IT Application Portfolio Management (APM) is a practice that has emerged in mid to large size Information Technology (IT) organizations since the mid 1990s. Application Portfolio Management attempts to use the lessons of financial portfolio management to justify and measure the financial benefits of each application in comparison to the costs of the application's maintenance and operations.
Business Process Management (BPM) is an emerging field of knowledge and research at the intersection between management and information technology, encompassing methods, techniques and tools to design, enact, control, and analyze operational business processes involving humans, organizations, applications, documents and other sources of information.
Mobile software is designed to run on handheld computers, personal digital assistants (PDAs), smartphones and cellphones. Since the first handheld computers of the 1980s, the popularity of these platforms has risen considerably. Recent model cellphones have included the ability to run user-installed software.
Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of 'secure' behavior on the operation of computers. The definition of 'secure' varies by application, and is typically defined implicitly or explicitly by a security policy that addresses confidentiality, integrity and availability of electronic information that is processed by or stored on computer systems.
A database management system (DBMS) is computer software designed for the purpose of managing databases. A DBMS is a complex set of software programs that controls the organization, storage, management, and retrieval of data in a database. The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data.
When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system.
Organizations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by data administrators and systems analysts. Detailed database design is performed by database administrators.
Network performance management is the discipline of optimizing how networks function, trying to deliver the lowest latency, highest capacity, and maximum reliability despite intermittent failures and limited bandwidth. Reliable and unreliable networks: Networks connect users or machines to one another using sets of well-defined protocols to govern how data is transmitted. Depending on the type of network and the goals of the application, the protocols may be optimized for specific characteristics.
Software development is the translation of a user need or marketing goal into a software product. Software development is sometimes understood to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products.
Speaker recognition (also known as voice recognition) is the computing task of recognizing people (which may involve identifying them and/or authenticating their identity) from their voices. Such systems extract features from speech, model them, and use them to recognize the person from his/her voice.
Note that there is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition.
Speaker recognition has a history dating back some four decades, where the output of several analog filters was averaged over time for matching. Speaker recognition uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned behavioral patterns (e.g., voice pitch, speaking style). This incorporation of learned patterns into the voice templates (the latter called "voiceprints") has earned speaker recognition its classification as a "behavioral biometric."