skip to content
DIDO Wiki
User Tools
Log In
Site Tools
Search
Tools
Show page
Old revisions
ODT export
Add to book
Export to PDF
Backlinks
Recent Changes
Media Manager
Sitemap
Log In
>
Recent Changes
Media Manager
Sitemap
Trace:
dido:public:ra:xapend:xapend.a_glossary:start
Backlinks
This is a list of pages that seem to link back to the current page.
Adaptability
Installability
Reference Architecture (RA)
e. Table of Contents
1.3 Content Organization
4.3.2.1 Maturity
Appendices
Glossary !-* Terms
16-Bit
32-Bit
64-Bit
Glossary 0-9 Terms
After Action Review (AAR)
Asynchronous Byzantine fault tolerance (ABFT)
Acceptance Testing
Access Control
Access Control Function
Accessibility
Accountability
Automated Clearing House (ACH) Network
Access Control List (ACL)
Apache ActiveMQ
Actuarial Tables
Adaptability
Advanced Encryption Standard (AES)
Aggregation Layer
Agile Model
Agreement Ledgers
Artificial Intelligence (AI)
Altcoin
Autorité des Marchés Financiers (AMF)
Anti Money Laundering (AML)
Advanced Message Queuing Protocol (AMQP)
Analysability
American National Standards Institute (ANSI)
Application Programming Interface (API)
Application Container
Application Layer
Application
Application Binary Interface (ABI)
Application Security
Application Performance
Appropriateness Recognizability
Architecture Adaptability
Argument
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Spoofing
American Standard for Information Interchange (ASCII)
Application Specific Integrated Circuit (ASIC)
Asset Class
Assurance
Attack Surface
Attestation Ledgers
Authentication
Authentication Code
Authenticity
Authority
Authorization
Automation Pyramid
Availability
Avalanche
Amazon Web Services (AWS)
Glossary A Terms
Blind Assignment for Blockchain Extension (BABE)
Federal Financial Services Authority (BaFin)
Bandwidth
Bar Code (Barcode)
Business impact Analysis (BIA)
BigQuery
Big-Endian
Binary Instrumentation
Biometric Authentication
Biometrics
Basic Input/Output System (BIOS)
Bank for International Settlements (BIS)
Bitcoin
Bitcoin Wallet
Bit Error
BitTorrent
Black Box Testing
Block Ciphers
Block Header
Block Height
Block Producers
Block Rewards
Block Validators
Blockchain
Blockchain Network
Bluetooth
Backus–Naur Form (BNF)
Bank of England (BoE)
Bill of Lading (BL or BoL)
Bootstrap
Business Process Model and Notation (BPMN)
Bridge
Brownfield
Bank Secrecy Act of 1970 (BSA)
Bug
Bus
Business Process
Bylaws
Bytecode
Byzantine Fault
Byzantine Fault Tolerance (BFT)
Byzantine Generals Problem
Glossary B Terms
Certificate Authority (CA)
Cable Subscriber Protection
Cardano
Cost Accounting Standards (CAS)
Category 5 (Cat-5)
Category 6 (Cat-6)
Category 7 (Cat-7)
Category 8 (Cat-8)
China Banking Regulatory Commission (CBRC)
California Consumer Credit Reporting Agencies Act (CCCRA)
California Consumer Privacy Act (CCPA)
Credit and Debit Card Receipt Clarification Act
Customer Due Diligence
Central Ledger
Consumer Financial Protection Bureau (CFPB)
Commodity Futures Trading Commission (CFTC)
Chain Linking
Charge Card
Charter
Checksum
Confidentiality, Integrity and Availability (CIA Triad)
Competition In Contracting Act (CICA)
Common Intermediate Language (CIL)
Cipher
Ciphertext
Confidential Information Protection and Statistical Efficiency Act (CIPSEA)
China Insurance Regulatory Commission (CIRC)
Complex Instruction Set Computer (CISC)
Claim
Class
Clearinghouse
Cleartext
Command Line Interface (CLI)
Client
Client-Server
Cloud Service
Cloud Storage
Cloud Elasticity
Common Language Runtime (CLR)
Configuration Management (CM)
Command Shell
Capability Maturity Model Integration (CMMI)
Constrained Application Protocol (CoAP)
Community of Interest (CoI)
Coins
Cold Boot Attack
Communication Protocol
Compiler
Component
Computer Architecture
Computer System
Computing Platform
Conceptual Schema
Condition
Confidentiality
Confidentiality Agreement
Confirmation
Conformance Specification
Consensus Algorithm
Consensus Process
Console
Consortium Blockchain
Container
Container Host
Container OS
Container Engine
Control Flow
Control Level
Children's Online Privacy Protection Act (COPPA)
Copyleft
Copyright
Common Object Request Broker Architecture (CORBA)
Core Dump
Corruption
Commercial Off-The-Shelf (COTS)
California Privacy Act
Central Processing Unit (CPU)
Crash
Credit Card
California Right to Financial Privacy Act
Crowdfunding
Cryptocurrency Addresses
Cryptoanalysis
Cryptocurrency
Cryptographic Algorithm
Cryptographic Checksum
Cryptographic Key
Cryptography
California Song-Beverly Credit Card Act
China Securities Regulatory Commission (CSRC)
Comma Separated Values (CSV)
Common Weakness Enumeration (CWE)
Common Warehouse Metamodel (CWM)
Cyber Resiliency
Cybersecurity
Cyclomatic
Cyclomatic Complexity
CyberSecurity Culture (CSC)
Glossary C Terms
Data as a Service (DaaS)
Daemon
Decentralized Autonomous Organization (DAO)
Decentralized Autonomous Organization
Distributed Application (ĐApp or DApp)
Dark Web
Data Breach
Data-Centric
Data Governance (DG)
Data-in-Motion
Data-in-Use
Data Localization
Data Management (DM)
Data Management Platform (DMP)
Data Modeling
Data Object (DO)
Data Protection
Data Reader
Data Remanence
Data Residency
Data Retention Policy
Data Sovereignty
Data Strategy
Data Type
Data Writer
Data-at-Rest
Database
Data Integrity
Data Link Layer (DLL)
Data Logging
Data Quality
Data Security
Datastore
Data Structure
Database Driver
DataBase Management System (DBMS)
Data-Centric Publish-Subscribe (DCPS)
Data Definition Language (DDL)
Distributed Denial-of-Service (DDoS)
Data Distribution Service (DDS)
DDS Sample
Drug Enforcement Administration (DEA)
Deadline QoS
Debit Card
Debugger
Decentralized Application
Decision Point
Declarative Programming
Decryption
Deep Copy
de facto Standard
Decentralized Finance (DeFi)
Delegated Byzantine Fault Tolerant (dBFT)
Delegated Proof of Stake (DPoS)
Dependent Event
Deposit Insurance
Desirement
Desktop
Deterministic Algorithm
DevOps
devp2p
Defense Federal Acquisition Regulation Supplement (DFARS)
Dynamic Host Configuration Protocol (DHCP)
Distributed Hash Table (DHT)
Decentralized IDentifier (DID)
Distributed Immutable Data Objects (DIDO)
DIDO Domain Community
DIDO Ecosphere Community
DIDO Ecosystem Community
DIDO Platform
Difficulty
Digital Asset
Digital Attack Surface Area
Digital Certificate
Digital Identity
Digital Rights
Digital Signature
Digital Transaction
Digital Twin
Disconnected, Intermittent and Limited (DIL)
Dual In-line Memory Module (DIMM)
Directed Acyclic Graph (DAG)
Discovery
Disk Image
Distributed Database
Distributed Ledger
Distributed System
Division by Zero (DIV/0)
Dynamic Link Library (.dll)
Data Loss Prevention (DLP)
Distributed Ledger Technology (DLT)
Data Model (DM)
Data Manipulation Language (DML)
Domain Name System (DNS)
Docker
Department of Defense (DoD)
Dodd-Frank Act
Department of Justice (DOJ)
Document Object Model (DOM)
DDS Domain
Domain Knowledge
Domain Participant
Domain Integrity
Domestic Money Laundering
Denial-of-Service (DoS)
Double Spend
Download Speed
Downtime
Data Protection Act 2018
Driver's Privacy Protection Act of 1994 (DPPA)
Dynamic Random Access Memory (DRAM)
Digital Rights Management (DRM)
Disaster Recovery Plan (DRP)
Drug Trafficking
Duck Typing
Durability
Glossary D Terms
End-to-End Solution (E2ES)
Electronic Commerce (e-Commerce)
E-Government Act
Electronic Benefit Transfer (EBT)
Elastic Compute Cloud (EC2)
Economies of Scale
Electronic Funds Transfer Act
Ethereum Improvement Proposal (EIP)
Electrotechnology
Europay, MasterCard® and Visa (EMV)
Encryption
Encryption Algorithm
End-to-End Testing (E2E Testing)
Endianness
Endpoint
Entity
Entity Integrity
Environment Variables
End-of-life (EoL)
Ethereum Request for Comment (ERC)
Entity Relationship Diagram (ERD)
Enterprise Resource Planning (ERP)
Ethereum Wire Protocol (ETH)
Ether
Ethereum
Ethereum Classic
Ethereum Memory
Ethereum Node
Ethereum Storage
Ethernet
Evidence
Ethereum Virtual Machine (EVM)
Ethereum Virtual Machine (EVM) Bytecode
EVM Code
Exception
Exception Handler
Executable File
Exploit
Exploitable
Glossary E Terms
Fair and Accurate Credit Transactions Act (FACTA)
Failover
Federal Acquisition Regulation (FAR)
Financial Accounting Standards Board (FASB)
Financial Action Task Force (FATF)
Fault Tolerance
Federal Bureau of Investigation (FBI)
Financial Conduct Authority (FCA)
Fair Credit Reporting Act (FCRA)
Fair Debt Collection Practices Act (FDCPA)
Full-Disk Encryption (FDE)
Federal Deposit Insurance Corporation (FDIC)
Federal Reserve (Fed)
Federal Reserve Note
Federal Emergency Management Agency (FEMA)
Fiat Currency
Field Level
Fifty-One Percent (51% Attack)
Financial Instrument Global Identifier (FIGI)
FIGI Symbology
File
Financial Instrument
Financial Market
Financial Sector
Financial Market Supervisory Authority (FINMA)
Financial Industry Regulatory Authority (FINRA)
Financial Technology (Fintech)
Firewall
Firmware
Federal Information Security Management Act (FISMA)
Five Nines
Flowchart
Full Memory Encryption (FME)
Figure of Merit (FoM)
Fork
Financial Services Agency (FSA)
File Transfer Protocol (FTP)
Full Node
Functional Requirements
Functional Language
Functional Programming
Fungibility
Fungible
Glossary F Terms
General Data Protection Regulation (GDPR)
Generally Accepted Accounting Principles (GAAP)
Ganache
Government Accountability Office (GAO)
Gas
Gateway
Geolocation
Gift Card
Gramm-Leach-Bliley Act (GLBA)
Google Mobile Services (GMS)
Goal
Gossip Protocol
Government Off-The-Shelf (GOTS)
Governing Body
Governance
General-Purpose Graphics Processing Unit (GPGPU)
Graphics Processing Unit (GPU)
Graph DataBase (GDB)
Greenfield
Global StableCoin (GSC)
Graphical User Interface (GUI)
Glossary G Terms
Hacker
Halving
Hard Fork
Hardware (H/W)
Hardware Firewall
Hash Function
Hash Key
Hashcash
Hashgraph
Hashgraph Consensus Algorithm
Hashing
Hashrate
Hard Disk Drive (HDD)
Heap Memory
Heap Error
Hedera
Health Insurance Portability and Accountability Act (HIPAA)
History QoS
Human-machine interface (HMI)
Homomorphic Encryption (HE)
Horizontal Scaling
Howey Test
Hard Real-Time System
Hypertext markup language (HTML)
Hypertext Transfer Protocol (HTTP)
Hypertext transfer protocol (HTTP) Request
Hypertext transfer protocol (HTTP) Response
HTTP Sniffer
Hypertext Transport Protocol Secure (HTTPS)
Hub
Human Trafficking
Hybrid Network
Hype-Cycle
Hyperledger
Hypervisor
Glossary H Terms
Infrastructure-as-a-Service (IaaS)
Internet Assigned Number Authority (IANA)
Insolvency and Bankruptcy Board of India (IBBI)
Initial Coin Offering (ICO)
Identifier (ID)
Integrated Development Environment (IDE)
Idempotence
Identification
Identity Theft
Institute of Electrical and Electronics Engineers (IEEE)
IEEE 802.1 Working Group
Internet Inter-ORB Protocol (IIOP)
Industrial Internet of Things (IIoT)
Immutable
Impacted Component
Imperative Programming
Incremental Model
Independent Event
Industrial Application
Information Assurance (IA)
Information Technology (IT)
Infrared Wireless Networking
Inherence Factor
Inheritance
Installability
Instance
Instruction Set
Instrumentation
Integration Testing
Integrity
Intellectual Property (IP)
Interactive Model
Interface
Interface Testing
International Money Laundering
Internet
Interoperability
Interoperability Testing
Intranet
Internet of Things (IOT)
Iota
Internet Protocol (IP)
Internet Protocol Address (IP Address)
Inter-Process Communication (IPC)
InterPlanetary File System (IPFS)
Internet Protocol Security (IPsec)
Insurance Regulatory and Development Authority of India (IRDAI)
Information Security (IS/InfoSec)
Internet Small Computer System Interface (iSCSI)
International Organization for Standardization (ISO)
ISO 15288
ISO 90003-2018
ISO 9001
Internet Service Provider (ISP)
Information Technology (IT) Risk Management
Glossary I Terms
Java
JavaScript
Java Database Connectivity(JDBC)
Just-In-Time (JIT)
Jitter
Java Message Service (JMS)
JavaScript Object Notation (JSON)
Java Virtual Machine (JVM)
Glossary J Terms
Kademlia
Key
Key Management
Knowledge Factor
Know Your Customer (KYC)
Glossary K Terms
Local Area Network (LAN)
Laptop
Latency
Latency Budget QoS
Lightweight Directory Access Protocol (LDAP)
Learnability
Ledger
Light Ethereum Subprotocol (LES)
License Distribution
License Linking
License Modification
License Patent Grant
License Private Use
Licensing Sublicensing
Licensing Trademark Grant
License
Light Node
Lightning Network
Lint
Liquidity
Liquidity Risk
Lisp
Listener
Litecoin
Little-Endian
Liveliness QoS
Location Factor
Logic Error
Logical Integrity
Long-Term Evolution (LTE)
Glossary L Terms
Machine to Machine (M2M)
Media Access Control (MAC)
Machine Authentication
Machine Learning (ML)
Maintainability
Maintainability Measure
Malicious Software (Malware)
Mean Active Maintenance Down Time (MAMDT)
Metropolitan Area Network (MAN)
Management Level
Manageability
Monetary Authority of Singapore (MAS)
Model-Based Systems Engineering (MBSE)
Mean Time Between Failure (MTBF)
Model Driven Architecture (MDA)
Meet-in-the-Middle Attack
Meme Coin
Memory Leak
Manufacturing Execution System (MES)
Metadata
Method Overloading
Multifactor Authentication (MFA)
Microcontroller
Micropayment Channel
Musical Instrument Digital Interface (MIDI)
Middleware
Markets in Financial Instruments Directive (MiFID)
Markets in Financial Instruments Directive II (MiFID II)
Miner Node
Mining
Mission Assurance (MA)
Mission Critical System
Man-in-the-Middle (MiTM) Attack
Money Laundering Control Act of 1986 (MCLA)
Mean Logistics Delay Time (MLDT)
Main Memory Encryption (MME)
Memorandum Of Agreement (MOA)
Mobile Device
Mobile Payment
Modem
Modifiability
Modularity
Module
Measures of Effectiveness (MoE)
MetaObject Facility Specification (MOF)
Message-Oriented Middleware (MOM)
Money Laundering
Monitoring Software
Motherboard
Modified Off-The-Shelf (MOTS)
Memorandum Of Understanding (MOU)
Multi-Party Computation (MPC)
Massively Parallel Processing (MPP)
Message Queue(MQ)
Message Queuing Telemetry Transport (MQTT)
Message Broker
Mean Time To Failure (MTTF)
Mean Time To Repair (MTTR)
Multi-Signature (multisig)
Multi-core Processor
Must (Requirement)
MUTual EXclusion (mutex)
Glossary M Terms
N-Tier Architecture
National Association of Insurance Commissioners (NAIC)
Namespace
Network Attached Storage (NAS)
National Credit Union Administration (NCUA)
Non-Disclosure Agreement (NDA)
Network Appliance
Network Cabling
Network Device
Network Layer
Network Node
Network Performance
Network Topology
Network Object
Network Traffic Analyzer
Network Security
Near-Field-Communication (NFC)
Non-Fungible Token (NFT)
Network Interface Card (NIC)
Network Management System (NMS)
Node
Node Network
Node.js
Non-Profit Organization (NPO)
Non-Functional Requirements
Non-Repudiation
Normalization
NoSQL
Notebook Computer
NATO Off-The-Shelf (NOTS)
Node Package Management (NPM)
Non-Volatile Storage (NVS)
Glossary N Terms
Open Standard Authorization ( OAuth )
Object
Objective
Options Clearing Corporation (OCC)
Open Database Connectivity (ODBC)
Object Management Group® (OMG®)
OneM2M
Ontology
Object-Oriented (OO)
Object-Oriented Database (OOD)
Object-Oriented Programming (OOP)
Open Platform Communication
Open Platform Communication Unified Architecture (OPC-UA)
Operational Code (OPCODE)
Open Telecom Platform (OTP)
Operability
Operational Resilience
Operator
Oracle
Object-Relational Database (ORD)
Operating System (OS)
Open Systems Interconnection (OSI) Model
Open Source Software (OSS)
Operational transformation (OT)
Other Transactions (OT)
One-Time PIN (OTP)
Overflow
Owner
Ownership QoS
Ownership Strength
Glossary O Terms
Peer-to-Peer (P2P)
Peer-to-Peer Lending (P2P Lending)
Policies and Procedures (P&P)
Platform-as-a-Service (PaaS)
Package
Package Manager
Packet Loss
Pulse-Amplitude Modulation (PAM)
Policy Administration Point (PAP)
Parallel Processing
Parliamentary Authority
Partition
Password
Patch
Payment Card
Payment Channel
Payment Card Industry Data Security Standard (PCI DSS)
Policy Decision Point (PDP)
Pedigree
Peer
Peer Review
Policy Enforcement Point (PEP)
Performance
Performance Efficiency Measure
Performance or Functional Specifications
Peripheral Device
Permissioned Networks
Permissioned Blockchains
Permissioned Ledger
Permissionless Networks
Permissive Open Source Software
Pension Fund Regulatory and Development Authority (PFRDA)
Phishing
Physical Attack Surface Area
Physical Integrity
Physical Layer
Physical Security
Procurement Integrity Act (PIA)
Personal Identifiable Information (PII)
Platform Independent Model (PIM)
Personal Identification Number (PIN)
Policy Information Point (PIP)
Public Key Infrastructure (PKI)
Plaintext
Planning Level
Platform
Platform Security
Plug In
Portable Network Graphics (PNG)
Point-to-Point
Policy
Polkadot
Port Number
Portability
Portable Operating System Interface (POSIX)
Possession Factor
Prudential Regulation Authority (PRA)
Prepaid Card
Presentation Layer
Principle
Private Key
Private Network
Privileges
Procedural Language
Procedure
Processor
Programming Language
Programming Style Guide
Project Management Software
Proof of Authority (PoA)
Proof of Stake (PoS)
Proof of Work (PoW)
Proof of Concept Software
Protection Rings
Protocol
Protocol Buffer (Protobuf)
Protocol Layer
Prototype
Prototype Model
Provenance
Platform Specific Model (PSM)
Packet Switched Network (PSN)
Precision Time Protocol (PTP)
Public Domain
Public Key
Public Network
Publish-Subscribe
Publisher
Pure Function
Python
Glossary P Terms
Quality of Service (QoS) Policies
Quick Response Code (QR Code)
Quantum Computing
Glossary Q Terms
Random Access Memory (RAM)
RabbitMQ
Rapid Application Development (RAD) Model
Reliability, Maintainability, and Availability (RAM)
Range Error
Reserve Bank of India (RBI)
Relational DataBase Management System (RDBMS)
Reboot the World Problem
reCAPTCHA
Recoverability
Recursion
Reentrancy Attack
Reference Architecture (RA)
Reference Implementation (RI)
Referential Integrity
Register
Registered Agent
Regression Testing
Regulatory Compliance
Relational Model (RM)
Reliability Measure
Relocatable Object
Repairability
Repeater
Replaceability
Requirement
Requirement Traceability
Reserve Currency
Resource Lock
Resources
Representational State Transfer (REST)
RESTful API
Reusability
Request For Comment (RFC)
Request For Information (RFI)
Radio Frequency Identification (RFID)
Request For Proposal (RFP)
Right to Financial Privacy Act of 1978 (RFPA)
Right to Privacy
Ripple
Reduced Instruction Set Computer (RISC)
Risk
Registered Jack-45 (RJ45) Connectors
RLPx
Robo-Advisor
Read-Only Memory (ROM)
Roundoff Error
Router
Remote Procedure Call (RPC)
RSA SecureID
Rich Site Summary (RSS)
Real-Time Application (RTA)
Research Development Test & Evaluation (RDT&E) Funding
Real-Time Payments (RTP)
Real-time Publish-Subscribe (RTPS)
Run Time
Runtime Error
Glossary R Terms
Six Sigma (6Sigma)
Software as a Service (SaaS)
Safety Assurance (SfA)
Safety-Critical System (SCS)
Salami Slicing
Sample
Storage Area Network (SAN)
Sandbox
Sandboxing
Sanity Testing
Sarbanes-Oxley Act (SOX)
Small Business Innovation Research (SBIR)
Supervisory Control and Data Acquisition (SCADA)
Scalability
Scaling Out
Scaling Up
Scope Creep
Script
Scrypt
Stream Control Transmission Protocol (SCTP)
Standards Developing Organization (SDO)
Systems Engineering (SE)
Securities and Exchange Board of India (SEBI)
Securities and Exchange Commission (SEC)
Secure Memory Encryption (SME)
Security Breach
Security (finance)
Security Measure
Segmentation Fault (SEGFAULT)
Semantic Web
Semantics
Sensor
Sequence
Server
Servicability
Service Mesh
Session Layer
Settlement Layer
Secure Encrypted Virtualization (SEV)
Single-Factor Authentication (SFA)
Software Guard Extensions (SGX)
SHA 256
Shall (Requirement)
Shallow Copy
Shard
Sharding
Shared Library
Shared Resources
Shielding
Should (Requirement)
Side-Channel Attack
Side Effect
Sidechain
Special Interest Group (SIG)
Silo
Subscriber Identity Module (SIM)
Single In-line Memory Module(SIMM)
Singleton
Smart Card
Smart Contract
Subject Matter Expert (SME)
Smoke Testing
Symmetric Multiprocessing (SMP)
Short Message Service (SMS)
Snapshot
Simple Network Management Protocol (SNMP)
Shared Object (.so)
Simple Object Access Protocol (SOAP)
System-on-a-Chip (SoC)
Soft Fork
Software (SW)
Software Development Model
Software Firewall
Solana
Solidity
Solidity Events
Solution Stack
Software Stack
System of Systems (SoS)
Source Instrumentation
Source Code
Special Rules
Specification
Spiral Model
Single Point of Failure (SPoF)
Sprint
Simple Payment Verification (SPV)
Sequenced Packet Exchange (SPX)
Software Quality Assurance (SQA)
Structured Query Language (SQL)
Static Random Access Memory (SRAM)
Solid-State Drive (SSD)
Secure Shell (SSH)
Self-sovereign Identity (SSI)
Secure Sockets Layer (SSL)
Single Sign-On (SSO)
Stablecoin
Stack Memory
Stack Trace
Stakeholder
Standard
Standing Rules
Glossary S Terms
Static Code Analysis
Static Library
Statute
Standards Organization
Simple (or Streaming) Text Oriented Message Protocol (STOMP)
Storage Device
Straight-through Processing (StP)
Stream Ciphers
Strongly Typed Language
Small Business Technology Transfer (STTR)
Specified Unlawful Activities (SUA)
Sub-Claim
Subscriber
Software Subsystem
Successful Attack
Supervisory Level
Supply Chain
Software Crisis
Software Engineering (SE)
Software Stack
Software Adaptability
Software Assurance (SwA)
Switch
Software Library
Syntax
Syntax Error
Syntax Highlighting
System Lifecycle
Systems Modeling Language (SysML)
System Assurance (SysA)
Systems and software Quality Requirements and Evaluation (SQuaRE)
Two-Factor Authentication (2FA)
Glossary T Terms
Tangle
Taxonomy
Transmission Control Protocol (TCP)
TCP/IP Conceptual Model
Technical Standard
Trusted Execution Environment (TEE)
Testability
The DAO Project
Threat
Throughput
Time Factor
Transport layer security (TLS)
Total Memory Encryption (TME)
Tokenless Ledger
Tokens
Topic
The Onion Router (Tor)
Total Cost of Ownership (TCO)
Trademark
Transaction
Transaction Block
Transaction Fees
Transport Priority
Transport Layer
TRESOR
Time Sensitive Network (TSN)
Type Safety
User Interface Aesthetics
Glossary U Terms
Universal Description Discovery and Integration (UDDI)
User Defined Integrity
User Datagram Protocol (UDP)
User Error Protection
Unified Modeling Language (UML)
Underflow
Unique Identifier (UID)
Unit Testing
UNIX
UNIX Domain Socket (Socket)
Unpermissioned Ledgers
Upload Speed
Uninterruptible Power Supply (UPS)
Uniform Resource Identifier (URI)
Uniform Resource Locator (URL)
US Patriot Act, Title III: Anti-money-laundering to prevent terrorism
U.S. Treasury
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001
Usability
Universal Serial Bus (USB)
User Scenario
Use-Case
User Authentication
User Defined Exception
User Story
Unicode Transformation Format (UTF)
Universally Unique IDentifier (UUID)
Glossary V Terms
V-Model
Validation
Value Chain
Variable
Voluntary Consensus-based Standards Body (VCSB)
Vendor Lock-In
Version Control
Vertical Scaling
Virtual Disk Image (VDI)
Virtual Machine Images
Virtual LAN (VLAN)
Virtual Machine (VM)
Volatile Storage (VS)
Volcker Rule
Vermont Privacy of Consumer Financial and Health Information
Visual Programming Language (VPL)
Virtual Private Network (VPN)
Video Privacy Protection Act (VPPA)
Vulnerability
Vulnerable
Glossary W Terms
WaitSet
Wallet
Wide Area Network (WAN)
Waterfall Model
Wayback Machine
Worst-Case Execution Time (WCET)
Weakly Typed Language
Weakness
web3.js
Web Service
Web Application (Web App)
Weight of Network
Whisper
White Box Testing
Wireless Fidelity (Wi-Fi)
Wifi Frequencies
Will (Requirement)
Windows Registry
Wired Network
Wireless Network
Wire Protocol
Wizard
Wrap Around
Web Services Description Language (WSDL)
World Wide Web (WWW)
Glossary X Terms
eXtensible Markup Language (XML)
XML Information Set (XML Infoset)
eXtensible Messaging and Presence Protocol (XMPP)
XML Query Language (XQuery)
XML Schema Definition (XSD)
Glossary Y Terms
Glossary Z Terms
Zero-Day
Zero Trust (ZT)
Zero Trust Security Model
ZigBee
Zero Trust Architecture (ZTA)
Command Line Interface (CLI)
@!!PAGE@
Appendix A - A to U
Appendix A - Glossary
Appendix A - Glossary (test)
Combined DIDO
DIDO 3.0 (Compact Version)
DIDO 3.0 (Slim Version)
DIDO RA 2.0 Book
DIDO RA 3.0 (Compact Version)
DIDO RA 3.0 (Full - Not B)
DIDO RA 3.0 (Full Version)
DIDO RA 3.0 (interim)
DIDO RA 3.0 (Slim Version)
Glossary 2.0
dido/public/ra/xapend/xapend.a_glossary/start.txt
· Last modified: 2022/05/11 16:00 by
nick
Page Tools
Show page
Old revisions
Backlinks
ODT export
Add to book
Export to PDF
Back to top