Acronyms

Here is a list of Integration related acronyms that you may come across when working with GLU.Ware.

A
ACK
ACK stands for “Acknowledgment” and is a signal used to indicate that a packet of data has been received successfully and can be used to confirm the receipt of a transmission. See the converse of ACK which is NACK
ACL
An ACL (Access Control List) is a list of permissions that define who or what is allowed to access specific resources within a system, such as files, directories, or network services. It is used to enforce security policies and prevent unauthorized access.
AML
AML (Anti-Money Laundering) refers to a set of laws, regulations, and procedures aimed at preventing money laundering, which is the process of disguising illegal proceeds as legitimate funds. AML systems monitor financial transactions for suspicious activity and help identify and prevent money laundering.
API
An API (Application Programming Interface) is a set of rules and protocols for building software applications that allows for communication between different systems. APIs allow different systems to exchange data and information, enabling integration and automation of processes.
AWS
Amazon Web Services
B
BI
Business Intelligence
C
CLI
Command Line Interface
D
DES
Data Encryption Standard
DMZ
A DMZ (Demilitarized Zone) is a network security concept where a small, secure network segment is placed between a secure internal network and an insecure external network (e.g. the internet). The DMZ acts as a buffer zone, allowing for secure communication between the internal and external networks while isolating and protecting sensitive internal systems from external threats.
DNS
Domain Name System
F
FTP
File Transfer Protocol is a standard network protocol used for transferring files between computers over the Internet or a local network.
H
HA
High Availability
HTTP
Hyper Text Transport Protocol
HTTPS
Hyper Text Transport Protocol Secure
I
IP
Internet Protocol
IPSec
Internet Protocol Security
iPaaS
iPaaS (Integration Platform as a Service) is a cloud-based platform that provides tools and infrastructure for connecting and integrating applications, data, and processes across multiple systems. iPaaS enables organisations to easily integrate their systems without the need for complex and costly on-premise integration solutions.
J
JAR
A .JAR (Java ARchive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file for distribution.
JSON
SON (JavaScript Object Notation) is a lightweight data-interchange format used for exchanging structured data between systems. It is easy to read and write, making it a popular choice for integration between systems, particularly in web-based applications. JSON supports multiple data types, such as numbers, strings, arrays, and objects, making it a versatile format for exchanging data between systems.
L
LAN
Local Area Network
M
MNO
Mobile Network Operator
MSISDN
Mobile Station International Subscriber Directory Number – this is simply a technical term for a mobile phone number.
N
NACK
NACK stands for “Negative Acknowledgment”. In computer networking, NACK is a signal used to indicate that a packet of data has not been received or has been received with errors and needs to be retransmitted. See the converse of NACK being ACK,
O
OWASP
OWASP (Open Web Application Security Project) is a non-profit organization dedicated to improving web application security. It provides guidelines, tools, and resources for developers and security professionals to help prevent and mitigate common web application security threats, such as SQL injection, cross-site scripting, and other security vulnerabilities.
P
PA-DSS
Payment Application – Data Security Standard
PCI-DSS
Payment Card Industry – Data Security Standard 
POC
A POC (Proof of Concept) is a demonstration of the feasibility and potential value of a system integration project. GLU will often use a POC exercise to demonstrate how GLU.Ware will meet a potential customer’s requirements and solve their business problems. POCs are often used in the early stages of the GLU sales process to help secure customer buy-in and can help to de-risk a project before full implementation.
R
RDS
Relational Database Service
REST
REST (Representational State Transfer) is an architectural style for building web services that allow for the exchange of information between systems. REST uses standard HTTP methods, such as GET, POST, PUT, and DELETE, and uses a URL to identify resources and actions. REST is a popular choice for system integration due to its simplicity, scalability, and compatibility with a wide range of programming languages and platforms.
S
SAML
Security Assertion Markup Language
SFTP
SSH File Transfer Protocol
SIT
System Integration Test – typically a stage in the SDLC when all Test End Points are available and the full Test cycle covering all Test Cases can be tested.
SMTP
Simple Mail Transfer Protocol
SOAP
SOAP (Simple Object Access Protocol) is a messaging protocol used for exchanging structured data in the implementation of web services. It defines a set of rules for encoding messages in a format that can be transmitted over a network, allowing systems to communicate and exchange information in a standardized way.
SSH
Secure Shell
SSL
Secure Socket Layer – in system integration, SSL is used to encrypt sensitive information during transmission, protecting it from eavesdropping and tampering. SSL has been replaced by its successor, TLS (Transport Layer Security), which provides equivalent security and is widely used to secure web communications and other networked applications.
SSO
SSO (Single Sign-On) is a security mechanism that allows users to access multiple systems using a single set of credentials. In system integration, SSO can simplify the user experience and improve security by eliminating the need for multiple usernames and passwords, reducing the risk of forgotten or weak passwords, and centralising the management of user accounts. SSO can be achieved through various methods, such as federation, smart card authentication, or shared session cookies.
T
TCP
Transmission Control Protocol
TLS
Transport Layer Security
TPS
Transactions per second
TPS
TPS (Transactions Per Second) is a measure of the number of transactions processed by a system in a given second. It is a commonly used metric for evaluating the performance and capacity of a system, particularly in the context of database systems, payment systems, and other systems that process a large number of transactions.
TTL
TTL (Time-to-Live) is a value used in computer networking to limit the lifespan of data in a network. It helps prevent data from circulating indefinitely by setting a maximum number of hops that a data packet can traverse before being discarded. This is important in system integration to ensure the reliability and efficiency of data transmission in a network.
V
VM
A VM (Virtual Machine) is an abstraction layer that enables multiple operating systems to run on a single physical machine. In DevOps, VMs are commonly used to create isolated, reproducible environments for software development, testing, and deployment, allowing teams to develop, test, and deploy applications without affecting each other’s work. VMs also provide scalability, flexibility, and ease of management, enabling teams to quickly spin up new environments, scale resources on demand, and automate the deployment and configuration of infrastructure.
VPN
Virtual Private Network
W
WAR
A .WAR file (Web Application Resource or Web application ARchive) is a file used to distribute a collection of JAR-files, JavaServer Pages, Java Servlets, Java classes, XML files, tag libraries, static web pages (HTML and related files) and other resources that together constitute a web application.
X
XML
XML (eXtensible Markup Language) is a markup language used for encoding structured data for storage and exchange between systems. It provides a flexible and human-readable way of representing data that can be processed by computers, enabling systems to exchange information in a standardized way.
XSS
XSS (Cross-Site Scripting) is a type of web security vulnerability that allows attackers to inject malicious code into a website, compromising the security of users who visit the site. In system integration, XSS can occur when data from one system is integrated into another system without proper input validation or sanitization, allowing an attacker to inject malicious scripts into the integrated data. XSS attacks can steal sensitive information, such as cookies or login credentials, or perform malicious actions, such as injecting malware or redirecting users to phishing sites.
Y
YAML
The application.yml file is a configuration file used in the GLU.Engine to define settings and parameters for the application. It typically contains information such as database connections, environment-specific configuration, and settings for components and routes that have been configured into the GLU.Engine. The file is written in YAML format, which is a human-readable, data-serialization format. The settings in the application.yml file provide the necessary information for it to run correctly.
Was this article helpful?

Related Articles

Need Support?

Can't find the answer you're looking for?
Contact Support
Fill the form and we’ll contact you shortly

    I agree with

    cookies
    We uses cookies to make your experience on this website better. Learn more
    Accept cookies