├── CITATION.cff
├── CODE_OF_CONDUCT.md
├── CONTRIBUTING.md
├── README.md
├── doc
├── access-control
│ ├── README.md
│ └── index.md
├── algorithms
│ ├── README.md
│ └── index.md
├── analytics
│ ├── README.md
│ └── index.md
├── authentication
│ └── index.md
├── automotive
│ ├── README.md
│ └── index.md
├── capability-maturity-model-integration
│ ├── README.md
│ └── index.md
├── consumer
│ ├── README.md
│ └── index.md
├── data-mining
│ ├── README.md
│ └── index.md
├── data-structures
│ ├── README.md
│ └── index.md
├── education
│ ├── README.md
│ └── index.md
├── energy
│ ├── README.md
│ └── index.md
├── engineering
│ ├── README.md
│ └── index.md
├── evaluation-and-results-based-management-by-oecd
│ ├── README.md
│ └── index.md
├── finance
│ ├── README.md
│ └── index.md
├── fintech
│ ├── README.md
│ ├── fintech-more.md
│ └── index.md
├── healthcare
│ ├── README.md
│ └── index.md
├── homeless-services-delivery-system-by-lahsa
│ ├── README.md
│ └── index.md
├── human-resources
│ ├── README.md
│ └── index.md
├── insurance
│ ├── README.md
│ └── index.md
├── lean-six-sigma
│ ├── README.md
│ └── index.md
├── manufacturing
│ ├── README.md
│ └── index.md
├── measurement
│ ├── README.md
│ └── index.md
├── media
│ ├── README.md
│ └── index.md
├── organizations
│ ├── README.md
│ └── index.md
├── politics
│ ├── README.md
│ └── index.md
├── program-evaluation-and-review-technique
│ ├── README.md
│ └── index.md
├── project-management
│ ├── README.md
│ └── index.md
├── quality-attributes-examples
│ ├── README.md
│ └── index.md
├── quality-attributes
│ ├── README.md
│ └── index.md
├── raid-log
│ ├── README.md
│ └── index.md
├── real-estate
│ ├── README.md
│ └── index.md
├── responsibility-assignment-matrix
│ ├── README.md
│ └── index.md
├── retail
│ ├── README.md
│ └── index.md
├── six-sigma
│ ├── README.md
│ └── index.md
├── software-cloud-hosting-models
│ ├── README.md
│ └── index.md
├── software-companies-products-services
│ ├── README.md
│ └── index.md
├── software-concepts
│ ├── README.md
│ └── index.md
├── software-design-patterns
│ ├── README.md
│ └── index.md
├── software-engineering-by-iqbba
│ ├── README.md
│ └── index.md
├── software-for-apple-macos-ios-watchos
│ ├── README.md
│ └── index.md
├── software-testing
│ ├── README.md
│ └── index.md
├── software-web-frameworks
│ ├── README.md
│ └── index.md
├── startups
│ ├── README.md
│ └── index.md
├── statistics
│ ├── README.md
│ └── index.md
├── technical-debt-causes
│ ├── README.md
│ └── index.md
├── telecommunication
│ ├── README.md
│ └── index.md
├── todo
│ ├── README.md
│ └── index.md
├── travel
│ ├── README.md
│ └── index.md
├── united-states-department-of-defense
│ └── business-enterprise-architecture
│ │ ├── README.md
│ │ └── index.md
└── x-as-a-service
│ ├── README.md
│ └── index.md
└── pages
└── README.md
/CITATION.cff:
--------------------------------------------------------------------------------
1 | cff-version: 1.2.0
2 | title: Demo wordbooks
3 | message: >-
4 | If you use this work and you want to cite it,
5 | then you can use the metadata from this file.
6 | type: software
7 | authors:
8 | - given-names: Joel Parker
9 | family-names: Henderson
10 | email: joel@joelparkerhenderson.com
11 | affiliation: joelparkerhenderson.com
12 | orcid: 'https://orcid.org/0009-0000-4681-282X'
13 | identifiers:
14 | - type: url
15 | value: 'https://github.com/joelparkerhenderson/wordbooks/'
16 | description: Demo wordbooks
17 | repository-code: 'https://github.com/joelparkerhenderson/wordbooks/'
18 | abstract: >-
19 | Demo wordbooks
20 | license: See license file
21 |
--------------------------------------------------------------------------------
/CODE_OF_CONDUCT.md:
--------------------------------------------------------------------------------
1 |
2 | # Contributor Covenant Code of Conduct
3 |
4 | ## Our Pledge
5 |
6 | We as members, contributors, and leaders pledge to make participation in our
7 | community a harassment-free experience for everyone, regardless of age, body
8 | size, visible or invisible disability, ethnicity, sex characteristics, gender
9 | identity and expression, level of experience, education, socio-economic status,
10 | nationality, personal appearance, race, caste, color, religion, or sexual
11 | identity and orientation.
12 |
13 | We pledge to act and interact in ways that contribute to an open, welcoming,
14 | diverse, inclusive, and healthy community.
15 |
16 | ## Our Standards
17 |
18 | Examples of behavior that contributes to a positive environment for our
19 | community include:
20 |
21 | * Demonstrating empathy and kindness toward other people
22 | * Being respectful of differing opinions, viewpoints, and experiences
23 | * Giving and gracefully accepting constructive feedback
24 | * Accepting responsibility and apologizing to those affected by our mistakes,
25 | and learning from the experience
26 | * Focusing on what is best not just for us as individuals, but for the overall
27 | community
28 |
29 | Examples of unacceptable behavior include:
30 |
31 | * The use of sexualized language or imagery, and sexual attention or advances of
32 | any kind
33 | * Trolling, insulting or derogatory comments, and personal or political attacks
34 | * Public or private harassment
35 | * Publishing others' private information, such as a physical or email address,
36 | without their explicit permission
37 | * Other conduct which could reasonably be considered inappropriate in a
38 | professional setting
39 |
40 | ## Enforcement Responsibilities
41 |
42 | Community leaders are responsible for clarifying and enforcing our standards of
43 | acceptable behavior and will take appropriate and fair corrective action in
44 | response to any behavior that they deem inappropriate, threatening, offensive,
45 | or harmful.
46 |
47 | Community leaders have the right and responsibility to remove, edit, or reject
48 | comments, commits, code, wiki edits, issues, and other contributions that are
49 | not aligned to this Code of Conduct, and will communicate reasons for moderation
50 | decisions when appropriate.
51 |
52 | ## Scope
53 |
54 | This Code of Conduct applies within all community spaces, and also applies when
55 | an individual is officially representing the community in public spaces.
56 | Examples of representing our community include using an official e-mail address,
57 | posting via an official social media account, or acting as an appointed
58 | representative at an online or offline event.
59 |
60 | ## Enforcement
61 |
62 | Instances of abusive, harassing, or otherwise unacceptable behavior may be
63 | reported to the community leaders responsible for enforcement at
64 | [INSERT CONTACT METHOD].
65 | All complaints will be reviewed and investigated promptly and fairly.
66 |
67 | All community leaders are obligated to respect the privacy and security of the
68 | reporter of any incident.
69 |
70 | ## Enforcement Guidelines
71 |
72 | Community leaders will follow these Community Impact Guidelines in determining
73 | the consequences for any action they deem in violation of this Code of Conduct:
74 |
75 | ### 1. Correction
76 |
77 | **Community Impact**: Use of inappropriate language or other behavior deemed
78 | unprofessional or unwelcome in the community.
79 |
80 | **Consequence**: A private, written warning from community leaders, providing
81 | clarity around the nature of the violation and an explanation of why the
82 | behavior was inappropriate. A public apology may be requested.
83 |
84 | ### 2. Warning
85 |
86 | **Community Impact**: A violation through a single incident or series of
87 | actions.
88 |
89 | **Consequence**: A warning with consequences for continued behavior. No
90 | interaction with the people involved, including unsolicited interaction with
91 | those enforcing the Code of Conduct, for a specified period of time. This
92 | includes avoiding interactions in community spaces as well as external channels
93 | like social media. Violating these terms may lead to a temporary or permanent
94 | ban.
95 |
96 | ### 3. Temporary Ban
97 |
98 | **Community Impact**: A serious violation of community standards, including
99 | sustained inappropriate behavior.
100 |
101 | **Consequence**: A temporary ban from any sort of interaction or public
102 | communication with the community for a specified period of time. No public or
103 | private interaction with the people involved, including unsolicited interaction
104 | with those enforcing the Code of Conduct, is allowed during this period.
105 | Violating these terms may lead to a permanent ban.
106 |
107 | ### 4. Permanent Ban
108 |
109 | **Community Impact**: Demonstrating a pattern of violation of community
110 | standards, including sustained inappropriate behavior, harassment of an
111 | individual, or aggression toward or disparagement of classes of individuals.
112 |
113 | **Consequence**: A permanent ban from any sort of public interaction within the
114 | community.
115 |
116 | ## Attribution
117 |
118 | This Code of Conduct is adapted from the [Contributor Covenant][homepage],
119 | version 2.1, available at
120 | [https://www.contributor-covenant.org/version/2/1/code_of_conduct.html][v2.1].
121 |
122 | Community Impact Guidelines were inspired by
123 | [Mozilla's code of conduct enforcement ladder][Mozilla CoC].
124 |
125 | For answers to common questions about this code of conduct, see the FAQ at
126 | [https://www.contributor-covenant.org/faq][FAQ]. Translations are available at
127 | [https://www.contributor-covenant.org/translations][translations].
128 |
129 | [homepage]: https://www.contributor-covenant.org
130 | [v2.1]: https://www.contributor-covenant.org/version/2/1/code_of_conduct.html
131 | [Mozilla CoC]: https://github.com/mozilla/diversity
132 | [FAQ]: https://www.contributor-covenant.org/faq
133 | [translations]: https://www.contributor-covenant.org/translations
134 |
135 |
--------------------------------------------------------------------------------
/CONTRIBUTING.md:
--------------------------------------------------------------------------------
1 | # Contributing
2 |
3 | To contribute, you can create a pull request, or send us email, or chat with us, whichever is easiest for you.
4 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Demo wordbooks
2 |
3 | This repository contains demo wordbooks.
4 |
5 | * A wordbook is a collection of words, and possibly their meanings.
6 | * A wordbook is like a dictionary, glossary, lexicon, vocabulary, terminology list, etc.
7 |
8 | We use these wordbooks with our software consulting clients.
9 |
10 | * A wordbook helps us communicate quickly, clearly, and consistently.
11 | * A wordbook is especially good for cross-cultural teams and global teams.
12 |
13 | Suggestions, comments, and pull requests are welcome.
14 |
15 | Industries:
16 |
17 | * [Automotive](doc/automotive/)
18 | * [Consumer](doc/consumer/)
19 | * [Education](doc/education/)
20 | * [Energy](doc/energy/)
21 | * [Engineering](doc/engineering/)
22 | * [Finance](doc/finance/)
23 | * [Healthcare](doc/healthcare/)
24 | * [Human Resources](doc/human-resources/)
25 | * [Insurance](doc/insurance/)
26 | * [Manufacturing](doc/manufacturing/)
27 | * [Media](doc/media/)
28 | * [Politics](doc/politics/)
29 | * [Real estate](doc/real-estate/)
30 | * [Retail](doc/retail/)
31 | * [Telecommunication](doc/telecommunication/)
32 | * [Travel](doc/travel/)
33 |
34 | Consulting:
35 |
36 | * [Organizations](doc/organizations/)
37 | * [Project management](doc/project-management/)
38 | * [RAID log](doc/raid-log/)
39 | * [Responsibility Assigment Matrix](doc/responsibility-assignment-matrix/)
40 | * [Strategic Business Scorecard](doc/strategic-business-scorecard/)
41 | * [Six Sigma](doc/six-sigma/)
42 | * [Lean Six Sigma](doc/lean-six-sigma/)
43 | * [Capability maturity model integration (CMMI)](doc/capability-maturity-model-integration/)
44 | * [Program evaluation and review technique (PERT) wordbook](doc/program-evaluation-and-review-technique/)
45 | * [Responsibility assigment matrix (RAM)](doc/responsibility-assigment-matrix/)
46 |
47 | Software:
48 |
49 | * [Access control](doc/access-control/)
50 | * [Algorithms](doc/algorithms/)
51 | * [Data structures](doc/data-structures/)
52 | * [Quality attributes](doc/quality-attributes/)
53 | * [Quality attributes examples](doc/quality-attributes-examples/)
54 | * [Software companies, products, services](doc/software-companies-products-services/)
55 | * [Software concepts](doc/software/)
56 | * [Software design patterns](doc/software-design-patterns/)
57 | * [Software cloud hosting models](doc/software-cloud-hosting-models/)
58 | * [Software for Apple, macOS, iOS, watchOS](doc/software-for-apple-macos-ios-watchos/)
59 | * [Software engineering by IQBBA](doc/software-engineering-by-iqbba/)
60 | * [Software testing](doc/software-testing/)
61 | * [Technical debt causes](doc/software-technical-debt-causes/)
62 | * [X as a Service](doc/x-as-a-service/)
63 |
64 | Data:
65 |
66 | * [Analytics](doc/analytics/)
67 | * [Measurement](doc/measurement/)
68 | * [Statistics](doc/statistics/)
69 |
70 | Areas of interest:
71 |
72 | * [Homeless services delivery system by LAHSA](doc/homeless-services-delivery-system-by-lahsa/)
73 |
74 | * [United States Department of Defense - business enterprise architecture](united-states-department-of-defense/business-enterprise-architecture/)
75 |
76 | To Do:
77 |
78 | * [TODO](doc/todo/)
79 |
80 | ## Tracking
81 |
82 | * Package: wordbooks
83 | * Version: 4.0.0
84 | * Created: 2014-01-01
85 | * Updated: 2021-05-19T19:56:45Z
86 | * License: BSD, MIT, GPL
87 | * Contact: Joel Parker Henderson (joel@joelparkerhenderson.com)
88 |
--------------------------------------------------------------------------------
/doc/access-control/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/access-control/index.md:
--------------------------------------------------------------------------------
1 | # Access control wordbook
2 |
3 | Contents:
4 | * [](#)
5 |
6 |
7 | ## General
8 |
9 |
10 | * [access control (AC)](https://en.wikipedia.org/wiki/Access_control)
11 |
12 | * [access control list (ACL)](https://en.wikipedia.org/wiki/Access_control_list)
13 |
14 |
15 | ## Access control methodologies
16 |
17 |
18 | * [Attribute-Based Access Control (ABAC)](https://en.wikipedia.org/wiki/Attribute-Based_Access_Control)
19 |
20 | * [Capability-based security](https://en.wikipedia.org/wiki/Capability-based_security)
21 |
22 | * [Context-based access control (CBAC)](https://en.wikipedia.org/wiki/Context-based_access_control)
23 |
24 | * [discretionary access control (DAC)](https://en.wikipedia.org/wiki/Discretionary_access_control)
25 |
26 | * [graph-based access control (GBAC)](https://en.wikipedia.org/wiki/Graph-based_access_control)
27 |
28 | * [lattice-based access control (LBAC)](https://en.wikipedia.org/wiki/Lattice-based_access_control)
29 |
30 | * [mandatory access control (MAC)](https://en.wikipedia.org/wiki/Mandatory_access_control)
31 |
32 | * [NIST RBAC model](https://en.wikipedia.org/wiki/NIST_RBAC_model): a standardized definition of role based access control.
33 |
34 | * [Organisation-based access control (OrBAC)](https://en.wikipedia.org/wiki/Organisation-based_access_control)
35 |
36 | * [Role-based access control (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control)
37 |
38 | * [Rule-set-based access control (RSBAC)](https://en.wikipedia.org/wiki/RSBAC)
39 |
40 | * [Location-based authentication](https://en.wikipedia.org/wiki/Location-based_authentication)
41 |
42 | * [Risk-based authentication](https://en.wikipedia.org/wiki/Risk-based_authentication)
43 |
44 |
45 | ## Miscellaneous
46 |
47 |
48 | * [Bell–LaPadula model](https://en.wikipedia.org/wiki/Bell%E2%80%93LaPadula_model): a state machine model used for enforcing access control in government and military applications.
49 |
50 | * [Biba Model](https://en.wikipedia.org/wiki/Biba_Model): a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
51 |
52 | * [Computer security model](https://en.wikipedia.org/wiki/Computer_security_model)
53 |
54 | * [Role hierarchy](https://en.wikipedia.org/wiki/Role_hierarchy)
55 |
56 | * [XACML eXtensible Access Control Markup Language](https://en.wikipedia.org/wiki/XACML)
57 |
58 |
--------------------------------------------------------------------------------
/doc/algorithms/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/algorithms/index.md:
--------------------------------------------------------------------------------
1 | # Algorithms wordbook
2 |
3 | * [List of algorithms](https://en.wikipedia.org/wiki/List_of_algorithms)
4 | * [Bcrypt: secure password key derivation function](https://wikipedia.org/wiki/Bcrypt) (cf. Scrypt)
5 | * [MD5: Message Digest Algorithm](https://wikipedia.org/wiki/Md5) (cf. SHA)
6 | * [SHA: Secure Hash Algorithm](https://wikipedia.org/wiki/Secure_Hash_Algorithm) (cf. MD5) (related: SHA1, SHA2, SHA512, etc.)
7 | * [Scrypt: secure password key derivation function](https://wikipedia.org/wiki/Scrypt) (cf. Bcrypt)
8 | * [Vector clock: for ordering events in a distributed systems](https://en.wikipedia.org/wiki/Vector_clock)
9 |
--------------------------------------------------------------------------------
/doc/analytics/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/analytics/index.md:
--------------------------------------------------------------------------------
1 | # Analytics wordbook
2 |
3 | Contents:
4 | * [General](#general)
5 | * [Quality Metrics](#quality)
6 | * [Credit](#credit)
7 |
8 |
9 | ## General
10 |
11 | * [alert](?): a notification of a change in your data
12 | * [AMPU: average margin per user (or unit)](https://wikipedia.org/wiki/Average_revenue_per_user) (cf. ARPU, ARPPU)
13 | * [AOV: average order value](https://en.wikipedia.org/wiki/Average_order_value)
14 | * [APC: average purchase cost](TODO)
15 | * [APPY: average purchases per year](TODO)
16 | * [ARPPU: average revenue per paying user](https://wikipedia.org/wiki/Average_revenue_per_user) (cf. ARPU, AMPU)
17 | * [ARPU: average revenue per user (or unit)](https://wikipedia.org/wiki/Average_revenue_per_user) (cf. AMPU, ARPPU)
18 | * [ART: average retention time](TODO)
19 | * [attrition rate](https://en.wikipedia.org/wiki/Churn_rate) a.k.a. churn rate.
20 | * [average session length](?) measures duration of one session
21 | * [benchmarking](?): how a service is performing in comparison to other services of similar scope
22 | * [bounce rate](?): the percentage of visits in which a visitor only views one page of your site before leaving
23 | * [churn rate a.k.a. attrition rate](https://en.wikipedia.org/wiki/Churn_rate) a measure of items moving out of a group over a period of time
24 | * [CI: confidence interval](https://en.wikipedia.org/wiki/Confidence_interval): a range of values (interval) that act as good estimates of an unknown population parameter.
25 | * [CL: confidence level](https://en.wikipedia.org/wiki/Confidence_interval): How frequently the observed interval contains the parameter is determined by the confidence level or confidence coefficient.
26 | * [click](?): The single instance of a user following a hyperlink to another page or to initiate an action
27 | * [CMRR: contracted monthly recurring revenue or committed monthly recurring revenue](TODO)
28 | * [conversion](?): when a visitor comes to a site and complets a goal
29 | * [cookie](?): a small amount of data used to remember information from page to page and visit to visit
30 | * [cost data](?): the information imported from a Google AdWords account into an Analytics account
31 | * [downloads and registrations](TODO) downloads and registrations serve as the top-of-funnel metric for user engagement.
32 | * [DNRs: downloads and registrations](TODO)
33 | * [CLV: customer lifetime value](https://en.wikipedia.org/wiki/Customer_lifetime_value)
34 | * [CLVT: customer lifetime value](https://en.wikipedia.org/wiki/Customer_lifetime_value)
35 | * [CP: customer profitability](https://en.wikipedia.org/wiki/Customer_profitability)
36 | * [custom reporting](?): options to create reports based on metrics and dimensions you choose
37 | * [customer lifetime value (CLV, CLTV)](https://en.wikipedia.org/wiki/Customer_lifetime_value) prediction of net profit for to the entire relationship with a customer.
38 | * [customer profitability (CP)](https://en.wikipedia.org/wiki/Customer_profitability) the profit the firm makes from serving a customer or customer group over a specified period of time.
39 | * [daily active users (DAU)](https://wikipedia.org/wiki/Daily_Active_Users) (cf. MAU, WAU) DAUs help measure engagement, retention, stickiness, and lifetime value of users.
40 | * [DAU: daily active users](https://wikipedia.org/wiki/Daily_Active_Users)
41 | * [direct traffic](?): visits to a site where a user types your URL in their browser's address bar, not in a search engine.
42 | * [ecommerce](?): purchasing or selling of products or services using the internet
43 | * [exact match](?): a match on every character in a search string from beginning to end
44 | * [filter](?): a guideline that includes or excludes specific data from reports
45 | * [funnel](?): a series of steps a visitor completes to reach an end goal
46 | * [goal conversion rate](?): the percentage of visits on a site where a visitor completes a goal or conversion
47 | * [goal](?): a measure of something you want to track in analytics, that you define as a success
48 | * [Google Analytics](?): Free service offering a simple way to track metrics on a site.
49 | * [head match](?): a match on the characters you specify as the beginning of a string
50 | * [hero shot](TODO): a promotional image that shows how a product/service works, so prospects can picture themselves using it.
51 | * [IAP: in-app purchase](TODO)
52 | * [impression](?): The display of a referral link or advertisement on a web page.
53 | * [in-app purchase (IAP)](TODO)
54 | * [include](?): a type of filter that matches a text string or regular expression against incoming data
55 | * [keywords](?): words that visitors use to find your site when using a search engine
56 | * [landing page](?): the first page a visitor views during a session; also known as the entrance page
57 | * [LCV: lifetime customer value)](https://en.wikipedia.org/wiki/Customer_lifetime_value) a.k.a. customer lifetime value.
58 | * [life-time value (LTV)](https://en.wikipedia.org/wiki/Customer_lifetime_value) a.k.a. customer lifetime value.
59 | * [lifetime customer value (LCV)](https://en.wikipedia.org/wiki/Customer_lifetime_value) a.k.a. customer lifetime value.
60 | * [Likert scale](https://en.wikipedia.org/wiki/Likert_scale) a psychometric scale commonly used for measuring agree-or-disgree.
61 | * [LTV: life-time value](https://en.wikipedia.org/wiki/Customer_lifetime_value) a.k.a. customer lifetime value.
62 | * [loyalty](?): A measure of visitor behavior, such as number of visits in a time period
63 | * [Marketing Accountability Standards Board (MASB)](https://en.wikipedia.org/wiki/Marketing_Accountability_Standards_Board)
64 | * [marketing metric audit protocol (MMAP)](https://en.wikipedia.org/wiki/Marketing_metric_audit_protocol) a process for connecting marketing activities to financial performance.
65 | * [MASB: Marketing Accountability Standards Board](https://en.wikipedia.org/wiki/Marketing_Accountability_Standards_Board)
66 | * [match type](?): how to match text characters (see head match, exact match, regular expression match)
67 | * [MAU: monthly active users](TODO) (cf. DAU, WAU)
68 | * [MMAP: marketing metric audit protocol](https://en.wikipedia.org/wiki/Marketing_metric_audit_protocol)
69 | * [new visitor](?): a user who visits your site for the first time (cf. returning visitor)
70 | * [offline conversion](TODO) e.g. a redemption of an app-specific offer that occurs outside of the app.
71 | * [organic traffic](?): visitors who come to your site from unpaid organic or natural search engine results (cf. paid traffic)
72 | * [page view](?): when a visitor arrives on an individual page of your site
73 | * [paid content](https://en.wikipedia.org/wiki/Paid_content)
74 | * [paid traffic](?): visitors who come to your site from paid advertisements (cf. organic traffic)
75 | * [pay per click](https://en.wikipedia.org/wiki/Pay_per_click)
76 | * [query parameter](?): A VARIABLE=VALUE pair that follows the question mark ("?") in a URL
77 | * [query variable](?): The VARIABLE portion of the VARIABLE=VALUE pair that makes up a query parameter
78 | * [rating](?) e.g. when a user rates an app in an app store, or a product on a web site
79 | * [rating scale](https://en.wikipedia.org/wiki/Rating_scale): a set of categories designed for questionnaires; common scales are the Likert response scale and 1-10 rating scale.
80 | * [referring site](?): another site that sends a visitor to your site
81 | * [regular expression match](?): match text by using special characters, wildcards, and flexible rules
82 | * [request URI](?): the string at the end of a URL after a site's domain name
83 | * [retention](?) measures ongoing users vs. download users.
84 | * [returning visitor](?): a user who is coming to a site more than once (cf. new visitor)
85 | * [review](?) e.g. when a user writes about an app in an app store, or a product on a web site
86 | * [search engine](?): a site that helps a user search online, such as Google
87 | * [session](?) the time one user engages with one app or sit
88 | * [sessions per visitor per week](?) measures how often one person returns to an app
89 | * [taps and views](?) taps and views can serve as indicators of engagement, or even revenue.
90 | * [time on site](?): the average length of time a visitor spends accessing a site within a specified time period
91 | * [top exit pages](?): the pages on a site that visitors jump off, or depart from, when existing a site
92 | * [top landing pages](?): the pages on a site that visitors land on, or come to, when entering a site
93 | * [tracking code](?): a small snippet of code that captures information about visits to a page
94 | * [traffic sources](?): where a site's traffic comes from
95 | * [traffic](?): the total number of visits to your site
96 | * [unique visitor](?): the number of individual (non-duplicate) visitors to a site in a specific time period
97 | * [user-generated content](https://en.wikipedia.org/wiki/User-generated_content)
98 | * [visitor session](?): the duration a visitor spends on a site
99 | * [visitor](?): a person who goes to a site
100 | * [visits](?): the amount of times a site is accessed
101 | * [WAU: weekly active users](TODO) (cf. DAU, MAU)
102 |
103 |
104 | ## Quality Metrics
105 |
106 | * [mean time to repair (MTTR)](https://en.wikipedia.org/wiki/Mean_time_to_repair)
107 | * [mean time to recovery (MTTR)](https://en.wikipedia.org/wiki/Mean_time_to_recovery)
108 | * [time between overhaul (TBO, TBOH)](https://en.wikipedia.org/wiki/Time_between_overhaul
109 | * [mean time between failures (MTBF)](https://en.wikipedia.org/wiki/Mean_time_between_failures)
110 | * [jitter](https://en.wikipedia.org/wiki/Jitter): the deviation from true periodicity of a presumably periodic signal.
111 |
112 |
113 | ## Credit
114 |
115 | * [List of Google Analyatics terms](http://www.epower.com/google-analytics-glossary)
116 | * [Unbounce conversion glossary](http://unbounce.com/conversion-glossary/)
117 |
--------------------------------------------------------------------------------
/doc/authentication/index.md:
--------------------------------------------------------------------------------
1 | # Authentication
2 |
3 | Authentication in the context of software applications refers to the process of verifying the identity of a user, device, or system trying to access the software or its resources. This ensures that only authorized users can perform certain actions or access specific data.
4 |
5 | Authentication methods can vary based on security requirements and the sensitivity of the information being protected.
6 |
7 | ## Helpful terminology
8 |
9 | ### Type 1 Authentication: something you know
10 |
11 | **Username or Email Address**: A user provides a unique identifier (such as a username or email address) to initiate the login process. This is typically the first step before entering other forms of credentials.
12 |
13 | **Password or Passphrase**: A password is a secret string of characters (letters, numbers, symbols) used to authenticate a user. A passphrase is similar but typically longer and more complex.
14 |
15 | **Security Challenge Questions**: The user answers a set of pre-determined questions, such as "What is your favorite color?" or "Who wrote your favorite book?" to verify their identity.
16 |
17 | **Recovery Codes**: Temporary or one-time codes that are used to regain access when the usual authentication method (like a password) is unavailable. These codes are often provided during account setup or via email/SMS.
18 |
19 | **Personal Identification Number (PIN)**: A numeric password that is usually shorter than a password but is used to authenticate a user, often on bank automatic teller machines (ATMs), or phone call services.
20 |
21 | ### Type 2 Authentication: something you have
22 |
23 | **Mobile Authentication Application (Authenticator App)**: Applications like Google Authenticator, Microsoft Authenticator, or Authy generate a time-limited one-time password (TOTP) that proves the user has access to the user's personalized authentication application.
24 |
25 | **OTP (One-Time Password)**: A single-use password for a user to complete a transaction or login session. A popular use is for a website to send an OTP to a user via the email or mobile phone text message.
26 |
27 | **TOPT (Time-Based One-Time Password)**: A type of OTP that is valid for a very short period (e.g., 30 seconds). The password is generated based on the current time and a secret key shared between the server and the client.
28 |
29 | **FIDO2 (Fast IDentity Online 2)**: A set of standards for strong authentication that enables passwordless login using public key cryptography. Users authenticate using devices such as biometric sensors or security keys (e.g., YubiKey).
30 |
31 | **RFID (Radio Frequency Identification)**: Authentication using RFID involves the use of a small device, such as an RFID card or tag, that contains unique identifying information. It is scanned by a reader to authenticate the user.
32 |
33 | **NFC (Near Field Communication)**: Authentication via NFC uses devices (e.g., smartphones, cards) to communicate with each other when they are in close proximity. It’s often used for contactless payments or authentication.
34 |
35 | **Identification card or badge or letter**
36 |
37 | **Government passport**
38 |
39 | **Smart card**
40 |
41 | **Security token**
42 |
43 | **Browser cookie**
44 |
45 | **Pinned certificate**
46 |
47 | **SSH key**
48 |
49 | **Electronic signature**: An electronic signature, or e-signature, is data that is logically associated with other data and which is used by the signatory to sign the associated data.
50 |
51 | ### Type 3 Authentication: something you are
52 |
53 | **Biometrics**: biometric authentication uses physical traits such as fingerprints, facial recognition, iris scans, or voice patterns to verify the identity of a user.
54 |
55 | **Fingerprint**
56 |
57 | **Palm print**
58 |
59 | **Face recognition**
60 |
61 | **Voice recognition**
62 |
63 | **Gesture recognition**
64 |
65 | **Iris scan**
66 |
67 | **Gait analysis**
68 |
69 | **Keystroke dynamics**
70 |
71 | **Touch dynamics**
72 |
73 | ### More terminology
74 |
75 | **Authentication factors**: The three typical authentication factors (a.k.a. categories) are something you know, something you have, something you are.
76 |
77 | **Single-factor authentication (SFA)**: Require one authentication factor to authenticate. The use of only one factor does not offer much protection.
78 |
79 | **Multi-Factor Authentication (MFA)**: Require multiple authentication factors to authenticate. The use of multiple factors offers much better protection than single-factor authentication. A typical example: require a password (which is something you know) and time-based one-time password using your mobile phone (which is something you have). [Wikipedia](https://wikipedia.org/wiki/Multi-factor_authentication)
80 |
81 | **Continuous authentication**: Most computer systems authenticate users once at the initial log-in session. Some higher-security systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s).
82 |
83 | **Authentication protocol**: This is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity (e.g. a client connecting to a server) as well as authenticate itself to the connecting entity (a server to a client) by declaring the type of information needed for authentication as well as syntax. - Wikipedia.
84 |
85 | **Federated identity**: A federated identity is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems. [Wikipedia](https://wikipedia.org/wiki/Federated_identity).
86 |
87 | **Federated authentication**: A federated authentication system allows users to authenticate to multiple systems using a single set of credentials.
88 |
89 | **Single sign-on (SSO)**: An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems. True single sign-on allows the user to log in once and access services without re-entering authentication factors. [Wikipedia](https://wikipedia.org/wiki/Single_sign-on).
90 |
91 | ## Popular directory terminology
92 |
93 | **LDAP (Lightweight Directory Access Protocol)**: LDAP is an application protocol used to query and modify directory services. In authentication, it allows users to log in using a centralized directory, such as Active Directory, without needing separate credentials.
94 |
95 | **Active Directory**: A directory service provided by Microsoft that helps organizations manage user accounts, authenticate users, and assign permissions to resources within a network. Authentication occurs through LDAP or Kerberos protocols.
96 |
97 | **Windows Hello**: A feature of Windows 10 and later that provides passwordless authentication via biometrics (facial recognition or fingerprint) or a PIN. It can also support external security keys.
98 |
99 | ## Challenges for automatic testing
100 |
101 | Software engineering often uses automatic testing, such as for continuous integration (CI), continuous delivery (CD), continuous telemetry (CT), etc.
102 |
103 | However, authentication can be a challenge for automatic testing, especially for multi-factor authentication:
104 |
105 | * Example 1: if test code needs to use a mobile phone application for TOPT, then somehow the CI/CD/CT system needs to be able to simulate a phone, or manipulate a phone. Some test systems can simulate a phone by using a virtual device. Some test systems can manipulate a phone by using a robot finger.
106 |
107 | * Example 2: if test code needs to do biometrics such as a fingerprint, then the CI/CD/CT system needs to be able to simulate the fingerprint, or manipulate a fake. Some test systems can simulate a fingerprint by mocking the fingerprint scanner. Some test systems can manipulate a fingerprint by using a prosthetic finger that is modeled to match the fingerprint of a real person.
108 |
--------------------------------------------------------------------------------
/doc/automotive/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/automotive/index.md:
--------------------------------------------------------------------------------
1 | # Automotive industry wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Automotive
4 |
5 |
--------------------------------------------------------------------------------
/doc/capability-maturity-model-integration/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/capability-maturity-model-integration/index.md:
--------------------------------------------------------------------------------
1 | # Capability maturity model integration (CMMI) wordbook
2 |
3 | * CAR: Causal Analysis and Resolution
4 | * CM: Configuration Management
5 | * DAR:Decision Analysis and Resolution
6 | * IPM: Integrated Project Management
7 | * MA: Measurement and Analysis
8 | * OPD: Organizational Process Definition
9 | * OPF: Organizational Process Focus
10 | * OPM: Organizational Performance Management
11 | * OPP: Organizational Process Performance
12 | * OT: Organizational Training
13 | * PMC: Project Monitoring and Control
14 | * PP: Project Planning
15 | * PM: Project Management
16 | * PPQA: Process and Product Quality Assurance
17 | * QPM: Quantitative Project Management
18 | * REQM: Requirements Management
19 | * RSKM: Risk Management
20 | * SAM: Supplier Agreement Management
21 |
--------------------------------------------------------------------------------
/doc/consumer/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/consumer/index.md:
--------------------------------------------------------------------------------
1 | # Consumer industry wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Consumer
4 |
5 |
6 |
--------------------------------------------------------------------------------
/doc/data-mining/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/data-mining/index.md:
--------------------------------------------------------------------------------
1 | # Data mining
2 |
3 |
4 | Data mining involves six common classes of tasks:[4]
5 |
6 | * Anomaly detection (Outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation.
7 |
8 | * Association rule learning (Dependency modelling) – Searches for relationships between variables. For example, a supermarket might gather data on customer purchasing habits. Using association rule learning, the supermarket can determine which products are frequently bought together and use this information for marketing purposes. This is sometimes referred to as market basket analysis.
9 |
10 | * Clustering – is the task of discovering groups and structures in the data that are in some way or another "similar", without using known structures in the data.
11 |
12 | * Classification – is the task of generalizing known structure to apply to new data. For example, an e-mail program might attempt to classify an e-mail as "legitimate" or as "spam".
13 |
14 | * Regression – attempts to find a function which models the data with the least error.
15 | Summarization – providing a more compact representation of the data set, including visualization and report generation.
16 |
--------------------------------------------------------------------------------
/doc/data-structures/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/data-structures/index.md:
--------------------------------------------------------------------------------
1 | # Data structures wordbook
2 |
3 | * [Array](https://wikipedia.org/wiki/array)
4 | * [B-tree](https://wikipedia.org/wiki/b-tree)
5 | * [Bag](https://wikipedia.org/wiki/bag)
6 | * [Hash](https://wikipedia.org/wiki/hash)
7 | * [Hash tree a.k.a. Merkle tree](https://wikipedia.org/wiki/merkle_tree)
8 | * [Heap](https://wikipedia.org/wiki/heap)
9 | * [List](https://wikipedia.org/wiki/list)
10 | * [Map](https://wikipedia.org/wiki/bag)
11 | * [Matrix](https://wikipedia.org/wiki/matrix)
12 | * [Set](https://wikipedia.org/wiki/set)
13 | * [Sorted Set](https://wikipedia.org/wiki/sorted_set)
14 | * [Stack](https://wikipedia.org/wiki/stack)
15 | * [Queue](https://wikipedia.org/wiki/queue)
16 | * [Vector](https://wikipedia.org/wiki/vector)
17 |
18 |
19 |
--------------------------------------------------------------------------------
/doc/education/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/education/index.md:
--------------------------------------------------------------------------------
1 | # Education wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Education
4 |
5 |
--------------------------------------------------------------------------------
/doc/energy/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/engineering/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/engineering/index.md:
--------------------------------------------------------------------------------
1 | # Engineering wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Engineering
4 |
--------------------------------------------------------------------------------
/doc/evaluation-and-results-based-management-by-oecd/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/finance/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/finance/index.md:
--------------------------------------------------------------------------------
1 | # Finance wordbook
2 |
3 | Overviews:
4 | * Economics
5 | * Economics terminology that differs from common usage
6 | * Glossary of economics
7 |
8 | Wordbook:
9 | * [99ers](https://wikipedia.org/wiki/99ers)
10 | * [2000s commodities boom](https://wikipedia.org/wiki/2000s_commodities_boom)
11 | * [Absorption (economics)](https://wikipedia.org/wiki/Absorption_(economics))
12 | * [Aggregation problem](https://wikipedia.org/wiki/Aggregation_problem)
13 | * [AK model](https://wikipedia.org/wiki/AK_model)
14 | * [Balance of trade](https://wikipedia.org/wiki/Balance_of_trade)
15 | * [Bond (finance)](https://wikipedia.org/wiki/Bond_(finance))
16 | * [Bond Tender Offer](https://wikipedia.org/wiki/Bond_Tender_Offer)
17 | * [Book value](https://en.wikipedia.org/wiki/Book_value)
18 | * [Bottom line a.k.a. net income](https://en.wikipedia.org/wiki/Net_income)
19 | * [Capital (economics)](https://wikipedia.org/wiki/Capital_(economics))
20 | * [Capital accumulation](https://wikipedia.org/wiki/Capital_accumulation)
21 | * [Capital good](https://wikipedia.org/wiki/Capital_good)
22 | * [Capital expense (cap ex)](https://wikipedia.org/wiki/Capital_expenditure) (cf. financing expense, operational expense)
23 | * [Classical theory of growth and stagnation](https://wikipedia.org/wiki/Classical_theory_of_growth_and_stagnation)
24 | * [Coincidence of wants](https://wikipedia.org/wiki/Coincidence_of_wants)
25 | * [Colonial commodity fiat](https://wikipedia.org/wiki/Colonial_commodity_fiat)
26 | * [Common stock](https://wikipedia.org/wiki/Common_stock)
27 | * [Center for Community and Economic Development](https://wikipedia.org/wiki/Center_for_Community_and_Economic_Development)
28 | * [Consumer complaint](https://wikipedia.org/wiki/Consumer_complaint)
29 | * [Cost of goods sold](https://en.wikipedia.org/wiki/Cost_of_goods_sold)
30 | * [Cost of poor quality](https://wikipedia.org/wiki/Cost_of_poor_quality)
31 | * [Cumulative process](https://wikipedia.org/wiki/Cumulative_process)
32 | * [Currency basket](https://wikipedia.org/wiki/Currency_basket)
33 | * [Decision cycle](https://wikipedia.org/wiki/Decision_cycle)
34 | * [Defined contribution plan](https://wikipedia.org/wiki/Defined_contribution_plan)
35 | * [Deflation](https://wikipedia.org/wiki/Deflation)
36 | * [Demand vacuum](https://wikipedia.org/wiki/Demand_vacuum)
37 | * [Distribution (economics)](https://wikipedia.org/wiki/Distribution_(economics))
38 | * [Division of labour](https://wikipedia.org/wiki/Division_of_labour)
39 | * [Dominance (economics)](https://wikipedia.org/wiki/Dominance_(economics))
40 | * [EBT: earnings before taxes](https://en.wikipedia.org/wiki/Earnings_before_taxes)
41 | * [EBIT: earnings before interest and taxes](https://en.wikipedia.org/wiki/Earnings_before_interest_and_taxes)
42 | * [EBITA: earnings before interest, taxes, and amortization](https://en.wikipedia.org/wiki/Earnings_before_interest,_taxes,_and_amortization)
43 | * [EBITDA: earnings before interest, taxes, depreciation, and amortization](https://en.wikipedia.org/wiki/Earnings_before_interest,_taxes,_depreciation,_and_amortization): EBITDA margin is a measurement of a company's operating profitability as a percentage of its total revenue.
44 | * [Economic growth](https://wikipedia.org/wiki/Economic_growth)
45 | * [Endogeneity (econometrics)](https://wikipedia.org/wiki/Endogeneity_(econometrics))
46 | * [Endogenous money](https://wikipedia.org/wiki/Endogenous_money)
47 | * [Equation of exchange](https://wikipedia.org/wiki/Equation_of_exchange)
48 | * [Equitable adjustment](https://wikipedia.org/wiki/Equitable_adjustment)
49 | * [EV/EBITDA: Enterprise value / earnings before interest, taxes, depreciation, and amortization](https://en.wikipedia.org/wiki/EV/EBITDA)
50 | * [Ex-ante](https://wikipedia.org/wiki/Ex-ante)
51 | * [Exchange rate](https://wikipedia.org/wiki/Exchange_rate)
52 | * [Exchange-rate flexibility](https://wikipedia.org/wiki/Exchange-rate_flexibility)
53 | * [Explicit cost](https://wikipedia.org/wiki/Explicit_cost)
54 | * [Federal funds](https://wikipedia.org/wiki/Federal_funds)
55 | * [Fei–Ranis model of economic growth](https://wikipedia.org/wiki/Fei%E2%80%93Ranis_model_of_economic_growth)
56 | * [Final product](https://wikipedia.org/wiki/Final_product)
57 | * [Financial system](https://wikipedia.org/wiki/Financial_system)
58 | * [Financing expense (fin ex)](https://wikipedia.org/wiki/Corporate_finance) (cf. capital expense, operating expense)
59 | * [Fiscal multiplier](https://wikipedia.org/wiki/Fiscal_multiplier)
60 | * [Fixed-asset turnover](https://wikipedia.org/wiki/Fixed-asset_turnover)
61 | * [Foreign portfolio investment](https://wikipedia.org/wiki/Foreign_portfolio_investment)
62 | * [Forged endorsement](https://wikipedia.org/wiki/Forged_endorsement)
63 | * [Free-trade area](https://wikipedia.org/wiki/Free-trade_area)
64 | * [Friedman–Savage utility function](https://wikipedia.org/wiki/Friedman%E2%80%93Savage_utility_function)
65 | * [Gains from trade](https://wikipedia.org/wiki/Gains_from_trade)
66 | * [Gross profit](https://en.wikipedia.org/wiki/Gross_profit)
67 | * [Hard landing (economics)](https://wikipedia.org/wiki/Hard_landing_(economics))
68 | * [Hoarding (economics)](https://wikipedia.org/wiki/Hoarding_(economics))
69 | * [Hundi](https://wikipedia.org/wiki/Hundi)
70 | * [Hyperinflation](https://wikipedia.org/wiki/Hyperinflation)
71 | * [Implicit cost](https://wikipedia.org/wiki/Implicit_cost)
72 | * [Index (economics)](https://wikipedia.org/wiki/Index_(economics))
73 | * [Institutional work](https://wikipedia.org/wiki/Institutional_work)
74 | * [Interest expense](https://en.wikipedia.org/wiki/Interest_expense)
75 | * [Investment](https://wikipedia.org/wiki/Investment)
76 | * [Killer bees (business)](https://wikipedia.org/wiki/Killer_bees_(business))
77 | * [Kitchen sink regression](https://wikipedia.org/wiki/Kitchen_sink_regression)
78 | * [Knowledge spillover](https://wikipedia.org/wiki/Knowledge_spillover)
79 | * [The labor problem](https://wikipedia.org/wiki/The_labor_problem)
80 | * [Learning effect (economics)](https://wikipedia.org/wiki/Learning_effect_(economics))
81 | * [Level playing field](https://wikipedia.org/wiki/Level_playing_field)
82 | * [Libor](https://wikipedia.org/wiki/Libor)
83 | * [Liquidation preference](https://wikipedia.org/wiki/Liquidation_preference)
84 | * [Lost sales](https://wikipedia.org/wiki/Lost_sales)
85 | * [Malinvestment](https://wikipedia.org/wiki/Malinvestment)
86 | * [Market (economics)](https://wikipedia.org/wiki/Market_(economics))
87 | * [Market price](https://wikipedia.org/wiki/Market_price)
88 | * [Market socialism](https://wikipedia.org/wiki/Market_socialism)
89 | * [Microfoundations](https://wikipedia.org/wiki/Microfoundations)
90 | * [Micromarketing](https://wikipedia.org/wiki/Micromarketing)
91 | * [Microsegment](https://wikipedia.org/wiki/Microsegment)
92 | * [Microsegmenting](https://wikipedia.org/wiki/Microsegmenting)
93 | * [Minsky moment](https://wikipedia.org/wiki/Minsky_moment)
94 | * [Monetary base](https://wikipedia.org/wiki/Monetary_base)
95 | * [Monetary system](https://wikipedia.org/wiki/Monetary_system)
96 | * [Money creation](https://wikipedia.org/wiki/Money_creation)
97 | * [Money supply](https://wikipedia.org/wiki/Money_supply)
98 | * [National savings](https://wikipedia.org/wiki/National_savings)
99 | * [Negotiable instrument](https://wikipedia.org/wiki/Negotiable_instrument)
100 | * [Net capital outflow](https://wikipedia.org/wiki/Net_capital_outflow)
101 | * [Net economic welfare](https://wikipedia.org/wiki/Net_economic_welfare)
102 | * [Net income a.k.a. bottom line](https://en.wikipedia.org/wiki/Net_income)
103 | * [Net profit](https://en.wikipedia.org/wiki/Net_profit)
104 | * [Netting](https://wikipedia.org/wiki/Netting)
105 | * [Neutrality of money](https://wikipedia.org/wiki/Neutrality_of_money)
106 | * [No-par stock](https://wikipedia.org/wiki/No-par_stock)
107 | * [Nonmarket forces](https://wikipedia.org/wiki/Nonmarket_forces)
108 | * [Notional amount](https://wikipedia.org/wiki/Notional_amount)
109 | * [OIBDA: operating income before depreciation and amortization](https://en.wikipedia.org/wiki/Operating_income_before_depreciation_and_amortization)
110 | * [Oil burden](https://wikipedia.org/wiki/Oil_burden)
111 | * [Open economy](https://wikipedia.org/wiki/Open_economy)
112 | * [Operating expense (op ex)](https://wikipedia.org/wiki/Operating_expense) (cf. capital expense, financing expense)
113 | * [Operating margin](https://en.wikipedia.org/wiki/Operating_margin) a.k.a. also known as operating income margin, operating profit margin and return on sales (ROS).
114 | * [Opportunity cost](https://wikipedia.org/wiki/Opportunity_cost)
115 | * [ORPIC: Operational Readiness Per Invested Capital](TODO)
116 | * [Overnight indexed swap](https://wikipedia.org/wiki/Overnight_indexed_swap)
117 | * [Payment](https://wikipedia.org/wiki/Payment)
118 | * [Peak debt](https://wikipedia.org/wiki/Peak_debt)
119 | * [Physical capital](https://wikipedia.org/wiki/Physical_capital)
120 | * [Prague interbank offered rate](https://wikipedia.org/wiki/Prague_interbank_offered_rate)
121 | * [Price dispersion](https://wikipedia.org/wiki/Price_dispersion)
122 | * [Price/earnings ratio a.k.a. P/E or PER)](https://en.wikipedia.org/wiki/Price%E2%80%93earnings_ratio)
123 | * [Price override](https://wikipedia.org/wiki/Price_override)
124 | * [Prime rate](https://wikipedia.org/wiki/Prime_rate)
125 | * [Procyclical and countercyclical](https://wikipedia.org/wiki/Procyclical_and_countercyclical)
126 | * [Production–possibility frontier](https://wikipedia.org/wiki/Production%E2%80%93possibility_frontier)
127 | * [Profit (economics)](https://wikipedia.org/wiki/Profit_(economics))
128 | * [Profit motive](https://wikipedia.org/wiki/Profit_motive)
129 | * [Quality costs](https://wikipedia.org/wiki/Quality_costs)
130 | * [Quantity theory of money](https://wikipedia.org/wiki/Quantity_theory_of_money)
131 | * [R&D: research and development](https://en.wikipedia.org/wiki/Research_and_development)
132 | * [Rationalization (economics)](https://wikipedia.org/wiki/Rationalization_(economics))
133 | * [Real versus nominal value (economics)](https://wikipedia.org/wiki/Real_versus_nominal_value_(economics))
134 | * [Representative agent](https://wikipedia.org/wiki/Representative_agent)
135 | * [Reservation price](https://wikipedia.org/wiki/Reservation_price)
136 | * [Reservation wage](https://wikipedia.org/wiki/Reservation_wage)
137 | * [ROIC: return on invested capital](TODO)
138 | * [ROS: return on sales](https://en.wikipedia.org/wiki/Operating_margin) a.k.a. also known as operating margin, operating income margin, operating profit margin.
139 | * [Ringfencing](https://wikipedia.org/wiki/Ringfencing)
140 | * [Rivalry (economics)](https://wikipedia.org/wiki/Rivalry_(economics))
141 | * [Robinson Crusoe economy](https://wikipedia.org/wiki/Robinson_Crusoe_economy)
142 | * [Scarcity](https://wikipedia.org/wiki/Scarcity)
143 | * [Service (economics)](https://wikipedia.org/wiki/Service_(economics))
144 | * [SIP: Strategic Investment Plan](TODO)
145 | * [SG&A: Selling, General and Administrative Expenses](https://en.wikipedia.org/wiki/SG%26A)
146 | * [Shutdown (economics)](https://wikipedia.org/wiki/Shutdown_(economics))
147 | * [Small open economy](https://wikipedia.org/wiki/Small_open_economy)
148 | * [Smart city](https://wikipedia.org/wiki/Smart_city)
149 | * [Soft landing (economics)](https://wikipedia.org/wiki/Soft_landing_(economics))
150 | * [Spillover effect](https://wikipedia.org/wiki/Spillover_effect)
151 | * [Spruce-pine-fir](https://wikipedia.org/wiki/Spruce-pine-fir)
152 | * [Stock](https://wikipedia.org/wiki/Stock)
153 | * [Stock and flow](https://wikipedia.org/wiki/Stock_and_flow)
154 | * [Stock catalyst](https://wikipedia.org/wiki/Stock_catalyst)
155 | * [Structured settlement](https://wikipedia.org/wiki/Structured_settlement)
156 | * [Stylized fact](https://wikipedia.org/wiki/Stylized_fact)
157 | * [Substantivism](https://wikipedia.org/wiki/Substantivism)
158 | * [Tax expense](https://en.wikipedia.org/wiki/Tax_expense)
159 | * [TED spread](https://wikipedia.org/wiki/TED_spread)
160 | * [Term (time)](https://wikipedia.org/wiki/Term_(time))
161 | * [Terminal market](https://wikipedia.org/wiki/Terminal_market)
162 | * [Trade promotion (international trade)](https://wikipedia.org/wiki/Trade_promotion_(international_trade))
163 | * [Trading nation](https://wikipedia.org/wiki/Trading_nation)
164 | * [Transfer payment](https://wikipedia.org/wiki/Transfer_payment)
165 | * [Upside beta](https://wikipedia.org/wiki/Upside_beta)
166 | * [User pays](https://wikipedia.org/wiki/User_pays)
167 | * [Velocity of money](https://wikipedia.org/wiki/Velocity_of_money)
168 | * [Virtuous circle and vicious circle](https://wikipedia.org/wiki/Virtuous_circle_and_vicious_circle)
169 | * [Walrasian auction](https://wikipedia.org/wiki/Walrasian_auction)
170 | * [Wealth elasticity of demand](https://wikipedia.org/wiki/Wealth_elasticity_of_demand)
171 | * [Well-being](https://wikipedia.org/wiki/Well-being)
172 | * [Whitemail](https://wikipedia.org/wiki/Whitemail)
173 | * [Willingness to accept](https://wikipedia.org/wiki/Willingness_to_accept)
174 | * [Willingness to pay](https://wikipedia.org/wiki/Willingness_to_pay)
175 | * [ZBB: Zero-based_budgeting](https://en.wikipedia.org/wiki/Zero-based_budgeting)
176 | * [Zerat](https://wikipedia.org/wiki/Zerat)
177 | * [Zero-based_budgeting (ZBB)](https://en.wikipedia.org/wiki/Zero-based_budgeting)
178 |
--------------------------------------------------------------------------------
/doc/fintech/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/fintech/index.md:
--------------------------------------------------------------------------------
1 | # Fintech jargon
2 |
3 | https://www.icmagroup.org/market-practice-and-regulatory-policy/fintech-and-digitalisation/fintech-resources/fintech-jargon/
4 |
5 | Altcoin: A cryptocurrency or a category of cryptocurrencies that are an alternative to bitcoin. Many altcoins project themselves as better alternatives to bitcoin in various ways (e.g. more efficient, less expensive, etc.).
6 |
7 | Application Programming Interface: An application programming interface (API) is a set of protocols, routines, functions and/or commands that programmers use to develop software or facilitate interaction between distinct systems. APIs are available for both desktop and mobile use, and are typically useful for programming GUI (graphic user interface) components, as well as allowing a software program to request and accommodate services from another program.
8 |
9 | Bitcoin (BTC): A type of cryptocurrency created by Satoshi Nakamoto in 2009. It was one of the first digital currencies that enabled instant P2P payments. Bitcoins are created through a process known as bitcoin mining that requires a massive amount of computing power. For more information, please see the Bitcoin whitepaper.
10 |
11 | Blockchain: A decentralized, digital ledger where transactions made in Bitcoin or other cryptocurrencies are recorded chronologically and publicly. The block contains information that, once it goes into the blockchain, it becomes part of the permanent and immutable database, connecting to other blocks in the blockchain like the links in a chain.
12 |
13 | Consensus protocol: A process, encoded in software, by which computers in a network, called nodes, reach an agreement about a set of data.
14 |
15 | Crypto Token: Crypto tokens are special kind of virtual currency tokens that reside on their own blockchains and represent an asset or utility. Such crypto tokens often serve as the transaction units on the blockchains that are created using the standard templates like that of Ethereum network that allows a user to create his/her own tokens.
16 |
17 | Cryptocurrency: A type of digital currency that is generally decentralized and uses cryptography (i.e. data is converted into a format that is unreadable for unauthorized users) for added security, making it difficult to counterfeit or manipulate.
18 |
19 | dAPP: Decentralized Application. This refers to an application that uses an Ethereum smart contract as it’s back-end code.
20 |
21 | Distributed Ledger Technology: A system, most commonly a blockchain, for creating a shared, cryptographically secured database.
22 |
23 | ERC-20: A token standard for Ethereum, used for smart contracts implementing tokens. It is a common list of rules defining interactions between tokens, including transfer between addresses and data access.
24 |
25 | ERC-721: A token standard for non-fungible Ethereum tokens. An Ethereum Improvement Proposal introduced in 2017, it enables smart contracts to operate as tradeable tokens similar to ERC-20 tokens.
26 |
27 | Ethereum: An open source, decentralized platform based on blockchain technology created by Vitalik Buterin in 2013. It runs smart contracts on a custom built blockchain that allows developers to create markets, store registries of debts, and so on. For more information, please visit the Ethereum Foundation website or read their whitepaper.
28 |
29 | FIX protocol: Financial Information eXchange (FIX) is a vendor-neutral electronic communications protocol for international real-time exchange of securities transaction information, which is useful to funds, investment managers, and firms. FIX systems transfer accurate and timely financial information concerning securities trades through and across security exchange houses. Its use enables users to make timely and accurate decisions. FIX has become as the de-facto messaging standard for pre-trade, trade and post-trade communication as well as for U.S. regulatory reporting. It is compatible with almost every commonly used network technology.
30 |
31 | Fork: A change to the way a blockchain’s software rules define valid transactions, or blocks.Hard fork: A change to the rules that all nodes on a network must adopt, or else leave the network./Soft fork: A backwards-compatible change that hinges only on a majority of nodes’ adopting the new rules.
32 |
33 | Genesis block: The first block of data that is processed and validated to form a new blockchain, often referred to as block 0 or block 1.
34 |
35 | Git: Git is an open source program for tracking changes in text files, and is the core technology that GitHub, the social and user interface, is built on top of.
36 |
37 | Hash function: A cryptography tool that turns any input into a string of characters that serves as a virtually unforgeable digital fingerprint of the data, called a hash.
38 |
39 | Initial coin offering – ICO: An unregulated means by which a cryptocurrency venture, typically early stage, can raise money from supporters by issuing tokens. It is often referred to as a crowdsale as ICO participants may potentially earn a return on their investments (as opposed to crowdfunding, where supporters donate money to a project or cause).
40 |
41 | Litecoin (LTC): A type of cryptocurrency that was created by former Google employee Charlie Lee in 2011. It offers features such as Segregated Witness and the Lightning Network which allows for faster processing at lower cost. For more information, visit the Litecoin website.
42 |
43 | Mining: A process where transactions are verified and added to a blockchain. It is also the process where new bitcoins or certain altcoins are created. In theory, anyone with the necessary hardware and access to the internet can be a miner and earn income, but the cost of industrial hardware and electricity has limited mining for bitcoins and certain altcoins today to large-scale operations.
44 |
45 | Node: A node, in its simplest terms, is an intersection point. Technically, any computer connecting to the bitcoin network can be a node. Nodes are a communications end-point, and form the backbone of any blockchain network, and in this case, making up the bitcoin network. A node downloads a copy of the blockchain and verifies it, helping to maintain the security. The more nodes present, the more secure the blockchain network will be.
46 |
47 | Proof of Stake (PoS): An algorithm that rewards participants that solves difficult cryptographic puzzles to achieve distributed consensus. Unlike proof of work or PoW, a person can validate transactions and create new blocks based on their individual wealth (i.e. stake) such as the total number of coins owned. One of the key advantages that PoS has over PoW is lower energy consumption.
48 |
49 | Proof of Work (PoW): An algorithm that rewards the first person that solves a computational problem (i.e. mining) to achieve distributed consensus. Miners compete to solve difficult cryptographic puzzles in order to add the next block on the blockchain. It prevents spam and cyber attacks such as DDoS as it requires work (i.e. processing time) from the service requester.
50 |
51 | Pump and dump – PnD – scheme: A scheme in which the development team (or short-term traders) hypes up a project without fundamental basis in order to pump up the price of the tokens temporarily and then sells their holdings immediately after launch to earn a profit. See the US SEC's investor alert on pump and dump schemes.
52 |
53 | Segregated Witness – SegWit: The process where the block size limit on a blockchain is increased by removing digital signature data and moving it to the end of a transaction to free up capacity. Transactions are essentially split (or 'segregated'), into two segments: the original data segment and the signature (or 'witness') segment.
54 |
55 | Simplified Payment Verification – SPV – client: SPV clients are Bitcoin lightweight clients which do not download and store the whole blockchain locally. These wallets provide a way to verify payments without having to download the complete blockchain. An SPV client only downloads the block headers by connecting to a full node.
56 |
57 | Smart contracts: An automated mechanism involving two or more parties where digital assets are put in and redistributed at a later date based on some preset formula and triggering event. The contract can run as programmed without any downtime, censorship, fraud or third party interference. For more information, see Vitalik Buterin's terminology guide.
58 |
59 | Software as a Service – SaaS: Software-as-a-Service (SaaS) is a software licensing model in which access to the software is provided on a subscription basis, with the software being located on external servers rather than on servers located in-house. Software-as-a-Service is typically accessed through a web browser, with users logging into the system using a username and password. Instead of each user having to install the software on his computer, the user is able to access the program via the internet.
60 |
61 | Tokenize: The process by which real-world assets are turned into something of digital value called a token, often subsequently able to offer ownership of parts of this asset to different owners.
62 |
63 | Wallet: A store of digital assets such as cryptocurrencies, analogous to a digital bank account. Crypto wallets can be divided into two categories: hosted wallets (e.g. wallets store on exchanges or third-party servers) and cold wallets (e.g. hardware wallets such as the Ledger Nano S, paper wallets and desktop wallets).
64 |
65 | Wash Trade: A form of market manipulation in which investors create artificial activity in the marketplace by simultaneously selling and buying the same cryptocurrencies.
66 |
67 | Whitelist: A list of interested participants in an ICO, who registered their intent to take part or purchase in a sale.
68 |
69 | Whitepaper: An informational document that generally informs readers on the philosophy, objectives and technology of a project or initiative. Whitepapers are often provided before the launch of a new coin or token.
70 |
71 | Extensible Markup Language – XML: A flexible markup language for structured electronic documents. XML is based on SGML (standard generalized markup language), an international standard for electronic documents. XML is commonly used by data-exchange services (like blog feeds) to send information between otherwise incompatible systems. Many other languages, such as RSS, are based on XML.
72 |
73 | Zero Knowledge Proof: In cryptography, a zero knowledge proof enables one party to provide evidence that a transaction or event happened without revealing private details of that transaction or event.
74 |
75 |
76 | 3D Secure: 3D Secure is a three-domain (3D) structure connecting the issuer, the acquirer, and the merchant page to prevent fraudulent transactions. It is a payment security system where the customer enters OTP on a secure page to validate their identity and complete the transaction.
77 |
78 | Account Information Service Provider (AISP): A very popular term in Open Banking, Account Information Service Provider (AISP), provides third-party access to account information with the customers’ consent. AISPs help customers reduce manual work by offering quick access to their financial information, savings, and approval of loans.
79 |
80 | Acquiring bank/ Acquirer: Acquiring bank is a financial institution that links merchants with issuing banks. The merchants can quickly process card transactions by leveraging acquiring banks’ infrastructure and financial backing.
81 |
82 | Advanced Encryption Standard (AES): The Advanced Encryption Standard (AES), originally known as Rijndael, is one of the most secure encryption algorithms available. The symmetric-key block algorithm is the Fintech industry standard to encrypt and decrypt classified data.
83 |
84 | AML: Anti-money laundering (AML) is carried out by a financial institution that consists of laws, procedures, and regulations that aim to achieve legal requirements. AML monitors suspicious activities by preventing practices that involve disguising illegal funds as legit income.
85 |
86 | API: API (Application Programming Interface) is an intermediary that enables two applications to communicate. APIs are a set of protocols that allows the creation of applications that access data and features of other services.
87 |
88 | API Banking: API banking involves a set of regulated protocols, tools, or routines that allows access to banking services by a financial or third-party institution via API. These banks provide secured and restricted access of its central bank system to third-party systems to carry out functions.
89 |
90 | Bank Identification Number (BIN): Bank Identification Number (BIN) is the first 6 to 8 numbers present on the credit, debit, and prepaid cards. BIN is used to identify the card issuer and helps merchants validate transactions using credit/debit/prepaid cards.
91 |
92 | Blockchain: Blockchain is a distributed ledger technology that’s secure, immutable, and unanimous. Futuristic and versatile, blockchain powers cryptocurrencies, smart contracts, healthcare, supply chain, and energy trading, among several other use cases.
93 |
94 | Buy Now Pay Later (BNPL): BNPL is a modernized version of retail finance where the customers enjoy no-cost EMI and easy repayments. BNPL services are growing over 39% a year because it masks the feeling of a loan by offering credit at the point of sale.
95 |
96 | Card on File transactions: Card on File or Subscription transactions are the stored card credentials available with a Merchant, Payment Gateway, or Aggregator. Used for future transactions, the card on file will have all the relevant details stored in the encrypted format except its CVV. A customer’s explicit consent is needed to store the card details.
97 |
98 | Card Not Present (CNP) Transactions: Card-not-present (CNP) are the transactions that are processed without the cardholder and the card not physically present at POS. These transactions are facilitated virtually or by mobile wallets by entering the card details with a security code.
99 |
100 | Charge cards: Charge cards are electronic credit cards by which the cardholder can make purchases that the card issuer pays. These cards have no spending limits and interests, but the cardholder is entitled to repay the debt within the due date.
101 |
102 | Chargeback: A chargeback is the refund amount returned to the cardholder for a dispute raised by him. It is a consumer protection tool and the easiest way for cardholders to request payment reversal from the issuing bank.
103 |
104 | Cross-border payments: Cross-border payments include wholesale, retail, or recurring transactions involving individuals, banks, companies, etc., in which the payee and the recipient operate from different countries.
105 |
106 | Crowdfunding: Crowdfunding occurs when money is raised from many individuals that provide funds for a new business venture. It aims to draw more investors with a small amount of capital from a large mass of people through social media and crowdfunding websites.
107 |
108 | Decentralized Finance: Decentralized Finance (DeFi) is a blockchain-based system making products and services available on a decentralized public network. DeFi enables transparent transactions using peer-to-peer interaction by a software-based mediator.
109 |
110 | Digital credit: Digital credit refers to loans accessed through a digital channel, via a mobile device, or a third-party agent. It is an emerging way of accessing electronic money with backend customer evaluation and automated customer interactions.
111 |
112 | Digital financial inclusion: Digital Financial Inclusion offers the underbanked and the unbanked cost-affordable and sustainable services by ensuring digital access.
113 |
114 | Disposable Virtual Card: Customers can create disposable virtual cards for instant online transactions. These one-time payment cards are generated every time with new card details to protect users from online fraud.
115 |
116 | e-money: Electronic money is a form of currency used for electronic transactions by storing in banking computer systems, digital databases, etc. These are highly accessible in international transactions and are backed by a central authority as fiat currency.
117 |
118 | e-wallet: A digital wallet securely stores users’ payment information, passwords for numerous payment methods and websites on an electronic device. This software-based e-wallet system enables users to purchase and transact easily. For example, M2P’s forex cards can hold up to 24 currencies, allowing customers to make payments easily.
119 |
120 | Embedded credit: Embedded credit involves using a familiar interface that allows the customer to apply, acquire and repay loans within the platform, avoiding the need for a third-party site.
121 |
122 | Embedded Finance: Embedded finance enables customer-facing non-financial platforms to offer financial services. Customers can access in-app, contextual financial offerings via apps and services right at the point of sale.
123 |
124 | Embedded lending: Embedded lending integrates Lending-as-a-Feature in digital platforms. Companies work with Fintechs to offer credit as an in-app experience to increase LTV (Life Time Value) of customers and average order value.
125 |
126 | EMV Chip: EMV is the tiny computer chip that makes you dip your credit card instead of the regular old swipe. EMV stands for Europay, MasterCard, and Visa. The EMV chip creates a unique transaction code for every dip to prevent fraud.
127 |
128 | FinTech Sandbox: FinTech or API sandbox is a regulated environment for innovators to test their products in real-time. Sandbox helps reduce systemic risks before entering the market and facilitates fintechs to innovate better services and products.
129 |
130 | Forex cards: Forex cards are secure and convenient prepaid travel cards with worldwide acceptance. Capable of holding multiple currencies in a single card, it is the best way to carry and spend foreign currencies while travelling.
131 |
132 | Ghost cards: A ghost credit or debit card allows businesses to generate random card and CVV numbers codes for their purchases. These virtual ghost cards help track expenditures effectively as they have preset limits and are used only with specific vendors.
133 |
134 | Infrastructure as a service (IaaS): Infrastructure as a Service (IaaS) refers to a cloud computing service where businesses rent or lease servers for computing, storage, and networking instead of a traditional data center. IaaS gives its customers access to servers in locations close to their end-users and eliminates the need for physical servers.
135 |
136 | Insurtech: Insurtech (Insurance + Technology) aims to improve efficiency and reduce costs for customers and companies by offering online services to research, compare policies, etc., without needing a physical visit.
137 |
138 | Interchange Fee: Interchange is a fee reimbursed to the issuing bank out of the MDR collected by the acquiring bank from the merchant. The fees cover accepting, processing, fraud protection, and authorizing card transaction costs for merchants to provide a convenient buying experience for the end customers.
139 |
140 | Issuing Bank/Issuer: The issuing bank is an intermediary or financial institution that issues branded payment cards to the customer on behalf of card networks. An issuer verifies the customer’s sufficient funds before a transaction takes place.
141 |
142 | KYC: Know Your Customer (KYC) is a mandatory process that verifies and authenticates a customer’s identity. All legal and financial institutions must validate their customers’ Proof of Identity (POI) and Proof of Address (POA) to prevent illegal or fraudulent activities as per Reserve Bank of India’s norms.
143 |
144 | Lendtech: Lending tech or lending technology is a platform that utilizes data to offer lending at a digital level. It combines primary information, loan structures, and monitoring strategies to provide a unique lending experience. It uses AI and other tech strategies to evaluate the borrower’s repaying capacity.
145 |
146 | Neo Bank: Neo banks are user-friendly fintech firms providing traditional banking services sans physical branches. A mobile-first virtual bank that offers a seamless digital banking experience and targets the digital-savvy millennials of today.
147 |
148 | NFC Payments: Near Field Communication (NFC) powers contactless payments through mobile wallets and contactless cards. NFC allows seamless checkouts by just placing the smartphone/ wearable within four inches from the NFC reader.
149 |
150 | Ongoing monitoring: Ongoing monitoring is a process taken up by every financial institution to ensure that their customer information is up to date. The overall risk-based assessment provides better financial health and reduces potential risks and economic losses.
151 |
152 | Open banking: Open banking lets third-party providers access customer-approved banking data securely via APIs. Open banking enables Fintech’s to access and leverage financial data for building customized and user-centric applications and products aimed at their target segment.
153 |
154 | Payment gateway: A payment gateway acts as an interface between the merchants’ website and the acquirer to accept credit/debit transactions that a customer makes. The technology validates card details, ensures sufficient funds, and then enables merchants to get paid.
155 |
156 | Payment Switch: Payment Switch is an independent tool that communicates with different entities in a transaction process. It facilitates the trouble-free processing of real-time payments by connecting the merchant’s gateway with the right processor.
157 |
158 | PCI DSS: PCI DSS stands for Payment Card Industry Data Security Standard that protects consumers’ sensitive data. PCI DSS is applicable for organizations that store/process/transmit the cardholder data either as clear or in an encrypted manner.
159 |
160 | POP (Point-of-Purchase): POP (Point-of-Purchase) is the physical location in which the in-store interaction between the customer and the product happens and the customer decides whether they purchase the product or not.
161 |
162 | POS (point of sale system): POS (Point of Sale) is where the customer-product interaction happens, and the customer initiates a transaction. The POS system allows a retailer to check out the goods that a customer buys.
163 |
164 | PSD2: PSD2 is the second Payment Services Directive implemented by the European Union to unify payments in a single market space. It is the improved version of PSD that enforces strong consumer authentication by providing TPSPs secured access to consumer information.
165 |
166 | Regtech: Regtech as a service facilitates compliance, reports, and monitoring of the financial process to avoid any regulatory mishap. It enables FIs to have accountability, constant compliance assessment, and effective policy management.
167 |
168 | Strong Customer Authentication (SCA): Strong Customer Authentication (SCA) is a two-factor authentication process in which the institutions add a layer of security for online payments. The customers are authenticated with two of three elements that are knowledge (PIN, password), possession (hardware token, phone), and inherence (facial recognition, fingerprints).
169 |
170 | Tokenization: Tokenization makes cardholder data by replacing it with a random string of characters called Tokens. With the help of tokenization, the merchants and networks can move sensitive data without the hovering threat of payments fraud or identity theft.
171 |
172 | Velocity Controls: Velocity controls help in monitoring and tracking repeated card-not-present transactions to prevent fraud. It triggers an alert when many transactions happen through a single card. The issuer can verify the transaction authenticity via email or call with the cardholder.
173 |
174 | Virtual Cards: Virtual cards are electronic cards that don’t have a plastic existence and are highly secure and easy to use. These electronic cards provide a user with 24/7 access to online, contactless payments with only a smartphone.
175 |
176 | Sources:
177 |
178 | https://m2pfintech.com/blog/50-popular-fintech-terms-you-must-know/
179 |
180 | https://www.bankingtech.com/2018/02/glossary-whats-what-in-fintech/
181 |
182 | https://blockchainhub.net/blockchain-glossary/
183 |
184 | https://coinmarketcap.com/de/glossary/
185 |
186 | https://crushcrypto.com/glossary/
187 |
188 | https://cryptominded.com/glossary-cryptocurrency-terms-need-know/
189 |
190 | https://thefintechtimes.com/an-ico-glossary/
191 |
192 | https://help.github.com/articles/github-glossary/
193 |
194 | https://www.investopedia.com/terms/
195 |
196 | https://www.reuters.com/article/usa-fintech-crypto/fintech-glossary-crypto-edition-idUSKCN1B31RR
197 |
198 | https://www.technologyreview.com/s/610885/a-glossary-of-blockchain-jargon/
199 |
--------------------------------------------------------------------------------
/doc/healthcare/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/healthcare/index.md:
--------------------------------------------------------------------------------
1 | # Healthcare wordbook
2 |
3 | See:
4 |
5 | * [Wikipedia: Health care](https://en.wikipedia.org/wiki/Health_care)
6 | * [Wikipedia: List of medical abbreviations](https://en.wikipedia.org/wiki/List_of_medical_abbreviations)
7 |
8 | Wordbook:
9 |
10 | * ABG: arterial blood gas
11 | * ACE: angiotensin-converting enzyme
12 | * ACTH: adrenocorticotropic hormone
13 | * ADH: antidiuretic hormone
14 | * AIDS: acquired immunodeficiency syndrome
15 | * ALT: alanine aminotransferase: old version is SGPT
16 | * AST: aspartate aminotransferase: old version is SGOT
17 | * ATP: adenosine triphosphate
18 | * BCG: bacille Calmette-Guérin
19 | * bid: 2 times a day
20 | * BMR: basal metabolic rate
21 | * BP: blood pressure
22 | * BSA: body surface area
23 | * BUN: blood urea nitrogen
24 | * BR: bedside rounds
25 | * BPD: borderline personality disorder
26 | * C: Celsius; centigrade; complement
27 | * Ca: calcium
28 | * cAMP: cyclic adenosine monophosphate
29 | * CBC: complete blood count
30 | * cGy: centigray
31 | * Ci: curie
32 | * CK: creatine kinase
33 | * Cl: chloride; chlorine
34 | * cm: centimeter
35 | * CNS: central nervous system
36 | * CO2: carbon dioxide
37 | * COPD: chronic obstructive pulmonary disease
38 | * CPK: creatine phosphokinase
39 | * CPK-MB: creatine phosphokinase muscle bandisoenzyme
40 | * CPR: cardiopulmonary resuscitation
41 | * CSF: cerebrospinal fluid
42 | * CT: computed tomography
43 | * Cu: cubic
44 | * D & C: dilation and curettage
45 | * dL: deciliter: 1 dL = 100 mL
46 | * DNA: deoxyribonucleic acid
47 | * DTP: diphtheria-tetanus-pertussis(toxoids/vaccine)
48 | * D/W: dextrose in water
49 | * ECF: extracellular fluid
50 | * ECG: electrocardiogram
51 | * EEG: electroencephalogram
52 | * ENT: ear nose and throat
53 | * ERCP: endoscopic retrogradecholangiopancreatography
54 | * ESR: erythrocyte sedimentation rate
55 | * F: Fahrenheit
56 | * FDA: U.S. Food and Drug Administration
57 | * Ft: foot; feet: measure unit
58 | * FUO: fever of unknown origin
59 | * G: gram
60 | * GFR: glomerular filtration rate
61 | * GI: gastrointestinal
62 | * GVHD: Graft-versus-host disease
63 | * G6PD: glucose-6-phosphate dehydrogenase
64 | * GU: genitourinary
65 | * Gy: gray
66 | * H: hour
67 | * Hb: hemoglobin
68 | * HCl: hydrochloric acid; hydrochloride
69 | * HCO3: bicarbonate
70 | * Hct: hematocrit
71 | * Hg: mercury
72 | * HIV: human immunodeficiency virus
73 | * HLA: human leukocyte antigen
74 | * HMG-CoA: hydroxymethyl glutaryl coenzyme A
75 | * Hz: hertz: cycles/second unit
76 | * hs: at bedtime
77 | * ICF: intracellular fluid
78 | * ICU: intensive care unit
79 | * IgA: etc. immunoglobin A
80 | * IL: interleukin
81 | * IM: intramuscular(ly)
82 | * INR: international normalized ratio
83 | * IPPB: intermittent positive pressure breathing
84 | * IU: international unit
85 | * IV: intravenous(ly)
86 | * IVU: intravenous urography
87 | * K: potassium
88 | * kcal: kilocalorie: mean food calorie
89 | * kg: kilogram
90 | * L: liter
91 | * lb: pound
92 | * LDH: lactic dehydrogenase
93 | * M: molar
94 | * m: meter
95 | * MCH: mean corpuscular hemoglobin
96 | * MCHC: mean corpuscular hemoglobin concentration
97 | * mCi: millicurie
98 | * MCV: mean corpuscular volume
99 | * mEq: Milliequivalent
100 | * Mg: magnesium
101 | * mg: milligram
102 | * MI: myocardial infarction
103 | * MIC: minimum inhibitory concentration
104 | * mIU: milli-international unit
105 | * mL: milliliter
106 | * mm: millimeter
107 | * mmol: millimole
108 | * mo: month
109 | * mol: wt molecular weight
110 | * mOsm: Milliosmole
111 | * MRI: magnetic resonance imaging
112 | * N: nitrogen; normal: unit to measure strength of solution
113 | * Na: sodium
114 | * NaCl: sodium chloride
115 | * ng: nanogram: also name as millimicrogram
116 | * nm: nanometer: also name as millimicron
117 | * nmol: nanomole
118 | * Npo: nothing by mouth
119 | * NSAID: nonsteroidal anti-inflammatory drug
120 | * O2: oxygen
121 | * OTC: over-the-counter: pharmaceuticals
122 | * oz: ounce
123 | * P: phosphorus; pressure
124 | * PAco2: alveolar carbon dioxide partial pressure
125 | * Paco2: arterial carbon dioxide partial pressure
126 | * PAo2: alveolar oxygen partial pressure
127 | * Pao2: arterial oxygen partial pressure
128 | * PAS: periodic acid-Schiff
129 | * Pco2: carbon dioxide partial pressure: or tension
130 | * PCR: polymerase chain reaction
131 | * PET: positron emission tomography
132 | * pg: picogram: micromicrogram
133 | * pH: hydrogen ion concentration
134 | * PMN: polymorphonuclear leukocyte
135 | * po: orally
136 | * Po2: oxygen partial pressure: or tension
137 | * PPD: purified protein derivative: tuberculin
138 | * ppm: parts per million
139 | * prn: as needed
140 | * PT: prothrombin time
141 | * PTT: partial thromboplastin time
142 | * q: every
143 | * qid: 4 times a day
144 | * RA: rheumatoid arthritis
145 | * RBC: red blood cell
146 | * RNA: ribonucleic acid
147 | * Sao2: arterial oxygen saturation
148 | * SBE: subacute bacterial endocarditis
149 | * sc: subcutaneous(ly)
150 | * SI: International System of Units
151 | * SIDS: sudden infant death syndrome
152 | * SLE: systemic lupus erythematosus
153 | * soln: solution
154 | * sp: species: singular
155 | * spp: species: plural
156 | * sp gr: specific gravity
157 | * sq: square
158 | * SSRI: selective serotonin reuptake inhibitor
159 | * STS: serologic test(s) for syphilis
160 | * T&A: tonsillectomy and adenoidectomy
161 | * TB: tuberculosis
162 | * tid: 3 times a day
163 | * TPN: total parenteral nutrition
164 | * URI: upper respiratory infection
165 | * UTI: urinary tract infection
166 | * WBC: white blood cell
167 | * WHO: World Health Organization
168 | * wt: weight
169 | * μ: micro-; micron
170 | * μCi: microcurie
171 | * μg: microgram
172 | * μL: microliter
173 | * μm: micrometer: also name micron
174 | * μmol: micromole
175 | * μOsm: micro-osmole
176 | * mμ: millimicron
177 |
--------------------------------------------------------------------------------
/doc/homeless-services-delivery-system-by-lahsa/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/homeless-services-delivery-system-by-lahsa/index.md:
--------------------------------------------------------------------------------
1 | # Homeless services delivery system
2 |
3 | Homeless services delivery system glossary of terms/acronyms. By Los Angeles Homeless Services Authority (LAHSA).
4 |
5 | https://homeless.lacounty.gov/wp-content/uploads/2017/12/25-Glossary-of-Terms-and-Acronyms.pdf
6 |
7 | **Adults with HIV/AIDS**: This subpopulation category of the Point in Time (PIT) includes adults who have been diagnosed with AIDS and/or have tested positive for HIV.
8 |
9 | **Adults with a Serious Mental Illness (SMI)**: This subpopulation category of the PIT includes adults with a severe and persistent mental illness or emotional impairment that seriously limits a person's ability to live independently. Adults with SMI must also meet the qualifications identified in the term for “disability” (e.g., “is expected to be long-continuing or indefinite duration”).
10 |
11 | **Adults with a Substance Use Disorder**: This subpopulation category of the PIT includes adults with a substance abuse problem (alcohol abuse, drug abuse, or both). Adults with a substance use disorder must also meet the qualifications identified in the term for “disability” (e.g., “is expected to be long-continuing or indefinite duration”).
12 |
13 | **Bridge (Reserved Crisis) Housing**: Safe,reserved, 24‐hour emergency shelter to be utilized by eligible homeless individuals, identified through the Coordinated Entry System (CES). The intention of this emergency housing is to provide individuals with some stability, so that they can more easily maintain contact with their Housing Navigator, as they are assisted in their efforts to housing. Crisis Housing bed converts to a Bridge (Reserved Crisis) Housing bed if the program participantdoes not self-resolve their episode of homelessness within 14 days.
14 |
15 | **Case Conferencing**: A region’s formal, planned, and structured meeting in which providers coordinate staffing assignments, provide client level updates, and ensure coordination of services. The goal of case conferencing is to provide holistic, coordinated, and integrated services across providers, and to reduce duplication. Case conferences are usually multidisciplinary, and include multiple providers from throughout the SPA or region. Case conferences should be used to identify or clarify issues regarding a participant’s housing status and progress towards permanent housing; to review activities including progress and barriers towards housing; to assign primary Housing Navigation responsibilities; to strategize solutions; and to adjust current service plans, as necessary. Case conferences may be face-to-face or by phone/videoconference, held at routine intervals or during significant change. Case conferencing must be documented and must follow any policies and procedures established for the Coordinated Entry System (CES).
16 |
17 | **Case Management**: Case management is defined by the Case Management Society of America as “a collaborative process of assessment, planning, facilitation, care coordination, evaluation, and advocacy for options and services” to meet individual needs. Case Management in the context of the Coordinated Entry System (CES) should be voluntary and client centered, with the goal of identifying strengths and client directed goals, while promoting “health, recognition, and well-being” (USICH, 2016). Case Managers in CES should ultimately focus on linking the client to a permanent housing resource and providing the necessary services needed to promote housing stability.
18 |
19 | **Chronically Homeless**: 1. An individual who: a. Is homeless and lives in a place not meant for human habitation, a safe haven, or in an emergency shelter; AND b. Has been homeless and living or residing in a place not meant for human habitation, a safe haven, or in an emergency shelter continuously for at least twelve months or on at least four separate occasions in the last three years where those occasions cumulatively total at least twelve months; AND c. Can be diagnosed with one or more of the following conditions: substance use disorder, serious mental illness, developmental disability (as defined in section 102 of the Developmental Disabilities Assistance Bill of Rights Act of 2000 [42 U.S.C. 15002]), post-traumatic stress disorder, cognitive impairments resulting from brain injury, or chronic physical illness or disability; 2. An individual who has been residing in an institutional care facility, including a jail, substance abuse or mental health treatment facility, hospital, or other similar facility, for fewer than 90 days and met all of the criteria in paragraph (1) of this definition, before entering that facility; or 3. A family with an adult head of household (or if there is no adult in the family, a minor head of household) who meets all of the criteria in paragraph (1) of this definition, including a family whose composition has fluctuated while the head of household has been homeless.
20 |
21 | **Chronically Homeless Family with Children**: A family with children with an adult head of household (or if there is no adult in the family with children, a minor head of household) who meets all of the criteria for a chronically homeless individual, including a family with children whose composition has fluctuated while the head of household has been homeless.
22 |
23 | **Continuum of Care (CoC)**: A community plan to organize and deliver housing and services to meet the specific needs of people who are homeless as they move to stable housing and maximize self-sufficiency. It includes action steps to end homelessness and prevent a return to homelessness.” In Los Angeles County, there are four CoCs. The Los Angeles Homeless Services Authority serves all cities of the County with the exception of Long Beach, Pasadena, and Glendale, who each have their own CoC.
24 |
25 | **Coordinated Entry System (CES)**: CES is a regionally based system that connects new and existing programs into a “no-wrong-door network” by assessing the needs of individuals/ families/youth experiencing homelessness and linking them with the most appropriate housing and services to end their homelessness. The goal of the CES is to streamline processes through which communities assess, house, and support housing retention for individuals/families who are homeless; to ensure all of our homeless neighbors are known and supported; to target and maximize limited housing resources; and comply with the federal mandate to adopt a standardized intake and coordinated assessment process for housing. The essential components of CES are: 1) a system that is low-barrier and easy to access; 2) a system that identifies and assesses people’s needs; and 3) a system that prioritizes and matches housing resources based on those needs.
26 |
27 | **Crisis Housing**: An emergency shelter in the homeless coordinated entry system. Crisis Housing means any facility, the primary purpose of which is to provide temporary shelter for the homeless or to provide a bridge to permanent housing.
28 |
29 | **Disability**: An individual with one or more of the following conditions: A. A physical, mental, or emotional impairment, including impairment caused by alcohol or drug abuse, post-traumatic stress disorder, or brain injury that: (1) Is expected to be long-continuing or of indefinite duration; (2) Substantially impedes the individual's ability to live independently; and (3) Could be improved by the provision of more suitable housing conditions. B. A developmental disability, as defined in section 102 of the Developmental Disabilities Assistance and Bill of Rights Act of 2000 (42 U.S.C. 15002); or C. The disease of acquired immunodeficiency syndrome (AIDS) or any condition arising from the etiologic agency for acquired immunodeficiency syndrome (HIV).
30 |
31 | **Emergency Shelter (ES)**: Any facility whose primary purpose is to provide temporary shelter for homeless in general or for specific populations of the homeless.
32 |
33 | **Evidence of Site Control**: Documentation of an appropriate certificate of occupancy and/or a conditional use permit allowing the legal use of the property for the service/housing being proposed, and at least one of the following types of documentation securing the location for the use of the proposed system component: a) Proof of Ownership; b) Executed Option to Purchase; c) Executed Lease Agreement; d) Executed Option to Lease; e) Letter of Intent signed by both parties.
34 |
35 | **General Relief (GR)**: Acounty-funded program that provides financial assistance to indigent adults who are ineligible for Federal or State programs.
36 |
37 | **Harm Reduction**: An aspect of a program’s or system’s design established by a set of policies and the resulting procedures and practices whose objective is to reduce the negative consequences of participants’ continued use of drugs and/or alcohol or failure to be medication compliant. In housing settings, harm reduction is intended to prevent a participant’s loss of housing and/or termination from the program based solely on his or her inability to stop using drugs or alcohol or failure to take prescribed medications. Programs incorporating a harm reduction model must utilize all interventions possible, short of termination from the program to enable the participant to reduce or minimize their risky behaviors while at the same time assisting them to move into and become stabilized in permanent housing. Harm reduction is not intended to prevent the termination of a participant whose actions or behavior constitute a threat to the safety of other participants and staff. Organizations must develop a set of policies and procedures to be implemented in the event of such behavior on the part of a participant.
38 |
39 | **Homeless**: An individual who belongs to one of the following categories: (1) An individual who lacks a fixed, regular, and adequate nighttime residence, meaning: (i) An individual with a primary nighttime residence that is a public or private place not designed for or ordinarily used as a regular sleeping accommodation for human beings, including a car, park, abandoned building, bus or train station, airport, or camping ground;(ii) An individual living in a supervised publicly or privately operated shelter designated to provide temporary living arrangements (including congregate shelters, transitional housing, and hotels and motels paid for by charitable organizations or by federal, state, or local government programs for low-income individuals); or(iii) An individual who is exiting an institution where he or she resided for 90 days or less and who resided in an emergency shelter or place not meant for human habitation immediately before entering that institution;(2) An individual who will imminently lose their primary nighttime residence, provided that: (i) The primary nighttime residence will be lost within 14 days of the date of application for homeless assistance;(ii) No subsequent residence has been identified; and(iii) The individual lacks the resources or support networks,e.g., family, friends, faith-based or other social networks, needed to obtain other permanent housing; (3) Any individual who: (i) Is fleeing, or is attempting to flee, domestic violence, dating violence, sexual assault, stalking, or other dangerous or life-threatening conditions that relate to violence against the individual that has either taken place within the individual's primary nighttime residence or has made the individual afraid to return to their primary nighttime residence;(ii) Has no other residence; and (iii) Lacks the resources or support networks,e.g., family, friends, faith-based or other social networks, to obtain other permanent housing.
40 |
41 | **Homeless, defined by DPSS**: Applicants/participants are considered homeless when they lack fixed and regular nighttime residences. If they share a residence with family or friends on a temporary basis; if they have a primary nighttime residencethat is a supervised publicly or privately operated shelter designed to provide temporary living accommodations; if they reside in a public or private place not designed for or ordinarily used as a regular sleeping accommodation for human beings; if they have a need for housing in a commercial establishment (e.g. hotel/motel), shelter, publicly funded transitional housing or from a person in the business of renting properties, or received an eviction notice or notice to pay rent or quit.
42 |
43 | **Housing First**: HousingFirst is an approach that offers permanent housing as quickly as possible for people experiencing homelessness, particularly for people with long histories of homelessness and co-occurring health challenges, while providing the supportive services people need to keep their housing and avoid returning to homelessness. The provider ensures that the supportive services that program participants need or want in order to achieve permanent housing and to increase income are offered, but are not required as a condition of housing, including links to mainstream programs or partner agencies (i.e. mental health services, substance abuse treatment, medical services, child care, etc.). Income, sobriety and/or participation in treatment or other services are voluntary and are not required as a condition for housing.
44 |
45 | **Housing Inventory Chart (HIC)**: Consists of three housing inventory charts for: emergency shelter, transitional housing and permanent supportive housing.
46 |
47 | **Housing Navigation**: Housing Navigation is the process by which homeless clients that have entered the CES system are provided ongoing engagement, document collection, and case management services in order to facilitate a match to an appropriate housing resource. In the context of CES, outreach workers, case managers, and other homeless service providers may provide housing navigation assistance.
48 |
49 | **Housing Navigator(s)**: Housing Navigator is the client’s primary point of contact in CES, often a social worker, case manager, outreach worker, or volunteer. The primary function of the Housing Navigator is to: 1) assist clients in collecting necessary documents for housing applications, 2) accompany clients to housing appointments, and 3) assist clients in navigating the entire housing search and placement process.
50 |
51 | **Matched**: Matched is the process by which an individual in CES is determined to be eligible or initially eligible for a housing resource, and is “matched” to that resource.
52 |
53 | **Outreach**: In the context of the CES system, Outreach is defined as the activity of engaging a homeless individual through the process of rapport building with the goal of linking that individual to a permanent housing resource. Outreach and engagement is an ongoing process that “involves creativity, flexibility, may take months or years, and involves establishing a relationship” to connect a client to services (Olivet, Bassuk, Elstad, Kenny, and Jassil, 2010). Outreach can be viewed as a“service in itself” and “a process of building a personal connection that may play a role in helping a person improve his or her housing, health status, or social support network” (Olivet, Bassuk, Elstad, Kenny, and Jassil, 2010). Outreach and engagement should be approached in a client-centered and voluntary manner that does not create any time constraints as to the alacrity in which the client voluntarily seeks permanent housing. Outreach workers should have the capacity to refer clients to resources and services such as Crisis & Bridge (Reserved Crisis) Housing and should regularly participate in case conferencing to ensure clients entering CES are matched to the appropriate permanent housing resource.
54 |
55 | **Outreach Coordination**: Theplanning and ongoing coordination of outreach activities in a region. This should include a multi-disciplinary approach that ensures adequate geographic coverage and the use of best practices to outreach.
56 |
57 | **Parenting Youth**: A youth who identifies as the parent or legal guardian of one or more children who are present with or sleeping in the same place as that youth parent, where there is no person over age 24 in the household.
58 |
59 | **Permanent Housing (PH)**: Community-based housing without a designated length of stay, which includes both Permanent Supportive Housing (PSH) and Rapid Rehousing (RRH). Examples of permanent housing include, but are not limited to, a house or apartment with a month-to-month or annual lease term or home ownership.
60 |
61 | **Permanent Supportive Housing (PSH)**: Long-term, community-based housing that has supportive services for homeless persons with disabilities. This type of supportive housing enables the special needs of populations to live independently as possible in a permanent setting. Permanent housing can be provided in one structure or in several structures at one site or in multiple structures at scattered sites.
62 |
63 | **Point in Time (PIT)**: A snapshot of the homeless population taken on a given day. Since 2005, HUD requires all CoC applicants to complete this count every other year in the last week of January. This count includes a street count in addition to a count of all clients in emergency and transitional beds.
64 |
65 | **Rapid Rehousing (RRH)**: Asupport intervention that uses a combination of case management, Housing Navigation, and short to medium term financial assistance to assist mid-range acuity homeless households identify and stabilize in tenant-based, scattered site, permanent housing.
66 |
67 | **Regional Coordination**: Oversight of SPA-wide partnerships across public and private entities that ensure homeless persons are fully supported and connected to housing and services within their respective communities. Regional and coordinated access to housing and services ensures that a homeless person does not have to go to multiple agencies to obtain housing and services assistance.
68 |
69 | **Rent Reasonableness**: The total rent charged for a unit must be reasonable in relation to the rents being charged during the same time period for comparable units in the private unassisted market and must not be in excess of rents being charged by the owner during the same period for comparable non-luxury unassisted units. Such determinations should consider: (a) location, quality, size, type, and age of unit; and (b) any amenities, housing services, maintenance and utilities to be provided by the owner. Comparable rents may be verified by using a market study, reviewing comparable units advertised for rent, or by obtaining written verification from the property owner documenting comparable rents for other units owned.
70 |
71 | **Social Enterprise -Social Enterprises are profit or non-profit organizations whose primary purpose is “common good to advance their social, environmental and human justice agendas.” Many Social Enterprises provide a supportive work environment for those with significant barriers to employment. Social Enterprises provide those with barriers to employment, including individuals experiencing homelessness, those reentering the community from incarceration, Veterans, disconnected youth, and those with disabilities, subsidized transitional employment combined with case management, supportive services and job readiness skills to prepare the hard-to-serve individual for unsubsidized, permanent employment.
72 |
73 | **Supportive Services**: Services that may assist homeless participants in the transition from the streets or shelters into permanent or permanent supportive housing, and that assist persons with living successfully in housing.
74 |
75 | **Transition Age Youth (TAY)**: An individual between the ages of 16 and 24. Please note that while the Youth Coordinated Entry System serves youth and young adults, ages 16-24, for the purposes of Rapid Rehousing and other housing resources that require a lease to be signed, youth must be at least 18 years old to sign a lease.* Therefore, for the program area of Rapid Rehousing, TAY are defined as youth ages 18-26. *Youth under age 18 who have legally emancipated are legally able to sign a lease. However, the prevalence of youth who have emancipated before age 18 is rare.
76 |
77 | **Transitional Housing (TH)**: Transitional housing (TH) is designed to provide homeless individuals and families with the interim stability and support to successfully move to and maintain permanent housing. Transitional housing may be used to cover the costs of up to 24 months of housing with accompanying supportive services. Program participants must have a lease (or sublease) or occupancy agreement in place when residing in transitional housing.
78 |
79 | **Unaccompanied Youth**: Unaccompanied youth are persons under age 18 who are not accompanied by a parent or guardian and are not a parent presenting with or sleeping in the same place as his/her child(ren). Unaccompanied youth are single youth, youth couples, and groups of youth presenting together as a household.
80 |
81 | **Unduplicated Count**: The number of people who are homeless within a specified location and time period. An unduplicated count ensures that individuals are counted only once regardless of the number of times they entered or exited the homeless system or the number of programs in which they participated.
82 |
83 | **Veteran**: This subpopulation category of the PIT includes adults who have served on active duty in the Armed Forces of the United States. This does not include inactive military reserves or the National Guard unless the person was called up to active duty.
84 |
85 | **Victims of Domestic Violence**: This subpopulation category of the PIT includes adults who have been victims of domestic violence, dating violence, sexual assault, or stalking.
86 |
87 | **Victim service provider**: A private nonprofit organization whose primary mission is to provide services to victims of domestic violence, dating violence, sexual assault, or stalking. This term includes rape crisis centers, battered women’s shelters, domestic violence transitional housing programs, and other programs.
88 |
89 | **Youth**: Persons under age 25, including children under age 18 and young adults ages 18 to 24.
90 |
--------------------------------------------------------------------------------
/doc/human-resources/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/insurance/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/insurance/index.md:
--------------------------------------------------------------------------------
1 | # Insurance wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Insurance
4 |
--------------------------------------------------------------------------------
/doc/lean-six-sigma/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/manufacturing/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/manufacturing/index.md:
--------------------------------------------------------------------------------
1 | # Manufacturing wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Manufacturing
4 |
--------------------------------------------------------------------------------
/doc/measurement/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/measurement/index.md:
--------------------------------------------------------------------------------
1 | # Measurment wordbook
2 |
3 | See [ISO 5725-1:1994(en) Accuracy (trueness and precision) of measurement methods and results — Part 1: General principles and definitions](https://www.iso.org/obp/ui/#iso:std:iso:5725:-1:ed-1:v1:en)
4 |
5 | * accuracy: a description of systematic errors, a measure of statistical bias, that includes both precision and trueness.
6 |
7 | * precision: the closeness of agreement between test results. (ISO 5725 definition)
8 |
9 | * trueness: the closeness of agreement between the arithmetic mean of a large number of test results and the true or accepted reference value. (ISO 5725 definition)
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/doc/media/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/media/index.md:
--------------------------------------------------------------------------------
1 | # Media wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Mass_media
4 |
--------------------------------------------------------------------------------
/doc/organizations/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/organizations/index.md:
--------------------------------------------------------------------------------
1 | # Organizations
2 |
3 | Contents:
4 |
5 | * [Miscellaneous](#misc)
6 | * [Titles](#titles)
7 |
8 |
9 |
10 | * [activity-based_costing](https://wikipedia.org/wiki/Activity-based_costing)
11 | * [balanced scorecard (BSC)](https://en.wikipedia.org/wiki/Balanced_scorecard) a semi-standard structured report that is a strategy performance management tool.
12 | * [BAU: business as usual](TODO)
13 | * [BPO: business process outsourcing](https://en.wikipedia.org/wiki/Business_process_outsourcing) (compare ITES-BPO, KPO, LPO
14 | * [BSC: balanced scorecard](https://en.wikipedia.org/wiki/Balanced_scorecard) a semi-standard structured report that is a strategy performance management tool.
15 | * [best practice](https://en.wikipedia.org/wiki/Best_practice)
16 | * [Capability Maturity Model](https://wikipedia.org/wiki/Capability_Maturity_Model)
17 | * [core competency](https://wikipedia.org/wiki/Core_competency)
18 | * [customer experience (CX)](TODO)
19 | * [CID: customer identifier](TODO) (cf. UCID)
20 | * [CoE: center of excellence](TODO)
21 | * [corporate social responsibility (CSR)](https://en.wikipedia.org/wiki/Corporate_social_responsibility): business practices involving initiatives that benefit society. A business's CSR can encompass a wide variety of tactics, from giving away a portion of a company's proceeds to charity, to implementing "greener" business operations. (cf. customer service record)
22 | * [cost to company](https://wikipedia.org/wiki/Cost_to_company)
23 | * [competitive advantage](https://wikipedia.org/wiki/Competitive_advantage)
24 | * [customer service record (CSR)](TODO)
25 | * [cost to company (CTC)](https://en.wikipedia.org/wiki/Cost_to_company)
26 | * [CTC: cost to company](https://en.wikipedia.org/wiki/Cost_to_company)
27 | * [CX: Customer Experience](TODO)
28 | * [Dynamic_systems_development_method](https://wikipedia.org/wiki/Dynamic_systems_development_method)
29 | * [elevator pitch](https://wikipedia.org/wiki/Elevator_pitch)
30 | * [formula for change](https://wikipedia.org/wiki/Formula_for_change)
31 | * [four stages of competence](https://wikipedia.org/wiki/Four_stages_of_competence)
32 | * [Globalization](https://en.wikipedia.org/wiki/Globalization)
33 | * [ITES-BPO: Information Technology Enabled Service - Business Process Outsourcing] (compare BPO, KPO, LPO)
34 | * [KPI: key performance indicator](https://en.wikipedia.org/wiki/Performance_indicator): s a type of performance measurement that evaluates the success of an organization or activity.
35 | * [KPO: knowledge process outsourcing](https://en.wikipedia.org/wiki/Knowledge_process_outsourcing) (compare BPO, ITES-BPO, KPO)
36 | * [lean enterprise](https://wikipedia.org/wiki/Lean_enterprise)
37 | * [learning styles](https://wikipedia.org/wiki/Learning_styles)
38 | * [LPO: legal process outsourcing](https://en.wikipedia.org/wiki/Legal_process_outsourcing) (compare BPO, ITES-BPO, KPO)
39 | * [LMX: leader–member exchange theory](https://en.wikipedia.org/wiki/Leader%E2%80%93member_exchange_theory): a relationship-based approach to leadership that focuses on the two-way (dyadic) relationship between leaders and followers
40 | * [management by objectives (MBO)](https://en.wikipedia.org/wiki/Management_by_objectives)
41 | * [marketing](https://en.wikipedia.org/wiki/Marketing)
42 | * [MBO: management by objectives](https://en.wikipedia.org/wiki/Management_by_objectives)
43 | * [MGMT: management](https://en.wikipedia.org/wiki/Management)
44 | * [mission statement](https://wikipedia.org/wiki/Mission_statement)
45 | * [motivation](https://wikipedia.org/wiki/Motivation)
46 | * [organizational architecture](https://wikipedia.org/wiki/Organizational_architecture)
47 | * [organizational chart](https://en.wikipedia.org/wiki/Organizational_chart)
48 | * [organizational structure](https://wikipedia.org/wiki/Organizational_structure)
49 | * [sales](https://en.wikipedia.org/wiki/Sales)
50 | * [sales presentation](https://wikipedia.org/wiki/Sales_presentation)
51 | * [small-to-medium enterprise (SME)](TODO)
52 | * [SME: small-to-medium enterprise](TODO)
53 | * [SME: subject matter expert](TODO)
54 | * [six thinking hats](https://en.wikipedia.org/wiki/Six_Thinking_Hats): Managing Blue, Information White, Emotions Red, Discernment Black, Optimistic Yellow, Creativity Green
55 | * [subject matter expert (SME)](TODO)
56 | * [resource allocation](https://en.wikipedia.org/wiki/Resource_allocation)
57 | * [resource leveling](https://en.wikipedia.org/wiki/Resource_leveling)
58 | * [resource management](https://en.wikipedia.org/wiki/Resource_management): efficient and effective development of an organization's resources, such as money, people, and inventory.
59 | * [return on investment (ROI)](https://en.wikipedia.org/wiki/Return_on_investment)
60 | * [ROI: return on investment](https://en.wikipedia.org/wiki/Return_on_investment)
61 | * [strategic management](https://wikipedia.org/wiki/Strategic_management)
62 | * [strategic planning](https://wikipedia.org/wiki/Strategic_planning)
63 | * [TBO: total benefits of ownership](https://wikipedia.org/wiki/Total_benefits_of_ownership)
64 | * [TC: total cost](https://wikipedia.org/wiki/Total_cost)
65 | * [TCA: total cost of acquisition](https://wikipedia.org/wiki/Total_cost_of_acquisition)
66 | * [TCO: total cost of ownership](https://en.wikipedia.org/wiki/Total_cost_of_ownership)
67 | * [third-generation balanced scorecard](https://en.wikipedia.org/wiki/Third-generation_balanced_scorecard): a balanced scorecare typically with four items: a destination statement, a strategic linkage model, defintions of objectives, and measures for targets.
68 | * [total cost of ownership (TCO)](https://en.wikipedia.org/wiki/Total_cost_of_ownership)
69 | * [total project control](https://wikipedia.org/wiki/Total_project_control)
70 | * [UCID: universal customer identifier](TODO) (cf. CID)
71 | * [total quality management (TQM)](https://en.wikipedia.org/wiki/Total_quality_management)
72 | * [TQM: total quality management)](https://en.wikipedia.org/wiki/Total_quality_management)
73 | * [vendor lock-in](https://en.wikipedia.org/wiki/Vendor_lock-in)
74 | * [vision statement](https://wikipedia.org/wiki/Vision_statement)
75 | * [whole-life cost](https://wikipedia.org/wiki/Whole-life_cost)
76 | * [core business](https://wikipedia.org/wiki/Core_business)
77 | * [experience curve effects](https://wikipedia.org/wiki/Experience_curve_effects)
78 | * [PEST analysis](https://wikipedia.org/wiki/PEST_analysis)
79 | * [marketing management](https://wikipedia.org/wiki/Marketing_management)
80 | * [six forces model](https://wikipedia.org/wiki/Six_forces_model)
81 | * [Porter's four corners model](https://wikipedia.org/wiki/Porter%27s_four_corners_model)
82 | * [enterprise planning system](https://wikipedia.org/wiki/Enterprise_planning_system)
83 | * [growth-share_matrix](https://wikipedia.org/wiki/Growth%E2%80%93share_matrix)
84 | * [Porter's five forces analysis](https://wikipedia.org/wiki/Porter%27s_five_forces_analysis)
85 | * [Porter's generic strategies](https://wikipedia.org/wiki/Porter%27s_generic_strategies)
86 | * [outsourcing](https://wikipedia.org/wiki/Outsourcing)
87 | * [strategic thinking](https://wikipedia.org/wiki/Strategic_thinking)
88 | * [theory of multiple intelligences](https://wikipedia.org/wiki/Theory_of_multiple_intelligences)
89 | * [SWOT analysis](https://wikipedia.org/wiki/SWOT_analysis)
90 |
91 |
92 |
93 |
94 | * [Assistant Vice President](https://en.wikipedia.org/wiki/Vice_president#In_business)
95 | * [Chief Information Officer (CIO)](https://en.wikipedia.org/wiki/Chief_information_officer)
96 | * [Chief Marketing Officer (CMO)](https://en.wikipedia.org/wiki/Chief_marketing_officer)
97 | * [Chief Technology Officer (CTO)](https://en.wikipedia.org/wiki/Chief_technology_officer)
98 | * [Executive Vice President (EVP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
99 | * [First Vice President (FVP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
100 | * [General Manager (GM)(https://en.wikipedia.org/wiki/General_manager]
101 | * [Vice President (VP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
102 | * [Senior Executive Vice President (SEVP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
103 | * [Deputy President (DP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
104 | * [Senior Vice President (SVP)](https://en.wikipedia.org/wiki/Vice_president#In_business)
105 | * [BA: Business Analyst]
106 | * [PM: Project Manager]
107 | * [IT: Information Technology]
108 | * [XD: Experience Design]
109 | * [CX: Customer Experience]
110 | * [DX: Developer Experience]
111 | * [QA: Quality Assurance]
112 | * [QA: Quality Architect]
113 | * [SET: Software Engineer in Test]
114 | * [SDET: Software Development Engineer in Test]
115 | * [TDE: Test Design Engineer]
116 |
--------------------------------------------------------------------------------
/doc/politics/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/program-evaluation-and-review-technique/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/program-evaluation-and-review-technique/index.md:
--------------------------------------------------------------------------------
1 | # Program evaluation and review technique (PERT) wordbook
2 |
3 | * [PERT: program evaluation and review technique](https://wikipedia.org/wiki/Program_evaluation_and_review_technique)
4 | * [PERT event](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): a point that marks the start or completion of one or more activities. It consumes no time and uses no resources. When it marks the completion of one or more activities, it is not "reached" (does not occur) until all of the activities leading to that event have been completed.
5 | * [predecessor event](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): an event that immediately precedes some other event without any other events intervening. An event can have multiple predecessor events and can be the predecessor of multiple events.
6 | * [successor event](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): an event that immediately follows some other event without any other intervening events. An event can have multiple successor events and can be the successor of multiple events.
7 | * [PERT activity](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the actual performance of a task which consumes time and requires resources (such as labor, materials, space, machinery). It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred.
8 | * [PERT sub-activity](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3. Sub-activities have all the properties of activities; in particular, a sub-activity has predecessor or successor events just like an activity. A sub-activity can be decomposed again into finer-grained sub-activities.
9 | * [optimistic time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the minimum possible time required to accomplish an activity (o) or a path (O), assuming everything proceeds better than is normally expected
10 | * [pessimistic time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the maximum possible time required to accomplish an activity (p) or a path (P), assuming everything goes wrong (but excluding major catastrophes).
11 | * [most likely time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the best estimate of the time required to accomplish an activity (m) or a path (M), assuming everything proceeds as normal.
12 | * [expected time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the best estimate of the time required to accomplish an activity (te) or a path (TE), accounting for the fact that things don't always proceed as normal (the implication being that the expected time is the average time the task would require if the task were repeated on a number of occasions over an extended period of time).
13 | * [standard deviation of time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the variability of the time for accomplishing an activity (†óte) or a path (†óTE)
14 | * [float a.k.a. slack](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): a measure of the excess time and resources available to complete a task. It is the amount of time that a project task can be delayed without causing a delay in any subsequent tasks (free float) or the whole project (total float). Positive slack would indicate ahead of schedule; negative slack would indicate behind schedule; and zero slack would indicate on schedule.
15 | * [critical path](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the longest possible continuous pathway taken from the initial event to the terminal event. It determines the total calendar time required for the project; and, therefore, any time delays along the critical path will delay the reaching of the terminal event by at least the same amount.
16 | * [critical activity](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): An activity that has total float equal to zero. An activity with zero float is not necessarily on the critical path since its path may not be the longest.
17 | * [lead time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the time by which a predecessor event must be completed in order to allow sufficient time for the activities that must elapse before a specific PERT event reaches completion.
18 | * [lag time](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): the earliest time by which a successor event can follow a specific PERT event.
19 | * [fast tracking](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): performing more critical activities in parallel
20 | * [crashing critical path](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): Shortening duration of critical activities
21 | * [earliest start time (ES)](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): The earliest time, an activity can start once the previous dependent activities are over.
22 | * [latest start time (LS)](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): LF - activity duration.
23 | * [earliest finish time (EF)](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): ES + activity duration.
24 | * [latest finish time (LF)](https://wikipedia.org/wiki/Program_evaluation_and_review_technique): The latest time an activity can finish without delaying the project.
25 |
--------------------------------------------------------------------------------
/doc/project-management/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/project-management/index.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/joelparkerhenderson/wordbooks/8841cb4193738188e1cdf501d3e462490c70db5d/doc/project-management/index.md
--------------------------------------------------------------------------------
/doc/quality-attributes-examples/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/quality-attributes-examples/index.md:
--------------------------------------------------------------------------------
1 | # Quality Attributes Examples
2 |
3 | * [Introduction](#introduction)
4 | * [IEEE Recommended Practice](#ieee)
5 | * [Users and developers](#users-and-developers)
6 | * [Subjective and objective](#subjective-and-objective)
7 | * [Big list of categories and examples](#big)
8 |
9 |
10 | Introdcution
11 |
12 | * [Non-functional requirements-- do we really care?](http://www.slideshare.net/osscube/non-functional-requirements-do-we-really-care)
13 | * [What is a functional and non-functional requirement? - Stack Overflow](http://stackoverflow.com/questions/16475979/what-is-functional-and-non-functional-requirement)
14 |
15 | Examples of
16 | Execution qualities, such as security and usability, which are observable at run time.
17 | Evolution qualities, such as testability, maintainability, extensibility and scalability, which are embodied in the static structure of the software system.
18 |
19 |
20 | IEEE Recommended Practice
21 |
22 | Examples based on [IEEE Recommended Practice for Software Requirements Specifications](http://www.utdallas.edu/~chung/RE/IEEE830-1993.pdf)
23 |
24 | * Performance requirements
25 | * Interface requirements
26 | * Operational requirements
27 | * Resource requirements
28 | * Verification requirements
29 | * Acceptance requirements
30 | * Documentation requirements
31 | * Security requirements
32 | * Portability requirements
33 | * Quality requirements
34 | * Reliability requirements
35 | * Maintainability requirements
36 | * Safety requirements
37 |
38 |
39 | Users and developers
40 |
41 | Users and developers typically want different kinds of quality attributes.
42 |
43 |
44 | Important to users | Important to developers |
45 | Usability | Maintainability |
46 | Availability | Scalability |
47 | Reliability | Testability |
48 |
49 |
50 |
51 | Subjective and objective
52 |
53 | Examples of subjective attributes and objective attributes:
54 |
55 |
56 | Subjective | Objective |
57 | Fast | Within 1 second |
58 | Easy | A majority of focus group users check the survey box "this is easy" |
59 | Frequent | Every hour on the hour |
60 | Secure | All password storage uses scrypt encryption |
61 | Available | Our third-party monitoring service proves our uptime is 99% or higher |
62 |
63 |
64 |
65 | Big list of categories and examples
66 |
67 | Accessibility:
68 | * Can a blind person navigate the site using a screen reader?
69 |
70 | Accountability:
71 | * Does each image have a watermark or similar indicator of who owns it and the usage rights?
72 |
73 | Accuracy:
74 | * Does an estimate come within 1% of the true value?
75 |
76 | Adaptability:
77 | * TODO
78 |
79 | Administrability:
80 | * TODO
81 |
82 | Affordability:
83 | * Is our product priced within 10% of our competitor's similar product?
84 |
85 | Agility:
86 | * How long does it take to go from a new idea to deploying the idea as a new feature?
87 |
88 | Auditability:
89 | * How is information managed to ensure accuracy, warrantability, traceability, etc.?
90 | * What are the policies for company retention, legal discovery, regulatory compliance, etc.?
91 |
92 | Autonomy:
93 | * TODO
94 |
95 | Automatability:
96 | * Are we able to interaction with the system by using command line interfaces, scripts, etc.?
97 |
98 | Atomicity:
99 | * How do we verify that a transaction is "all or nothing", rather than stuck at partially-completed?
100 |
101 | Availability:
102 | * We are aiming for 99.99% uptime according to our monitoring service.
103 | * What are expectations for uptime, hours of operation, maintenance windows, outage mean time to recovery, etc.?
104 | * Where are the most important locations of operation, and are there any special connection requirements?
105 |
106 | Capacity:
107 | * How many transactions does the system need to be able during normal usage and also at peak usage?
108 | * What resources are expected, in terms of memory, storage, processing, bandwidth, etc.?
109 | * What happens if the system ever exhausts a resource?
110 |
111 | Compatibility:
112 | * Our API data conforms to the JSON specification.
113 |
114 | Composability:
115 | * TODO
116 |
117 | Configurability:
118 | * TODO
119 |
120 | Controllability:
121 | * Can we control the state of the system by using administration tools?
122 |
123 | Consistency:
124 | * To what degree are the system and its data consistent, such as changing only in allowed ways?
125 |
126 | Correctness:
127 | * TODO
128 |
129 | Credibility:
130 | * TODO
131 |
132 | Customizability:
133 | * TODO
134 |
135 | Debugability:
136 | * TODO
137 |
138 | Degradability:
139 | * TODO
140 |
141 | Determinability:
142 | * TODO
143 |
144 | Demonstrability:
145 | * TODO
146 |
147 | Dependability:
148 | * TODO
149 |
150 | Deployability:
151 | * TODO
152 |
153 | Discoverability:
154 | * TODO
155 |
156 | Distributability:
157 | * TODO
158 |
159 | Durability:
160 | * When a transaction is committed, is it preserved, even in the event of power loss, crashes, or errors?
161 |
162 | Effectiveness:
163 | * TODO
164 |
165 | Efficiency:
166 | * TODO
167 |
168 | Evolvability:
169 | * TODO
170 |
171 | Extensibility:
172 | * TODO
173 |
174 | Failure transparency:
175 | * TODO
176 |
177 | Fault-tolerance:
178 | * How will the system handle failures?
179 | * What are the goals for fault trapping?
180 |
181 | Fidelity:
182 | * TODO
183 |
184 | Flexibility:
185 | * TODO
186 |
187 | Heterogeneity:
188 | * To what extent do we use diverse technologies, such as multiple programming languages and frameworks?
189 |
190 | Homogeneity:
191 | * To what extent do we use the same technologies, such as one programming language and framework?
192 |
193 | Inspectability:
194 | * TODO
195 |
196 | Installability:
197 | * TODO
198 |
199 | Integrity:
200 | * What are goals for consistency of events, values, methods, measures, expectations, and outcomes?
201 | * Are there needs for application integrity, such as checksumming binaries, or signing transactions, etc.?
202 | * Are there needs for data integrity, such as referential integrity, or randomness guarantees, etc.?
203 |
204 | Interchangeability:
205 | * TODO
206 |
207 | Interoperability:
208 | * TODO
209 |
210 | Instrumentability:
211 | * To what degree is it possible to instrument the system?
212 |
213 | Isolateability:
214 | * To what degree are items are kept separate, such as for ACID transactions or testing?
215 |
216 | Learnability:
217 | * TODO
218 |
219 | Maintainability:
220 | * How easily can the system be maintained?
221 | * What are the goals for conformance to best practices, coding standards, enterprise architecture patterns, etc.?
222 | * What documentation is needed for the system, training, versioning, etc.?
223 |
224 | Manageability:
225 | * TODO
226 |
227 | Mobility:
228 | * TODO
229 |
230 | Modifiability:
231 | * TODO
232 |
233 | Modularity:
234 | * TODO
235 |
236 | Monitorability:
237 | * the degree to which it is possible to monitor the system.
238 |
239 | Observability:
240 | * the degree to which it is possible to observe the system.
241 |
242 | Operability:
243 | * TODO
244 |
245 | Orthogonality:
246 | * TODO
247 |
248 | Portability:
249 | * TODO
250 |
251 | Precision:
252 | * TODO
253 |
254 | Predictability:
255 | * TODO
256 |
257 | Process capabilities:
258 | * TODO
259 |
260 | Producibility:
261 | * TODO
262 |
263 | Provability:
264 | * TODO
265 |
266 | Recoverability:
267 | * What is the disaster recovery plan?
268 | * What is the data policy for backups, retentions, proof of fitness for recoverability, fire drills, etc.?
269 | * Are there any sensitive data that involves special handling because of privacy, or legality, or other reasons?
270 | * What are the Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO)?
271 |
272 | Relevance:
273 | * TODO
274 |
275 | Reliability:
276 | * Mean Time Between Failures (MTBF): what are the acceptable thresholds for outages, down time, material errors, etc.?
277 | * Mean Time To Recovery (MTTR): if something breaks, how much time is expected to get everything corrected and running?
278 |
279 | Repeatability:
280 | * TODO
281 |
282 | Reproducibility:
283 | * TODO
284 |
285 | Resilience:
286 | * TODO
287 |
288 | Responsiveness:
289 | * How fast are response times for browser page loading, API responses, software downloads, etc.?
290 | * What is the process for tracking query times, reporting times, ETL times, etc.?
291 | * Throughput
292 |
293 | Reusability:
294 | * TODO
295 |
296 | Robustness:
297 | * How will the system handle failures?
298 | * What are the goals for fault trapping, application hooks, SMNP, etc.?
299 |
300 | Safety:
301 | * TODO
302 |
303 | Scalability:
304 | * TODO
305 |
306 | Seamlessness:
307 | * TODO
308 |
309 | Self-sustainability:
310 | * TODO
311 |
312 | Serviceability:
313 | * TODO
314 |
315 | Securability:
316 | * How are authentication credentials encrypted and managed?
317 | * How are authorization access control rules managed?
318 | * Do passwords have any requirements, such as length, special characters, expiry, recycling policies, multi-factor authentication (MFA)
319 | * What are the encryption requirements for data in flight and/or data at rest?
320 | * What is the policy if someone reports a possible data breach?
321 | * SSL implementation
322 | * Password policy
323 | * Integrity of accounts
324 | * Data confidentiality
325 | * Processes for authentication and authorization
326 | PCI compliance
327 | Non-repudiation
328 | Encryption
329 |
330 |
331 | Separability:
332 | * The extent to which each item has a single well defined responsibility.
333 |
334 | Simplicity:
335 | * TODO
336 |
337 | Stability:
338 | * TODO
339 |
340 | Standards compliance:
341 | * What standards are involved, such as ISO, IEEE, Internet RFCs, etc.?
342 | * What are the goals for conformance to Enterprise Architecture standards, technical design standards, coding standards, etc.?
343 | * What automatic standards validators are available, such as code quality metric tools, source code linters, etc.?
344 |
345 | Supportability:
346 | * TODO
347 |
348 | Survivability:
349 | * TODO
350 |
351 | Sustainability:
352 | * TODO
353 |
354 | Tailorability:
355 | * TODO
356 |
357 | Testability:
358 | * TODO
359 |
360 | Timeliness:
361 | * TODO
362 |
363 | Traceability:
364 | * TODO
365 |
366 | Transparency:
367 | * TODO
368 |
369 | Ubiquity:
370 | * TODO
371 |
372 | Understandability:
373 | * the system items are self-explaining, or documented, or diagrammed, etc.
374 |
375 | Upgradability:
376 | * TODO
377 |
378 | Usability:
379 | * How are we measuring customer sastisfaction?
380 | * Are there goals or standards for user interfaces, look and feel, keyboard navigation, image alt tags, etc.?
381 | * What are the needs for internationalization, localization, languages, spellings, regional keyboards, etc.?
382 | * What help is available for the users?
383 | * See also: Learnability, Efficiency, Memorability
384 |
385 | Warrantability:
386 | * for guarantees or promises, express or implied, such as for legal contracts, SLAs, and QoS.
387 |
--------------------------------------------------------------------------------
/doc/quality-attributes/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/quality-attributes/index.md:
--------------------------------------------------------------------------------
1 | # Quality attributes
2 |
3 | See [list of system quality attributes](https://en.wikipedia.org/wiki/List_of_system_quality_attributes)
4 |
5 | * [accessibility](https://en.wikipedia.org/wiki/Accessibility): for people who experience disabilities.
6 |
7 | * [accountability](https://en.wikipedia.org/wiki/Accountability): for answerability, annotatability, liability, and the expectation of account-giving.
8 |
9 | * [accuracy](https://wikipedia.org/wiki/Accuracy): for closeness of measurements to true values.
10 |
11 | * [adaptability](https://wikipedia.org/wiki/Adaptation_(computer_science))
12 |
13 | * [administrability](TODO)
14 |
15 | * [affordability](https://en.wiktionary.orghttps://wikipedia.org/wiki/affordability)
16 |
17 | * [agility](https://wikipedia.org/wiki/Agility)
18 |
19 | * [auditability](https://wikipedia.org/wiki/Auditability)
20 |
21 | * [autonomy](https://wikipedia.org/wiki/Autonomy)
22 |
23 | * [automatability]() for automation interactions with the system, components, tests, etc.
24 |
25 | * [atomicity](https://en.wikipedia.org/wiki/Atomicity_(database_systems)): a transaction must be "all or nothing"; see [ACID](https://en.wikipedia.org/wiki/ACID).
26 |
27 | * [availability](https://wikipedia.org/wiki/Availability)
28 |
29 | * [compatibility](https://en.wiktionary.orghttps://wikipedia.org/wiki/compatibility)
30 |
31 | * [composability](https://wikipedia.org/wiki/Composability)
32 |
33 | * [configurability](https://en.wiktionary.orghttps://wikipedia.org/wiki/configurability)
34 |
35 | * [controllability](TODO): for controling the state of the system.
36 |
37 | * [consistency](https://en.wikipedia.org/wiki/Consistency_(database_systems)): the degree to which the system and its data must be consistent, such as changing only in allowed ways.
38 |
39 | * [correctness](https://wikipedia.org/wiki/Correctness_(computer_science))
40 |
41 | * [credibility](https://wikipedia.org/wiki/Credibility)
42 |
43 | * [customizability](https://en.wiktionary.orghttps://wikipedia.org/wiki/customizability)
44 |
45 | * [debugability](TODO)
46 |
47 | * [degradability](https://en.wiktionary.orghttps://wikipedia.org/wiki/degradability)
48 |
49 | * [determinability](https://en.wiktionary.orghttps://wikipedia.org/wiki/determinable)
50 |
51 | * [demonstrability](https://en.wiktionary.orghttps://wikipedia.org/wiki/demonstrability)
52 |
53 | * [dependability](https://wikipedia.org/wiki/Dependability)
54 |
55 | * [deployability](https://en.wiktionary.orghttps://wikipedia.org/wiki/deployability)
56 |
57 | * [discoverability](https://wikipedia.org/wiki/Discoverability)
58 |
59 | * [distributability](https://en.wiktionary.orghttps://wikipedia.org/wiki/distributability)
60 |
61 | * [durability](https://wikipedia.org/wiki/Durability_(database_systems)): a transaction that is committed is preserved, even in the event of power loss, crashes, or errors; see [ACID](https://en.wikipedia.org/wiki/ACID).
62 |
63 | * [effectiveness](https://wikipedia.org/wiki/Effectiveness)
64 |
65 | * [efficiency](https://en.wiktionary.orghttps://wikipedia.org/wiki/efficiency)
66 |
67 | * [evolvability](https://wikipedia.org/wiki/Evolvability)
68 |
69 | * [extensibility](https://wikipedia.org/wiki/Extensibility)
70 |
71 | * [failure transparency](https://wikipedia.org/wiki/Failure_transparency)
72 |
73 | * [fault-tolerance](https://wikipedia.org/wiki/Fault-tolerance)
74 |
75 | * [fidelity](https://wikipedia.org/wiki/Fidelity)
76 |
77 | * [flexibility](https://wikipedia.org/wiki/Flexibility_(engineering))
78 |
79 | * [heterogeneity](https://en.wikipedia.org/wiki/Homogeneity_and_heterogeneity): uses diverse technologies, such as multiple languages and frameworks.
80 |
81 | * [homogeneity](https://en.wikipedia.org/wiki/Homogeneity_and_heterogeneity): uses the same technologies, such as one language and framework.
82 |
83 | * [inspectability](https://en.wiktionary.orghttps://wikipedia.org/wiki/inspectability)
84 |
85 | * [installability](https://en.wiktionary.orghttps://wikipedia.org/wiki/installability)
86 |
87 | * [integrity](https://wikipedia.org/wiki/Data_corruption)
88 |
89 | * [interchangeability](https://wikipedia.org/wiki/Interchangeable_parts)
90 |
91 | * [interoperability](https://wikipedia.org/wiki/Interoperability)
92 |
93 | * [instrumentability](TODO): the degree to which it is possible to instrument the system.
94 |
95 | * [isolateability](https://en.wikipedia.org/wiki/Isolation_(database_systems)): the degree to which items are kept separate, such as for ACID transactions, testing.
96 |
97 | * [learnability](https://wikipedia.org/wiki/Learnability)
98 |
99 | * [maintainability](https://wikipedia.org/wiki/Maintainability)
100 |
101 | * [manageability](https://en.wiktionary.orghttps://wikipedia.org/wiki/manageability)
102 |
103 | * [mobility](https://en.wiktionary.orghttps://wikipedia.org/wiki/mobility)
104 |
105 | * [modifiability](https://en.wiktionary.orghttps://wikipedia.org/wiki/modifiability)
106 |
107 | * [modularity](https://wikipedia.org/wiki/Modularity_(programming))
108 |
109 | * [monitorability](TODO): the degree to which it is possible to monitor the system.
110 |
111 | * [observability](TODO): the degree to which it is possible to observe the system.
112 |
113 | * [operability](https://wikipedia.org/wiki/Operability)
114 |
115 | * [orthogonality](https://wikipedia.org/wiki/Orthogonality#Computer_science)
116 |
117 | * [portability](https://wikipedia.org/wiki/Software_portability)
118 |
119 | * [precision](https://wikipedia.org/wiki/Precision_(computer_science))
120 |
121 | * [predictability](https://wikipedia.org/wiki/Predictability)
122 |
123 | * [process capabilities](https://wikipedia.org/wiki/Capability_(systems_engineering))
124 |
125 | * [producibility](https://en.wiktionary.orghttps://wikipedia.org/wiki/producibility)
126 |
127 | * [provability](https://en.wiktionary.orghttps://wikipedia.org/wiki/provability)
128 |
129 | * [recoverability](https://en.wiktionary.orghttps://wikipedia.org/wiki/recoverability)
130 |
131 | * [relevance](https://wikipedia.org/wiki/Relevance)
132 |
133 | * [reliability](https://wikipedia.org/wiki/Reliability_(computer_networking))
134 |
135 | * [repeatability](https://wikipedia.org/wiki/Repeatability)
136 |
137 | * [reproducibility](https://wikipedia.org/wiki/Reproducibility)
138 |
139 | * [resilience](https://wikipedia.org/wiki/Resilience_(engineering_and_construction))
140 |
141 | * [responsiveness](https://wikipedia.org/wiki/Responsiveness)
142 |
143 | * [reusability](https://wikipedia.org/wiki/Reusability)
144 |
145 | * [robustness](https://wikipedia.org/wiki/Robustness_(computer_science))
146 |
147 | * [safety](https://wikipedia.org/wiki/Safety)
148 |
149 | * [scalability](https://wikipedia.org/wiki/Scalability)
150 |
151 | * [seamlessness](https://en.wiktionary.orghttps://wikipedia.org/wiki/Special:Search/seamless)
152 |
153 | * [self-sustainability](https://wikipedia.org/wiki/Self-sustainability)
154 |
155 | * [serviceability](https://wikipedia.org/wiki/Serviceability_(computer))
156 |
157 | * [securability](https://en.wiktionary.orghttps://wikipedia.org/wiki/securability)
158 |
159 | * [separability](TODO): each item has a single well defined responsibility.
160 |
161 | * [simplicity](https://wikipedia.org/wiki/Simplicity)
162 |
163 | * [stability](https://wikipedia.org/wiki/Stability_Model)
164 |
165 | * [standards compliance](https://wikipedia.org/wiki/Standardization)
166 |
167 | * [supportability](TODO)
168 |
169 | * [survivability](https://wikipedia.org/wiki/Survivability)
170 |
171 | * [sustainability](https://wikipedia.org/wiki/Sustainability)
172 |
173 | * [tailorability](https://en.wiktionary.orghttps://wikipedia.org/wiki/tailorability)
174 |
175 | * [testability](https://wikipedia.org/wiki/Testability)
176 |
177 | * [timeliness](https://wikipedia.org/wiki/Timeliness)
178 |
179 | * [traceability](https://wikipedia.org/wiki/Traceability)
180 |
181 | * [transparency](https://wikipedia.org/wiki/Transparency_(behavior))
182 |
183 | * [ubiquity](https://en.wiktionary.orghttps://wikipedia.org/wiki/ubiquity)
184 |
185 | * [understandability](https://wikipedia.org/wiki/Understandability): the system items are self-explaining, or documented, or diagrammed, etc.
186 |
187 | * [upgradability](https://en.wiktionary.orghttps://wikipedia.org/wiki/upgradability)
188 |
189 | * [usability](https://wikipedia.org/wiki/Usability)
190 |
191 | * [warrantability](https://en.wikipedia.org/wiki/Warranty): for guarantees or promises, express or implied, such as for legal contracts, SLAs, and QoS.
192 |
193 |
--------------------------------------------------------------------------------
/doc/raid-log/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/raid-log/index.md:
--------------------------------------------------------------------------------
1 | # RAID Log
2 |
3 | A RAID log tracks:
4 |
5 | * Risks
6 | * Assumptions
7 | * Issues
8 | * Dependencies
9 |
10 | Risks:
11 |
12 | * Factors that can have an adverse impact on your project if they occur.
13 |
14 | * Risk refers to the combined likelihood the event will occur and the impact on the project if it does occur.
15 |
16 | * If the likelihood of the event happening and impact to the project are both high, then you identify the event as a risk.
17 |
18 | * The RAID log tracks each risk, including its description, an estimate of likelihood, an estimate of impact, a full analysis, and a mitigation plan.
19 |
20 | Assumptions:
21 |
22 | * Factors that you are assuming to be in place that will contribute to the successful result of your project.
23 |
24 | * The RAID log tracks the assumption, the reason it is assumed, and the action needed to confirm whether the assumption is valid.
25 |
26 | Issues:
27 |
28 | * Factors that are going wrong on your project and needs managing; issues may result in a poor delivery or a failed delivery.
29 |
30 | * The RAID log tracks descriptions of each issue, its impact, its seriousness and actions needed to contain and remove it.
31 |
32 | Dependencies:
33 |
34 | * Factors that are dependent on the result of your project, or on which your project is dependent.
35 |
36 | * The RAID log tracks whom you are dependent on, what they should deliver and when, and who is dependent on you.
37 |
--------------------------------------------------------------------------------
/doc/real-estate/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/real-estate/index.md:
--------------------------------------------------------------------------------
1 | # Real estate wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Real_estate
4 |
--------------------------------------------------------------------------------
/doc/responsibility-assignment-matrix/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/responsibility-assignment-matrix/index.md:
--------------------------------------------------------------------------------
1 | # Responsibility Assignment Matrix (RAM) wordbook
2 |
3 | See [Wikipedia: Responsibility assignment matrix](https://en.wikipedia.org/wiki/Responsibility_assignment_matrix)
4 |
5 | * [RACI: responsible, accountable, consulted, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
6 | * [PACSI: perform, accountable, control, suggest, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
7 | * [RASCI: responsible, accountable, support, control, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
8 | * [RASI: responsible, accountable, support, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
9 | * [RACIQ: responsible, accountable, consulted, informed, quality review](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
10 | * [RACI-VS: responsible, accountable, consulted, informed, verifier, signatory](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
11 | * [RACIO a.k.a. CAIRO: responsible, accountable, consulted, informed, omitted](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
12 | * [DACI: driver, approver, contributors, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
13 | * [RAPID: recommend, agree, perform, input, decide](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
14 | * [RATSI: responsibility, authority, task, support, informed](https://wikipedia.org/wiki/Responsibility_assignment_matrix)
15 |
--------------------------------------------------------------------------------
/doc/retail/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/retail/index.md:
--------------------------------------------------------------------------------
1 | # Retail wordbook
2 |
3 | Credit:
4 |
5 | * [DECA Retail Glossary](http://www.glencoe.com/sec/marketingeducation/retailing/students/deca_glossary.php/)
6 | * [Angi Egan retail jargon glossary](http://www.angiegan.com/retail-jargon-glossary.htm)
7 |
8 | Glossary:
9 |
10 | * [acquisition ](TODO): The takeover of a retail operation by another company.
11 | * [anchor](TODO): A business, usually a department store, that is important to a shopping center because it attracts traffic.
12 | * [audit tape](TODO): A record kept by the cash register of all the transactions entered on the register.
13 | * [auditory marketing](TODO): playing music to strengthen your brand quality.
14 | * [AVT](TODO): average value transaction - the average spend of your customer.
15 | * [bill of lading ](TODO): A shipping contract which includes the exact contents of the delivery.
16 | * [BOGO: buy one get one](TODO): a promotion kind. Compare GWP, PWP.
17 | * [BOPS: buy online, pickup in store](TODO)
18 | * [branch store](TODO): A smaller store operated by a department store that carries a limited range of merchandise.
19 | * [brand](TODO): the total sensory experience the client has with your company and its product or service.
20 | * [button ticket](TODO): A pricing ticket with a hook at the top that can be attached to a button.
21 | * [buying office](TODO): A central office where buyers purchase merchandise for all stores in a department store chain.
22 | * [chain stores](TODO): Two or more stores with similar characteristics, owned by the same company.
23 | * [classic](TODO): A style that does not lose popularity over time.
24 | * [client journey](TODO): the experience the client has with your brand.
25 | * [closed merchandising](TODO): everything locked behind glass cabinets - customer has to ask permission to buy.
26 | * [colour blocking](TODO): merchandising products together of similar colours and shades.
27 | * [compelling communication](TODO): using words to describe what is in it for me.
28 | * [convenience products](TODO): Merchandise that is purchased frequently, without advance planning.
29 | * [cooperative](TODO): A group in which several retailers pool their resources to buy products at a discount.
30 | * [core range](TODO): the products you always have in stock, never changes, what you're known for.
31 | * [deliverables](TODO): what you business provides, the measure for services you provide.
32 | * [delivery receipt](TODO): A receipt from a delivery driver that indicates a delivery was made to a store.
33 | * [department store](TODO): A large retail store that sells a variety of merchandise, organized into departments.
34 | * [differentiation](TODO): The process of distinguishing services or products through design.
35 | * [directory](TODO): A list of the departments of a department store and their locations.
36 | * [discount store](TODO): A self-service retail store with low markups. Example: Wal-Mart, Kmart.
37 | * [dollar control](TODO): A buying method that depends on the amount of purchases, rather than the number of items.
38 | * [dual sited/dual positioning](TODO): having products merchandised in more than one place.
39 | * [durable goods](TODO): Products that can be used frequently and have a long life expectancy.
40 | * [electronic shopping](TODO): Shopping over the Internet or through a TV cable channel.
41 | * [emergency items](TODO): Products that are purchased in an unusual situation when need is suddenly high.
42 | * [fad](TODO): A fashion that gains and loses popularity very quickly.
43 | * [fashion cycle](TODO): The process of a fashion gaining and losing mass acceptance.
44 | * [fashion](TODO): The popularity of a certain product, style, or appearance.
45 | * [FIFO](TODO): First in-first out; a system of stock rotation.
46 | * [flow](TODO): the ease and direction your customers take in the retail environment.
47 | * [flying squad](TODO): A group of employees who are not assigned to a department, but work wherever needed.
48 | * [forward reserve stock](TODO): Reserve stock that is kept in a stock room near the selling floor.
49 | * [forward stock](TODO): Merchandise that is kept on the selling floor.
50 | * [full background](TODO): The rear of a window display that completely covers the display, closing it off from the store.
51 | * [full-line](TODO): Describes department stores that carry a full line of merchandise, from appliances and hardware to clothing and jewelry.
52 | * [good with important services](TODO): A product/service mix that offers a good that needs or is enhanced by services.
53 | * [goods](TODO): Tangible products for sale that can be held or touched.
54 | * [grade labeling](TODO): Product labeling that includes a quality rating for the product.
55 | * [group buying](TODO): When retailers pool their resources to buy products at a discount; also called a cooperative.
56 | * [gummed label](TODO): A pricing ticket with adhesive on the back, used on cloth, leather, and unpainted wood.
57 | * [GWP: gift with purchase](TODO): a promotion kind. Compare BOGO, PWP.
58 | * [hard line](TODO): Describes all nontextile merchandise.
59 | * [hard mark](TODO): hard markdown a.k.a. permanent markdown; theese tend to be taken at the end of the season, but can also be taken on slow moving merchandise that you want to exit out of. (cf. promo markdown)
60 | * [heterogenous products](TODO): Durable products that are different in quality, appearance, and other features.
61 | * [hole pin ticket](TODO): A pricing ticket used on paired items such as gloves.
62 | * [home furnishings](TODO): Refers to all furniture and accessories for the home, including dishes, rugs, furniture, etc.
63 | * [homogenous products](TODO): Durable products that are similar in quality, and require comparisons.
64 | * [hot spot](TODO): the area in store which every customer sees and can get at
65 | * [hypermarket](TODO): A huge retail store that is a combination of a drugstore, supermarket, and discount store.
66 | * [iconic](TODO): creating an aspirational, singular display - to make something exclusive, gorgeous, totally irresisible.
67 | * [image](TODO): The impression customers have of a company or service.
68 | * [impulse buys](TODO): products which are unplanned purchases.
69 | * [impulse items](TODO): products that people purchase without planning for it, such as magazines or candy bars.
70 | * [informative labeling](TODO): product labeling that includes the product's performance in tests.
71 | * [leased department](TODO): a part of a store that is leased out to another store; common with cosmetics.
72 | * [limited editions](TODO): designed to create urgency - great for increasing the average sale value.
73 | * [limited line](TODO): describes a department store that carries a limited amount of merchandise.
74 | * [link sales](TODO): placing a product next to another to encourage the customer to buy more than one product.
75 | * [logical adjacencies](TODO): store layout follows a logical sequence e.g. how a customer would use a product.
76 | * [lookbook](https://en.wikipedia.org/wiki/Lookbook): a collection of photographs compiled to show off a model, a photographer, a style, or stylist or a clothing line. Usually, bloggers or vloggers will "model" fashionable looks for that month or season. This gives viewers ideas on how to style outfits, or to show the latest fashions.
77 | * [merchandising plan](TODO): A strategy for actual and projected sales for a specific period of time.
78 | * [merchandising strategy](TODO): the plan you have for positioning which product where.
79 | * [merger](TODO): The combining of two or more retail organizations into one company.
80 | * [mind share](TODO): getting into the customer's head - they think of what you sell.
81 | * [multiline drugstore](TODO): A store that sells a variety of household items in addition to prescription drugs.
82 | * [nondurable goods](TODO): Products that are purchased frequently and used in a short period of time.
83 | * [nonmarking](TODO): A price tag system that labels a bin or shelf, instead of each individual item.
84 | * [olfactory marketing](TODO): using the sense of smell to create a signature fragrance.
85 | * [open background](TODO): Describes a window display with a completely unobstructed view of the interior of the store.
86 | * [open merchandising](TODO): liberated retail area! Customer is able to pick up, touch, play, experience the product.
87 | * [overerr](TODO): A mistake when an employee enters an amount into the register that is more than the sale price.
88 | * [partial background](TODO): The rear of a window display that is partially covered, but allows customers to see through the display into the store.
89 | * [patronage buying motive](TODO): A reason customers will shop at one store instead of another, can be rational or emotional.
90 | * [pin ticket](TODO): The sort of price ticket used on towels and washcloths that is attached with a pin.
91 | * [point-of-sale terminal](TODO): An electronic machine at a checkout station.
92 | * [POS: Point Of Sale](TODO): the printed materials in your store.
93 | * [premarking](TODO): A system in which the manufacturer, rather than the retailer, marks merchandise with the retail price.
94 | * [preretailing](TODO): when merchandise is ordered, advise receiving, so arrivals can be marked with correct prices.
95 | * [price blocking](TODO): merchandising products together with the same price point
96 | * [primary space](TODO): a hot spot - the most accessible for your customer, highly visible from the entrance.
97 | * [product/service mix](TODO): The number and kind of products and services a general merchandise retailer will offer.
98 | * [product/service planning](TODO): The process of deciding what the product/service mix will be.
99 | * [profit center](TODO): A section of a store that earns money for the retailer.
100 | * [promo markdowns](TODO): used for sales events and the like, such as 20% off, etc. (cf. hard markdown)
101 | * [promotional campaign](TODO): the time and place you choose to introduce lines, products etc.
102 | * [promotional lines](TODO): limited editions, summer ranges, only available during the promotion
103 | * [proportional merchandising](TODO): giving more space to your best sellers and less space to your poor sellers.
104 | * [proxemics](TODO): The nonverbal communication suggested by the space between two people.
105 | * [pull policy](TODO): A promotional policy aimed at building strong consumer demand for a product.
106 | * [push policy](TODO): A promotional policy aimed at getting retailers to stock a product, to build supply in the marketplace.
107 | * [PWP: purchase with purchase](TODO): a promotion kind. Compare BOGO, GWP.
108 | * [relationships](TOD): how well you know your customers, vendors, partners, et al.
109 | * [reserve stock](TODO): Merchandise that is kept somewhere other than the selling floor.
110 | * [resident buying office](TODO): An office located in a central merchandising area where buyers can receive information about products from a variety of manufacturers.
111 | * [retailers](TODO): Businesses that buy goods from wholesalers or manufacturers and resell them to customers.
112 | * [retailing strategy](TODO): A strategic plan to adapt to changing technology and markets, and meet company goals and objectives through retailing.
113 | * [returns percentage](TODO): The relationship between returns and allowances, and sales, calculated by dividing returns and allowances by gross sales.
114 | * [ringseal ticket](TODO): A pricing ticket shaped like a butterfly bandage, used on jewelry and lampshades.
115 | * [Romancing the Customer](TODO): a metaphor for describing how to create lasting business relationships.
116 | * [romancing](TODO): becoming obsessive (in a healthy way) with your customer, their needs, wants, desires.
117 | * [scrim](TODO): A sheer fabric onto which pictures can be painted to be used as a transparent backdrop in the theater and as a visual merchandising prop in stores.
118 | * [SDD: same day delivery](TODO)
119 | * [seasonal merchandising](TODO): reflective of the time of year, or holiday, etc.
120 | * [secondary space](TODO): almost as good as primary space or a hot spot but may be less visible - generally next to primary space
121 | * [seducing the senses](TODO): using your environment to appeal to each of our senses.
122 | * [sensory experience](TODO): appealing to the clients sense of sight, smell, hearing, touch, taste, et al.
123 | * [service excellence](TODO): proud to serve, exceed expectations, educate, listen, adopt an attiutude of yes I can, create wow!
124 | * [service with accompanying products](TODO): A product/service mix in which a service is the primary offering, and products are offered to accompany and augment the service.
125 | * [service](TODO): A product/service mix that offers only a service, with no accompanying product needed or wanted, such as an insurance policy.
126 | * [services](TODO): Intangible items for purchase.
127 | * [SKU: stock keeping unit](https://en.wikipedia.org/wiki/Stock_keeping_unit): an item or group of related items in a unit control inventory system.
128 | * [shoplifting detection wafer](TODO): A small device attached to goods, especially clothing, that sets off an alarm if it leaves the store.
129 | * [shopping items](TODO): Durable goods that require a great deal of comparison before purchase, such as appliances and furniture.
130 | * [soft line](TODO): Describes textile products.
131 | * [specialty products](TODO): Products that solve a specific want or need for specific customers, often expensive products with special characteristics or brand identity.
132 | * [specialty store](TODO): A store that specializes in selling a specific kind of product.
133 | * [specification buying](TODO): Demands made by retailers and wholesalers to manufacturers of the products they sponsor and sell.
134 | * [stack promotions](TODO): different kinds of promotions that come together for a product.
135 | * [staples](TODO): Products that are purchased routinely for everyday use, with little decision-making, and that must be in stock at all times, such as cleaning supplies and food.
136 | * [stock keeping unit (sku)](https://en.wikipedia.org/wiki/Stock_keeping_unit): an item or group of related items in a unit control inventory system.
137 | * [store operations](TODO): Includes all functions of operating a store except merchandising, such as customer service, protection, maintenance, and distribution.
138 | * [string ticket](TODO): A pricing ticket attached with a piece of string.
139 | * [suite selling](TODO): Sell items together in a bundle, such as a complete outfit, or a complete bedding set.
140 | * [supportive services](TODO): Free services offered to customers to increase convenience and entice buying more.
141 | * [surprise & delight](TODO): dare to be different! Use colour, animation, humour, anything to wake customers up.
142 | * [swing area](TODO): the positioning of tables, gondalas or floor fixtures to influence the flow or direction your customer takes through your environment.
143 | * [tangible product](TODO): A product/service mix that offers only a tangible product; no services are offered.
144 | * [textile merchandise](TODO): Products made from natural or manmade fibers, including clothing, curtains, and bedding.
145 | * [twig](TODO): A small store operated by a department store that carries only a limited amount of merchandise.
146 | * [under-the-counter stock](TODO): Merchandise that is kept in drawers or cabinets where customers cannot reach them.
147 | * [undererr](TODO): A mistake when an employee enters an amount into the cash register that is less than the sale price.
148 | * [unit control](TODO): A buying method in which the buyer makes decisions based on inventory and sales records, rather than cost.
149 | * [Universal Product Code (UPC)](TODO): Bar code used for electronic entry.
150 | * [Universal Vendor Marketing (UVM)](TODO): Product code that appears as a series of numbers on a price tag.
151 | * [unsought products](TODO): Products that consumers don't know about and aren't asking for.
152 | * [up-selling](TODO): customer enters the store for a shirt and leaves with a shirt, tie, suit, and shoes.
153 | * [visual pollution](TODO): clutter everywhere - unable to focus on anything, and makes your eyes hurt.
154 | * [warehouse reserve stock](TODO): Reserve stock that is stored in a warehouse, with only one example item on display.
155 |
--------------------------------------------------------------------------------
/doc/six-sigma/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/six-sigma/index.md:
--------------------------------------------------------------------------------
1 | # Six Sigma
2 |
3 | ## Most important
4 |
5 | * [Six Sigma](https://www.wikipedia.org/wiki/Six_Sigma)
6 | * [Lean Six Sigma](https://www.wikipedia.org/wiki/Lean_Six_Sigma)
7 | * [Lean manufacturing](https://www.wikipedia.org/wiki/Lean_manufacturing)
8 | * [Design for Six Sigma](https://www.wikipedia.org/wiki/Design_for_Six_Sigma)
9 | * [Lean IT](https://www.wikipedia.org/wiki/Lean_IT)
10 | * [Lean manufacturing](https://www.wikipedia.org/wiki/Lean_manufacturing)
11 |
12 | ## General concepts
13 |
14 | * [critical to quality (CTQ)](TODO)
15 | * [defects per million opportunities (DPMO)](https://www.wikipedia.org/wiki/Defects_per_million_opportunities)
16 | * [DMAIC: Define, Measure, Analyze, Improve, Control](https://www.wikipedia.org/wiki/DMAIC)
17 | * [Kaizen](https://www.wikipedia.org/wiki/Kaizen)
18 | * [Theory of constraints](https://www.wikipedia.org/wiki/Theory_of_constraints)
19 | * [Total productive maintenance](https://www.wikipedia.org/wiki/Total_productive_maintenance)
20 | * [Total quality management](https://www.wikipedia.org/wiki/Total_quality_management)
21 |
22 | ## Complementary methodologies and resources
23 |
24 | * [Agile software development](https://www.wikipedia.org/wiki/Agile_software_development)
25 | * [Capability Maturity Model Integration (CMMI)](https://www.wikipedia.org/wiki/Capability_Maturity_Model_Integration)
26 | * [COBIT: Control Objectives for Information and related Technology](https://www.wikipedia.org/wiki/COBIT)
27 | * [Continual improvement process](https://www.wikipedia.org/wiki/Continual_improvement_process)
28 | * [Just-in-time manufacturing](https://www.wikipedia.org/wiki/Just-in-time_manufacturing)
29 | * [Information Technology Infrastructure Library (ITIL)](https://www.wikipedia.org/wiki/ITIL)
30 | * [IT service management](https://www.wikipedia.org/wiki/IT_service_management)
31 | * [Project Management Body of Knowledge](https://www.wikipedia.org/wiki/Project_Management_Body_of_Knowledge)
32 | * [Rational Unified Process](https://www.wikipedia.org/wiki/Rational_Unified_Process)
33 | * [Universal Service Management Body of Knowledge (USMBOK)](TODO)
34 | * [The Open Group Architecture Framework (TOGAF)](https://www.wikipedia.org/wiki/The_Open_Group_Architecture_Framework)
35 |
36 | ## Types of waste
37 |
38 | * [Muda](https://www.wikipedia.org/wiki/Muda_(Japanese_term))
39 | * [Mura](https://www.wikipedia.org/wiki/Mura_(Japanese_term))
40 | * [Muri](https://www.wikipedia.org/wiki/Muri_(Japanese_term))
41 |
42 | ## Quality management tools and methods
43 |
44 | * [5 Whys](https://www.wikipedia.org/wiki/5_Whys)
45 | * [Axiomatic design](https://www.wikipedia.org/wiki/Axiomatic_design)
46 | * [Check sheet](https://www.wikipedia.org/wiki/Check_sheet)
47 | * [Business Process Mapping](https://www.wikipedia.org/wiki/Business_Process_Mapping)
48 | * [Cause & effects diagram (also known as fishbone or [Ishikawa diagram](https://www.wikipedia.org/wiki/Ishikawa_diagram))
49 | * [Run chart](https://www.wikipedia.org/wiki/Run_chart)
50 | * [Control chart](https://www.wikipedia.org/wiki/Control_chart) a.k.a. control plan, swimlane map)
51 | * [Cost-benefit analysis](https://www.wikipedia.org/wiki/Cost-benefit_analysis)
52 | * [CTQ tree](https://www.wikipedia.org/wiki/CTQ_tree)
53 | * [Stratified sampling](https://www.wikipedia.org/wiki/Stratified_sampling)
54 | * [Design of experiments](https://www.wikipedia.org/wiki/Design_of_experiments)
55 | * [Pareto_analysis](https://www.wikipedia.org/wiki/Pareto_analysis)
56 | * [Pareto chart](https://www.wikipedia.org/wiki/Pareto_chart)
57 | * [Histogram](https://www.wikipedia.org/wiki/Histogram)
58 | * [Process capability](https://www.wikipedia.org/wiki/Process_capability)
59 | * [Rolled throughput yield](https://www.wikipedia.org/wiki/Rolled_throughput_yield)
60 | * [Pick chart](https://www.wikipedia.org/wiki/Pick_chart)
61 | * [Quality Function Deployment](https://www.wikipedia.org/wiki/Quality_Function_Deployment) (QFD)
62 | * [Enterprise Feedback Management](https://www.wikipedia.org/wiki/Enterprise_Feedback_Management) (EFM)
63 | * [Quantitative marketing research](https://www.wikipedia.org/wiki/Quantitative_marketing_research)
64 | * [Root cause analysis](https://www.wikipedia.org/wiki/Root_cause_analysis)
65 | * [SIPOC](https://www.wikipedia.org/wiki/SIPOC) analysis (Suppliers, Inputs, Process, Outputs, Customers)
66 | * [COPIS](https://www.wikipedia.org/wiki/COPIS" class="mw-redirect) analysis (Customer centric version/perspective of SIPOC)
67 | * [Taguchi Loss Function](https://www.wikipedia.org/wiki/Taguchi_Loss_Function)
68 | * [Taguchi methods](https://www.wikipedia.org/wiki/Taguchi_methods)
69 | * [Value stream mapping](https://www.wikipedia.org/wiki/Value_stream_mapping)
70 |
71 | ## Statistical and fitting tools
72 |
73 | * [Analysis of variance](https://www.wikipedia.org/wiki/Analysis_of_variance)
74 | * [General linear model](https://www.wikipedia.org/wiki/General_linear_model)
75 | * [ANOVA Gauge R&R](https://www.wikipedia.org/wiki/ANOVA_Gauge_R%26R" class="mw-redirect)
76 | * [Regression analysis](https://www.wikipedia.org/wiki/Regression_analysis)
77 | * [Correlation](https://www.wikipedia.org/wiki/Correlation" class="mw-redirect)
78 | * [Scatter diagram](https://www.wikipedia.org/wiki/Scatter_diagram" class="mw-redirect)
79 | * [Chi-squared test](https://www.wikipedia.org/wiki/Chi-squared_test)
80 |
81 |
--------------------------------------------------------------------------------
/doc/software-cloud-hosting-models/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-cloud-hosting-models/index.md:
--------------------------------------------------------------------------------
1 | # Software Cloud Hosting Models
2 |
3 | * [cloud computing](https://en.wikipedia.org/wiki/Cloud_computing)
4 | * [private cloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated solely for a single organization.
5 | * [public cloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated on a public network for any organization.
6 | * [hybrid cloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated in multiple ways (public, private, community, etc.)
7 | * [community cloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated in shared infrastructure among organizations with common concerns (e.g. security, compliance, jurisdiction, etc.).
8 | * [volunteer cloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated using the intersection of public-resource computing and cloud computing.
9 | * [public-resource computing](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): cloud infrastructure operated using typically donated/nonprofit networks.
10 | * [intercloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): an interconnected "cloud of clouds".
11 | * [multicloud](https://en.wikipedia.org/wiki/Cloud_computing#Deployment_models): the use of multiple cloud computing services in a single heterogeneous architecture.
12 |
--------------------------------------------------------------------------------
/doc/software-companies-products-services/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-concepts/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-design-patterns/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-design-patterns/index.md:
--------------------------------------------------------------------------------
1 | # Software design patterns
2 |
3 | * [Abstract factory](https://wikipedia.org/wiki/Abstract_factory_pattern): Provide an interface for creating families of related or dependent objects.
4 | * [Abstraction principle](https://wikipedia.org/wiki/Abstraction_principle_(programming))
5 | * [Active object](https://wikipedia.org/wiki/Active_object): Decouple method execution from method invocation that reside in their own thread of control.
6 | * [Active record](https://wikipedia.org/wiki/Active_record_pattern)
7 | * [Adapter](https://wikipedia.org/wiki/Adapter_pattern): Convert the interface of a class into another interface clients expect.
8 | * [Aggregate](https://wikipedia.org/wiki/Aggregate_pattern) object sequentially without exposing its underlying representation.
9 | * [Algorithmic skeleton](https://wikipedia.org/wiki/Algorithmic_skeleton)
10 | * [Anti-pattern](https://wikipedia.org/wiki/Anti-pattern)
11 | * [Architectural pattern](https://wikipedia.org/wiki/Architectural_pattern_(computer_science))
12 | * [Artificial intelligence](https://wikipedia.org/wiki/Artificial_intelligence)
13 | * [Balking](https://wikipedia.org/wiki/Balking_pattern): Only execute an action on an object when the object is in a particular state.
14 | * [Binding properties](https://wikipedia.org/wiki/Binding_properties_pattern): Combine multiple observers to force properties in different objects to be coordinated.
15 | * [Blackboard](https://wikipedia.org/wiki/Blackboard_design_pattern): Artificial intelligence pattern for combining disparate sources of data.
16 | * [Blockchain](https://wikipedia.org/wiki/Blockchain_(database)): Decentralize storage of data and agree on ways of processing it.
17 | * [Bridge](https://wikipedia.org/wiki/Bridge_pattern): Decouple an abstraction from its implementation allowing the two to vary independently.
18 | * [Builder](https://wikipedia.org/wiki/Builder_pattern): Separate the construction of a complex object from its representation.
19 | * [Business delegate](https://wikipedia.org/wiki/Business_delegate_pattern)
20 | * [Cache access patterns](TODO)
21 | * [Chain of responsibility](https://wikipedia.org/wiki/Chain_of_responsibility_pattern): Chain event-receiving objects in order to pass a request along the chain until an object handles it.
22 | * [Circuit-breaker](TODO)
23 | * [Command](https://wikipedia.org/wiki/Command_pattern): Encapsulate a request as an object.
24 | * [Composite entity](https://wikipedia.org/wiki/Composite_entity_pattern): Compose objects into tree structures to represent part-whole hierarchies.
25 | * [Composite](https://wikipedia.org/wiki/Composite_pattern)
26 | * [Concurrency pattern](https://wikipedia.org/wiki/Concurrency_pattern)
27 | * [Creational pattern](https://wikipedia.org/wiki/Creational_pattern)
28 | * [Data access object](https://wikipedia.org/wiki/Data_access_object)
29 | * [Data transfer object](https://wikipedia.org/wiki/Data_transfer_object)
30 | * [Debugging patterns](https://wikipedia.org/wiki/Debugging_patterns)
31 | * [Decorator](https://wikipedia.org/wiki/Decorator_pattern): Attach additional responsibilities to an object dynamically keeping the same interface.
32 | * [Dependency injection](https://wikipedia.org/wiki/Dependency_injection)
33 | * [Design pattern](https://wikipedia.org/wiki/Design_pattern)
34 | * [Distributed design patterns](https://wikipedia.org/wiki/Distributed_design_patterns)
35 | * [Double-chance function](https://wikipedia.org/wiki/Double-chance_function)
36 | * [Double-checked locking](https://wikipedia.org/wiki/Double-checked_locking): Reduce the overhead of acquiring a lock by first testing the locking criterion.
37 | * [EDA: Event-driven architecture a.ka. message-driven architecture (MDA)](https://en.wikipedia.org/wiki/Event-driven_architecture)
38 | * [Enterprise Architecture framework](https://wikipedia.org/wiki/Enterprise_Architecture_framework)
39 | * [Event-based asynchronous](https://wikipedia.org/wiki/Asynchronous_method_invocation): Address problems with asynchronous patterns that occur in multithreaded programs.
40 | * [Extension object](TODO): Add functionality to a hierarchy without changing the hierarchy.
41 | * [Facade](https://wikipedia.org/wiki/Facade_pattern): Provide a unified interface to a set of interfaces in a subsystem.
42 | * [Factory method](https://wikipedia.org/wiki/Factory_method_pattern): Define an interface to create an object, but let subclasses decide which class to instantiate.
43 | * [Fault tolerance access patterns](TODO)
44 | * [Flyweight](https://wikipedia.org/wiki/Flyweight_pattern): Use sharing to support large numbers of similar objects efficiently.
45 | * [Front controller](https://wikipedia.org/wiki/Front_controller): Provide a centralized entry point for handling requests.
46 | * [General Responsibility Assignment Software Patterns (GRASP)](https://wikipedia.org/wiki/GRASP_(object-oriented_design))
47 | * [GRASP (object-oriented design)](https://wikipedia.org/wiki/GRASP_(object-oriented_design))
48 | * [Guarded suspension](https://wikipedia.org/wiki/Guarded_suspension): Manage operations that first require both a lock and a precondition.
49 | * [Helper class](https://wikipedia.org/wiki/Helper_class)
50 | * [Identity map](https://wikipedia.org/wiki/Identity_map_pattern)
51 | * [Interaction design pattern](https://wikipedia.org/wiki/Interaction_design_pattern)
52 | * [Intercepting filter](https://wikipedia.org/wiki/Intercepting_filter_pattern)
53 | * [Interceptor](https://wikipedia.org/wiki/Interceptor_pattern)
54 | * [Interpreter](https://wikipedia.org/wiki/Interpreter_pattern): Represent a language's grammar and how to interpret sentences.
55 | * [Inversion of control](https://wikipedia.org/wiki/Inversion_of_control)
56 | * [Iterator](https://wikipedia.org/wiki/Iterator_pattern): Provide a way to access the elements of an aggregate object sequentially.
57 | * [Join](https://wikipedia.org/wiki/Join-pattern): Provide a way to write concurrent, parallel and distributed programs by message passing.
58 | * [Lazy initialization](https://wikipedia.org/wiki/Lazy_initialization): Tactic of delaying the creation of an object, the calculation of a value, or some other expensive process until the first time it is needed.
59 | * [Lazy loading](https://wikipedia.org/wiki/Lazy_loading)
60 | * [Lock](https://wikipedia.org/wiki/Lock_pattern): Put a "lock" on a resource, preventing other objects from accessing or modifying it.
61 | * [Marker](https://wikipedia.org/wiki/Marker_interface_pattern): Empty interface to associate metadata with a class.
62 | * [Mediator](https://wikipedia.org/wiki/Mediator_pattern): Promote loose coupling by keeping objects from referring to each other explicitly.
63 | * [Memento](https://wikipedia.org/wiki/Memento_pattern): Capture and externalize an object's internal state, enabling the object to be restored to this state later.
64 | * [Messaging design pattern (MDP)](https://wikipedia.org/wiki/Messaging_pattern): Enable interchange of information (i.e. messages) between components.
65 | * [Mock object](https://wikipedia.org/wiki/Mock_object)
66 | * [Module](https://wikipedia.org/wiki/Module_pattern): Group related elements, such as classes and methods, into a single conceptual entity.
67 | * [Monitor](https://wikipedia.org/wiki/Monitor_(synchronization)): An object whose methods are subject to mutual exclusion, thus preventing multiple objects from erroneously trying to use it at the same time.
68 | * [Multi-tier architecture a.k.a. n-tier architecture](https://wikipedia.org/wiki/Multitier_architecture)
69 | * [Multiton](https://wikipedia.org/wiki/Multiton_pattern): Ensure a class has only named instances, and provide a global point of access to them.
70 | * [MVC: Model-View-Controller](https://wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller)
71 | * [Naked objects](https://wikipedia.org/wiki/Naked_objects)
72 | * [Null object](https://wikipedia.org/wiki/Null_object_pattern): Provide a default object, so as to avoid null references.
73 | * [Object pool](https://wikipedia.org/wiki/Object_pool_pattern): Avoid expensive acquisition and release of resources by recycling objects that are no longer in use.
74 | * [Observer](https://wikipedia.org/wiki/Observer_pattern): Define how a state change in one object results in dependents being notified and updated.
75 | * [Pattern language](https://wikipedia.org/wiki/Pattern_language)
76 | * [Pattern theory](https://wikipedia.org/wiki/Pattern_theory)
77 | * [Pedagogical patterns](https://wikipedia.org/wiki/Pedagogical_patterns)
78 | * [Portland Pattern Repository](https://wikipedia.org/wiki/Portland_Pattern_Repository)
79 | * [Proactor](https://wikipedia.org/wiki/Proactor_pattern)
80 | * [Prototype](https://wikipedia.org/wiki/Prototype_pattern): Create new objects from the skeleton of an existing object.
81 | * [Proxy](https://wikipedia.org/wiki/Proxy_pattern): Provide a surrogate or placeholder for another object to control access to it.
82 | * [Publish–subscribe a.k.a. pubsub](https://wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern): Define a one-to-many dependency between objects where a state change in one object results in all its dependents being notified and updated automatically.
83 | * [Reactor](https://wikipedia.org/wiki/Reactor_pattern): Provide an asynchronous interface to resources that must be handled synchronously.
84 | * [Read-write lock](https://wikipedia.org/wiki/Read/write_lock_pattern): Allows concurrent read access to an object, but requires exclusive access for write operations.
85 | * [Refactoring](https://wikipedia.org/wiki/Refactoring)
86 | * [Resource acquisition is initialization](https://wikipedia.org/wiki/Resource_Acquisition_Is_Initialization): Ensure resources are released by tying them to the lifespan of objects.
87 | * [Scheduler](https://wikipedia.org/wiki/Scheduler_pattern): Explicitly control when threads may execute single-threaded code.
88 | * [Servant](https://wikipedia.org/wiki/Servant_(design_pattern)): Define common functionality for a group of classes.
89 | * [Service locator](https://wikipedia.org/wiki/Service_locator_pattern)
90 | * [Service to service access patterns](TODO)
91 | * [Singleton](https://wikipedia.org/wiki/Singleton_pattern): Ensure a class has only one instance, and provide a global point of access to it.
92 | * [SOA: Service-oriented architecture](https://en.wikipedia.org/wiki/Service-oriented_architecture)
93 | * [Software design pattern](https://wikipedia.org/wiki/Software_design_pattern)
94 | * [Software development methodology](https://wikipedia.org/wiki/Software_development_methodology)
95 | * [Specification](https://wikipedia.org/wiki/Specification_pattern): Recombinable business logic in a Boolean fashion.
96 | * [State](https://wikipedia.org/wiki/State_pattern): Allow an object to alter its behavior when its internal state changes.
97 | * [Strategy](https://wikipedia.org/wiki/Strategy_pattern): Define a family of algorithms, encapsulate each one, and make them interchangeable.
98 | * [Structural pattern](https://wikipedia.org/wiki/Structural_pattern)
99 | * [Template method](https://wikipedia.org/wiki/Template_method_pattern): Define the skeleton of an algorithm in an operation, deferring some steps to subclasses.
100 | * [Thread pool](https://wikipedia.org/wiki/Thread_pool_pattern): A number of threads are created to perform a number of tasks.
101 | * [Thread-local storage](https://wikipedia.org/wiki/Thread-local_storage)
102 | * [Thread-specific storage](https://wikipedia.org/wiki/Thread-Specific_Storage): Static or "global" memory local to a thread.
103 | * [Twin](https://wikipedia.org/wiki/Twin_pattern): Model multiple inheritance in programming languages that do not support this feature.
104 | * [Type tunnel](https://wikipedia.org/wiki/Type_Tunnel_pattern)
105 | * [Visitor](https://wikipedia.org/wiki/Visitor_pattern): Represent an operation to be performed on the elements of an object structure.
106 |
--------------------------------------------------------------------------------
/doc/software-engineering-by-iqbba/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-for-apple-macos-ios-watchos/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-for-apple-macos-ios-watchos/index.md:
--------------------------------------------------------------------------------
1 | # Software for Apple macOS, iOS, watchOS
2 |
3 | * [bropages](http://bropages.org/): concise examples of using command line programs.
4 | * [BetterSnapTool](https://www.boastr.net/bettersnaptool/): enables you to easily manage your window positions and sizes
5 | * [BetterTouchTool](https://www.boastr.net/): configure actions for your mouse, trackpad, and keyboard.
6 | * [Burp Suite](https://portswigger.net/burp/): toolkit for web application security testing.
7 | * [Charles](https://www.charlesproxy.com/): enables a developer to view HTTP traffic between their machine and the internet.
8 | * [Disk Inventory X](http://www.derlien.com/): disk usage utility for Mac that shows sizes of files and folders in a treemap.
9 | * [Fugu](https://en.wikipedia.org/wiki/Fugu_(software)): a graphical shell for SSH and FTP.
10 | * [Homebrew](https://en.wikipedia.org/wiki/Homebrew_(package_management_software)) package management software for Mac.
11 | * [iWork](https://en.wikipedia.org/wiki/IWork) Apple iWork office suite, including Numbers, Pages, Keynote.
12 | * [Jazzy](https://github.com/realm/jazzy): generates documentation for Swift or Objective-C.
13 | * [LaTeX](https://www.latex-project.org/): document preparation system with high-quality typesetting.
14 | * [OmniGraffle](https://en.wikipedia.org/wiki/OmniGraffle): diagramming and digital illustration application.
15 | * [Pandoc](http://pandoc.org/): convert files from one markup format into another.
16 | * [Paw](https://paw.cloud/): HTTP API testing tool.
17 | * [Pixelmator](http://www.pixelmator.com/mac/): full-featured image editor for Mac.
18 | * [Shuttle](http://fitztrev.github.io/shuttle/): simple SSH shortcut menu for Mac.
19 | * [SourceTree](https://www.sourcetreeapp.com/)graphical client for Mercurial and Git version control.
20 | * [The Unarchiver](http://wakaba.c3.cx/s/apps/unarchiver.html): archive unpacker program for Mac.
21 | * [Xmind](https://en.wikipedia.org/wiki/XMind): mind mapping and brainstorming software.
22 |
--------------------------------------------------------------------------------
/doc/software-testing/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-testing/index.md:
--------------------------------------------------------------------------------
1 | # Software testing wordbook
2 |
3 | * [acceptance testing](https://wikipedia.org/wiki/Acceptance_testing)
4 | * [ad hoc testing](https://en.wikipedia.org/wiki/Ad_hoc_testing)
5 | * [BDD: behavior-driven development](https://wikipedia.org/wiki/Behavior-driven_development) (cf. EDD, FDD, TDD)
6 | * [black-box testing](https://en.wikipedia.org/wiki/Black-box_testing)
7 | * [boundary testing](https://en.wikipedia.org/wiki/Boundary_testing)
8 | * [code coverage](https://en.wikipedia.org/wiki/Code_coverage): the degree to which the source code of a program is executed when a particular test suite runs.
9 | * [compatibility testing](https://en.wikipedia.org/wiki/Compatibility_testing)
10 | * [contract testing](TODO)
11 | * [dynamic testing](https://en.wikipedia.org/wiki/Dynamic_testing) (compare static testing)
12 | * [EDD: experiment-driven development](https://wikipedia.org/wiki/Test-driven_development) (cf. BDD, FDD, HDD, TDD)
13 | * [FAT: factory acceptance testing](TODO)
14 | * [FDD: feature-driven development](https://wikipedia.org/wiki/Feature-driven_development) (cf. BDD, EDD, TDD)
15 | * [functional testing](https://wikipedia.org/wiki/Functional_testing)
16 | * [fuzz testing](https://en.wikipedia.org/wiki/Fuzz_testing)
17 | * [HDD: hypothesis-driven development](https://wikipedia.org/wiki/Test-driven_development) (cf. BDD, EDD, FDD, TDD)
18 | * [graphical user interface testing](https://en.wikipedia.org/wiki/Graphical_user_interface_testing)
19 | * [gray-box testing](https://en.wikipedia.org/wiki/Gray_box_testing)
20 | * [installation testing](https://en.wikipedia.org/wiki/Installation_testing)
21 | * [integration testing](https://wikipedia.org/wiki/Integration_testing)
22 | * [load testing](https://en.wikipedia.org/wiki/Load_testing)
23 | * [maintenance testing](https://en.wikipedia.org/wiki/Maintenance_testing)
24 | * [OAT: operational acceptance testing](https://en.wikipedia.org/wiki/Operational_acceptance_testing)
25 | * [performance testing](https://en.wikipedia.org/wiki/Software_performance_testing)
26 | * [recovery testing](https://en.wikipedia.org/wiki/Recovery_testing)
27 | * [regression testing](https://en.wikipedia.org/wiki/Regression_testing)
28 | * [regulation acceptance testing](TODO)
29 | * [sanity testing](https://en.wikipedia.org/wiki/Sanity_testing)
30 | * [security testing](https://en.wikipedia.org/wiki/Security_testing)
31 | * [scalability testing](https://en.wikipedia.org/wiki/Scalability_testing)
32 | * [shift-left testing](https://en.wikipedia.org/wiki/Shift_left_testing)
33 | * [shift-right testing](https://en.wikipedia.org/wiki/Shift_right_testing)
34 | * [smoke testing](https://en.wikipedia.org/wiki/Smoke_testing_(software))
35 | * [software testing](https://en.wikipedia.org/wiki/Software_testing)
36 | * [static testing](https://en.wikipedia.org/wiki/Static_program_analysis) (compare dynamic testing)
37 | * [stress testing](https://en.wikipedia.org/wiki/Stress_testing)
38 | * [system testing](https://en.wikipedia.org/wiki/System_testing)
39 | * [TDD: test-driven development](https://wikipedia.org/wiki/Test-driven_development) (cf. BDD, EDD, FDD, HDD)
40 | * [test automation](https://en.wikipedia.org/wiki/Test_automation)
41 | * [test harness](https://en.wikipedia.org/wiki/Test_harness)
42 | * [test pyramid a.k.a. test triangle](http://martinfowler.com/bliki/TestPyramid.html)
43 | * [UAT: user acceptance test](TOD)
44 | * [unit testing](https://wikipedia.org/wiki/Unit_testing)
45 | * [usability testing](https://en.wikipedia.org/wiki/Usability_testing)
46 | * [white-box testing](https://en.wikipedia.org/wiki/White-box_testing) (also known as clear box testing, glass box testing, transparent box testing, and structural testing)
47 |
--------------------------------------------------------------------------------
/doc/software-web-frameworks/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/software-web-frameworks/index.md:
--------------------------------------------------------------------------------
1 | # Software web frameworks
2 |
3 | * [Catalyst](https://wikipedia.org/wiki/Catalyst_(software)) for [Perl](https://wikipedia.org/wiki/Perl_(programming_language))
4 | * [Django](https://wikipedia.org/wiki/Django_(web_framework)) for [Python](https://wikipedia.org/wiki/Python_(programming_language))
5 | * [Laravel](https://wikipedia.org/wiki/Laravel) for [PHP](https://wikipedia.org/wiki/Php)
6 | * [Lift](https://wikipedia.org/wiki/Lift_(web_framework)) for [Scala](https://wikipedia.org/wiki/Scala_(programming_language))
7 | * [Phoenix](https://www.phoenixframework.org/) for [Elixir](https://wikipedia.org/wiki/Elixir_(programming_language))
8 | * [Ruby on Rails](https://wikipedia.org/wiki/Ruby_on_Rails) for [Ruby](https://wikipedia.org/wiki/Ruby_(programming_language))
9 | * [Spring](https://wikipedia.org/wiki/Spring_Framework) for [Java](https://wikipedia.org/wiki/Java_(programming_language))
10 | * [Iron](TODO) for [Rust](https://wikipedia.org/wiki/Rust_(programming_language))
11 |
--------------------------------------------------------------------------------
/doc/startups/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/startups/index.md:
--------------------------------------------------------------------------------
1 | # Startups
2 |
3 | Acquisition/Acquire
4 | See Exit
5 |
6 | Agile
7 | This isn’t about the athletic prowess of founders. Agile is an iterative method of establishing clear organizational tasks and requirements, continuously developing solutions, and making decisions quickly. Teams break up each of these factors into small digestible pieces, to keep the momentum going.
8 |
9 | B2B2C
10 | A mutually beneficial eCommerce business model where a company teams up with their business client, to then sell jointly to an end customer, controlling more of the transaction and increasing their visibility. Amazon is the most well-known example of this in the way that they receive product form manufacturers, to ship to the consumer, but may also be selling you product directly
11 |
12 | Blind or Anonymous Applications
13 | A process that removes identifying information (name, gender, company name, etc.) from the application in order to reduce bias. If there is little to no identifying information on a candidate or applicant, we make decisions that are free of bias and naturally result in diverse cohorts. We employ this method in our Launch Lane and Digital Health accelerators. TL:DR? It works.
14 |
15 | Burn rate/runway
16 | In its simplest form, how quickly your business is spending money that is already available. A high burn rate means you are spending cash quickly (burning through money quickly). And the runway is how much time you have before you burn through it all. There’s a fancy calculation for this, but make sure you are using your net burn rate to figure it out.
17 |
18 | Business Advisor
19 | Business Advisors provide guidance to companies (in our case, startups) in a variety of capacities. Business advisors might be investors, serial entrepreneurs, or seasoned experts in a specific field. The common theme is that they know a whole lot and can be hugely valuable to your early-stage company. If you are reading this, chances are you are not one (yet). Know someone who fits this description and wants to help others? Have them check us out!
20 | C
21 |
22 | Churn rate
23 | Now that you’ve familiarized yourself with burn rate, there’s a fancy calculation for this one too. Churn is the rate of customer attrition. Still too jargon-y? The rate at which a customer stops doing business with you, or the opposite of retention rate.
24 |
25 | Commercialization
26 | The process by which products or services are brought to the market. For example, the process by which mRNA research transitioned into a publicly available COVID-19 vaccine. We have an entire suite of programs to help companies and entrepreneurs along different stages of their journey and many of our convening and cultivation initiatives center around this key focus.
27 |
28 | Customer discovery
29 | Customer discovery doesn’t mean looking for customers, but rather identifying who the right customer is for your product while simultaneously finetuning your offering to suit their needs. At this stage you are testing assumptions and hypotheses to validate the customer you’ve identified and their “problem” or need.
30 |
31 | Product/market fit
32 | If you’ve done the work of customer discovery you may end up determining there is a big enough market or demand for your product or service. Or, you could end up deciding your idea or product is not worth pursuing further.
33 |
34 | E
35 |
36 | Ecosystem
37 | An ecosystem is an interconnected environment with diverse players and systems that support each other. We often define it by region, and we could frankly write a whole blog post just on this. As a first step, take a look at our ecosystem for a better idea of the resources we provide.
38 |
39 | Exit
40 | An exit is where founders have the opportunity to liquidate or reduce their stake or ownership in their business.
41 |
42 | Acquisition/Acquire
43 | A bigger fish comes along and offers to buy up most (more than 50%) or all of the company. At this point, they begin to call the shots and make the decisions.
44 | Acquihire
45 | When a company is acquired for its talent, skills or people.
46 | IPO or “Going Public”
47 | “Going Public” is when a privately held company (which startups typically are) becomes a publicly traded and owned entity, enabling it to gain cheaper access to capital, expand operations and diversify ownership. The IPO is the “Initial Public Offering” or the initial selling price for shares. The IPO gets the ball rolling on the whole process.
48 | Joint Venture
49 | Two separate companies join together to run or operate an already existing company or business.
50 | Merger
51 | Two companies mutually combine and blend, to create a new entity that benefits both parties.
52 | SPAC
53 | When a public "blank check" or shell company acquires a private company to take it public. It's a particular type of IPO that involves buying a company that's already listed but doesn't have an on-going business. It's technical, it's jargon-y, it's legal.
54 |
55 | Corporate VC (CVC)
56 | This investment is coming from within a corporation, and it could also include industry insights and connections. Beyond equity, the CVCs may be looking for a collaboration agreement or they may see your company as an acquisition target. Local examples includes Comcast Ventures, originally run by Julian Brodsky, Comcast’s co-founder and Touchdown Ventures, which runs outsourced CVCs for corporations, founded by Comcast Ventures alumni, David Horowitz.
57 |
58 | Follow-on funding
59 | A repeat investment from a funder who previously provided capital, now at a later stage in the business. For example, startups participating in the Science Center’s Commercialization programs raised over $43 million in follow-on funding in 2020.
60 |
61 | Pre/Post money valuation
62 | The value of a company before external investments or the latest round of funding/ the value of company after external investments or the latest round of funding.
63 |
64 | Priced Round
65 | This is an investment where the valuation of the company is determined as a negotiation between the company and the investor, and includes a price-per-share so it's clear how much of the company everyone owns.
66 |
67 | SAFE Note
68 | A non-debt convertible security. The “non-debt” part sounds safe, but let’s break that down even further. It will eventually convert into equity or something of value, in a future investment round (see Series A, B, C, D…below). Even simpler still: an investor is betting on the future potential of the company. SAFE notes exists as one option in a range of options between debt and a publicly traded stock price.
69 | Seed Funding
70 | The first official round of startup funding or equity funding (selling shares or ownership). Investors are involved here.
71 | Series A Funding
72 | The second stage of startup funding, but the first stage of venture capital financing. This comes before the B funding round.
73 | Series B Funding
74 | The second stage of venture capital financing. It sometimes features many of the same investors from the previous round, Series A, but may bring in additional prospects.
75 | Series C, D, etc.
76 | By the time a company reaches Series C funding, they may want to expand into another market (internationally, for example) or may be preparing themselves to go public or for an acquisition (i.e. an exit). For most companies, this is the final phase of funding.
77 | Venture Capitalists or VCs
78 | Private investors or investment firms that use money from pension plans, insurance companies, and wealthy people to place bets (capital) in exchange for equity in companies they believe have lots of growth potential, usually of (planned) unicorn proportions. Locally, the best example is none-other than First Round Capital, founded by Wharton alum, Josh Kopelman, and they have a pretty good sense of humor.
79 |
80 | In-kind support
81 | Free support-- whether it’s space, equipment, human resources, creative skills, or professional services. For example, a university may donate lab space to a startup company as an in-kind donation.
82 |
83 | Iteration
84 | See Prototype
85 |
86 | IPO or “Going Public”
87 | See Exit
88 | J
89 |
90 | Joint Venture
91 | See Exit
92 | K
93 |
94 | Licensing
95 | A business arrangement where a company sells the right to use their IP to another company to use its brand (trademark), copyrights, or a specific technology, usually patented or protected by trade secrets. These agreements are commonly used to pull technology out of TTO’s (see below).
96 |
97 | LEAN
98 | A strategy or methodology that focuses on creating the most value, using the least resources possible.
99 | M
100 |
101 | Merger
102 | See Exit
103 |
104 | MVP (Minimum Viable Product)
105 | Sorry there are no trophies for this MVP. An MVP is a stripped-down version of the prototype with just the essential features and no bells and whistles. This allows the developers to save time while they validate a product idea and gather feedback on what to improve.
106 | N
107 |
108 | Non-technical founders
109 | Like the name implies, you founded a tech or tech-enabled company, but do not code or build hardware. Maybe you’ve designed the business model, are leading first sales, or are overseeing operations. Non-technical founders might have a technical cofounder and will surround themselves with good tech talent to focus on the nitty gritty.
110 |
111 | P
112 |
113 | Pitch
114 | How you present and sell your idea or product to investors. A good accelerator or business advisor will help you perfect this tirelessly, making sure you have a solid business plan to back it up. It is a choreographed performance. Check out our Startup Roundtable every Thursday at Venture Café Philadelphia to give you some guidance. It’s free and all are welcome!
115 |
116 | Elevator pitch
117 | A much shorter, condensed version of your regular pitch that you could effectively give to an investor during a short elevator ride. Keeping it simple is key here. At Venture Café Philadelphia, we once had attendees literally try this out, with investors from Robin Hood Ventures. In better forms, it will likely answer (nicely) “What do you do and why should we care?”
118 |
119 | Pre/Post money valuation
120 | See Funding & Funders
121 |
122 | Product/market fit
123 | See Customer discovery
124 |
125 | Proof-of-concept
126 | Evidence that demonstrates the feasibility of your concept. Our QED Proof-of-Concept program helps bridge the gap between proof-of-concept and an effective business plan. It’s also what occurs when your MVP is validated.
127 |
128 | Prototype
129 | An early model of your product, built to test the concept. There are various types of prototypes, depending on what you are trying to test.
130 |
131 | Iteration
132 | The process of repetition to continuously improve. You’re going to continue testing and improving on your prototype, each time creating a different version. That will take time…and also funding.
133 |
134 |
135 | R&D Tax Credit
136 | A federal income tax liability offset, used to stimulate startups and companies’ spending on research and development.
137 |
138 | Revenue
139 | The income generated by a company, usually through pilots, sales, or corporate partnerships. This does not include investments. A good rule of thumb is to aim to have as much of this as possible.
140 | S
141 |
142 | Scaling
143 | This is the point where a company’s revenue is outpacing its costs substantially. At this stage, real growth can begin to happen because automating and ramping up production becomes more affordable. Our Launch Lane accelerator focuses on startups looking to reach this juncture.
144 |
145 | Seed Funding
146 | See Funding & Funders
147 |
148 | Series A, B, C... Funding
149 | See Funding & Funders
150 |
151 | Sweat equity
152 | You need to raise capital, but you want to minimize the amount of debt you are saddled with. Founders and other employees contribute “sweat equity” (read blood, sweat and tears) as a share of the company with a monetary value, paid in equity in the company. Believe it or not, there is a way to calculate this.
153 | T
154 |
155 | Tech-enabled
156 | These companies are not the same as “tech companies” because the product or service is powered by another already existing platform or technology (i.e. the internet). Companies that don’t create new technology, but leverage existing technology to provide a platform or service. Our Launch Lane accelerator is dedicated to growing tech and tech-enabled startups.
157 |
158 | Technical Founder
159 | This type of founder is building the product whereas non-technical founderstypically focus on business models, financial models, early sales, or overseeing operations.
160 |
161 | The Valley of Death
162 | The large gap in funding for early-stage startups or research. This is problematic for many startups and makes it challenging for success at an early stage-- it can deprive society of a potentially lifesaving or life changing innovation.
163 |
164 | Value proposition
165 | You want customers and investors to show you the money. You’re gonna have to explain why they should choose your product. What’s special or different about you? This is your value prop.
166 |
167 | Venture Capital or VCs
168 | See Funding & Funders
--------------------------------------------------------------------------------
/doc/statistics/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/statistics/index.md:
--------------------------------------------------------------------------------
1 | # Statistics
2 |
3 | To do:
4 |
5 | * https://en.wikipedia.org/wiki/False_positives_and_false_negatives
6 |
7 | * https://en.wikipedia.org/wiki/False_positive_rate
8 |
9 | * https://en.wikipedia.org/wiki/Multiple_comparisons_problem
10 |
11 | * https://en.wikipedia.org/wiki/Look-elsewhere_effect
12 |
13 | * https://en.wikipedia.org/wiki/Statistical_inference
14 |
15 | * https://en.wikipedia.org/wiki/Descriptive_statistics
16 |
17 | * https://en.wikipedia.org/wiki/Sample_(statistics)
18 |
19 | * https://en.wikipedia.org/wiki/Statistical_unit
20 |
21 | * https://en.wikipedia.org/wiki/Quantitative_research
22 |
23 | * https://en.wikipedia.org/wiki/Census
24 |
25 | * https://en.wikipedia.org/wiki/Enumeration
26 |
27 | * https://en.wikipedia.org/wiki/Subset
28 |
29 | * https://en.wikipedia.org/wiki/Inference
30 |
31 | * https://en.wikipedia.org/wiki/Extrapolation
32 |
33 | * https://en.wikipedia.org/wiki/Sample_size_determination
34 |
35 | * https://en.wikipedia.org/wiki/Comorbidity
36 |
37 | * https://en.wikipedia.org/wiki/Average
38 |
39 | * https://en.wikipedia.org/wiki/Standard_deviation
40 |
41 | * https://en.wikipedia.org/wiki/Variance
42 |
43 | * https://en.wikipedia.org/wiki/Kurtosis
44 |
45 | * https://en.wikipedia.org/wiki/Skewness
46 |
47 | * https://en.wikipedia.org/wiki/Sampling_(statistics)
48 |
49 | * https://en.wikipedia.org/wiki/Probability_distribution
50 |
51 | * https://en.wikipedia.org/wiki/Confidence_interval
52 |
53 | * https://en.wikipedia.org/wiki/Null_hypothesis
54 |
55 | * https://en.wikipedia.org/wiki/Cluster_analysis
56 |
57 | * https://en.wikipedia.org/wiki/Statistical_classification
58 |
59 | * https://en.wikipedia.org/wiki/Regression_analysis
60 |
61 | * https://en.wikipedia.org/wiki/Automatic_summarization
62 |
63 | * https://en.wikipedia.org/wiki/Data_visualization
64 |
65 | * https://en.wikipedia.org/wiki/Online_algorithm
66 |
67 | * https://en.wikipedia.org/wiki/Computational_complexity_theory
68 |
69 | * https://en.wikipedia.org/wiki/Machine_learning
70 |
71 | * https://en.wikipedia.org/wiki/Artificial_intelligence
72 |
73 | * https://en.wikipedia.org/wiki/Data_mining
74 |
--------------------------------------------------------------------------------
/doc/technical-debt-causes/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/technical-debt-causes/index.md:
--------------------------------------------------------------------------------
1 | # Software technical debt causes
2 |
3 | * Business pressures: where the business considers getting something released sooner before all of the necessary changes are complete, builds up technical debt comprising those uncompleted changes.
4 | * Lack of process or understanding: where businesses are blind to the concept of technical debt, and make decisions without considering the implications.
5 | * Lack of building loosely coupled components: where functions are not modular, the software is not flexible enough to adapt to changes in business needs.
6 | * Lack of a test suite: which encourages quick and risky band-aids to fix bugs.
7 | * Lack of documentation: where code is created without necessary supporting documentation. That work to create the supporting documentation represents a debt that must be paid.
8 | * Lack of collaboration: where knowledge isn't shared around the organization and business efficiency suffers, or junior developers are not properly mentored.
9 | * Parallel development: at the same time on two or more branches can cause the buildup of technical debt because of the work that will eventually be required to merge the changes into a single source base. The more changes that are done in isolation, the more debt that is piled up.
10 | * Delayed refactoring: as the requirements for a project evolve, it may become clear that parts of the code have become unwieldy and must be refactored in order to support future requirements. The longer that refactoring is delayed, and the more code is written to use the current form, the more debt that piles up that must be paid at the time the refactoring is finally done.
11 | * Lack of alignment to standards: where industry standard features, frameworks, technologies are ignored. Eventually, integration with standards will come, doing sooner will cost less (similar to 'delayed refactoring').
12 | * Lack of knowledge: when the developer simply doesn't know how to write elegant code.
13 | * Lack of ownership: when outsourced software efforts result in in-house engineering being required to refactor or rewrite outsourced code.
14 | * Poor technological leadership: where poorly thought out commands handed down the chain of command increases the technical debt rather than reduce it
15 | * Last minute specification changes: these have potential to percolate throughout a project but no time or budget to see them through with documentation and checks
16 | * Scope Doping: unmanaged scope reduction or shedding of scope by project managers, or indeed technical staff. Subtly different to Business pressures in that, while business pressures may be a cause, Scope Doping will also cause business pressure due to unmanaged work scope that has been shed.
17 |
--------------------------------------------------------------------------------
/doc/telecommunication/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/telecommunication/index.md:
--------------------------------------------------------------------------------
1 | # Telecommunication wordbook
2 |
3 | See https://en.wikipedia.org/wiki/Telecommunication
4 |
--------------------------------------------------------------------------------
/doc/todo/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/todo/index.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/joelparkerhenderson/wordbooks/8841cb4193738188e1cdf501d3e462490c70db5d/doc/todo/index.md
--------------------------------------------------------------------------------
/doc/travel/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/travel/index.md:
--------------------------------------------------------------------------------
1 | # Travel wordbook
2 |
3 | Credit to https://www.onetravel.com/travel/glossary.asp
4 |
5 |
6 | * [add-on](TODO): A selection, typically at an increased price, added to a travel reservation.
7 |
8 | * [adjoining rooms](TODO): Bordering hotel rooms that do not share a common door.
9 |
10 | * [advance purchase requirement](TODO): Ticket must be purchased a minimum number of days before the flight departs.
11 |
12 | * [ARC](TODO): The Airlines Reporting Corporation - is responsible for supervising payments from travel agencies to airlines along with the manner in which tickets are issued to consumers.
13 |
14 | * [airport access fee](TODO): A fee paid to the airport authority by car rental companies for the use of shuttle vehicles.
15 |
16 | * [availability](TODO): The total number of seats allowed to be sold at a particular rate. Return to TopB
17 |
18 | * [base fare](TODO): The cost of an airfare prior to addition of fees, taxes or surcharges.
19 |
20 | * [blackout dates](TODO): Specific dates in which special fares or promotions do not apply.
21 |
22 | * [blocked space](TODO): Seats reserved to be sold to third party companies at a discounted group rate.
23 |
24 | * [boarding pass](TODO): A ticket issued at airport check-in that authorizes airplane boarding.
25 |
26 | * [bulk contract](TODO): An agreement whereby an airline sells large blocks of seats at a discount for resale by a third party.
27 |
28 | * [bulk fare](TODO): A reduced fare for purchases of a large number of tickets.
29 |
30 | * [business class](TODO): While amenities vary based on the airline, business class generally falls between first class and coach.
31 |
32 | * [bancellation penalty](TODO): A fee to charged to customers that cancel flights after booking reservations.
33 |
34 | * [commission](TODO): A small fee that a travel agency or services adds to the total fee in order to make money.
35 |
36 | * [consolidator](TODO): A business that has contracts with airlines to sell tickets in bulk, generally at a discounted rate.
37 |
38 | * [corporate agency](TODO): A travel agency that usually caters to medium-large sized businesses.
39 |
40 | * [domestic fare](TODO): An additional fare added to national flights.
41 |
42 | * [dlectronic ticket a.k.a. E-ticket](TODO): A paperless ticket that allows travelers to fly with only a photo ID.
43 |
44 | * [exclusive fare](TODO): Discounted airfares offered by travel consolidators.
45 |
46 | * [fare basis (code)](TODO): The code that determines the price of an airline ticket.
47 |
48 | * [first class](TODO): The class which offers the most premium service.
49 |
50 | * [global distribution system (GDS)](TODO): An international computer reservation system that accesses many databases of suppliers, airlines, etc. in different countries, such as Sabre.
51 |
52 | * [hub](TODO): A city in which an airline has a major presence.
53 |
54 | * [IATAN](TODO): International Airlines Travel Agent Network - Administers the IATAN card, the only widely accepted form of legitimate travel agent identification.
55 |
56 | * [interline connection](TODO): A trip with a connection flight from a different airline.
57 |
58 | * [land arrangements](TODO): All non-flying reservations upon arrival such as car rental, hotel, and tourist reservations.
59 |
60 | * [layover](TODO): The period of time spent between connecting flights.
61 |
62 | * [LDW - loss damage waiver](TODO): Supplementary car rental insurance that covers theft, vandalism, and accident damage.
63 |
64 | * [leisure travel](TODO): Usually signifies traveling for relaxation, vacation, or to visit friends/family.
65 |
66 | * [limited service hotel](TODO): A hotel without a restaurant on the premises.
67 |
68 | * [lowest available fare](TODO): The most inexpensive flight currently available.
69 |
70 | * [maximum stay](TODO): The longest period of time a traveler can stay at a particular destination and still qualify for the promotion or discounted fare.
71 |
72 | * [minimum connect time](TODO): The shortest time required in order to successfully transfer to a connecting flight.
73 |
74 | * [modified American plan (MAP)](TODO): Meal plan that includes two daily meals, usually breakfast and dinner.
75 |
76 | * [net fare, net rate](TODO): Implies the commission has already been added to the price of the fare.
77 |
78 | * [no show](TODO): A traveler that doesn’t appear for their flight, hotel, or car rental reservation.
79 |
80 | * [non-refundable](TODO): A ticket in which no money will be returned if the customer no longer intends to use the ticket.
81 |
82 | * [non-transferable](TODO): A ticket that can only be used by the person who was originally scheduled to fly at the time of purchase.
83 |
84 | * [nonstop](TODO): A flight that travels directly to its destination without connections or layovers.
85 |
86 | * [occupancy rate](TODO): The proportion of reservations expected during any given period.
87 |
88 | * [offline connection](TODO): A connection that requires switching to both a new aircraft and carrier.
89 |
90 | * [off-peak](TODO): A less expensive time to travel as result of lower consumer volume during these periods.
91 |
92 | * [operator](TODO): Any company that provides any transportation service.
93 |
94 | * [overbooking](TODO): When a carrier books more reservations than available seats.
95 |
96 | * [passenger facility charge (PFC)](TODO): an additional fee for the use of the airport.
97 |
98 | * [passenger name record (PNR)](TODO): The official name of one's reservation in a computer reservation system (CRS).
99 |
100 | * [personal effects coverage](TODO): Additional car rental insurance covering loss of personal property from the rented vehicle.
101 |
102 | * [PNR: passenger name record](TODO): The official name of one's reservation in a computer reservation system (CRS).
103 |
104 | * [point-to-point](TODO): Refers to the fares between two cities.
105 |
106 | * [published fare](TODO): A fare immediately offered for purchase by the airline.
107 |
108 | * [rack rate](TODO): The price of a hotel prior to discount.
109 |
110 | * [reconfirm](TODO): to double-check a reservation.
111 |
112 | * [record locator](TODO): The number assigned to a reservation in the airlines number; this number is unique, as it will never be assigned again.
113 |
114 | * [red-eye flight](TODO): A flight in which the travel takes place between the hours of 9pm and 7am.
115 |
116 | * [reissue](TODO): When a new ticket is issued as a result of a change of plans.
117 |
118 | * [round trip](TODO): Two flights: the destination flight and its return trip.
119 |
120 | * [Sabre](TODO): The world’s largest travel reservation system.
121 |
122 | * [saturday night stay](TODO): In order to receive a specialty fare, a Saturday stay over is sometimes required.
123 |
124 | * [scheduled carrier](TODO): An airline that offers regularly scheduled flights between destinations.
125 |
126 | * [special fare](TODO): Any fare that deviates from normal pricing (typically discounted).
127 |
128 | * [shoulder season](TODO): The period of time between busy and quiet seasons in which prices are typically at a midpoint.
129 |
130 | * [suite](TODO): A hotel room that usually offers a living room and kitchenette in addition to the bedroom.
131 |
132 | * [supplier](TODO): A company that offer travel services to the general public.
133 |
134 | * [through passenger](TODO): A passenger who remains on the plane at a connecting stop on the way to his/her final destination.
135 |
136 | * [ticket stock](TODO): Blank airline tickets.
137 |
138 | * [travel agent](TODO): An individual or company that sell travel services on a commission basis.
139 |
140 | * [travel agency](TODO): Usually used in the travel industry to refer to an ARC-appointed storefront retailer.
141 |
142 | * [unlimited mileage](TODO): Signifies there are no mileage restrictions for renters.
143 |
144 | * [unrestricted fare](TODO): An airfare with no limitations, typically refundable and has no blackout days.
145 |
146 | * [waiver](TODO): A written acknowledgement that a passenger has declined something.
147 |
--------------------------------------------------------------------------------
/doc/united-states-department-of-defense/business-enterprise-architecture/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/united-states-department-of-defense/business-enterprise-architecture/index.md:
--------------------------------------------------------------------------------
1 | # US DoD BEA
2 |
3 | United States Department of Defense Business Enterprise Architecture
4 |
5 | See https://en.wikipedia.org/wiki/Department_of_Defense_Architecture_Framework
6 |
7 | * BEA: Business Enterprise Architecture
8 | * BMA: Business Mission Area
9 | * BPM: Business Process Model
10 | * BPR: Business Process Reengineering
11 | * CBM: Core Business Mission
12 | * CIO: Chief Information Officer
13 | * CPM: Capability Portfolio Management
14 | * DAS: Defense Acquisition System
15 | * DBS: Defense Business Systems
16 | * DCMO: Deputy Chief Management Officer
17 | * DFMIG: Defense Financial Management Improvement Guidance
18 | * DITPR: DoD IT Portfolio Repository
19 | * DM2: DoDAF Meta Model
20 | * DoD: Department of Defense
21 | * DoDAF: DoD Architecture Framework
22 | * DOORS: Dynamic Object Oriented Requirements System
23 | * E2E: End-to-End
24 | * EEIM: Enterprise Energy Information Management
25 | * ETP: Enterprise Transition Plan
26 | * FM: Financial Management
27 | * FoS: families of systems (cf. SoS)
28 | * GAO: Government Accountability Office
29 | * GFP: Government Furnished Property
30 | * GPC: Government Purchase Card
31 | * H2R: Hire-to-Retire
32 | * HRM: Human Resources Management
33 | * HTML: Hypertext Markup Language
34 | * I&E: Installations and Environment
35 | * IRB: Investment Review Board
36 | * IT: Information Technology
37 | * JCIDS: Joint Capabilities Integration and Development
38 | * LRP: Laws, Regulations and Policies
39 | * MSSM: Materiel Supply and Service Management
40 | * NDAA: National Defense Authorization Act
41 | * OMB: Office of Management and Budget
42 | * OPLAN: Operational Planning
43 | * P2P: Procure-to-Pay
44 | * PCA: Pre-Certification Authority
45 | * PDS: Procurement Data Standard
46 | * PPBE: Planning, Programming, Budgeting, and Execution
47 | * PRDS: Purchase Request Data Standard
48 | * QDR: Quadrennial Defense Review
49 | * RPILM: Real Property and Installation Lifecycle Management
50 | * SCOR: Supply Chain Operations Reference
51 | * SE: Systems Engineering
52 | * SFIS: Standard Financial Information Structure
53 | * SIPPS: Service Integrated Personnel and Pay Systems
54 | * SLOA: Standard Line of Accounting
55 | * SMP: Strategic Management Plan
56 | * Sos: systems of systems (cf. FoS)
57 | * USSGL: United States Standard General Ledger
58 | * WSLM: Weapons System Lifecycle Managemen
59 |
--------------------------------------------------------------------------------
/doc/x-as-a-service/README.md:
--------------------------------------------------------------------------------
1 | index.md
--------------------------------------------------------------------------------
/doc/x-as-a-service/index.md:
--------------------------------------------------------------------------------
1 | # X as a Service
2 |
3 | * [CaaS: content as a service](https://en.wikipedia.org/wiki/Content_as_a_Service)
4 | * [DaaS: data as a service](https://en.wikipedia.org/wiki/Data_as_a_service)
5 | * [DaaS: desktop as a service](https://en.wikipedia.org/wiki/Desktop_as_a_service)
6 | * [DCaaS: digital content as a service](https://en.wikipedia.org/wiki/Digital_Content_as_a_service) TODO
7 | * [IaaS: infrastructure as a service](https://en.wikipedia.org/wiki/Infrastructure_as_a_service)
8 | * [ITMaaS: information technology management as a service](https://en.wikipedia.org/wiki/Information_technology_management_as_a_service) TODO
9 | * [MBaaS: mobile backend as a service](https://en.wikipedia.org/wiki/Mobile_backend_as_a_service)
10 | * [MSaaS: managed software as a service](https://en.wikipedia.org/wiki/Managed_software_as_a_service) TODO
11 | * [PaaS: platform as a service](https://en.wikipedia.org/wiki/Platform_as_a_service)
12 | * [SaaS: software as a service](https://en.wikipedia.org/wiki/Software_as_a_service)
--------------------------------------------------------------------------------
/pages/README.md:
--------------------------------------------------------------------------------
1 | # Authentication
2 |
3 | Authentication in the context of software applications refers to the process of verifying the identity of a user, device, or system trying to access the software or its resources. This ensures that only authorized users can perform certain actions or access specific data.
4 |
5 | Authentication methods can vary based on security requirements and the sensitivity of the information being protected.
6 |
7 | ## Helpful terminology
8 |
9 | ### Type 1 Authentication: something you know
10 |
11 | **Username or Email Address**: A user provides a unique identifier (such as a username or email address) to initiate the login process. This is typically the first step before entering other forms of credentials.
12 |
13 | **Password or Passphrase**: A password is a secret string of characters (letters, numbers, symbols) used to authenticate a user. A passphrase is similar but typically longer and more complex.
14 |
15 | **Security Challenge Questions**: The user answers a set of pre-determined questions, such as "What is your favorite color?" or "Who wrote your favorite book?" to verify their identity.
16 |
17 | **Recovery Codes**: Temporary or one-time codes that are used to regain access when the usual authentication method (like a password) is unavailable. These codes are often provided during account setup or via email/SMS.
18 |
19 | **Personal Identification Number (PIN)**: A numeric password that is usually shorter than a password but is used to authenticate a user, often on bank automatic teller machines (ATMs), or phone call services.
20 |
21 | ### Type 2 Authentication: something you have
22 |
23 | **Mobile Authentication Application (Authenticator App)**: Applications like Google Authenticator, Microsoft Authenticator, or Authy generate a time-limited one-time password (TOTP) that proves the user has access to the user's personalized authentication application.
24 |
25 | **OTP (One-Time Password)**: A single-use password for a user to complete a transaction or login session. A popular use is for a website to send an OTP to a user via the email or mobile phone text message.
26 |
27 | **TOPT (Time-Based One-Time Password)**: A type of OTP that is valid for a very short period (e.g., 30 seconds). The password is generated based on the current time and a secret key shared between the server and the client.
28 |
29 | **FIDO2 (Fast IDentity Online 2)**: A set of standards for strong authentication that enables passwordless login using public key cryptography. Users authenticate using devices such as biometric sensors or security keys (e.g., YubiKey).
30 |
31 | **RFID (Radio Frequency Identification)**: Authentication using RFID involves the use of a small device, such as an RFID card or tag, that contains unique identifying information. It is scanned by a reader to authenticate the user.
32 |
33 | **NFC (Near Field Communication)**: Authentication via NFC uses devices (e.g., smartphones, cards) to communicate with each other when they are in close proximity. It’s often used for contactless payments or authentication.
34 |
35 | **Identification card or badge or letter**
36 |
37 | **Government passport**
38 |
39 | **Smart card**
40 |
41 | **Security token**
42 |
43 | **Browser cookie**
44 |
45 | **Pinned certificate**
46 |
47 | **SSH key**
48 |
49 | **Electronic signature**: An electronic signature, or e-signature, is data that is logically associated with other data and which is used by the signatory to sign the associated data.
50 |
51 | ### Type 3 Authentication: something you are
52 |
53 | **Biometrics**: biometric authentication uses physical traits such as fingerprints, facial recognition, iris scans, or voice patterns to verify the identity of a user.
54 |
55 | **Fingerprint**
56 |
57 | **Palm print**
58 |
59 | **Face recognition**
60 |
61 | **Voice recognition**
62 |
63 | **Gesture recognition**
64 |
65 | **Iris scan**
66 |
67 | **Gait analysis**
68 |
69 | **Keystroke dynamics**
70 |
71 | **Touch dynamics**
72 |
73 | ### More terminology
74 |
75 | **Authentication factors**: The three typical authentication factors (a.k.a. categories) are something you know, something you have, something you are.
76 |
77 | **Single-factor authentication (SFA)**: Require one authentication factor to authenticate. The use of only one factor does not offer much protection.
78 |
79 | **Multi-Factor Authentication (MFA)**: Require multiple authentication factors to authenticate. The use of multiple factors offers much better protection than single-factor authentication. A typical example: require a password (which is something you know) and time-based one-time password using your mobile phone (which is something you have). [Wikipedia](https://wikipedia.org/wiki/Multi-factor_authentication)
80 |
81 | **Continuous authentication**: Most computer systems authenticate users once at the initial log-in session. Some higher-security systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s).
82 |
83 | **Authentication protocol**: This is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity (e.g. a client connecting to a server) as well as authenticate itself to the connecting entity (a server to a client) by declaring the type of information needed for authentication as well as syntax. - Wikipedia.
84 |
85 | **Federated identity**: A federated identity is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems. [Wikipedia](https://wikipedia.org/wiki/Federated_identity).
86 |
87 | **Federated authentication**: A federated authentication system allows users to authenticate to multiple systems using a single set of credentials.
88 |
89 | **Single sign-on (SSO)**: An authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems. True single sign-on allows the user to log in once and access services without re-entering authentication factors. [Wikipedia](https://wikipedia.org/wiki/Single_sign-on).
90 |
91 | ## Popular directory terminology
92 |
93 | **LDAP (Lightweight Directory Access Protocol)**: LDAP is an application protocol used to query and modify directory services. In authentication, it allows users to log in using a centralized directory, such as Active Directory, without needing separate credentials.
94 |
95 | **Active Directory**: A directory service provided by Microsoft that helps organizations manage user accounts, authenticate users, and assign permissions to resources within a network. Authentication occurs through LDAP or Kerberos protocols.
96 |
97 | **Windows Hello**: A feature of Windows 10 and later that provides passwordless authentication via biometrics (facial recognition or fingerprint) or a PIN. It can also support external security keys.
98 |
99 | ## Challenges for automatic testing
100 |
101 | Software engineering often uses automatic testing, such as for continuous integration (CI), continuous delivery (CD), continuous telemetry (CT), etc.
102 |
103 | However, authentication can be a challenge for automatic testing, especially for multi-factor authentication:
104 |
105 | * Example 1: if test code needs to use a mobile phone application for TOPT, then somehow the CI/CD/CT system needs to be able to simulate a phone, or manipulate a phone. Some test systems can simulate a phone by using a virtual device. Some test systems can manipulate a phone by using a robot finger.
106 |
107 | * Example 2: if test code needs to do biometrics such as a fingerprint, then the CI/CD/CT system needs to be able to simulate the fingerprint, or manipulate a fake. Some test systems can simulate a fingerprint by mocking the fingerprint scanner. Some test systems can manipulate a fingerprint by using a prosthetic finger that is modeled to match the fingerprint of a real person.
108 |
--------------------------------------------------------------------------------