easy portal contact

Glossary

all definitions of numerous technical terms

ECM, DMS, SAP? Eloquent through the IT world – in our glossary you will find definitions for many technical terms.

Audit Proof

In the ECM context, the word audit-proof refers to archiving, its processes as well as the properties of electronic archiving systems and documents archived in them. This legal requirement for archiving processes has arisen from the regulations of the GoBD, the German Commercial Code (HGB), the German
Read more

Automated accounts payable (AAP) processing

The concept of automated accounts payable (AAP) processing comes from the areas of digital incoming invoice processing and accounts payable.
Read more

CMIS

This abbreviation is written out as Content Management Interoperability Services. CMIS describes a vendor-independent, open standard that represents an abstraction or access layer above the vendor-dependent interfaces of ECM/DMS systems.
Read more

Content Services Platform

The relatively ne term Content Services Platform (CSP) is the name that has been given to the successor of Enterprise Content Management. CSP aims to allow companies to meet
Read more

Digital Archive

A digital archive is a place of storage for the safekeeping of digital information such as files, invoices, deeds or other documents.
Read more

Digital signature

The digital signature pursues and achieves two goals – the example here of a sent email makes them clear
Read more

ECM

Enterprise content management (ECM) describes all methods, tools, and technologies for the creation, processing, management, and storage of content and documents in electronic systems.
Read more

EIM

Enterprise information management (EIM) represents a further development of enterprise content management.
Read more

Electronic seals

Electronic seals are among the cryptographically secured signature procedures that have come to the fore with the eIDAS Regulation. From a technical point of view, seals of this type belong to the category of digital signatures. However, there is a big difference in the use case. Very briefly: The seal
Read more

Experience Management

The term Experience Management – otherwise known as XM for short – refers to the collection and measurement of human, subjective experiences. The goal of Experience Management is to use the data that is collected in order to improve a product or a service or to experience a situation.
Read more

Greenfield- vs. Brownfield-Approach

Both terms originate from the field of software development and from software migration projects. Both the greenfield approach and the brownfield approach describe two different approaches and strategies for how and under what conditions software projects can be successfully implemented.
Read more

HMI devices

What do the abbreviation and term HMI devices mean? HMI stands for human machine interfaces. So it’s about interfaces – with devices.
Read more

IDW PS 880

In the software sector, there is no getting around it. Knowledge of abbreviations such as IDW PS 880 is simply part of the job today. In particular, people who are involved with archiving or automated invoice processing should know this abbreviation.
Read more

Maverick Buying

This term comes from the field of purchasing management, or more precisely, from strategic purchasing. As such, Maverick Buying describes unwelcome behavior in the field of corporate purchasing management.
Read more

On-Premises

This term describes a deployment and licensing model for a deployed software solution. On-premises means something like “in-house”. Of course, this is not to be taken literally
Read more

Private Cloud

With a private cloud, companies provide cloud computing services to a select, defined group of people. This means that it is only possible for authorized users to access the services that are offered via the internet or an internal company network. For this reason – and in contrast to the public cloud
Read more

Public Key Infrastructure (PKI)

The words “public key infrastructure” come from information technology – more precisely: from the field of asymmetric encryption and its practical application.
Read more

Purchase-to-Pay Process

The words Purchase-to-Pay and Procure-to-Pay are often used synonymously. Both come from the English-speaking world. But what does Purchase-to-Pay mean?
Read more

SAP ArchiveLink®

In the context of audit-proof archiving, you may have heard about ArchiveLink, a tried-and-tested SAP technology that has been around for some time. But what exactly does SAP ArchiveLink help with? What do you need it for?
Read more

SAP Fiori

With the inclusion of Fiori, SAP has focused on a new design, UI and user experience concept. Paramount to the development of SAP Fiori are the changing user habits and devices which are used to access SAP services.
Read more

Single source of truth (SSOT)

The single source of truth, abbreviates SSOT, is a term taken from data management. It is also sometimes known as the single point of truth (SPOT).
Read more

Smart Contracts

Smart contracts are contracts whose transactions run without manual activities and thus save costs and time to a considerable extent. Translated into German, smart contracts mean 'intelligent contracts', which can be traced back to digital contracts based on blockchain technology.
Read more

Software as a Service (SaaS)

Software as a Service (SaaS) is generally understood as a software and IT infrastructure operated by an external IT provider in a Cloud.
Read more

Software Development Kit (SDK)

A software development kit provides the tools for software developers.
Read more

Three-Way-Match

As an inspection concept, the three-way match is one of the central elements of the invoice and purchase-to-pay process. How do you ensure that the items on the incoming invoice match the original purchase order? It all comes down to a comparison of the data at three checkpoints know as “matching,”
Read more

Time stamps

Following the European eIDAS Regulation, and the eIDAS Implementation Act in Germany, digital time stamps are getting a new, official role. These electronic time stamps are part of the trust services along with digital signatures and electronic seals. They are being offered by trust service providers
Read more

Video Identification

The video identification process is a method for online identification of private persons that is designed to be as simple as possible.
Read more

WebDAV protocol

The WebDAV protocol plays an important role in many software applications. Originally intended as a file-sharing protocol, its application purpose today goes beyond that. First, let's look at what WebDAV is.
Read more

WORM – write once, read many

The acronym comes from information technology and stands for “write once, read many.” Strictly speaking, WORM protection is a type of data protection – with the goal of ensuring that data once written on any storage media is unchangeable and overall cannot be deleted, but remains readable by anyone
Read more

XRechnung

The XRechnung specifies a digital format for digital invoicing. The XRechnung format was initially brought into being with the EU Directive 2014/55/EU, which then took form in German law with the E-Invoice Law of April 4, 2017 (BGBl. I p. 770). Both demonstrate the political will to create a uniform
Read more

not found what you were looking for? we are happy to help!

Newsletter

We will keep you regularly up to date. Subscribe to our newsletter and find out everything you need to know about the digitization of business processes. The topics will be prepared for you in a tailor-made and varied way.

Newsletter subscription