|Access Control List. A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects.
|Advanced Encryption Standard.
|Aggregation Account is an account opened to facilitate the pay-in and pay out process for any financial system.
|Agent Entity. Agent within the system such as Amethyst of Emerald.
|Agent-Merchant Entity. Both functions enacted within the system.
|Anti-money laundering (AML) refers to a set of procedures, laws or regulations designed to stop the practice of generating income through illegal actions.
|Application Programming Interface. A protocol intended to be used as an interface used by software components to communicate with each other.
|Acquired Retail and Cross-sell.
|Smart Phone Application Entity.
|Amber Remote HTTP Interface.
|Amber Remote TCP Interface.
|Automated Teller Machine.
|This account is suited to Attorneys who are acting as trustees; the attorney will hold the funds on the Customers behalf.
|Business Continuity Planning.
|This account is used when building a stock/bonds or mutual funds portfolio.
|Business requirements specifications are specifications which once delivered, provide value. Products, systems, software, and processes are ways of how to deliver, satisfy, or meet business requirements.
|Application that allows the sending of an SMS to multiple recipients
|A collection of services sold as a group usually at a discounted price or single tariff. Can also refer to an amount of data/voice minutes.
|Business-to-business. Commerce transactions between businesses conducted via the Internet.
|Central Administration Portal Entity. Administrative portal of a specific product of system.
|Change control is a systematic approach to managing all changes made to a product or system. The purpose is to ensure that no unnecessary changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently.
|Common Entity Model component within specific product system.
|SSL Certificates are small data files that digitally bind a cryptographic key to an organization's details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser.
|Combat Finance Terrorist.
|A clearing account is usually a temporary account containing costs or amounts that are to be transferred to another account.
|CLOUD (CLOUD COMPUTING)
|The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
|Client Entity. The Client of PMT for whom the system is being built.
|Central Processing Centre.
|Certificate of Deposits are known as time deposits, because the account holder has agreed to keep the money in the account for a specified amount of time, anywhere from three months to six years.
|The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together.
|Customer Relationship Management.
|Time-based job scheduler in Unix-like computer operating systems.
|Customer Selected PIN.
|Comma-Separated Values. Comma separated Values file contains different values separated by a delimiter, which acts as a database table or an intermediate form of a database table
|Enables users to deposit, withdraw and transact at a lesser cost on banking fees or on a packaged deal for bundles transaction amounts at a single monthly fee.
|Customer Entity. End Consumer consuming the service of the PMT Client.
|Database. A database is an organized collection of data.
|Database Management System. A software package designed to define, manipulate, retrieve and manage data in a database.
|The processes involved in getting new software or hardware up and running properly in its environment, including installation, configuration, running, testing, and making necessary changes.
|A demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
|Domain Name Service. A distributed hierarchical naming system for computers, services, or any resource connected to the Internet or a private network.
|Disaster Recovery. The process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity.
|Electronic funds transfer. The electronic exchange, transfer of money from one account to another.
|Where a service connects to the network. In a service-oriented architecture, any single network interaction involves two endpoints: one to provide a service, and the other to consume it. In web services, an endpoint is specified by a URI.
|Erlang is a general-purpose programming language and runtime environment. Erlang has built-in support for concurrency, distribution and fault tolerance. See: http://www.erlang.org.
|Enterprise Resource Planning. ERP facilitates the flow of information between all business functions inside the boundaries of the organization and manages the connections to outside stakeholders.
|Erlang Remote Procedure Call. A remote procedure call is a method to call a function on a remote node and collect the answer.
|An Escrow Account is a financial instrument held by a third party on behalf of two parties
|E-carrier level 1, or E1 carrier. E-carrier is a European telecommunications standard. The level 1 is a wire technology used by telecommunication operators with a data rate of2Mbit/s.
|Switching to a redundant or standby server, system, hardware or environment upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network in a controlled environment.
|File System Hierarchy Standard. Defines the directory structure and directory contents in Linux operating systems.
|Financial Intelligence Centre Act (FICA) The purpose of FICA is to combat money laundering activities by, among other things, establishing a Financial Intelligence Centre and imposing certain duties on institutions and other persons that might be used for money laundering purposes.
|Functional Requirements Specification documents the operations and activities that a system must be able to perform.
|General Data Object.
|Basic FICA registration that allows customers to transact to R25000 and transfer up to R1000 per day
|General Packet Radio Service. A technology for radio transmission of small packets of data between cellular phones and the Internet.
|A Unix command used to search files for the occurrence of a string of characters that matches a specified pattern.
|Global System for Mobile communications. A standard to describe protocols for second generation (2G) digital cellular networks.
|Graphical User Interface.
|Gateway. A gateway is an internetworking system capable of joining together two networks that use different base protocols.
|Home Location Registry. The main database of permanent subscriber information for a mobile network.
|A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing.
|Hyper Text Markup Language is a standardised system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.
|Hypertext Transfer Protocol. A protocol (utilizing TCP) to transfer hypertext requests and information between servers and browsers.
|Secure Hypertext Transfer Protocol.
|A Hybrid SLA is used when a partnership exists between the entity and PMT and the costs of the work done are shared between the two partners
|Integrated Circuit Card Identifier: a physical number printed onto a SIM card by an MNO during SIM Personalisation.
|Interface Description Language (or Interface Definition Language). A specification language used to describe a software component's interface.
|Internal Engineering Task Force is a body that defines standard Internet operating protocols such as TCP/IP.
|Number used to identify a phone - 3GPP, iDEN mobile phones and satellite phones.
|Instant Messaging and Presence Service.
|International Mobile Subscriber Identity. A unique number usually fifteen digits associated with all GSM and UMTS network mobile phone users. It is stored in the SIM inside the phone and is sent by the phone to the network.
|The Intelligent Network, typically stated as its acronym IN, is a network architecture intended both for fixed as well as mobile telecom networks. It allows operators to differentiate themselves by providing value-added services in addition to the standard telecom services such as PSTN, ISDN and GSM services on mobile phones.
|Rates that are charged for a service that is part of a bundle. E.g If you get 25 free sms a month, the in-bundle rate is R0.00 until all 25 SMSs are used.
|Is an account held at a financial facility for the purpose of a long-term investment for capital preservation, growth or fixed income.
|The Institute of Directors in Southern Africa NPC (IoDSA) is a professional body recognised by the South African Qualifications Authority (SAQA) and a non-profit company (NPC) that exists to promote corporate governance, and to maintain and enhance the credibility of directorship as a profession
|Interoperable Object Reference. A CORBA reference that uniquely identified an object on a remote CORBA server.
|Internal Voice Response.
|An international communications standard for sending voice, video and data over digital telephone lines or normal telephone wires. ISDN supports data transfer rates of 64kbps.
|International Organization for Standardization. An international-standard-setting body composed of representatives from various national standards organizations.
|International Standards Organization standard 8583. A meta-protocol providing a set of rules for the definition of financial transaction protocols.
|The International Software Testing Qualifications Board (ISTQB) is a software testing qualification certification organisation that operates internationally.
|Joint Photographic Experts Group.
|Location Area Code. A LAC is used for paging in order to indicate in which Location Area a mobile subscriber is currently situated.
|Local Area Network
|Location-Based Services. An information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device.
|Lightweight Directory Access Protocol.
|Also known as a joint/shared account, is a bank account shared by two or more individuals.
|Mobile Application Part. An SS7 protocol, which provides an application layer for the various nodes in GSM and UMTS mobile core, networks and GPRS core networks to communicate with each other in order to provide services to mobile phone users.
|Mobile Country Code. A three-digit number uniquely identifying a given country.
|A Merchant account is a type of bank that allows businesses to accept payments by payment cards
|Merchant Entity. Merchant that sells or distributes goods and services.
|Management Information Base. It comprises a collection of objects in a (virtual) database used to manage entities (such as routers and switches) in a network.
|Mobile Information Device Profile. MIDP is a specification published for the use of Java on embedded devices such as mobile phones and PDAs.
|Management Information System. An organized collection of people, procedures, software, databases and devices that provide routine information to managers and decision makers.
|Multimedia Messaging Service. A system that enables cellular phones to send and receive pictures and sound clips as well as text messages.
|Mobile Money Transfer. An E-Money management system.
|Mobile Network Code. A two or three digit number used to uniquely identify a given network from within a specified country. The MNC is part of the IMSI.
|Mobile Network Operator. A telephone company that provides services for mobile phone subscribers.
|Traffic or commands that originate from the End Users Mobile device
|Traffic or commands that terminate at the End Users Mobile device
|Multi Protocol Label Switching
|Mobile Subscriber Identification Number: a subset of the IMSI, a number used to identify the subscriber identity.
|Mobile Station International integrated Systems Digital networking Number. A number uniquely identifying a subscription in a GSM or UMTS mobile network. Simply put, it is the telephone number to the SIM card in a mobile/cellular phone.
|Message Signalling Unit. The basic data exchange unit in SS7 networks.
|Message Transfer Part. Part of the Signalling System 7 (SS7) used for communication in Public Switched Telephone Networks. MTP is responsible for reliable, unduplicated and in-sequence transport of SS7 messages between communication partners.
|Network Address Translation. In computer networking, network address translation is the process of modifying network address information in datagram (IP) packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another.
|National Electronic Fund Transfer.
|Network Statistics. A command-line tool that displays the status of network connections (both incoming and outgoing) TCP, UDP, RAW, or UNIX.
|Near Field Communication. Short-range high frequency wireless communication technology, which enables the exchange of data between devices over about a 10-centimeter distance.
|NOTICE DEPOSIT ACCOUNT
|Is an account that requires a 7-32 day notice for funds to be withdrawn.
|NOTICE POOLING ACCOUNT
|This account maximises the effectiveness of working capital, achieves flexibility and realises interest savings with either a single currency or multi-currency pooling services.
|Noise Reduction Coefficient.
|Name Server Lookup. A UNIX utility used to query Internet domain name servers. An nslookup is usually used to find the IP address corresponding to a hostname.
|Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
|The method of determining whether a mobile number has changed from one Mobile Network to another
|The Orber application is a CORBA-compliant Object Request Broker (ORB), which provides CORBA functionality in an Erlang environment. Essentially, the ORB channels communication or transactions between nodes in a heterogeneous environment.
|OTP (Open Telecom Platform) is a large collection of libraries for Erlang to do everything from compiling ASN.1 to providing a WWW server. Most projects using Erlang are actually using Erlang/OTP, i.e. the language and the libraries. OTP is also open source.
|One Time PIN.A one-time pin is a pin that is valid for only one login session or transaction.
|Outsystems Platform Entity.
|Open Web Application Security Project.
|A small piece of code inserted into a program to improve its functioning or to correct an error.
|The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.
|Portable Document Format.
|Personal development planning is the process of creating an action plan based on awareness, values, reflection, goal-setting and planning for personal development within the context of a career, education, relationship or for self-improvement.
|Process Identifier is the number assigned to a process by the operating system.
|Personal Identify Information.
|Personal Identification Number, this number is used with the SMS interface and Mobile Phone Application (MAP), and should be kept private. It is 4 to 5 digits long.
|Public Key Infrastructure.
|Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
|Post Implementation Review. Review held after the implementation of a change to determine if the change has been implemented successfully and subsequently, if the expected benefits have been obtained.
|Pattern Matched Technologies Pty (Ltd)
|Protection of Constitutional Democracy Against Terrorist and Related Activities Act.
|A port is an endpoint of communication in an operating system
|Point of sale. A term used in the payments industry that refers to the physical location where a payment transaction takes place. POS is also used to describe credit card payment acceptance systems that are designed for the place of sale, such as card swipe terminals.
|An object-relational database management system often referred to simply as Postgres.
|Subscriber is billed for their tariff plan/package and usage, usually after the billing cycle/month.
|Payment in advance for airtime by purchasing vouchers/credit.
|Payment Processor. A system that enables secure, real time processing of online credit and debit card transactions, including authentication and verification.
|Peer-to-peer. A network or data communications in which no dedicated server is involved.
|Reversed Billed URL. A configuration setup on a URL where the client is not charged for the data when accessing the configured URL via their internet enabled device
|A revolving account is an account created by a lender to represent debts where the outstanding balance does not have to be paid in full every month by the borrower to the lender.
|Radio-frequency identification. The wireless non-contact use of radio frequency electromagnetic fields to transfer data for the purpose of automatically identifying and tracking tags attached to objects.
|Request for Information.
|Request for proposal
|Request for quote.
|Remote procedure call, a network protocol that allows a computer program running on one host to cause code to be executed on another host.
|Serially Attached SCSI. A method used in accessing computer peripheral devices that employs a serial means of digital data transfer over thin cables.
|The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
|Small Computer System Interface, or SCSI (pronounced scuzzy), is a set of standards for physically connecting and transferring data between computers and peripheral devices.
|Stream Control Transmission Protocol (SCTP) is a Transport Layer protocol, serving in a similar role as the popular protocols Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
|A smart card inside a mobile phone, carrying an identification number unique to the owner, storing personal data, and preventing operation if removed
|A method of securing access to applications if the SIM Card data such as IMEI, number last ported or MNO has changed
|SIGTRAN is the name, derived from signalling transport, of the Internet Engineering Task Force (IETF) working group that produced specifications for a family of protocols that provide reliable datagram service and user layer adaptations for Signalling System 7 (SS7) and ISDN communications protocols. The SIGTRAN protocols are an extension of the SS7 protocol family. It supports the same application and call management paradigms as SS7 but uses an Internet Protocol (IP) transport called Stream Control Transmission Protocol (SCTP).
|A service level agreement (SLA) is a contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider. SLAs are output-based in that their purpose is specifically to define what the customer will receive.
|Short message peer-to-peer protocol. A telecommunications industry protocol for exchanging SMS messages between SMS peer entities such as short message service centres and/or External Short Messaging Entities.
|Short Message Service. A system that enables cellular phone users to send and receive text messages.
|Short Message Service Centre (also SMS-C). A network element in the mobile telephone network, which delivers SMS messages.
|Simple Network Management Protocol. It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.
|Service-oriented architecture. A flexible set of design principles used during the phases of systems development and integration in computing.
|Simple Object Access Protocol. SOAP is a protocol for exchanging XML-based messages over computer networks, normally using HTTP/HTTPS. SOAP forms the foundation layer of the Web services stack, providing a basic messaging framework upon which abstract layers can be built.
|Structured Query Language
|Special Sensor Microwave/Imager. A sophisticated telecommunications protocol that provides out-of-band signalling and a data interface between phone company switches for the express purpose of reducing congestion in the PSTN.
|SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser.
|SIM Swop Verification. The method in determining whether a mobile number has moved from one sim card to another
|Signal Transfer Point. A router that relays SS7 messages between signalling end-points (SEPs) and other signalling transfer points.
|Transaction Capabilities Application Part. Part of the SS7 protocol that provides transactions within the signalling network. A typical use of TCAP is to verify a card number, for the credit card calling service.
|Transmission Control Protocol. One of the core protocols of the Internet Protocol Suite.
|The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.
|The Ethics Institute is an independent public institute producing original thought leadership and offering a range of ethics-related services and products.
|Transaction Processing Function component.
|Transactions per Minute. The number of database transactions performed per minute.
|Transactions per Second. The number of database transactions performed per second.
|Transaction. This could denote a Transaction Use Case or be used as shorthand for Transaction.
|Technical system specification
|Computer networks use a tunnelling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunnelling one can (for example) carry a payload over an incompatible delivery-network, or provide a secure path through an untrusted network.
|Text File Extension. A plain text document without any formatting data, readable on virtually all computer platforms and with all text editors and viewers in the world.
|User acceptance testing. The testing cycle in which the client signs off the newly created and tested features and improvements.
|OUT OF BUNDLE
|Rates that are charged for a service once a bundle is exhausted. E.g If you get 25 free sms a month, the out-of-bundle rate is 70c per sms after all 25 free SMSs are used up.
|Universal Resource Locator. A URL is a formatted text string used by Web browsers, email clients and other software to identify a network resource on the Internet.
|Unique Subscriber Identity Number.
|User Entity. A User is a business actor accessing a CAP interface.
|Unstructured Supplementary Service Data. A USSD Gateway routes USSD messages based upon the ability of the delivery agent or the source to send and receive them. As USSD is a session-based protocol unlike its siblings (SMS and MMS), therefore, the session needs to be allocated to each and every interaction.
|Value-added service. A telecommunications industry term for non-core services or, in short, all services beyond standard voice calls and fax transmissions. For mobile phones, while technologies like SMS, MMS and GPRS are usually considered value- added services, a distinction may also be made between standard (peer-to-peer) content and premium-charged content.
|Voucher Class of service.
|Voucher generating Unit.
|Virtual Local Area Network
|A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
|Voucher Verification Number. A three-digit number that can be used to redeem vouchers in special cases where the PIN is not available (In some cases also referred to as VVV Voucher Verification Value).
|Wide Area Network
|Wireless Application Protocol. A set of protocols for connecting cellular phones and other radio devices to the Internet.
|Wireless Application Service Provider. A third party service provider who creates and distributes mobile content to subscribers via a MNOs network and infrastructure.
|Wireless Application Service Provider Association.
|A Web service (also Web Service) is defined by the W3C as "a software system designed to support interoperable Machine to Machine interaction over a network." Web services are frequently just Web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. The W3C Web service definition encompasses many different systems, but in common usage the term refers to clients and servers that communicate using XML messages that follow the SOAP standard.
|Web Services Description Language. An XML-based language that provides a model for describing Web services.
|Extensible Markup Language. A meta-language that allows users to define their own customized markup languages.
|Excel File Format.
|Extensible Markup Language Remote Procedure Call. A protocol, which uses XML to encode its calls and HTTP as a transport mechanism.
|The Youth Account provides savings on banking fees for people aged 18 years and younger.
|W3C is the main international standards organisation for the World Wide Web.
|Triple Data Encryption Standard.