A security mechanism using a standard HTTP mechanism in which user information is sent received as clear text. (The term clear text indicates data is transmitted as clearly readable text characters rather than binary bit-streamed information, which is not text-formatted.) Passwords and user names are encoded but not encrypted in this type of authentication.
In source control, the process of sharing a file with another project and then separating it into two or more branches. Once a branch has been created, two files (the file in the project, and its counterpart in other projects) will have a shared history up to a certain point, and divergent histories after that time.
Representations of the nature and behavior of real-world things or concepts in terms that are meaningful to the business. For example, in an application, a customer, order, product, or invoice can be represented as a business object encapsulated for manipulation by users.
The combination of validation edits, login verifications, database lookups, policies, and algorithmic transformations that constitute an enterprise's way of doing business. Also known as business logic.