2.0 development.
Keystroke logger-A small program that records a user's keystrokes. Often installed secretly and maliciously to steal passwords and other sensitive information.
Knowledge management system – A system that identifies, stores, distributes, and makes shareable a firm's institutional knowledge.
License – An agreement in which the owner of intellectual property rights permits the licensee to exercise certain of these rights.
Malware – A general term used to describe viruses, spyware, Trojan horses, keystroke loggers, and other programs that can harm computers, networks, and/or data.
Metadata – Data about data, including hidden data about documents from creation dates and author names to revisions and comments.
Milestone-Something assigned to a particular person and due on a specified date.
It can be a deadline for a filing, a meeting with the client, or a date for a first draft of a contract agreement.
Mind map – A brainstorming or thinking tool in the form of a diagram in which a central keyword or idea is linked to other words or images arranged radially around the central keyword or idea. Mind maps help generate, visualize, structure, classify, and organize ideas.
Open Source software – Computer software under one of a limited number of standard, permissive licenses allowing modification of the program in exchange for limitations on liability. Often available at no cost and developed by a loose community of developers rather than a single software vendor. Open Source software is widely used in the infrastructure of the Internet.
P2P (peer-to-peer) network-An ad hoc or temporary computer network comprised of computers connecting directly over the Internet rather than using the traditional web servers hosting websites.
Packet sniffer – A software tool for capturing, intercepting, and logging data traffic over a network.
Pareto principle (80/20 rule) – A rule of thumb that says that 80 percent of the effects come from 20 percent of the causes. The 80/20 rule also includes many variations, each based on the 80/20 proportion.
Password cracker – A computer program that automates the process of guessing or breaking passwords.
PBX (Private Branch Exchange) – A private telephone exchange that serves a particular business or office and connects to the telephone system.
PDF (Portable Document Format) – A file format created by Adobe Systems to simplify document exchange by representing documents in a descriptive manner that is device-independent. PDF includes text, fonts, and images so that the document looks like the original printout.
Phishing – A method of attempting to fraudulently acquire identity or other sensitive information – including passwords, bank account, or credit card information by posing as a trustworthy entity in an email or other electronic communication.
Platform – A software framework on which other specialized applications or tools can operate.
Plug-in – A small program required to be added to a host application, such as a browser, to seamlessly provide limited, specific functionality for a service.
Portal - A web page that serves as a single point of access to external or internal information.
Project management – Organizing and managing resources so projects are completed within defined scope, quality, time, and cost specifications.
Redlining - A method for marking up a version of documents to show revisions from another version of the document. Sometimes called "blacklining."
RSS (Really Simple Syndication) – A family of XML formats for web feeds used to automatically publish frequently updated content such as blog entries, news headlines, or podcasts. RSSfeeds are usually read in a program or online service known as an RSS reader, newsreader, or news aggregator. The term "RSS" is often used generically to include other feed formats, such as Atom and RDF.
RTF (Rich Text Format) – A proprietary document file format developed by Microsoft
for exchanging documents that is simpler and more universal than the Word (doc) format is. Most word processors can read and write RTF documents.
SaaS (Software as a Service) – A method of making software applications available over the Internet for a monthly or other periodic fee.  In SaaS, the software is not installed on individual computers or networks; it is installed on the vendor's servers and accessed through a web browser. Other similar terms are hosted services and application service providers (ASPs).
Screen sharing – A process generally defined as the ability to transmit the content of your computer screen to the computers of one or more individuals.
Silos (b) – A reference to information stored in a separate program or space where it is not integrated with or accessible from other programs or sources.
SLA (Service-Level Agreement) – The portion of a technology service, usually a separate exhibit or attachment, in which the detailed support and service requirements are spelled out.
SMS (Short Message Service) - A communications protocol for exchanging short text messages between mobile phones that serves as the basis for text messaging. SMS is also used colloquially to describe text messages and text messaging of any kind.
Social engineering – Using human interaction rather than technological operations to obtain confidential information, including passwords, by manipulating users so that they "volunteer" the information.
Social networking – Websites and services that allow users to create, build, and manage online communities or networks of people who share similar interests and activities. Facebook (www.facebook.com) and Linkedln (www.linkedin.com) are well-known and popular examples of social networking platforms.
Spoofing - A security attack in which the attacker poses as another, trusted actor using falsified data to obtain sensitive information.
Spyware – Software automatically installed on a user's computer without the user's knowledge or informed consent for the purpose of obtaining sensitive information or taking partial control of the user's computer.
SQL (Structured Query Language) – A widely used standard interactive and programming language for querying and modifying data and managing databases. Many collaboration tools are built on SQL Relational databases.
SSL (Secure Sockets Layer) – A cryptographic protocol used to provide secure communications over the Internet for data transfers as part of web browsing and other Internet activities. SSL has been succeeded by TLS (Transport Layer Security), although the term "SSL" is still commonly used generically in referring to these types of protocols.
Strong password – A hard-to-crack password generally consisting of a combination of eight or more characters including uppercase and lowercase letters, numbers, and symbols.
SWOT analysis -- a strategic planning tool for evaluating a project or in a business
venture by focusing on the internal and external strengths, weaknesses, opportunities,
and threats associated with the project or business.
Synchronous – Happening simultaneously or in real time; the opposite of asynchronous.
Track Changes -- A document reviewing feature of Microsoft Office applications that allows users to identify and mark revisions to a document.  Similar to "redlining." Trojan horse-A form of spyware that allows an attacker to later take control of a user's computer without the user's knowledge.
VNC (Virtual Network Computing) – A graphical desktop-sharing system for remotely controlling another computer over the Internet or another network. VNC transmits only the keyboard and mouse activities of one computer to the other and relays screen updates back to the other computer.
VoIP (Voice over Internet Protocol) – The protocol optimized for transmission of voice over the Internet that enables Internet telephony.
Web 2.0 - Commonly refers to a perceived second generation of websites and Internet
usage, including hosted services and community sites designed for collaboration,
sharing, and similar purposes. Another definition of Web 2.0 emphasizes using the Internet itself as an application platform through the use of AJAX and similar technologies. Web 2.0 is often characterized by the presence of user-generated content. Wikis and social networking sites are often given as examples of Web 2.0 sites.
Web browser – A software program (most commonly Internet Explorer or Firefox) that lets a user view and interact with web pages and other information on the Internet.
Webinar (or teleseminar) – A live meeting or seminar presented over the Intern
(or by conference call).
Web parts – Modules that implement a specified function, such as a task list, discussion board, calendar, or shared document area.
Widget – A small piece of third-party code that can be incorporated into a web page to produce specific results. For example, a weather widget could be placed on a web page so visitors to the page would see current weather information.
Wiki - A simple database program, often hosted on the Internet that allows users to view and easily create, edit, and link web pages.
Wikitext – A simplified markup language used as an alternative to HTML in connection with wikis.
XHTML (Extensible Hyper Text Markup Language) – A markup language similar HTML, but with stricter requirements so that it also conforms to XML syntax.
XML (Extensible Markup Language) – A general-purpose markup language in which users can define their own tags.  XML is used to structure data and separates content from its display, making it a flexible medium for delivering information.


Comments (0)

You don't have permission to comment on this page.