The following are the Glossary In ASP :-
A , B
, C , D ,
E , F , G ,
H , I , J ,
K ,
M , N ,
O , P, Q ,
R , S , T ,
U , V , W ,
X
, Z
ASP Stands for Active Server Pages. Application Service
Providers offer individuals or enterprises access to software
applications and related support services over the internet.
Basically, ASPs are ISVs (Independent
Software Vendors) or ISPs that are now using
the internet as the delivery vehicle to make software applications
available. Delivering information to applications in this
manner allows small to medium enterprises to remove the time
and costs associated with installing, managing and supporting
new applications.
Some typical applications that companies are outsourcing
to ASPs are :-
payroll, travel and expense accounting, product configuration,
sales force automation, and e-commerce hosting.
ActiveX Data Objects
A Microsoft data access technology that enables your client
applications to find information and to control data from
a database server.
Asynchronous Transfer Mode
|
A communication protocol designed to offer much higher data
transmission speeds over existing networks than traditional
methods such as Ethernet. It is also knon as automated teller
machine.
Active Directory Services Interface
A set of COM interfaces used for managing network resources
from different network providers in a distributed computing
environment. Used to access the Microsoft Active Directory.
|
Business Performance Management. An active superset
of DSS/BI (business intelligence).
It helps users evaluate specific product offerings
by understanding business needs before evaluating technology
solutions. A four-dimensional BPM evaluation framework includes
an information supply chain dimension, the business model,
the technology framework and an assembly spectrum.
|
Competitive Local Exchange Carriers.
Customer Relationship Management. An most effective
information system that is used to plan, schedule and control
the presales and postsales activities in an organization.
A full-spectrum CRM application architecture consists of
the effective automation of business processes surrounding
customer touch points, including sales (contact management,
product configuration), marketing (campaign management,
telemarketing, data mining) and customer service (call center,
field service).
Collaborative Product Commerce
Read Aberdeen Group report
A computer program that can harm a computer by displaying
messages, deleting files, or even destroying the computer's
operating system.
Computerized Patient Record.
Cookies are used to store state and user preferences
information for more interactive Website experiences.
Because Webservers do not keep track of content sent to
different users, this information is stored and accessed
using cookies. Cookies are the piece of information sent
by a Web server to a Web browser that the browser software
is expected to save and send back to the server whenever
the browser makes additional requests from the server.
Cookies might contain information such as login or registration
information, online "shopping cart" information,
or user preferences. When a server receives a request
from a browser that includes a cookie, the server is able
to use the information stored in the cookie. For example,
the server might customize what is sent back to the user,
or keep a log of particular user's requests. Depending
on the type of cookie used, and the browser's settings,
the browser may or may not accept the cookie, and may
save the cookie for either a short time or a long time.
Cookies are usually set to expire after a predetermined
amount of time and are usually saved in memory until the
browser software is closed down, at which time they may
be saved to disk if their "expire time" has
not been reached.
|
A data mart is a data warehouse that is restricted to dealing
with a single subject or topic. The operational data that
feeds a data mart generally comes from a single set or source
of operational data.
A data warehouse is a storage area for data organized
in a format that is suitable for ad hoc query processing,
data mining, OLAP and/or other logical applications.
Data warehouses are built from operational
databases. The operational data is "cleaned"
and transformed so that it can be quickly recovered and
efficiently examined. A single-purpose data warehouse
is sometimes referred to as a "Data Mart."
Decision Support Systems. Applications that stress
to user-friendliness and ad hoc query, reporting and analysis
capabilities.
|
Enterprise Resource Planning. Packages that enable
the creation of a single corporate image from disparate,
decentralized divisions, enabling users to visualize underlying
business processes, reshape these processes and renovate
their businesses.
ERP modules may be able to interface with an
organization's own software with varying degrees of effort,
and, depending on the software, ERP modules may be alterable
via the vendor's proprietary tools as well as proprietary
or standard programming languages.
An ERP system can include software for manufacturing,
order entry, accounts receivable and payable, general ledger,
purchasing, warehousing, transportation and human resources.
The major ERP vendors are SAP, People Soft, Oracle, Baan
and J.D. Edwards. Lawson Software specializes in back-end
processing that integrates with another vendor's manufacturing
system.
Electronic Data Interchange
A form of electronic communication that allows trading partners
to exchange business transaction data in structured formats
that can be processed by applications software.
The address used for sending e-mails to a person or an organization.
Typical format is username@hostname.
|
File Transfer Protocol
The Internet protocol and program used to transfer
files between network nodes.
A packet-switching protocol for connecting devices on a Wide
Area Network (WAN). Frame Relay networks in the U.S. support
data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps)
speeds.
Web development software for the Windows platform. Developed
by Microsoft.
In web terms: The same as News groups.
|
Internet search and retrieve protocol. A protocol designed
to allow clients to search for, retrieve and display documents
over the Internet. Generally superceded by the Web, and no
longer in common use.
A computer program for transferring (and reformatting)
data between incompatible applications or networks.
|
Hypertext Transfer Protocol Secure.
The secure version of HTTP using certificates that can uniquely
identify the server and client, and encrypt all communication
between them.
High Performance File System.
Hypertext Transfer Protocol
A protocol running over IP and designed for the World Wide
Web. Provides packaging of information that can contain instruction
headers and other data about the content.
A pointer to another document. Most often a pointer to another
web page. A hyperlink is a synonym for a hotlink or a link,
and sometimes called a hypertext connection to another document
or web page.
|
IISP - Internet Infrastructure Service Provider delivers
turnkey ready-to-operate wholesale, Internet network and supporting
services to business customers. This includes the provisioning
of infrastructure, technical issues, network design, installation
and operations, and business functions such as billing and
provision of helpdesk services.
Independent software vendor. ISVs are one of the more
important elements of the application service provider (ASP)
model, as they provide the content. ISVs provide much of the
software applications that are hosted by ASPs. Microsoft Corp.
and Great Plains Software Inc. are examples of ISVs.
Independent software vendor. ISVs are one of the more
important elements of the application service provider (ASP)
model, as they provide the content. ISVs provide much of the
software applications that are hosted by ASPs. Microsoft Corp.
and Great Plains Software Inc. are examples of ISVs.
Internet Control Message Protocol.
The protocol used to handle errors and control messages at
the IP level. ICMP is actually part of the IP.
Integrated Services Digital Network.
A technology offered by many telephone companies across the
world. ISDN combines voice and digital network services in
a single medium, making it possible to offer customers digital
data services as well as voice connections over digital telephone
lines or normal telephone wires.
Internet Information Server.
Web server developed by Microsoft that runs on Windows NT/
Windows 2000 platforms. Server is bundled and tightly integrated
with Windows NT/2000 operating system
Internet Service Provider.
An agency or company that provides a connection to the Internet,
usually as a leased line or a dial-up link.
|
Java Database Connectivity.
A programming language developed by SUN. Mostly
for programming web servers and web applets.
See Web Applet.
|
Knowledge Retrieval System.
Klobits per second.
In web terms: A word used by a search engine to search for
relevant web information. In database terms: A word (or index)
used to identify a database record.
|
Multi Platform Management.
Mean Time Between Failures
Average time before failure of a system or device occurs.
Message Application Programming Interface.
The Microsoft standard application programming interface for
email software. Allows programs to read, create, send and
manipulate stored messages.
Manufacturing Resource Planning. Systems that enable users
to manage the processes that make up a supply chain, including
deploying inventory, forecasting, and shipping.
Sequentially, analysis of demands leads to creation
of a master production schedule (MPS). The next step is the
development of a material requirements plan (which generally
assumes infinite material availability). This in turn generates
a capacity requirement plan (CRP), in which capacity constraints
are first uncovered.
Mean Time To Recover.
Average time required to repair a failed system or device.
Marketing Development Fund.
Management Service Providers.
MSP is most commonly used by editors and analysts today to
refer to companies who deliver infrastructure management services
using an ASP (hosted application) model. Management Service
Providers most commonly offer network and application monitoring
services for e-businesses
Managed Service Providers.
The term Managed Service Provider (MSP) is used to refer to
service providers handling the delivery and management of
network-based services, applications and equipment. Managed
Service Providers can be hosting companies or access providers
that are moving into next generation services such as IP Telephony,
Messaging & Call Center, VPNs, Managed Firewalls, Server
& Network monitoring and reporting and more.
|
The Network File System (NFS) is a distributed file
system that allows users to access files and directories located
on remote computers and treat those files and directories
as if they were local. For example, users can use operating
system commands to create, remove, read, write, and set file
attributes for remote files and directories.
NT File System.
The Windows NT native disk format. Provides an efficient data
storage format, and allows a range of security settings to
be applied to individual files and directories.
NIS (Network Information System) is a network naming
and administration system for smaller networks that was developed
by Sun Microsystems. NIS+ is a later version that provides
additional security and other facilities. Using NIS, each
host client or server computer in the system has knowledge
about the entire system. A user at any host can get access
to files or applications on any host in the network with a
single user identification and password. NIS is similar to
the Internet"s domain name system (DNS) but somewhat
simpler and designed for a smaller network. It"s intended
for use on local area networks.
Network Service Provider.
A company that provides access to ISPs. Sometimes NSPs also
are called backbone providers due to the fact that they provide
access to the Internet backbone.
|
Open Database Connectivity.
A programming interface from Microsoft that
provides a common language for Windows applications to access
databases on a network.
Operating System.
The software that manages the basic operating of a computer.
|
Point-To-Point Tunneling Protocol.
A protocol that allows native network services such as NetBEUI
and IPX to be used to create a secure and reliable connection
over the Internet.
Provider of Payroll ASP services.
Partner relationship management.
Post Office Protocol.
A protocol used to retrieve e-mail from a mail server.
Public Switched Telephone Network.
The public system provided by telephone companies for residential
and business telephone and fax services. Consists of exchanges
and subexchanges, with calls switched between them as required.
|
Quality Of Service.
A multimedia file format created by Apple.
|
Risk Management Application
|
Risk management application. Discovers and analyzes risk
factors and providing decision makers with risk/return models.
Portfolio management, credit issuance and risk determination
to support insurance actuarial determinations are typical
uses. Also included are predictive models associated with
mutual funds and derivatives pricing.
Resource Description Framework
A framework for constructing languages for describing web
resources.
|
Supervisory Control and Data Acquisition.
Utility information system used in transmission and distribution
networks.
Sales Force Automation. Methodology that
enables sales personnel to concentrate on selling, providing
better information exchange in the sales cycle. It includes
lead generation, marketing, support and order management/fulfillment
functions.
Symmetric Multiprocessing.
SMP (symmetric multiprocessing) is the processing of programs
by multiple processors that share a common operating system
and memory. In symmetric (or "tightly coupled")
multiprocessing, the processors share memory and the I/O bus
or data path. A single copy of the operating system is in
charge of all the processors. SMP, also known as a "shared
everything" system, does not usually exceed 16 processors.
SMP systems are considered better than MPP systems for online
transaction processing (OLTP) in which many users access the
same database in a relatively simple set of transactions.
An advantage of SMP for this purpose is the ability to dynamically
balance the workload among computers (and as a result serve
more users faster).
Secure Sockets Layer.
Supply Chain Management Application. Analysis used
to forecast inventory levels and requirements and determine
efficient distribution strategies. It analyzes purchase patterns
to determine their impact on supply chain effectiveness and
efficiency.
Service Level Agreement. A contract between the provider
and the user that specifies the level of service that is expected
during its term. SLAs are used by vendors and customers, as
well as internally by IT shops and their end users.
They can specify bandwidth availability, response
times for routine and ad hoc queries and response time for
problem resolution (network down, machine failure, etc.).
SLAs can be very general or extremely detailed,
including the steps taken in the event of a failure. For example,
if the problem persists after 30 minutes, a supervisor is
notified; after one hour, the account representative is contacted.
Simple Mail Transfer Protocol.
A protocol for sending e-mail messages between
servers. Most e-mail systems that send mail over the Internet
use SMTP to send message from server to server.
Secure Electronic Transaction.
A credit card security and authorization protocol supported
by Visa and MasterCard.
Switched Multimegabit Data Service.
Simple Network Management Protocol.
|
Time To Live.
In web terms: Notifications or commands written
into a web document.
Transmission Control Protocol.
|
Uninterruptible Power Supply.
Computer operating system, developed by Bell Laboratories.
Mostly used for servers and web servers.
To transfer a file from a local computer to a remote computer.
In web terms: to transfer a file from a web client to a web
server.
|
Very High Speed Digital Subscriber Line transmits data
on the speed up to 55 Mbps over short distances, usually between
1000 and 4500 feet (300 - 1500 meters), of twisted pair copper
wire. The shorter the distance, the faster the connection
rate.
How entrepreneurs should value ASP businesses from a pre and
post
funding standpoint.
Is it 7 to 10 times earnings?
1.5 * Revenue?
Or another metric...
Virtual Private Network
Pseudo-private network that is constructed by using public
networks to connect nodes. Requires encryption and other security
mechanisms to ensure that the data can not be intercepted.
|
Wireless Application Protocol. It is an initiative
started by Unwired Planet, Motorola, Nokia and Ericsson to
develop a standard for wireless content delivery on the next
generation of mobile communication devices.
Wide Area Network.
Computers connected together in a wide network, larger than
a LAN, usually connected via phone lines.
A software program used to access web pages. Sometimes the
same as a Web Browser, but often used as a broader term.
|
A windowing and graphics system developed at the Massachusetts
Institute of Technology (MIT). MIT has placed the X-Window
source code in the public domain, making it a particularly
attractive system for UNIX vendors. Almost all UNIX graphical
interfaces, including Motif and OpenLook, are based on X-Window.
Etensible Link Language.
Extensible Markup Language.
XML is a markup language for documents containing structured
information.
Structured information contains both content (words, pictures,
etc.) and some indication of what role that content plays
(for example, content in a section heading has a different
meaning from content in a footnote, which means something
different than content in a figure caption or content in a
database table, etc.). Almost all documents have some structure.
A markup language is a mechanism to identify structures in
a document. The XML specification defines a standard way to
add markup to documents.
XPath is a set of syntax rules (language) for
defining parts of an XML document. XPath is a major part of
the W3C XSL standard.
|
Zero Administration Kit.
A compressing format for computer files. Commonly
used for compressing files before downloading over the Internet.
ZIP files can be compressed (ZIPPED) and decompressed (UNZIPPED)
using a computer program like WINZIP.
|
|