Difference between revisions of "Glossary"

From SmartWiki
Jump to: navigation, search
 
(6 intermediate revisions by one other user not shown)
Line 3: Line 3:
 
|'''AntiSamy'''
 
|'''AntiSamy'''
  
|AntiSamy is a sanitization framework; it is up to the userhow it does its sanitization. Using AntiSamy does not guarantee filtering ofall malicious code. AntiSamy simply does what is described by the policy file.
+
|AntiSamy is a sanitization framework; it is up to the user how it does its sanitization. Using AntiSamy does not guarantee filtering of all malicious code. AntiSamy simply does what is described by the policy file.
  
 
|-
 
|-
Line 9: Line 9:
 
|'''Apache'''
 
|'''Apache'''
  
|The Apache HTTP Server is a Web server application notablefor playing a key role in the initial growth of the Web.
+
|The Apache HTTP Server is a Web server application notable for playing a key role in the initial growth of the Web.
  
 
|-
 
|-
Line 15: Line 15:
 
|'''API'''
 
|'''API'''
  
|Application Programming Interface is a specificationintended to be used as an interface by software components to communicate witheach other. SmartSimple supports two different APIs:
+
|Application Programming Interface is a specification intended to be used as an interface by software components to communicate with each other. SmartSimple supports two different APIs:
  
*Web Service to support server to server communication viathe Internet – Apache Axis2 based.
+
*Web Service to support server to server communication via the Internet – Apache Axis2 based.
  
*Browser based communication to the Server - Ajax basednamed Pandora.
+
*Browser based communication to the Server - Ajax based named Pandora.
  
 
|-
 
|-
Line 25: Line 25:
 
|'''Bash'''
 
|'''Bash'''
  
|A Unix shell written for the GNU Project (a mass softwarecollaboration) as a free software replacement for the Bourne shell. Released in1989, it has been distributed widely as the shell for the GNU operating systemand as a default shell on Linux and Mac OS X.
+
|A Unix shell written for the GNU Project (a mass software collaboration) as a free software replacement for the Bourne shell. Released in 1989, it has been distributed widely as the shell for the GNU operating system and as a default shell on Linux and Mac OS X.
  
 
|-
 
|-
Line 37: Line 37:
 
|'''Cloud Computing'''
 
|'''Cloud Computing'''
  
|Internet-based computing where large groups of remoteservers are networked to allow sharing of data-processing tasks, centralizeddata storage and online access to computer services or resources.
+
|Internet-based computing where large groups of remote servers are networked to allow sharing of data-processing tasks, centralized data storage and online access to computer services or resources.
  
 
|-  
 
|-  
Line 43: Line 43:
 
|'''CPU'''
 
|'''CPU'''
  
|A Central Processing Unit (CPU) is the hardware inside acomputer that carries out the instructions of programs by performing the basicarithmetical, logical, and input/output operations of the system.  
+
|A Central Processing Unit (CPU) is the hardware inside a computer that carries out the instructions of programs by performing the basic arithmetical, logical, and input/output operations of the system.  
  
 
|-
 
|-
Line 49: Line 49:
 
|'''CRM'''
 
|'''CRM'''
  
|Contact Relationship Management. Can also stand forCustomer Relationship Management or Constituent Relationship Management. Themost popular CRM cloud service is Salesforce.com.
+
|Contact Relationship Management. Can also stand for Customer Relationship Management or Constituent Relationship Management. The most popular CRM cloud service is Salesforce.com.
  
 
|-
 
|-
Line 55: Line 55:
 
|'''CSS'''
 
|'''CSS'''
  
|Cascading Style Sheets. Used in conjunction with web pages to define how the pages should bepresented in the browser.
+
|Cascading Style Sheets. Used in conjunction with web pages to define how the pages should be presented in the browser.
  
 
|-
 
|-
Line 61: Line 61:
 
|'''CV'''
 
|'''CV'''
  
|While not exactly a technical term, CV is commonly used ina variety of applications and by a variety of organizations in reference to aperson's or organizations "Curriculum Vitae", an elaboration ofaccomplishments - rather like a resume.
+
|While not exactly a technical term, CV is commonly used in a variety of applications and by a variety of organizations in reference to a person's or organizations "Curriculum Vitae", an elaboration of accomplishments - rather like a resume.
  
 
|-
 
|-
Line 67: Line 67:
 
|'''DDoS'''
 
|'''DDoS'''
  
|A distributed denial-of-service (DDoS) or denial of service(DoS) attack is an attempt to make a machine or network resource unavailable toits intended users.
+
|A distributed denial-of-service (DDoS) or denial of service(DoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
  
 
|-
 
|-
Line 73: Line 73:
 
|'''DNS Server'''
 
|'''DNS Server'''
  
| A Domain Name System (DNS) Server is a computer hardwareor software server that implements a network service for providing responses toqueries against a directory service - much like a phone book for websiteaddresses.
+
| A Domain Name System (DNS) Server is a computer hardware or software server that implements a network service for providing responses to queries against a directory service - much like a phone book for website addresses.
  
 
|-  
 
|-  
Line 85: Line 85:
 
|'''Entity'''
 
|'''Entity'''
  
|In SmartSimple terms, an entity is a record of a person,organization or item. Each entity is designated Level 1, Level 2 or Level 3 inour Universal Tracking Application (UTA) based on whether it is a primary orsecondary activity:
+
|In SmartSimple terms, an entity is a record of a person,organization or item. Each entity is designated Level 1, Level 2 or Level 3 in our Universal Tracking Application (UTA) based on whether it is a primary or secondary activity:
  
*Level 1 - Level 1 represents the item to be tracked, forexample, a project or a case.
+
*Level 1 - Level 1 represents the item to be tracked, for example, a project or a case.
  
 
*Level 2 - Level 2 is a transaction result of the Level 1entity, a sub-entity.  
 
*Level 2 - Level 2 is a transaction result of the Level 1entity, a sub-entity.  
  
*Level 3 - Level 3 is, in turn, a sub-entity of a Level 2entity.
+
*Level 3 - Level 3 is, in turn, a sub-entity of a Level 2 entity.
  
 +
|-
 +
|'''ERP'''
 +
 +
|Enterprise Resource Planning (ERP) is business management software that companies use to collect, store, manage and interpret data from many business activities.
 
|-
 
|-
  
Line 103: Line 107:
 
|'''Gort'''
 
|'''Gort'''
  
|SmartSimple's automated server process that handles systememails, workflows and other activities.
+
|SmartSimple's automated server process that handles system emails, workflows and other activities.
  
 
|-
 
|-
Line 109: Line 113:
 
|'''HTML'''
 
|'''HTML'''
  
|Hyper Text Mark-up Language.  A Meta language that determines theformatting of web pages.
+
|Hyper Text Mark-up Language.  A Meta language that determines the formatting of web pages.
  
 
|-
 
|-
Line 115: Line 119:
 
|'''http/https'''
 
|'''http/https'''
  
|Hypertext Transfer Protocol/Hypertext Transfer ProtocolSecure.  The protocol used to transferweb pages from a web server to a browser. The '''S''' indicates that the communication is encrypted using SSL.
+
|Hypertext Transfer Protocol/Hypertext Transfer ProtocolSecure.  The protocol used to transfer web pages from a web server to a browser. The '''S''' indicates that the communication is encrypted using SSL.
  
 
|-  
 
|-  
Line 121: Line 125:
 
|'''Instance'''
 
|'''Instance'''
  
|A single copy of SmartSimple. Each SmartSimple customer hasaccess to two instances - one used for production use and another Backup andTesting Instance that is used for immediate backup and for testing newfeatures.
+
|A single copy of SmartSimple. Each SmartSimple customer has access to two instances - one used for production use and another Backup andTesting Instance that is used for immediate backup and for testing new features.
  
 
|-
 
|-
Line 127: Line 131:
 
|'''KML'''
 
|'''KML'''
  
|Keyhole Markup Language is an XML notation for expressinggeographic annotation and visualization within Internet-based, two-dimensionalmaps and three-dimensional Earth browsers.
+
|Keyhole Markup Language is an XML notation for expressing geographic annotation and visualization within Internet-based, two-dimensional maps and three-dimensional Earth browsers.
  
 
|-
 
|-
Line 133: Line 137:
 
|'''Linux'''
 
|'''Linux'''
  
|A Unix-like and mostly POSIX-compliant computer operatingsystem assembled under the model of free and open-source software developmentand distribution.
+
|A Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution.
  
 
|-
 
|-
Line 139: Line 143:
 
|'''Metadata'''
 
|'''Metadata'''
  
|Provides information about an item's content. For example,an image may include metadata that describes how large the picture is, when theimage was created and other relevant information. A text document's metadatamay contain information about how long the document is, who the author is andwhen it was written.
+
|Provides information about an item's content. For example,an image may include metadata that describes how large the picture is, when the image was created and other relevant information. A text document's meta data may contain information about how long the document is, who the author is and when it was written.
  
 
|-
 
|-
Line 145: Line 149:
 
|'''MVC'''
 
|'''MVC'''
  
|Model-View-Controller (MVC) is a software architecturalpattern for implementing user interfaces. It divides a given softwareapplication into three interconnected parts, so as to separate internalrepresentations of information from the ways that information is presented toor accepted from the user.
+
|Model-View-Controller (MVC) is a software architectural pattern for implementing user interfaces. It divides a given software application into three interconnected parts, so as to separate internal representations of information from the ways that information is presented to or accepted from the user.
  
 
|-
 
|-
Line 151: Line 155:
 
|'''ODBC'''
 
|'''ODBC'''
  
|Open Database Connectivity (ODBC) is a standard programminglanguage middleware API for accessing database management systems (DBMS). Thedesigners of ODBC aimed to make it independent of database systems andoperating systems.
+
|Open Database Connectivity (ODBC) is a standard programming language middleware API for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems.
  
 
|-  
 
|-  
Line 157: Line 161:
 
|'''OS'''
 
|'''OS'''
  
|Operating System (OSX, Windows, Linux, Unix Android.).  The software that manages the basic operationof a computer.
+
|Operating System (OSX, Windows, Linux, Unix Android.).  The software that manages the basic operation of a computer.
  
 
|-
 
|-
Line 163: Line 167:
 
|'''POSIX'''
 
|'''POSIX'''
  
|Portable Operating System Interface is a family ofstandards for maintaining compatibility between operating systems.POSIX definesthe API for software compatibility with variants of Unix and other operatingsystems.
+
|Portable Operating System Interface is a family of standards for maintaining compatibility between operating systems. POSIX defines the API for software compatibility with variants of Unix and other operating systems.
  
 
|-
 
|-
Line 169: Line 173:
 
|'''POST Request'''
 
|'''POST Request'''
  
|An http request that submits data to be processed to aspecified resource.
+
|An http request that submits data to be processed to a specified resource.
  
 
|-
 
|-
Line 175: Line 179:
 
|'''Rich Text'''
 
|'''Rich Text'''
  
|Rich Text Format (RTF) is a proprietary document fileformat with published specification developed by Microsoft Corporation from1987 until 2008 for cross-platform document interchange with Microsoftproducts.
+
|Rich Text Format (RTF) is a proprietary document file format with published specification developed by Microsoft Corporation from1987 until 2008 for cross-platform document interchange with Microsoft products.
  
 
|-
 
|-
Line 187: Line 191:
 
|'''SEO'''
 
|'''SEO'''
  
|Search Engine Optimization - the process of affecting thevisibility of a website or a web page in a search engine's "natural"or un-paid ("organic") search results.
+
|Search Engine Optimization - the process of affecting the visibility of a website or a web page in a search engine's "natural"or un-paid ("organic") search results.
  
 
|-  
 
|-  
Line 193: Line 197:
 
|'''SmartBridge
 
|'''SmartBridge
  
|SmartBridge converts data entered into SmartSimple toformats readable by other programs (for example, Oracle, Crystal).
+
|SmartBridge converts data entered into SmartSimple to formats readable by other programs (for example, Oracle, Crystal).
  
 
|-
 
|-
Line 199: Line 203:
 
|'''SmartFolders'''
 
|'''SmartFolders'''
  
|SmartFolders provide on-line storage for files in a securecentral location that is accessible from any computer with Internet access.
+
|SmartFolders provide on-line storage for files in a secure central location that is accessible from any computer with Internet access.
  
 
|-
 
|-
Line 211: Line 215:
 
|'''SSH'''
 
|'''SSH'''
  
|Secure Shell. Provides secure command line (DOS type) access to the operating systemwhen using Linux.
+
|Secure Shell. Provides secure command line (DOS type) access to the operating system when using Linux.
  
 
|-
 
|-
Line 223: Line 227:
 
|'''UAT'''
 
|'''UAT'''
  
|User Acceptance Testing. The process by which a client accepts the configuration work performedby a vendor.
+
|User Acceptance Testing. The process by which a client accepts the configuration work performed by a vendor.
  
 
|-
 
|-
Line 229: Line 233:
 
|'''UNIX'''
 
|'''UNIX'''
  
|Unix (all-caps UNIX for the trademark) is a multitasking,multi user computer operating system that exists in many variants, originallydeveloped at AT&T's Bell Labs research center.
+
|Unix (all-caps UNIX for the trademark) is a multitasking,multi user computer operating system that exists in many variants, originally developed at AT&T's Bell Labs research center.
  
 
|-
 
|-
Line 235: Line 239:
 
|'''URL'''
 
|'''URL'''
  
|A Uniform Resource Locator (URL) is also known as a webaddress, and is a specific character string that constitutes a reference to aresource. Most web browsers display the URL of a web page above the page in anaddress bar.  
+
|A Uniform Resource Locator (URL) is also known as a web address, and is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar.  
  
 
|-
 
|-
Line 241: Line 245:
 
|'''UTA<sup>TM</sup>'''
 
|'''UTA<sup>TM</sup>'''
  
|Universal Tracking Application<sup>TM</sup>. Ahighly configurable application within the SmartSimple framework used byorganizations to create unique applications to meet their specific trackingneeds.
+
|Universal Tracking Application<sup>TM</sup>. A highly configurable application within the SmartSimple framework used by organizations to create unique applications to meet their specific tracking needs.
  
 
|-
 
|-
Line 247: Line 251:
 
|'''Whitelisting'''
 
|'''Whitelisting'''
  
|Application whitelisting is a computer administrationpractice used to prevent unauthorized programs from running. This is primarilyto protect computers and networks from harmful applications.
+
|Application whitelisting is a computer administration practice used to prevent unauthorized programs from running. This is primarily to protect computers and networks from harmful applications.
  
 
|-
 
|-
Line 253: Line 257:
 
|'''XML'''
 
|'''XML'''
  
|Extensible Markup Language is a markup language that definesa set of rules for encoding documents in a format which is legible to bothpeople and machines.
+
|Extensible Markup Language is a markup language that defines a set of rules for encoding documents in a format which is legible to both people and machines.
  
 
|-
 
|-
Line 259: Line 263:
 
|'''XSS'''
 
|'''XSS'''
  
|Cross-site scripting (XSS) is a type of computer securityvulnerability typically found in web applications. XSS enables attackers toinject client-side script into web pages viewed by other users.
+
|Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.
  
 
|}
 
|}
Line 270: Line 274:
 
|'''HCAI'''
 
|'''HCAI'''
  
|Health Claims for Auto Insurance. The Ontario Governmentsystem for receipt and analysis of accident benefits claims.
+
|Health Claims for Auto Insurance. The Ontario Government system for receipt and analysis of accident benefits claims.
  
 
|-
 
|-
Line 276: Line 280:
 
|'''IME'''
 
|'''IME'''
  
|Independent Medical Examiner. An organization or individualthat provides an independent assessment of injuries after an accident thatinvolves an insurance claim.
+
|Independent Medical Examiner. An organization or individual that provides an independent assessment of injuries after an accident that involves an insurance claim.
  
 
|}
 
|}
Line 286: Line 290:
 
|'''CRA'''
 
|'''CRA'''
  
|Canada Revenue Agency. Grants clients in Canada and the US use CRA to verify the eligibility oforganizations based on their not-for-profit status.   
+
|Canada Revenue Agency. Grants clients in Canada and the US use CRA to verify the eligibility of organizations based on their not-for-profit status.   
  
 
|-
 
|-
Line 292: Line 296:
 
|'''CSR'''
 
|'''CSR'''
  
|Corporate Social Responsibility. CSR are generally programscompanies have incorporated into their business model as their way to be"socially responsible" to the community. This can include everythingfrom supporting medical research initiatives to food banks, children's programsto animal welfare and financial literacy to building homes for families in needboth in a company's native country and abroad.
+
|Corporate Social Responsibility. CSR are generally programs companies have incorporated into their business model as their way to be"socially responsible" to the community. This can include everything from supporting medical research initiatives to food banks, children's programs to animal welfare and financial literacy to building homes for families in need both in a company's native country and abroad.
  
 
|-
 
|-
Line 298: Line 302:
 
|'''eGrant'''
 
|'''eGrant'''
  
|eGrants are online systems designed to automate the entiregrants management process, and can include any or all of the following steps:
+
|eGrants are online systems designed to automate the entire grants management process, and can include any or all of the following steps:
  
 
*Submission of and tracking of grant applications.
 
*Submission of and tracking of grant applications.
Line 314: Line 318:
 
|'''EIN'''
 
|'''EIN'''
  
|Also known as the Federal Employer Identification Number(FEIN), the EIN is a unique nine-digit number assigned by the IRS to businessentities operating in the United States.
+
|Also known as the Federal Employer Identification Number(FEIN), the EIN is a unique nine-digit number assigned by the IRS to business entities operating in the United States.
  
 
|-
 
|-
Line 326: Line 330:
 
|'''hGrant'''
 
|'''hGrant'''
  
|A tool provided by The Foundation Center, hGrant allowsnon-profit organizations of any size to publish and share their informationonline with other non-profits, creating a community of information resourcesfor the not-for-profit sector.
+
|A tool provided by The Foundation Center, hGrant allows non-profit organizations of any size to publish and share their information online with other non-profits, creating a community of information resources for the not-for-profit sector.
  
 
|-
 
|-
Line 332: Line 336:
 
|'''IRS'''
 
|'''IRS'''
  
|Internal Revenue Service (U.S.).  Grants clients in the US use IRS to verifythe eligibility of organizations based on their not-for-profit status.
+
|Internal Revenue Service (U.S.).  Grants clients in the US use IRS to verify the eligibility of organizations based on their not-for-profit status.
  
 
|-
 
|-
Line 340: Line 344:
 
|Letter of Intent can mean one of two things:
 
|Letter of Intent can mean one of two things:
  
*In the granting process, the first stage outlining theintent of the applicant in the hopes of being invited to complete a fullfunding application.
+
*In the granting process, the first stage outlining the intent of the applicant in the hopes of being invited to complete a full funding application.
  
*In the SmartSimple sales process, a letter indicating theclients intent to purchase.
+
*In the SmartSimple sales process, a letter indicating the clients intent to purchase.
  
 
|-
 
|-
Line 348: Line 352:
 
|'''NTEE'''
 
|'''NTEE'''
  
|The National Taxonomy of Exempt Entities (NTEE) system isused by the IRS and NCCS to classify non-profit organizations.
+
|The National Taxonomy of Exempt Entities (NTEE) system is used by the IRS and NCCS to classify non-profit organizations.
  
 
|-
 
|-
Line 354: Line 358:
 
|'''OFAC'''
 
|'''OFAC'''
  
|Office of Foreign Asset Control (U.S.). This list isproduced by a variety of US government agencies (FBI, Homeland Security) andcontains all persons and organizations that are potentially terrorists.  SmartSimple clients in the U.S. must validatethat anyone they are dealing with - both organizations and contacts - are noton this list before providing any funds. This is a legal requirement and ismandatory.
+
|Office of Foreign Asset Control (U.S.). This list is produced by a variety of US government agencies (FBI, Homeland Security) and contains all persons and organizations that are potentially terrorists.  SmartSimple clients in the U.S. must validate that anyone they are dealing with - both organizations and contacts - are not on this list before providing any funds. This is a legal requirement and is mandatory.
  
 
|}
 
|}
Line 364: Line 368:
 
|'''CCV – Common CV'''
 
|'''CCV – Common CV'''
  
|The Canadian Common CV (CCV) is a web-based applicationthat provides researchers with a single, common approach to gathering CVinformation required by federal, provincial and not-for-profit research fundingorganizations.
+
|The Canadian Common CV (CCV) is a web-based application that provides researchers with a single, common approach to gathering CV information required by federal, provincial and not-for-profit research funding organizations.
  
 
|-
 
|-
Line 372: Line 376:
 
|Letter of Intent can mean one of two things:
 
|Letter of Intent can mean one of two things:
  
*In the granting process, the first stage outlining theintent of the applicant in the hopes of being invited to complete a fullfunding application.
+
*In the granting process, the first stage outlining the intent of the applicant in the hopes of being invited to complete a full funding application.
  
*In the SmartSimple sales process, a letter indicating theclients intent to purchase.
+
*In the SmartSimple sales process, a letter indicating the clients intent to purchase.
  
 
|-
 
|-
Line 380: Line 384:
 
|'''ORCiD'''
 
|'''ORCiD'''
  
|Open Researcher and Contributor ID.  This is both a system and anorganization.  Researchers can maintain aprofile in that system and automatically transfer parts of that profile to aresearch management system that has integrated with ORCiD.  SmartSimple is integrated with this system.
+
|Open Researcher and Contributor ID.  This is both a system and an organization.  Researchers can maintain a profile in that system and automatically transfer parts of that profile to a research management system that has integrated with ORCiD.  SmartSimple is integrated with this system.
  
 
|-
 
|-
Line 386: Line 390:
 
|'''PubMed'''
 
|'''PubMed'''
  
|The library of Congress (US) maintains a virtual library ofmore than 23 million documents on biomedical literature from MEDLINE, lifescience journals and online books.
+
|The library of Congress (US) maintains a virtual library of more than 23 million documents on biomedical literature from MEDLINE, life science journals and online books.
  
 
|}
 
|}

Latest revision as of 15:28, 19 October 2017

AntiSamy AntiSamy is a sanitization framework; it is up to the user how it does its sanitization. Using AntiSamy does not guarantee filtering of all malicious code. AntiSamy simply does what is described by the policy file.
Apache The Apache HTTP Server is a Web server application notable for playing a key role in the initial growth of the Web.
API Application Programming Interface is a specification intended to be used as an interface by software components to communicate with each other. SmartSimple supports two different APIs:
  • Web Service to support server to server communication via the Internet – Apache Axis2 based.
  • Browser based communication to the Server - Ajax based named Pandora.
Bash A Unix shell written for the GNU Project (a mass software collaboration) as a free software replacement for the Bourne shell. Released in 1989, it has been distributed widely as the shell for the GNU operating system and as a default shell on Linux and Mac OS X.
CGI Common Gateway Interface. This is a legacy scripting language. It is unlikely you will encounter this in modern scripting.
Cloud Computing Internet-based computing where large groups of remote servers are networked to allow sharing of data-processing tasks, centralized data storage and online access to computer services or resources.
CPU A Central Processing Unit (CPU) is the hardware inside a computer that carries out the instructions of programs by performing the basic arithmetical, logical, and input/output operations of the system.
CRM Contact Relationship Management. Can also stand for Customer Relationship Management or Constituent Relationship Management. The most popular CRM cloud service is Salesforce.com.
CSS Cascading Style Sheets. Used in conjunction with web pages to define how the pages should be presented in the browser.
CV While not exactly a technical term, CV is commonly used in a variety of applications and by a variety of organizations in reference to a person's or organizations "Curriculum Vitae", an elaboration of accomplishments - rather like a resume.
DDoS A distributed denial-of-service (DDoS) or denial of service(DoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
DNS Server A Domain Name System (DNS) Server is a computer hardware or software server that implements a network service for providing responses to queries against a directory service - much like a phone book for website addresses.
DOS Disc Operating System. Developed by Microsoft in 1976 but no longer in use.
Entity In SmartSimple terms, an entity is a record of a person,organization or item. Each entity is designated Level 1, Level 2 or Level 3 in our Universal Tracking Application (UTA) based on whether it is a primary or secondary activity:
  • Level 1 - Level 1 represents the item to be tracked, for example, a project or a case.
  • Level 2 - Level 2 is a transaction result of the Level 1entity, a sub-entity.
  • Level 3 - Level 3 is, in turn, a sub-entity of a Level 2 entity.
ERP Enterprise Resource Planning (ERP) is business management software that companies use to collect, store, manage and interpret data from many business activities.
GET Request An http request asking for data from a specified resource.
Gort SmartSimple's automated server process that handles system emails, workflows and other activities.
HTML Hyper Text Mark-up Language. A Meta language that determines the formatting of web pages.
http/https Hypertext Transfer Protocol/Hypertext Transfer ProtocolSecure. The protocol used to transfer web pages from a web server to a browser. The S indicates that the communication is encrypted using SSL.
Instance A single copy of SmartSimple. Each SmartSimple customer has access to two instances - one used for production use and another Backup andTesting Instance that is used for immediate backup and for testing new features.
KML Keyhole Markup Language is an XML notation for expressing geographic annotation and visualization within Internet-based, two-dimensional maps and three-dimensional Earth browsers.
Linux A Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution.
Metadata Provides information about an item's content. For example,an image may include metadata that describes how large the picture is, when the image was created and other relevant information. A text document's meta data may contain information about how long the document is, who the author is and when it was written.
MVC Model-View-Controller (MVC) is a software architectural pattern for implementing user interfaces. It divides a given software application into three interconnected parts, so as to separate internal representations of information from the ways that information is presented to or accepted from the user.
ODBC Open Database Connectivity (ODBC) is a standard programming language middleware API for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems.
OS Operating System (OSX, Windows, Linux, Unix Android.). The software that manages the basic operation of a computer.
POSIX Portable Operating System Interface is a family of standards for maintaining compatibility between operating systems. POSIX defines the API for software compatibility with variants of Unix and other operating systems.
POST Request An http request that submits data to be processed to a specified resource.
Rich Text Rich Text Format (RTF) is a proprietary document file format with published specification developed by Microsoft Corporation from1987 until 2008 for cross-platform document interchange with Microsoft products.
SaaS Software as a Service. Providing access to a software service via the Web. Generally billed on an ongoing basis.
SEO Search Engine Optimization - the process of affecting the visibility of a website or a web page in a search engine's "natural"or un-paid ("organic") search results.
SmartBridge SmartBridge converts data entered into SmartSimple to formats readable by other programs (for example, Oracle, Crystal).
SmartFolders SmartFolders provide on-line storage for files in a secure central location that is accessible from any computer with Internet access.
SQL Structured Query Language. The language used to communicate with a Relational Database.
SSH Secure Shell. Provides secure command line (DOS type) access to the operating system when using Linux.
SSL Secure Sockets Layer. Encryption of web communication using HTTP (HTTPS).
UAT User Acceptance Testing. The process by which a client accepts the configuration work performed by a vendor.
UNIX Unix (all-caps UNIX for the trademark) is a multitasking,multi user computer operating system that exists in many variants, originally developed at AT&T's Bell Labs research center.
URL A Uniform Resource Locator (URL) is also known as a web address, and is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar.
UTATM Universal Tracking ApplicationTM. A highly configurable application within the SmartSimple framework used by organizations to create unique applications to meet their specific tracking needs.
Whitelisting Application whitelisting is a computer administration practice used to prevent unauthorized programs from running. This is primarily to protect computers and networks from harmful applications.
XML Extensible Markup Language is a markup language that defines a set of rules for encoding documents in a format which is legible to both people and machines.
XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.


Claims Management Acronyms, Terms and Abbreviations

HCAI Health Claims for Auto Insurance. The Ontario Government system for receipt and analysis of accident benefits claims.
IME Independent Medical Examiner. An organization or individual that provides an independent assessment of injuries after an accident that involves an insurance claim.


Grants Management Acronyms, Terms and Abbreviations

CRA Canada Revenue Agency. Grants clients in Canada and the US use CRA to verify the eligibility of organizations based on their not-for-profit status.
CSR Corporate Social Responsibility. CSR are generally programs companies have incorporated into their business model as their way to be"socially responsible" to the community. This can include everything from supporting medical research initiatives to food banks, children's programs to animal welfare and financial literacy to building homes for families in need both in a company's native country and abroad.
eGrant eGrants are online systems designed to automate the entire grants management process, and can include any or all of the following steps:
  • Submission of and tracking of grant applications.
  • Online application review.
  • Negotiating and awarding of grants.
  • Selecting and searching for applicants in a database.
  • Financial tracking and reporting of awards.
EIN Also known as the Federal Employer Identification Number(FEIN), the EIN is a unique nine-digit number assigned by the IRS to business entities operating in the United States.
GSA General Service Agreement (U.S. government). A list of products that can be purchased byUS Federal government organizations can purchase. A variety of schedules are available. SmartSimple is listed on GSA Schedule 70.
hGrant A tool provided by The Foundation Center, hGrant allows non-profit organizations of any size to publish and share their information online with other non-profits, creating a community of information resources for the not-for-profit sector.
IRS Internal Revenue Service (U.S.). Grants clients in the US use IRS to verify the eligibility of organizations based on their not-for-profit status.
LOI Letter of Intent can mean one of two things:
  • In the granting process, the first stage outlining the intent of the applicant in the hopes of being invited to complete a full funding application.
  • In the SmartSimple sales process, a letter indicating the clients intent to purchase.
NTEE The National Taxonomy of Exempt Entities (NTEE) system is used by the IRS and NCCS to classify non-profit organizations.
OFAC Office of Foreign Asset Control (U.S.). This list is produced by a variety of US government agencies (FBI, Homeland Security) and contains all persons and organizations that are potentially terrorists. SmartSimple clients in the U.S. must validate that anyone they are dealing with - both organizations and contacts - are not on this list before providing any funds. This is a legal requirement and is mandatory.


Research Management Acronyms, Terms and Abbreviations

CCV – Common CV The Canadian Common CV (CCV) is a web-based application that provides researchers with a single, common approach to gathering CV information required by federal, provincial and not-for-profit research funding organizations.
LOI Letter of Intent can mean one of two things:
  • In the granting process, the first stage outlining the intent of the applicant in the hopes of being invited to complete a full funding application.
  • In the SmartSimple sales process, a letter indicating the clients intent to purchase.
ORCiD Open Researcher and Contributor ID. This is both a system and an organization. Researchers can maintain a profile in that system and automatically transfer parts of that profile to a research management system that has integrated with ORCiD. SmartSimple is integrated with this system.
PubMed The library of Congress (US) maintains a virtual library of more than 23 million documents on biomedical literature from MEDLINE, life science journals and online books.