Only this pageAll pages
Powered by GitBook
1 of 32

English

Loading...

Loading...

Loading...

TERMS

Loading...

Loading...

09

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

K

Loading...

Loading...

N

Loading...

Loading...

Q

Loading...

Loading...

Loading...

Loading...

V

W

X

Y

Z

THAM KHαΊ’O

Acronym

Trong tΓ i liệu nΓ y cΓ³ dΓΉng 1 sα»‘ thuαΊ­t ngα»― vΓ  Δ‘Γ΄i khi vαΊ«n để lΓ  tiαΊΏng Anh (khΓ΄ng dα»‹ch qua tiαΊΏng Việt), hoαΊ·c 1 sα»‘ tα»« viαΊΏt tαΊ―t.

TΓͺn thuαΊ­t ngα»―
TΓͺn Δ‘αΊ§y Δ‘α»§ vΓ  giαΊ£i thΓ­ch

DB

Database

MFA

Multi-Factor Authentication

GUID

Globally Unique Identifier

SMS

Short Message Service

SMTP

Simple Mail Transfer Protocol

URL

Uniform Resource Locator

JFW

Jframework

Contact

Please send an email to support@jframework.io for any questions.

Commonly confused words

Some words are confusing and difficult to understand (because they are translated from English), so it may be necessary to specify and choose an equivalent word. The current color for the document is bold.

Word list
Explanation

Template, Pattern

URL, Domain, Link

URL, Webhook, URL_Listener, URL_IPN, Payload

Provider, Partner

Ticket, Issue, Helpdesk, Help-desk, Community

Link, Register, Attach, Create, New, Add

Delivery, Send

permission, right, priviledge

Mockup, mock-up

Mock test, mock-test

Usecase, use-case, user case

Notation, term, glossary, vocab

Redeem, claim

Brand constant, App Constant

System, App

Tracking, Log

Billing vs Payment vs Price

Description, Public_Notes, Private_Notes, Internal_Notes, Notes.

Local database, internal database, temporary database, client database, and device database.

trΓͺn thiαΊΏt bα»‹ (device) cΓ³ lΖ°u file database tαΊ‘m nhu sqlite, ...

*

Introduction

Welcome

ChΓ o mα»«ng Δ‘αΊΏn vΓ³i trang danh sΓ‘ch cΓ‘c thuαΊ­t ngα»― cα»§a sαΊ£n phαΊ©m Jframework.io.

B

Brand

A brand is the identity and perception of a company, product, or service in customers' minds. It includes a unique combination of name, logo, design, values, messaging, and customer experience that differentiates a business from competitors.

Brand Owner

A Brand Owner is an individual or company legally owning and controlling a brand, its trademarks, and intellectual property. The brand owner has the exclusive rights to use the brand name, logo, and associated assets for business purposes.

Built-in object

Built-in objects have been built (built-in) in the JFW system, such as Permission and Roles (called built-in permission and built-in role). For example, when creating a brand, there will be a list of available permissions or roles such as Owner, Admin, Editor, and Viewer.

Drawing
Drawing

F

Feature

In software development, a feature is a distinct functionality or capability provided by a software product to fulfill user needs. Features define what the software can do and how it benefits the user.

Feature

Types of Features

  1. Core Features – Essential functionalities that define the primary purpose of the software.

    • Example: Sending and receiving messages in WhatsApp.

  2. Advanced Features – Additional functionalities that enhance user experience.

    • Example: End-to-end encryption in WhatsApp.

  3. UI/UX Features – Features that improve usability and design.

    • Example: Dark mode, drag-and-drop functionality.

  4. Performance Features – Enhancements related to speed, efficiency, and optimization.

    • Example: Faster page load times in a web browser.

  5. Security Features – Protect user data and ensure privacy.

    • Example: Two-factor authentication in Google accounts.

  6. Integration Features – Allow software to connect with other tools or platforms.

    • Example: Google Drive integration in Slack.

  7. Customization Features – Enable users to personalize the software.

    • Example: Custom themes in Windows OS.

How Features Are Managed in Software Development

  • Feature Requests – Users or stakeholders suggest new features.

  • Feature Prioritization – Product managers decide which features to develop first.

  • Feature Development – Engineers implement and test the features.

  • Feature Releases – New features are rolled out in updates.

J

JFW

See Jframework

JFramwork

Jframework is an adaptable authentication and authorization platform designed to enhance the security and user experience of your applications' login systems. It offers a range of features, including fine-grained authorization, universal login, single sign-on (SSO), multifactor authentication (MFA), and passwordless authentication. These capabilities enable developers to implement robust identity management solutions across various technology stacks.

E

Entry

In programming, "entry" can refer to different concepts, depending on the context.

Entry

End-dev

"End-Dev" is not commonly used as a standard industry term in software development. However, based on its structure, it could be interpreted in a few possible ways:

End-dev

1. End-Developer (End-Dev as a Short Form)

  • If "End-Dev" stands for End-Developer, it might refer to a developer working on the final stages of a software project.

  • This could involve deployment, maintenance, or user-facing features.

  • Example: "The End-Dev team ensures the product is production-ready."

2. End-to-End Development (End-Dev as an Abbreviation)

  • End-to-End Development refers to the complete software development lifecycle, from planning to deployment.

  • It covers all aspects, including front end, backend, databases, and deployment.

  • Example: "Our End-Dev process includes both UI/UX and backend integration."

End-User

An end-user is the person who ultimately uses a product, system, or software after it has been developed, distributed, or deployed. They interact with the software or hardware for its intended purpose without necessarily knowing the technical details behind its creation.

Event

An event in programming is an action or occurrence that a system detects and responds to. Events are commonly used in event-driven programming, where the flow of a program is determined by these occurrences instead of a pre-defined sequence.

Event

πŸ”Ή Common Types of Events

Event Type

Example

Where It’s Used

User Interaction Events

Click, key press, mouse movement

Web apps, GUIs

System Events

Startup, shutdown, error messages

Operating systems, servers

Network Events

Request received, connection lost

Web servers, APIs

Hardware Events

USB connected, low battery

Embedded systems, mobile devices

Custom Events

Business logic events (order placed, payment processed)

Enterprise applications

I

Invoice

An invoice is a document issued by a seller to a buyer that details a transaction, specifying the goods or services provided, their quantities, prices, payment terms, and due dates. It serves as a formal request for payment and is commonly used in business and accounting.

Invoice

πŸ”Ή Key Components of an Invoice

Component

Description

Invoice Number

A unique identifier for tracking

Date

When the invoice was issued

Seller Information

Business name, address, contact details

Buyer Information

Customer name, address, and contact details

Description of Goods/Services

Details of what was sold

Quantity & Unit Price

How much was sold and at what price

Total Amount

The total cost, including any taxes or discounts

Payment Terms

Due date, accepted payment methods, late fees

Tax Information

VAT, GST, or other applicable taxes


πŸ”Ή Example of an Invoice

yamlCopyEditINVOICE #12345
Date: 2025-03-06

From:  
Tech Solutions Ltd.  
123 Business St, City, Country  
Email: billing@techsolutions.com  

To:  
John Doe  
456 Customer Rd, City, Country  

Description:  
-------------------------------------------------  
1x Website Development Service - $1000  
2x Monthly Hosting Plan - $50 each  
-------------------------------------------------  
Subtotal: $1100  
Tax (10%): $110  
Total Due: $1210  

Payment Due By: 2025-03-20  
Payment Method: Bank Transfer / PayPal  

πŸ”Ή Types of Invoices

Type

Purpose

Proforma Invoice

Sent before delivery as a price estimate

Sales Invoice

Issued after selling goods/services

Recurring Invoice

Used for subscription-based billing

Credit Invoice

For refunds or discounts

Debit Invoice

Issued when additional charges are applied


πŸ”Ή Why Are Invoices Important?

βœ… Legal proof of transaction βœ… Tracks business revenue βœ… Helps in tax compliance βœ… Manages accounts receivable

Issue

In help desk support, an issue refers to a problem, request, or concern reported by a user that requires assistance from the support team. It can be related to software, hardware, network, or user account problems.

Issue

πŸ”Ή Types of Issues in Help Desk Support

Issue Type

Example

Technical Issue

Software crashes, system errors

Login Issue

Forgotten password, account locked

Network Issue

Slow internet, connection failure

Hardware Issue

Printer not working, laptop overheating

Service Request

New software installation, permission request

Billing Issue

Incorrect charges, invoice disputes


πŸ”Ή Issue Lifecycle in Help Desk

  1. Issue Reported – User submits a ticket via email, chat, or helpdesk portal.

  2. Ticket Created – System logs the issue and assigns a unique ID.

  3. Issue Categorized & Prioritized – Based on urgency and impact.

  4. Troubleshooting & Resolution – Support team investigates and resolves the issue.

  5. Issue Closed – User confirms the problem is fixed, and the ticket is closed.

  6. Follow-up (if needed) – For unresolved or recurring issues.


πŸ”Ή Example of an Issue Ticket

vbnetCopyEditTicket ID: #45678  
Date: 2025-03-06  
User: John Doe (john.doe@example.com)  
Issue Type: Login Issue  
Priority: High  
Description: Unable to log in to my email account. Error message: "Invalid Credentials."  
Status: Open  
Assigned To: IT Support Team  
Resolution: Password reset initiated, awaiting user confirmation.  

πŸ”Ή Why Is Issue Management Important?

βœ… Ensures quick problem resolution βœ… Improves customer satisfaction βœ… Helps track and analyze recurring issues βœ… Maintains efficient IT operations


🎯 Conclusion

πŸ”Ή An issue in help desk support is any problem or request that a user reports. πŸ”Ή It follows a structured ticketing system for tracking and resolution. πŸ”Ή Effective issue management enhances customer experience and system reliability.

M

Mode

In software and technology, "mode" refers to a specific state or operational setting that affects how a system, application, or device behaves. Modes are used to switch between different functionalities or configurations.

Mode

πŸ”Ή Examples of "Mode" in Software

1. Debug Mode (For Developers)

  • Used to troubleshoot errors in an application.

  • Example: Running an app in debug mode in Visual Studio to step through the code.

2. Dark Mode (User Interface)

  • Changes the UI background to dark colors.

  • Example: Dark mode in Windows, macOS, and mobile apps.

3. Safe Mode (System Recovery)

  • Boots with minimal drivers and settings to fix issues.

  • Example: Windows Safe Mode is used to troubleshoot startup problems.

4. Incognito Mode (Security & Privacy)

  • Prevents browsers from saving history or cookies.

  • Example: Google Chrome Incognito Mode.

P

Package

A group of related features offered together.

Package

Software Products

  • Basic Package: Includes only essential features.

  • Pro Package: Includes extra advanced features.

  • Enterprise Package: Includes all features with additional support and customization.

Password salt

Password salt is a random data string added to a password before hashing to improve security. It helps protect against rainbow table attacks and makes it harder for attackers to crack passwords using precomputed hashes.

Pay-as-you-go

Pay-as-you-go (PAYG) is a pricing model where users pay only for what they use instead of a fixed monthly or annual fee. This model is commonly used in cloud computing, utilities, and mobile services.

Pattern

A pattern is a repeated or structured arrangement of elements, concepts, or behaviors used in various fields, such as programming, design, mathematics, and problem-solving.

See #Template

Pattern vs Template is different.

Payment

Payment transfers money or value from one party to another to transfer goods, services, or financial obligations. Payments can be made using cash, digital transactions, bank instruments, or other financial instruments.

Payment gateway

A Payment Gateway is a secure service that authorizes and processes online business payments. It acts as a bridge between customers, merchants, and banks to ensure the safety and success of transactions.

Permission

In the Role-Based Access Control (RBAC) model, permissions define the specific actions a user can or cannot perform. These permissions are assigned to roles, and users are granted access based on their roles.

Price

Price refers to the money a customer must pay to purchase a product or service. The software industry's pricing models vary based on business strategy, customer needs, and market conditions.

Price

1. Types of Pricing Models in Software

A. One-Time Purchase (Perpetual License)

  • Pay once and own the software indefinitely.

  • Example: Older versions of Microsoft Office, such as Adobe Photoshop (before the subscription model).

B. Subscription-Based Pricing (Recurring Payments)

  • Users pay monthly, quarterly, or annually to access the software.

  • Examples: Microsoft 365, Netflix, AWS.

C. Freemium (Free + Premium Features)

  • The basic version is free, but premium features require payment.

  • Example: Spotify, Zoom, Trello.

D. Pay-As-You-Go (Usage-Based Pricing)

  • Customers pay based on usage (e.g., per API call, per GB of storage).

  • Examples: AWS, Google Cloud.

E. Tiered Pricing

  • Different price levels based on features or usage limits.

  • Example:

    • Basic Plan – $10/month (limited features).

    • Pro Plan – $30/month (advanced features).

    • Enterprise Plan – Custom pricing (full features & support).

F. Lifetime Deals

  • A one-time payment for lifetime access (usually for early adopters).

  • Example: Some SaaS startups offer lifetime deals on platforms like AppSumo.


2. Factors That Affect Price

  • Features & Functionality – More features = higher price.

  • Competitor Pricing – Prices are set based on market competition.

  • Target Audience – B2B software tends to be more expensive than B2C.

  • Cost of Development & Maintenance – Infrastructure, support, updates.

  • Geographical Pricing – Some companies adjust pricing based on region.

Protocol

A website protocol refers to the rules governing how data is transmitted between a web server and a browser (or client). It ensures secure, efficient, and structured communication over the internet.

Protocol site

See the Protocol.

Capture the screnshot from database SQL Server in JFW project (06/03/2025)

D

Device

A device is a physical or virtual machine designed to perform a specific function, often involving data processing, communication, or control. Devices can range from hardware components like computers and smartphones to virtual or software-based devices in cloud computing.

Device

πŸ”Ή Types of Devices

Category

Examples

Purpose

Computing Devices

Laptop, Desktop, Server

Process data and run applications

Mobile Devices

Smartphone, Tablet, Smartwatch

Portable computing and communication

Networking Devices

Router, Switch, Modem

Connect and transfer data over networks

Storage Devices

SSD, HDD, USB Drive

Store and retrieve data

IoT Devices

Smart Home Devices, Wearable Tech

Internet-connected automation and monitoring

Input Devices

Keyboard, Mouse, Scanner

Send data to a computer

Output Devices

Monitor, Printer, Speaker

Display or output processed information

Cloud & Virtual Devices

Virtual Machine (VM), Cloud Server

Software-defined computing environments

Distributor

A software distributor is a company or individual that buys software licenses from developers or vendors and resells them to businesses, resellers, or end users. They act as intermediaries between software vendors and customers, handling sales, support, and sometimes value-added services.

Distributor

πŸ”Ή Key Roles of a Software Distributor

Role

Function

License Management

Distributes software licenses to resellers or businesses

Sales & Marketing

Promotes software solutions in target markets

Technical Support

Provides troubleshooting and customer support

Customization & Integration

Offers value-added services like software customization

Training & Education

Provides training on software usage

Compliance & Legal Support

Ensures licenses comply with regulations


πŸ”Ή Types of Software Distributors

Type

Description

Example

Retail Software Distributor

Sells software directly to end users or businesses

Microsoft Office distributors for small businesses

Value-Added Distributor (VAD)

Offers extra services like support, training, and customization

A cybersecurity distributor offering setup & consulting

Cloud Software Distributor

Focuses on SaaS (Software-as-a-Service) solutions

AWS or Microsoft Azure resellers

OEM Software Distributor

Bundles software with hardware products

Windows pre-installed on Dell laptops

Enterprise Software Distributor

Supplies large-scale software solutions to businesses

ERP software distributors (SAP, Oracle)


πŸ”Ή Software Distributor vs. Software Reseller

Feature

Software Distributor

Software Reseller

Buys From

Software vendors/developers

Distributors or vendors

Sells To

Resellers, businesses, or end users

End users or businesses

Stock Management

Manages software inventory and licenses

Usually sells on-demand

Additional Services

Provides support, training, and consulting

Focuses mainly on sales

Example

Distributes Microsoft 365 licenses to IT resellers

An IT company selling Microsoft 365 to its clients


πŸ”Ή Why Use a Software Distributor?

βœ… Wider Market Reach – Vendors can sell their software globally without direct involvement. βœ… Reduced Operational Costs – Distributors handle sales, support, and licensing. βœ… Expertise & Support – Businesses get professional help for integration and troubleshooting. βœ… Compliance & Licensing Management – Distributors ensure proper legal distribution of software.


🎯 Conclusion

πŸ”Ή A software distributor is an intermediary that sells and manages vendor software licenses. πŸ”Ή They provide sales, support, and value-added services for businesses and resellers. πŸ”Ή Common types include retail, cloud, enterprise, and value-added distributors.

S

Schedule

Xem Scheduler

Scheduler

A scheduler in software is a system component that manages and controls the execution of tasks, processes, or jobs based on predefined rules and timing. It determines which task runs, when it runs, and for how long.

Scheduler

πŸ”Ή Types of Schedulers in Software

1️⃣ CPU Scheduler (Process Scheduler) πŸ–₯️

βœ” Found in operating systems, it decides which process gets CPU time. βœ” Uses scheduling algorithms like FCFS, Round Robin, Priority Scheduling. πŸ“Œ Example: Windows Task Manager schedules processes efficiently.

2️⃣ Job Scheduler πŸ“…

βœ” Handles scheduled batch jobs, reports, and automated workflows. βœ” Used in enterprise IT systems, cloud platforms, and databases. πŸ“Œ Example: Cron Jobs in Linux, Windows Task Scheduler, Jenkins for CI/CD.

3️⃣ Task Scheduler πŸ“‹

βœ” Manages background tasks within applications. βœ” Often used for automated backups, email notifications, and recurring tasks. πŸ“Œ Example: A task scheduler in a web app sends daily reports at midnight.

4️⃣ Database Query Scheduler πŸ“Š

βœ” Optimizes query execution time by scheduling database operations efficiently. πŸ“Œ Example: MySQL event scheduler runs stored procedures at scheduled times.

5️⃣ Cloud & Container Orchestration Scheduler ☁️

βœ” Schedules cloud-based workloads, container deployments, and microservices. πŸ“Œ Example: Kubernetes Scheduler assigns pods to nodes.


πŸ”Ή Why is Scheduling Important?

βœ” Efficiency: Ensures optimal use of system resources (CPU, memory). βœ” Automation: Reduces manual intervention in running repetitive tasks. βœ” Performance: Prevents overload and improves system responsiveness. βœ” Scalability: Helps manage tasks across distributed systems.


πŸ”Ή Key Takeaways

πŸ”Ή A scheduler manages task execution in software & systems. πŸ”Ή Used in OS, cloud computing, databases, automation, and DevOps. πŸ”Ή It ensures efficiency, automation, and resource management.

Scope

Scope refers to the boundaries or limits within which something is defined, accessed, or applicable. It is widely used in software development, project management, and security.

Soft-delete

Soft deletion is a technique used in databases and applications in which data is not permanently deleted but marked as "inactive" or "deleted." This allows for data recovery and maintains historical records.

Soft-delete

πŸ”Ή How does soft delete work?

1️⃣ Instead of deleting a record, a "deleted" flag (e.g., is_deleted = TRUE) is set. 2️⃣ The data remains in the database but is hidden from normal queries. 3️⃣ If needed, the record can be restored by changing the flag.

πŸ“Œ Example (SQL Soft-Delete)

sqlCopyEditUPDATE users 
SET is_deleted = TRUE 
WHERE user_id = 123;

Instead of deleting the row, it marks it as deleted.

πŸ“Œ Restoring a Soft-Deleted Record

sqlCopyEditUPDATE users 
SET is_deleted = FALSE 
WHERE user_id = 123;

πŸ”Ή Soft-Delete vs. Hard-Delete

Feature

Soft-Delete

Hard-Delete

Data Recovery

βœ… Possible

❌ Not possible

Performance Impact

🚨 Can slow queries (more filtering)

⚑ Faster deletion

Storage Usage

πŸ“ˆ More space required

βœ… Less space used

Audit & History

βœ… Retains history

❌ No record remains


πŸ”Ή When to use soft delete

βœ” When data recovery is needed (e.g., user accounts, transactions). βœ” For auditing and logging (e.g., keeping a history of deleted records). βœ” To prevent accidental data loss in applications.


πŸ”Ή When to Use Hard-Delete?

βœ” When storage is a concern and data is no longer needed. βœ” For compliance reasons where data must be completely removed. βœ” For temporary data that does not need recovery.


πŸ”Ή Soft-Delete in Frameworks

  • Django ORM: soft_delete = models.BooleanField(default=False)

  • Laravel Eloquent: use SoftDeletes;

  • MongoDB: { "is_deleted": true }


πŸ”Ή Key Takeaways

πŸ”Ή Soft-delete marks data as deleted instead of removing it. πŸ”Ή Allows recovery and auditing and prevents data loss. πŸ”Ή Used in databases, SaaS applications, and enterprise systems.

Service

In software, a service is a self-contained unit of functionality that performs specific tasks and can run independently or as part of a more extensive system. Services are commonly used in operating systems, web applications, cloud computing, and microservices architectures.

JFW supports 11 services, such as Identity, CDN, Security, Billing, Payment, ...

Statement

In project management, a statement refers to a formal document or declaration that defines key aspects of a project, such as its objectives, scope, deliverables, constraints, and assumptions. Statements help set clear expectations and guide project execution.

Subscription

In software and business, a subscription is a pricing model in which users pay a recurring fee (monthly, yearly, or for a custom period) to access a product or service.

Subscrption Type

A Subscription Type defines the duration and conditions of access to a service or product. For example, a 90-day subscription allows users to access the service for 90 days from the activation date, after which they must renew or extend it.

Subscription Type

Common Subscription Types by Duration

  1. Short-Term Subscriptions

    • 7 days (weekly)

    • 30 days (monthly)

    • 90 days (quarterly)

  2. Long-Term Subscriptions

    • 6-month (semi-annual)

    • 1-year (annual)

    • Lifetime (one-time payment for permanent access)

Subscription Renewal Types

  • Auto-Renewal: Automatically renews after 90 days unless canceled.

  • Manual Renewal: Users must manually renew after 90 days.

  • One-Time Access: No renewal, expires after 90 days.

System

It is JFW or service, an object without a specified Brand.

C

CDN

See Content Delivery Network

CDN (Content Delivery Network)

A CDN is a distributed server system that delivers web content (images, videos, scripts, HTML, etc.) quickly and efficiently to users based on their geographical location.

CDNs help reduce latency, improve website performance, and enhance security by caching content closer to end users.

CDN

πŸ”Ή How a CDN Works

1️⃣ User Requests Content β†’ A visitor accesses a website (e.g., loading an image or video). 2️⃣ CDN Routes Request to Nearest Server β†’ Instead of retrieving data from the origin server (which may be far away), the CDN serves cached content from a nearby edge server. 3️⃣ Faster Load Time β†’ Since data travels a shorter distance, website speed improves and reduces server load.

πŸ“Œ Example: A user in New York visits a website hosted in Singapore. Without a CDN, the data would travel long distances, causing slow loading. With a CDN, the content is delivered from a CDN server in New York, making the site load much faster.


πŸ”Ή Benefits of Using a CDN

Benefit

Description

Faster Load Times

Delivers content from the nearest server, reducing delay.

Reduced Server Load

Offloads traffic from the origin server, improving performance.

Better Scalability

Handles traffic spikes without crashing the website.

DDoS Protection

Blocks malicious traffic and prevents server overload.

Global Availability

Ensures content is accessible worldwide with minimal lag.


πŸ”Ή Common CDN Providers

CDN Provider

Features

Cloudflare

Security, DDoS protection, free tier

Akamai

Enterprise-grade CDN with high performance

Amazon CloudFront

Part of AWS, integrates with other AWS services

Google Cloud CDN

Optimized for Google Cloud users

Fastly

Used by large-scale media and streaming companies


πŸ”Ή When Should You Use a CDN?

βœ… High-traffic websites that serve users worldwide βœ… Websites with a lot of static content (images, CSS, JavaScript) βœ… Video streaming platforms and media-heavy sites βœ… E-commerce websites that need fast page loads to improve sales βœ… Mobile applications that serve global users

Coupon

A coupon is a promotional tool that offers a discount, special offer, or other benefits to users when they purchase a product or service. In the software industry, coupons are commonly used to attract new customers, retain existing ones, and boost sales.

Coupon

1. Types of Coupons in Software & Subscriptions

A. Discount Coupons

  • Offers a percentage or fixed amount off the price.

  • Example: "20% off your first month" on a SaaS subscription.

B. Free Trial Coupons

  • Provides limited-time free access to a product or service.

  • Example: "Get 7 days of premium features for free!"

C. Buy One, Get One (BOGO)

  • Users get an extra service or free subscription period.

  • Example: "Buy 1 year, get three extra months free!"

D. Referral Coupons

  • Users earn discounts or credits by referring others.

  • For example, "Invite a friend, and both get $10 off!" (Dropbox, Uber model).

E. Seasonal or Limited-Time Coupons

  • Discounts are available during special events (Black Friday, Cyber Monday, New Year).

  • Example: "50% off for 3 months – Limited time!"

F.. Loyalty or Retention Coupons

  • Special discounts are available for long-term customers or those at risk of canceling.

  • Example: "Come back & get 30% off your next renewal!"

Claim

In sales, a Claim refers to a statement, promise, or assurance made by a business or salesperson about a product, service, or offer. It is used to convince potential customers by highlighting benefits, features, or guarantees.

Conf

See Conf

Configure (cαΊ₯u hΓ¬nh)

Động tα»«, dα»‹ch lΓ  cαΊ₯u hΓ¬nh. Đôi khi dΓΉng trong use-case hay cΓ’u: "configre the settings".

Configuration

Configuration refers to setting up, customizing, and adjusting the components of a system, software, hardware, or network to function according to specific requirements. It involves defining settings, parameters, and preferences to ensure optimal performance.

Concept

A concept is an abstract idea, thought, or principle that helps explain or define something. It is a foundation for understanding, reasoning, and problem-solving in various fields such as business, science, philosophy, and technology.

Constant

A constant is a fixed value that does not change throughout the execution of a program, a mathematical equation, or a scientific principle. It is widely used in programming, mathematics, and physics.

Commission

A commission is a payment or fee earned based on a percentage of sales, transactions, or services provided. It is commonly used in sales, business, finance, and freelance work as an incentive for performance.

πŸ”Ή Types of Commission

Type

Definition

Example

Sales Commission

Paid based on the number or value of sales made

A real estate agent earns 3% of a home sale price

Performance-Based Commission

Earned when specific targets or goals are met

A salesperson gets a $500 bonus for exceeding quota

Flat-Rate Commission

A fixed amount paid per transaction

A recruiter gets $1,000 per hired candidate

Tiered Commission

Increases as sales volume grows

5% for the first $10,000 in sales, then 10% beyond that

Residual Commission

Ongoing payments for recurring sales

Insurance agents earn commissions on policy renewals

Affiliate Commission

Earned for referring customers to a business

Bloggers get a 10% commission from product referrals


πŸ”Ή Commission in Business & Sales

πŸ”Ή Used as an Incentive – Motivates employees and salespeople to perform better. πŸ”Ή Encourages Productivity – Higher sales lead to higher earnings. πŸ”Ή Common in Affiliate Marketing – Online influencers earn commissions from referrals.

πŸ“Œ Example in Sales:

  • A salesperson sells a $50,000 car with a 5% commission rate.

  • Their commission = $50,000 Γ— 5% = $2,500.

cPanel

cPanel is a web-based control panel allowing users to manage web hosting services easily. It provides a graphical user interface (GUI) for managing domains, files, databases, emails, security, and more without needing advanced technical skills.

CRUD

CRUD stands for Create, Read, Update, Deleteβ€”the four fundamental operations used to manage objects in databases, APIs, and applications.

CRUD

CRUD Operation

Description

Example in Object Context

Create (C)

Adds a new object to a database or system

Creating a new user in an app

Read (R)

Retrieves data from an object

Fetching a product’s details from a store

Update (U)

Modifies an existing object

Changing a user’s email address

Delete (D)

Removes an object from storage

Deleting a post from a blog

A

AdminTool

Admintool (Admin Tool hoαΊ·c AdminTool) lΓ  thuαΊ­t ngα»― viαΊΏt tαΊ―t cα»§a "administration tool". Trong JFW, Admin Tool lΓ  cΓ΄ng cα»₯ quαΊ£n trα»‹ được xΓ’y dα»±ng trΓͺn JFW.

Administrator

Administrator (viαΊΏt tαΊ―t: Admin) cΓ³ nghΔ©a lΓ  quαΊ£n trα»‹ viΓͺn, người chα»‹u trΓ‘ch nhiệm quαΊ£n lΓ½ vΓ  giΓ‘m sΓ‘t mα»™t hệ thα»‘ng, tα»• chα»©c hoαΊ·c nền tαΊ£ng cα»₯ thể.

API

API (Application Programming Interface) is a set of rules and protocols allowing different software applications to communicate. APIs enable data exchange, service requests, and automation between systems without requiring direct access to their internal code

API Protocol

An API Protocol is a set of rules and standards that define how APIs send and receive data between systems. It ensures that different applications can communicate smoothly, securely, and efficiently over networks (like the internet).

For example, protocol.jframework.io is an API protocol in JFW. Of course, "[protocol]" must be replaced for SSL and secuirty like https://ajdkhf2323khlasd.jframework.io.

Auth0

Auth0 is an Identity and Access Management (IAM) platform that provides application authentication and authorization services. It helps developers secure user logins, manage user identities, and enforce access control without building authentication from scratch.

πŸ”Ή Owned by Okta (since 2021) πŸ”Ή Common Uses: Single Sign-On (SSO), Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), API security πŸ”Ή Supports: Web apps, mobile apps, APIs, IoT

Auth0

πŸ”Ή Key Features of Auth0


πŸ”Ή How Auth0 Works?

1️⃣ User requests login β†’ Enters credentials (username/password, Google login, etc.). 2️⃣ Auth0 verifies identity β†’ Uses database, social login, or enterprise login. 3️⃣ Access token issued β†’ If successful, Auth0 sends a JWT (JSON Web Token). 4️⃣ Application grants access β†’ User can now access protected resources.

πŸ“Œ Example: JWT (JSON Web Token) issued by Auth0


πŸ”Ή Common Authentication Methods in Auth0


πŸ”Ή Auth0 vs. Firebase Authentication vs. AWS Cognito


πŸ”Ή Why Use Auth0?

βœ… Saves Development Time – No need to build authentication from scratch. βœ… Secure & Scalable – Supports MFA, RBAC, OAuth2, JWT. βœ… Works with Any Tech Stack – Supports JavaScript, React, Node.js, Python, etc. βœ… Supports Customization – Custom login pages, rules, hooks, and branding.

API

πŸ”Ή How API Works?

1️⃣ A client (requester) sends a request to an API (e.g., a mobile app requests weather data). 2️⃣ The API processes the request and interacts with the backend system. 3️⃣ The API returns a response with the requested data or action (e.g., weather details in JSON format).

πŸ“Œ Example of API Request & Response (JSON format)

πŸ”Ή Request: A mobile app asks for weather data

πŸ”Ή Response: The API returns weather details


πŸ”Ή Types of APIs

1️⃣ Web APIs (Most Common)

βœ” Used for communication between web-based services over the internet. βœ” Examples: REST API, SOAP API, GraphQL API.

2️⃣ Library/API Frameworks

βœ” APIs within programming libraries (e.g., Pandas API for Python, Java APIs).

3️⃣ Operating System APIs

βœ” APIs that allow software to interact with the OS (e.g., Windows API, POSIX API).

4️⃣ Hardware APIs

βœ” Allows software to control hardware devices (e.g., Bluetooth API, Camera API).


πŸ”Ή Common API Protocols


πŸ”Ή Real-World Examples of APIs

βœ” Google Maps API – Used by ride-sharing apps (Uber, Lyft) to get location data. βœ” PayPal API / Stripe API – Used for online payments in e-commerce websites. βœ” Twitter API – Allows developers to pull tweets, post updates, and analyze trends.


πŸ”Ή API vs. Web Service

Feature
API
Web Service

πŸ”Ή Why Are APIs Important?

βœ… Automation – Enables applications to interact without manual input. βœ… Scalability – Allows services to expand by integrating external tools. βœ… Security – Controls access to system functionality using authentication (OAuth, API Keys). βœ… Innovation – Encourages third-party developers to build on top of existing platforms.

httpCopyEditGET /weather?city=NewYork HTTP/1.1
Host: api.weather.com
jsonCopyEdit{
    "city": "New York",
    "temperature": "18Β°C",
    "condition": "Cloudy"
}

Protocol

Description

Example

REST API

Uses HTTP methods (GET, POST, PUT, DELETE). Lightweight & widely used.

Twitter API, Google Maps API

SOAP API

Uses XML for data exchange. More secure but complex.

Banking APIs, Payment APIs

GraphQL API

Allows clients to request only needed data. More flexible.

Facebook API, Shopify API

WebSocket API

Enables real-time, two-way communication.

Chat applications, live stock market feeds

Definition

Interface for communication

API designed for web-based communication

Protocols

Can use REST, SOAP, GraphQL, etc.

Mostly uses HTTP/HTTPS

Usage

Broad usage (software, OS, hardware)

Specifically for web applications

Feature

Description

Authentication

Secure login using passwords, social logins (Google, Facebook), or enterprise logins (LDAP, SAML)

Authorization (RBAC)

Assign user roles & permissions (Admin, User, Manager, etc.)

Single Sign-On (SSO)

Users log in once and access multiple applications

Multi-Factor Authentication (MFA)

Adds extra security with OTP, biometrics, or hardware tokens

API Security

Protects APIs using OAuth 2.0, JWT (JSON Web Tokens)

User Management

Store, manage, and analyze user profiles

Passwordless Login

Log in using email links, SMS, or biometrics (no password required)

jsonCopyEdit{
  "sub": "auth0|123456789",
  "name": "John Doe",
  "role": "admin",
  "iat": 1617187200,
  "exp": 1617190800
}

Auth Method

Description

Username & Password

Traditional login using a database

Social Login

Sign in with Google, Facebook, GitHub, etc.

Enterprise Login

Uses LDAP, SAML, or Active Directory

MFA (Multi-Factor Authentication)

Requires extra verification (OTP, push notification, etc.)

Passwordless Login

Users log in using email links or SMS codes

Feature

Auth0

Firebase Auth

AWS Cognito

Ease of Use

Easy, prebuilt UI

Simple, but tied to Firebase

Complex, AWS-focused

Custom Authentication

Yes

Limited

Yes

Supports Social Login

Yes

Yes

Yes

Supports Enterprise Login (SAML, LDAP)

Yes

No

Yes

API Security (OAuth2, JWT)

Yes

Yes

Yes

Free Tier?

Yes (Limited)

Yes

Yes

L

License

A license in software is a legal agreement that specifies how a user can use a particular software product. It defines the rights, restrictions, and responsibilities of the software provider (developer, company) and the end user (individual, organization).

In JFW, it means a Subscription license.

License

Types of Software Licenses

  1. Proprietary License (Closed Source)

    • The software is owned by a company or an individual.

    • Users must purchase or obtain permission to use it.

    • Modification and redistribution are usually prohibited.

    • Example: Microsoft Windows, Adobe Photoshop.

  2. Open Source License

    • The source code is publicly available.

    • Users can modify, distribute, and use the software under specified conditions.

    • Example: Linux, Apache, MySQL.

  3. Freeware

    • The software is free to use but usually retains copyright.

    • It may have restrictions on modification or redistribution.

    • Example: Google Chrome, Skype.

  4. Shareware

    • Users can try the software for free for a limited time.

    • After the trial period, they must purchase a full license.

    • Example: WinRAR.

  5. Copyleft License

    • Requires that any modified versions must also be distributed under the same terms.

    • Example: GNU General Public License (GPL).

  6. Perpetual vs. Subscription License

    • Perpetual License: One-time purchase with indefinite use. (Example: Old versions of Microsoft Office)

    • Subscription License: Users pay regularly (monthly/yearly) for continued access. (Example: Office 365, Adobe Creative Cloud)

Link

See URL

O

Object (Đối tượng)

An object is a self-contained unit that combines data (attributes/properties) and behavior (methods/functions). Objects are created from classes, which act as blueprints.

In object-oriented programming (OOP), an object is a self-contained unit that combines data (attributes/properties) and behavior (methods/functions). Objects are created from classes, which act as blueprints.

HΓ¬nh chα»₯p copy tα»« source code cα»§a .NET project cΓ³ folder conf (hay config)

R

Rate

In the context of currency exchange, the term "Rate" refers to the exchange rate, which is the value of one currency in relation to another. It tells you how much one unit of a currency is worth in another currency.

See the Exchange rate.

Redeem

"Redeem" means to exchange, claim, or convert something of value, such as points, vouchers, or credits, for a reward, cash, or service.

Redeem

πŸ”Ή Common Uses of "Redeem"

1️⃣ Redeem Points or Rewards

  • Use loyalty points to get discounts, free items, or services.

  • Example: "You can redeem 500 points for a $10 gift card."

2️⃣ Redeem Vouchers or Coupons

  • Convert a promo code or gift card into discounts or products.

  • Example: "Enter this code to redeem a 20% discount on your next order."

3️⃣ Redeem Digital Codes

  • Claim a digital product using a unique code.

  • Example: "You can redeem your Xbox Game Pass code to activate your subscription."

4️⃣ Redeem Bonds or Investments

  • Cash out financial securities like bonds or stocks.

  • Example: "Investors can redeem their bonds after five years for the full value."


πŸ”Ή Example Sentences

βœ” "I redeemed my airline miles for a free flight." βœ” "You can redeem this gift card at any store location." βœ” "He worked hard to redeem his reputation after the scandal."

Referral

See the Referral User

Referral User

A Referral User is a person who joins a service, buys a product, or signs up for an account through a referral link or referral program. This user is typically introduced by an existing customer who gets rewarded for the referral.

Referral code

A Referral Code is a unique alphanumeric code assigned to users that allows them to refer others to a service, product, or platform. When a new user signs up or purchases using the referral code, the referrer and the new user may receive rewards like discounts, credits, or cashback.

Referee

A Referee is someone who is being referred to a service, job, or opportunity by another person.

Reseller

A Reseller is a person or business that buys products or services from a manufacturer, wholesaler, or provider and then sells them to customers for a profit. Resellers do not typically produce the goods themselves but act as intermediaries.

See the Distributor.

Resource

A resource can be used to accomplish a task, support a process, or achieve a goal. Resources can be physical, digital, financial, or human. Here is in JFW:

  • Object

  • Service

RBAC (Role-Based Access Control)

Xem Role-Base Access Control

RBAC (Role-Based Access Control)

Role-Based Access Control (RBAC) is a security model that restricts access to systems, data, or resources based on a user's role within an organization. Instead of granting permissions to individual users, permissions are assigned to roles, and users are then assigned to those roles.

Role

A role is a defined set of permissions, responsibilities, or actions assigned to a user or system within an organization or application. Roles help control access by grouping users with similar privileges.

Role

πŸ”Ή Types of Roles in Different Contexts

1️⃣ Roles in IT & Software Security (RBAC)

In Role-Based Access Control (RBAC), roles determine what a user can and cannot do in a system. πŸ“Œ Example:

  • Admin β†’ Full access (create, edit, and delete users).

  • Editor β†’ Can create and edit content but not delete.

  • Viewer β†’ Can only read content.

2️⃣ Roles in Organizations

In businesses, roles define job functions and responsibilities. πŸ“Œ Example:

  • HR Manager β†’ Manages employee records.

  • Sales Executive β†’ Handled customer interactions.

  • IT Support β†’ Maintains technical infrastructure.

3️⃣ Roles in Software Development

Roles help manage access to databases, applications, and programming systems. πŸ“Œ Example:

  • Database Administrator (DBA) β†’ Manages database access.

  • Frontend Developer β†’ Works on user interfaces.

  • Backend Developer β†’ Handles server-side logic.

4️⃣ Roles in Cloud & SaaS Applications

Cloud services (AWS, Azure, Google Cloud) use roles for access control. πŸ“Œ Example:

  • IAM Role in AWS β†’ Defines permissions for cloud resources.

  • Service Account Role in Google Cloud β†’ Grants API access to applications.


πŸ”Ή Why Use Roles?

βœ” Security: Restricts unauthorized access. βœ” Efficiency: It simplifies permission management. βœ” Scalability: Easier to manage access for growing teams.


πŸ”Ή Key Takeaways

πŸ”Ή Role = A defined set of permissions or responsibilities. πŸ”Ή Used in RBAC, IT security, business, cloud, and development. πŸ”Ή Helps with access control, security, and organization management.

T

Template

In programming, the term "Template" can have different meanings depending on the context and the language used.

See the Pattern.

U

User

See the End-User.