- 3-D Spreadsheet
- A Programming Language
- Abandonware
- Abstract Window Toolkit
- Abstraction
- Accounting Software
- ACD Canvas
- Activity Stream
- Adaptive Software
- Add-In
- Add-On Manager
- Amazon CloudWatch
- Amazon Relational Database Service
- Android App
- Android Froyo (Android 2.2)
- Android Market
- Annual Change Traffic
- Anonymity Network
- Anonymous (Computing)
- Anti-Malware
- Antique Software
- Anti-Virus Software
- Apache Hadoop
- App
- App Drawer
- App Economy
- App Store
- Application Availability
- Application Development Cycle
- Application Development Environment
- Application Framework
- Application Lifecycle Management
- Application Log
- Application Management
- Application Monitoring
- Application Outsourcing
- Application Performance Management
- Application Portability
- Application Portfolio
- Application Program
- Application Service Provider
- Application Service Virtualization
- Application Software
- Application Sprawl
- Application Stack
- Application Suite
- Application Virtualization
- Applications On Tap
- Apportunity
- Aptent
- Augmented Reality
- AutoCAD
- Automated Broker Software
- Automated Testing Software
- Automated Treatment Plan
- Automatic Content Recognition
- Automatic Summarization
- Avahi
- Azure Service Platform
- Bait Apps
- Baitware
- Bespoke Software
- BibTeX
- Billing Software
- Binary Runtime Environment for Wireless
- Black Box Testing
- Bleeding Edge
- Bloatware
- Bottom-Up Testing
- Breakpoint
- Broadcast Flag
- Brownfield
- Bug
- Bug Fix
- Bug Tracking
- Build to Order
- Build Your Own App
- Bump Mapping
- Bundled Software
- Business Activity Monitoring
- Business Application Programming Interface
- Business Intelligence Dashboard
- Business Process Automation
- Call Center Suite
- Capability Maturity Model
- Capability Maturity Model Integration
- Castanet
- Cell
- Character Set
- Chat Acronym
- Clonezilla
- Close To Metal
- Cloud App
- Cloud Capitalist
- Codebase
- Collaboration
- Collaborative Browsing
- Commercial Software
- Comodo Dragon
- Component
- Composite Applications
- Composite UI Application Block
- Computer Aided Software Engineering
- Computer Aided Three-Dimensional Interactive Application
- Computer Management Software
- Computer-Aided Engineering
- Computer-Aided Software Testing
- Computer-Based Learning
- Concurrent Use
- Conformance Testing
- Context-Driven Testing
- Contextual Collaboration Software
- Continuous Integration
- Controller
- Convention Over Configuration
- Copyright Infringement
- Counterfeit App
- Countermeasure
- Creeping Featuritis
- Crimeware
- Critical Path Method
- Cyberduck
- Data Hiding
- Database Front End
- Debugging
- Decentralized Application
- Dedicated Server
- Deployment
- Desk Accessory
- Device Management Software
- Device Manager
- Digital Dolly
- Digital Millennium Copyright Act
- Direct Access File System
- Disassembler
- Disco
- Distributed Application
- Distribution
- Donationware
- Driver Development Kit
- Dropper
- Dynamic HTML
- Eclipse Platform
- E-Commerce Advisor
- End-to-End Test
- Endurance Testing
- Engine
- Enhancement
- Enterprise Application Integration
- Enterprise Architecture
- Enterprise Decision Management
- Enterprise Service Bus
- E-Speak
- Eucalyptus
- Event-Driven Architecture
- Executive Support System
- Exokernel
- Expert System
- Exploratory Model
- Extensible User Interface Language
- Facebook Forced Invite
- Facebook Graph API
- Facial Recognition Software
- Facility Management
- Fast User Switching
- Fat Client
- Feature Creep
- Final Cut Pro
- Financial Information System
- Financial Software
- Firefox Sync
- Firesheep
- Firmware Over-The-Air
- Form
- FORTRAN 77
- Free and Open-Source Software
- Free Software
- Freenet
- Freeware
- Future Date Testing
- Future Proof
- Generator Locking
- Genetic Algorithm
- Geotagging
- Glueware
- GNU General Public License
- GNU Project
- Gold Code
- Google Bookmarks
- Google Health
- Google Play
- Google Takeout
- Governance Plan
- Graffiti
- Gridlines
- Guest Virtual Machine
- Hardware Abstraction Layer
- Header
- Helper Application
- Horizontal Application
- Host Virtual Machine
- Hosted Application
- HyperCard
- If Expression
- Imaging Software
- In-App Purchasing
- Indigo
- Information Management System
- Information Technology Management
- Input/Output
- In-Service Software Upgrade
- Integrated Development Environment - .NET
- Integration Testing
- Intelligent Agent
- IntelliPoint
- Intentional Software
- Interface Design Tool
- Internet Bot
- Internet Desktop
- Internet Software Piracy
- Interpreter
- In-Vehicle Infotainment
- Iterative and Incremental Development
- Iterative Development
- J#
- Jailbreak App
- Java
- Java 2 Platform, Enterprise Edition (J2EE) Components
- Java Foundation Classes
- Java ME WTK
- Java Media Framework
- Java Remote Method Invocation
- Java Swing
- Ken's Law
- Keystroke Logger
- Killer Application
- KnowledgeTree
- Labor Management System
- Lag
- LANDesk Client Manager
- Landscape
- Legacy System
- License Manager
- Limited Connected Device User Interface
- Line Editor
- Link Checker
- LISTSERV
- Liteware
- Load Testing
- Logic Bomb
- Logical OR Symbol
- Lotus 1-2-3
- Lotus Domino
- Lotus Notes
- Lotus Word Pro
- Mac OS X Lion
- Machine Binding
- Macro Virus
- Magic Cookie
- Mailing List Manager
- Make
- Managed Document Service
- Manual Testing
- MapR M5
- Marshalling
- Mashboard
- Master Data Management Software
- Menu Bar
- Mercury LoadRunner
- Message Queue
- Metasyntactic Variable
- Method Stub
- Micro App
- Microsoft Excel
- Microsoft Office
- Microsoft Office 365
- Microsoft Office Web Apps
- Microsoft Outlook
- Microsoft PowerPoint
- Microsoft Publisher
- Microsoft Word
- Middleweight Thread
- MIDlet
- MIT License
- Mobile Application
- Mobile Business Intelligence
- Mobile Code
- Mobile Software Management
- Mode
- Model (MVC)
- Modular
- Modular Object-Oriented Dynamic Learning Environment
- Modularity
- Multiple Activation Key
- Multi-Tier Application
- Mutation Testing
- My Windows Phone
- Nagware
- Named User License
- Named-Entity Recognition
- Native Mobile App
- NetBeans
- NetBIOS Extended User Interface
- Network Tracking Tool
- Nomad Software
- Obfuscation
- Object Code
- Object Linking and Embedding Database
- Odroid
- Ohnosecond
- Onscreen Keyboard
- Open vSwitch
- Open-Source Software
- Operating System
- Operating System Virtualization
- Operational Testing
- Optical Mark Recognition
- Optics Software for Layout and Optimization
- OTOY
- Outlook Express
- Pango
- Parental Control Software
- Password Cracking
- Password Generator
- Password Sniffer
- Password Vault
- Pasta Theory
- Patch
- Patch Management
- Patent Pending
- Personal Health Record
- Picasa
- Piracy
- Platform Agnostic
- Point of Sale
- Polymorphic Virus
- Presentation Software
- Print Management
- Print Management Software
- Print Preview
- Problem Program
- Product Activation
- Professional Services Automation
- Program Evaluation and Review Technique
- Public Key
- PuTTY
- R Programming Language
- R/3 Client/Server Application
- Random Testing
- Rapid Mobile Application Development
- Red Screen of Death
- Redaction Tools
- Remote Control
- Reputation-Based Security
- Revision Control System
- Rich Internet Application
- Runtime Program
- Sabily
- Sales Force Automation
- Same Old Software as a Service
- Same Origin Policy
- Sandbox
- SAP Integration Adapter
- Scalable Agile
- Script Kiddie
- Scrobble
- Scrolling
- Scrum
- Scumware
- Seamless Interface
- Self-Relocating Program
- Service-Oriented Analysis and Design
- Service-Oriented Architecture Repository
- Shareware
- Shotgun Debugging
- Single Point of Failure
- Site License
- SkyDrive
- Skype
- SlideRocket
- Smart Client
- Smartsheet
- Snipping Tool
- Software
- Software Agent
- Software Architecture
- Software Asset Management
- Software Audit
- Software Configuration Management
- Software Development Life Cycle Model
- Software License Agreement
- Software Licensing
- Software Life Cycle
- Software Metric
- Software Patent
- Software Piracy
- Software Plus Services
- Software Program
- Software Quality Assurance
- Software Rot
- Software Versioning
- Solaris
- Source Code
- Spam and Open Relay Blocking System
- Speech Analytics
- Spreadsheet
- Spreadsheet Software
- Sprite Effects
- Spyware
- SRWare Iron
- SSLeay
- Static Testing
- Static Timing Analysis
- Static Verification
- Stove Piped Development
- Straw Man
- Structure Diagram
- Structured Programming
- Structured System Analysis and Design Method
- Structured Systems Analysis And Design Method
- Sun Open Net Environment
- SuperFetch
- Supply Chain Management
- Syncdocs
- Synchronous Groupware
- System Administrator
- System Integration Testing
- System Software
- Task Pane
- Terminal Emulator
- Terms of Service
- Test Automation
- Test Driven Development
- Test Management Software
- Test Script
- Text to Speech
- The Pirate Bay
- Thin Client
- Three-Tier Architecture
- Title Bar
- Tombstoned
- Tool Palette
- Toolbar
- Track Changes
- Transaction Processing
- Transportation Management System
- Triple DES
- Trumpet Winsock
- Trusted Data Format
- Two-Tier Architecture
- Uninstall
- Uninstaller
- Unsubscribe
- Upgrade
- Usability
- Use Case
- User Acceptance Testing
- User Agent Server
- User Experience Designer
- Vaporware
- Veepers
- Vertical Enterprise Portal
- Virtual Network Computing
- Virtual Shredder
- Virtual Terminal
- Virtualization
- VisiCalc
- Visual FoxPro
- VMware
- VMware ESX
- Vmware Player
- VMware Thinapp
- Vocabulary Management Solution
- Voice Recognition
- Voice Web Application Platform
- Vulnerability Discovery and Remediation
- WaveMaker
- Web Application Firewall
- Web Application Security
- Web Collaboration
- Web Intermediary
- Web Log Client
- Web Log Software
- Web of Trust
- Web Services Coordination
- Web Workers
- Web-Based Application
- Webware
- Weenix
- Widget
- Windows Communication Foundation
- Windows Live
- Windows Management Instrumentation (WMI) Database
- Windows Meeting Space
- WordPad
- WordPerfect
- WS Transaction
- X Window System
- x86 Architecture
- Xenodochial
- XNA Game Studio
- Zero Administration for Windows
- Zero-Day Exploit
- Zero-Day Threat
- Zoho Office Suite