Skip to main content

Bioscience QMS Work Order System — Comprehensive Glossary

Classification: Internal — Reference
Date: 2026-02-13
Version: 5.0 (comprehensive — all terms from all 79+ artifacts + system prompt v8, alphabetized A→Z)
Scope: Every acronym, technical term, and domain concept appearing across all markdown artifacts, JSX dashboards, ADRs, meta-prompts, and specification documents


A

TermDefinitionCODITECT EquivalentEcosystem Analogs
ABACAttribute-Based Access Control — access decisions based on attributes of user, resource, and environmentFuture RBAC extensionAzure ABAC, AWS IAM policies
ACIAgent-Computer Interface — Anthropic principle that tool design for AI agents deserves equal investment to HCITool Engineering principleAnthropic agent guidelines
ACIDAtomicity, Consistency, Isolation, Durability — transaction properties guaranteed by PostgreSQLDatabase transaction modelSQL standard
ACVAnnual Contract Value — average annual revenue per customer contract; target $240K at maturityRevenue metricSaaS ACV
ADRArchitecture Decision Record — structured document capturing architectural decisions with context, alternatives, consequencesadrs/ artifact collectionMADR, Nygard ADR format
AES-256Advanced Encryption Standard (256-bit key) — symmetric encryption for data at rest in PostgreSQL TDEEncryption configurationNIST standard
Agent MessageTyped data structure routed between agent nodes via Event Bus with payload, correlation ID, and metadataAgentMessage interfaceLangGraph StateMessage, Temporal Signal
Agent Session IDUnique identifier for a CODITECT agent execution trace, linking audit entries to specific agent runsAuditTrail.agentSessionIdOpenTelemetry Trace ID
AICPAAmerican Institute of Certified Public Accountants — defines SOC 2 Trust Service CriteriaCompliance standard body
APIApplication Programming Interface — contract defining component communication; CODITECT uses REST + eventsAPI Gateway layerOpenAPI 3.1, gRPC, GraphQL
ApprovalFormal decision record (APPROVED/REJECTED) linked to an electronic signature for Part 11 complianceApproval entityServiceNow Approval, Veeva eSignature
Approval ChainOrdered sequence of required approvals; regulatory WOs need System Owner + QA; tenant-configurableCompliance Engine configVeeva Approval Workflow
Approval GateMandatory checkpoint requiring human e-signed approval before state advancement; database-enforcedCheckpoint ManagerTemporal Activity
ARRAnnual Recurring Revenue — total annualized subscription revenue; Y3 target $28.8MRevenue metricSaaS ARR
ARPUAverage Revenue Per User — revenue divided by active user countRevenue metricSaaS ARPU
AssetPhysical or logical item in QMS — device, computer, instrument — with lifecycle status and CMMS referenceAsset entityMaximo Asset, ServiceNow CI
AsyncIOPython asynchronous I/O framework for Agent Orchestrator non-blocking executionOrchestrator runtimeNode.js async, Go goroutines
Audit TrailImmutable, append-only record of all entity changes; DB trigger prevents modification per Part 11 §11.10(e)AuditTrail entityVeeva Audit Trail, TrackWise
ANVISAAgência Nacional de Vigilância Sanitária — Brazil's national health surveillance agency regulating pharmaceuticals, medical devices, and biologics; relevant for CODITECT's Brazil market entry (Y3)Regulatory jurisdiction mappingFDA, EMA, MHRA, TGA
APPIAct on the Protection of Personal Information — Japan's data protection law governing handling of personal data; relevant for CODITECT's Japan market entryRegulatory jurisdiction mappingGDPR, LGPD, PIPEDA
ARIAAccessible Rich Internet Applications — W3C specification for making web content accessible to assistive technologiesWCAG complianceWAI-ARIA, Section 508
Auth0Identity-as-a-Service platform — IdP option for CODITECT SSO integrationIdP integration optionKeycloak, Okta, Azure AD
AWSAmazon Web Services — cloud infrastructure provider; CODITECT architecture is cloud-agnostic but references AWS analogsCloud provider referenceGCP, Azure

B

TermDefinitionCODITECT EquivalentEcosystem Analogs
BAABusiness Associate Agreement — HIPAA-required contract between covered entity and business associate handling PHICompliance documentStandard HIPAA BAA
BCPBusiness Continuity Plan — documented procedures for maintaining operations during disruptionOperational readinessDRP, DR
BDDBehavior-Driven Development — testing methodology writing tests as user stories in Given/When/Then formatTest strategy optionCucumber, Jest BDD
BOMBill of Materials — structured component list referenced in manufacturing work ordersFuture WO extensionERP BOM, MES BOM
BPMNBusiness Process Model and Notation — standardized graphical notation for business process workflowsDocumentation formatUML Activity, Flowcharts
BRDBusiness Requirements Document — high-level business needs specificationPlanning artifactPRD, MRD
Break-GlassEmergency access mechanism that bypasses normal authorization controls with enhanced logging and mandatory justification; required by HIPAA §164.312(a)(2)(ii)Emergency access procedureHIPAA emergency access, privileged access management
BuildxDocker CLI plugin for extended build capabilities including multi-platform image builds and build caching; used in CI/CD pipeline for container image creationCI/CD build toolDocker Build, Kaniko

C

TermDefinitionCODITECT EquivalentEcosystem Analogs
C4 ModelArchitecture description framework: Context (C1), Container (C2), Component (C3), Code (C4)C4 artifact suiteStructurizr, Arc42
CACCustomer Acquisition Cost — total sales + marketing cost per new customer; target $45KRevenue metricSaaS CAC
CAGRCompound Annual Growth Rate — annualized growth rate; QMS market ~8.2% CAGRMarket metric
CAPACorrective and Preventive Action — process triggered by WO rejection patterns indicating systemic quality issuesCODITECT CAPA moduleVeeva CAPA, TrackWise CAPA
CAPA ActionIndividual corrective or preventive task within a CAPA record, tracked to completion with evidence and verification; generates WOs automaticallyCAPAAction entityTrackWise tasks, Veeva actions
Canary DeploymentRelease strategy routing a small percentage of traffic (10%→50%→100%) to the new version while monitoring error rates and latency before full rolloutProduction deployment strategyBlue-green, rolling update
Causation IDIdentifier linking a domain event to the event or command that caused it, enabling causal chain reconstruction in event-driven systemsEvent envelope fieldCorrelation ID (related)
CCPACalifornia Consumer Privacy Act — California data privacy law granting consumers rights over personal dataInternational complianceGDPR, LGPD, PIPEDA
CDECardholder Data Environment — PCI-DSS defined boundary containing systems that store, process, or transmit cardholder dataPCI-DSS compliance scopeNetwork segmentation
Chaos EngineeringDiscipline of proactively injecting failures into production-like systems to discover weaknesses; WO system defines 6 chaos experimentsTesting strategyLitmus, Chaos Monkey, Gremlin
Conway's LawObservation that system architecture mirrors the communication structure of the organization building it; used in team topology designTeam topology alignmentInverse Conway Maneuver
CosignContainer image signing tool from Sigstore project; used with Cloud KMS to cryptographically sign container images in CI/CD pipelineSupply chain securityNotary, Docker Content Trust
Cursor PaginationAPI pagination method using opaque cursors instead of page numbers; provides consistent results during concurrent modificationsAPI design patternOffset pagination, keyset pagination
CDCChange Data Capture — detecting data changes in PostgreSQL WAL for event publishingTransactional Outbox patternDebezium, Maxwell
CDMOContract Development and Manufacturing Organization — outsourced pharmaceutical manufacturingTarget customer segmentLonza, Catalent, Samsung Biologics
CFRCode of Federal Regulations — US federal regulatory law; Title 21 covers FDA regulationsRegulatory framework
Change ControlRegulated process of planning, executing, reviewing, and approving changes to validated systemsWO Lifecycle EngineITIL Change Management
ChangeItemTarget of a Work Order — device, system, or document being changed, linked to Asset entityChangeItem entityServiceNow CI, Maximo Asset
Child WOExecution-level Work Order linked to Master WO via masterId; maps to CODITECT Worker agent patternWorkOrder with masterIdMaximo Child WO
CI/CDContinuous Integration / Continuous Deployment — automated build-test-deploy pipelineGoogle Cloud BuildJenkins, GitHub Actions
Circuit BreakerThree-state (closed/open/half-open) failure detection pattern preventing cascading agent failuresOrchestrator componentHystrix, Resilience4j
CLIAClinical Laboratory Improvement Amendments — US regulation for laboratory testing quality standardsAdjacent regulatory domainCAP accreditation
CMMSComputerized Maintenance Management System — manages maintenance, work orders, and assetsIntegration targetMaximo, SAP PM, eMaint
CODITECTAutonomous AI development platform for regulated industries by AZ1.AI Inc.Platform name
COGSCost of Goods Sold — direct delivery costs; primarily compute + AI model tokensFinancial metric
CPMCost Per Mille (thousand) — cost per 1000 tokens in AI model pricingToken economics metric
CQRSCommand Query Responsibility Segregation — separate read and write models for state managementArchitecture patternEvent Sourcing complement
CROContract Research Organization — outsourced clinical research partnerTarget customer segmentIQVIA, Labcorp Drug Dev
CRUDCreate, Read, Update, Delete — four basic database operationsData access patternREST verbs mapping
CSVComputer System Validation — FDA-required validation methodology for regulated software systemsCompliance processIQ/OQ/PQ, GAMP 5
CTECommon Table Expression — SQL WITH clause for readable complex queriesDatabase query pattern
CTOChief Technology Officer — technical leadership role; Hal Casteel at AZ1.AIExecutive roleVP Engineering
CUIDCollision-resistant Unique Identifier — alternative to UUID for shorter, URL-safe IDsID generation optionUUID, ULID, NanoID

D

TermDefinitionCODITECT EquivalentEcosystem Analogs
DAGDirected Acyclic Graph — Master/Child WO dependency structure; enforces no circular dependenciesWO hierarchy modelAirflow DAG, Temporal Workflow
DDDDomain-Driven Design — software design approach modeling domain concepts explicitlyArchitecture methodologyBounded Contexts, Aggregates
DHFDesign History File — FDA-required documentation of medical device design processCompliance documentation21 CFR 820
DIDependency Injection — design pattern for providing object dependencies; InversifyJS in TheiaTheia architecture patternSpring DI, Angular DI
DICOMDigital Imaging and Communications in Medicine — healthcare imaging data standardIntegration protocolHL7, FHIR
DMRDevice Master Record — FDA-required documentation containing device specifications and proceduresCompliance documentation21 CFR 820
DMSDocument Management System — controlled document storage with versioning and access controlIntegration targetSharePoint, Documentum
DRPDisaster Recovery Plan — procedures for restoring systems after catastrophic failureOperational readinessBCP, RPO/RTO
Data Classification5-level taxonomy (L0 Public → L4 Regulated) applied to all data fields, determining encryption, access control, retention, and residency requirementsData architecture foundationNIST data classification, ISO 27001
Data LineageTracking of data origin, transformations, and access as a directed acyclic graph; required for regulatory traceability and auditLineage tracking engineApache Atlas, Marquez, dbt
Data ResidencyRequirement that data physically resides within a specific geographic jurisdiction; driven by GDPR, LGPD, HIPAATenant-level config (data_residency_region)Data sovereignty, data localization
Data SubjectIndividual whose personal data is processed; has rights (access, deletion, portability, correction) under GDPR, LGPD, CCPAConsent managementData controller, data processor
DeviationDocumented departure from expected result during validation (IQ/OQ/PQ); classified as Critical, Major, Minor, or ObservationDeviation report in validationNon-conformance, OOS
DistrolessMinimal container base images containing only the application runtime and dependencies, with no shell, package manager, or OS tools; reduces attack surfaceContainer image baseAlpine, scratch, chainguard
DLQDead Letter Queue — destination for messages that cannot be processed after maximum retries; monitored for operational issuesNATS DLQ subjectRabbitMQ DLQ, AWS SQS DLQ
Domain EventImmutable record of something that happened in the system, following a standard envelope schema with correlation ID, causation ID, and data classification metadataEvent catalog eventsCloudEvents, EventBridge
DPIAData Protection Impact Assessment — GDPR-required evaluation of processing activities that may result in high risk to data subjectsPrivacy compliancePIA, HIPAA risk assessment

E

TermDefinitionCODITECT EquivalentEcosystem Analogs
E2EEnd-to-End — testing methodology validating complete workflow from input to outputTest strategyIntegration testing
EAMEnterprise Asset Management — lifecycle management of physical assets across an organizationIntegration domainMaximo, SAP EAM
EBITDAEarnings Before Interest, Taxes, Depreciation, and Amortization — profitability metricFinancial metric
ECNEngineering Change Notice — formal notification of change to engineering documentation or productQMS document typeECO, CAPA
ECOEngineering Change Order — formal authorization to implement an engineering changeQMS document typeECN, CAPA
ECSElastic Container Service — AWS managed container orchestration serviceDeployment optionGKE, Azure ACI
EHRElectronic Health Record — digital health record system; FDA-regulated integration targetIntegration targetEpic, Cerner, MEDITECH
ELKElasticsearch, Logstash, Kibana — open-source log aggregation and search stackObservability optionOTEL + Grafana stack
ELNElectronic Laboratory Notebook — digital lab notebook for recording experiments and observationsAdjacent QMS systemLabArchives, Benchling
EMAEuropean Medicines Agency — EU pharmaceutical regulatory authority equivalent to FDAInternational regulatoryFDA, MHRA, TGA
ePHIElectronic Protected Health Information — digital health data protected under HIPAAHIPAA scopePHI (paper form)
ERDEntity-Relationship Diagram — visual schema representation; WO system has 20+ entitiesDesign artifactUML Class Diagram
ERPEnterprise Resource Planning — integrated business management softwareIntegration targetSAP, Oracle ERP
Error BudgetAllowed failure threshold derived from SLO (e.g., 99.95% uptime = 0.05% error budget); when consumed, feature development pauses for reliability workSLA frameworkGoogle SRE error budgets
Event CatalogComprehensive inventory of all domain events with schemas, producers, consumers, data classification, and compliance implicationsDomain event registryAsyncAPI, EventCatalog
Event EnvelopeStandard wrapper for domain events containing metadata (id, type, timestamp, tenant, actor, correlation/causation IDs, data classification)DomainEvent interfaceCloudEvents specification
Expand-ContractSchema evolution pattern: add new column/field (expand), migrate data, switch readers, remove old column (contract); enables zero-downtime migrationsSchema migration strategyParallel change, strangler fig

F

TermDefinitionCODITECT EquivalentEcosystem Analogs
FATFactory Acceptance Testing — pre-delivery testing at manufacturer site; maps to IQ validationValidation phaseIQ, SAT
FDAFood and Drug Administration — US federal agency regulating food, drugs, medical devices, biologicsPrimary regulatory bodyEMA, MHRA, TGA
FHIRFast Healthcare Interoperability Resources — HL7 standard for healthcare data exchangeIntegration protocolHL7 v2, DICOM
FKForeign Key — database constraint linking related tables; enforces referential integrityData model constraint
FMEAFailure Mode and Effects Analysis — risk assessment methodology identifying potential failure pointsRisk management toolFTA, HAZOP
FRSFunctional Requirements Specification — detailed functional behavior of a systemPlanning artifactURS, SRS
FSMFinite State Machine — computational model with discrete states and transitions; WO uses 9-state FSMWO Lifecycle EngineXState, Spring SM
FSMAFood Safety Modernization Act — US law for food safety preventive controlsAdjacent regulatory domainHACCP, GMP
FTAFault Tree Analysis — top-down risk analysis method using Boolean logicRisk management toolFMEA, HAZOP
FTEFull-Time Equivalent — unit measuring one person's full-time workloadResource metric
FDA 483FDA Form 483 — inspectional observation form listing conditions that may constitute regulatory violations; requires written response within 15 business daysAudit finding typeWarning Letter, Consent Decree
Feature FlagRuntime toggle controlling feature availability per tenant, role, or percentage; in regulated environments, flag state changes are auditable and cannot bypass compliance controlsFeature flag architectureLaunchDarkly, Flagsmith, Unleash
Fishbone DiagramRoot cause analysis tool (also called Ishikawa diagram) categorizing potential causes into People, Process, Technology, Equipment, Materials, MeasurementCAPA root cause methodFive Whys, Fault Tree
Fitness FunctionAutomated architectural test verifying the system still meets its design principles as it evolves (e.g., no L4 data in logs, all endpoints authenticated)Architecture governanceArchUnit, fitness functions
Five WhysRoot cause analysis technique iteratively asking "why" to drill from symptom to root cause; structured template in CAPA workflowCAPA root cause methodFishbone, Fault Tree
FluentbitLightweight log processor and forwarder; collects structured JSON logs from containers and ships to Grafana Loki in the observability stackLog collection agentFluentd, Logstash, Vector

G

TermDefinitionCODITECT EquivalentEcosystem Analogs
GAGeneral Availability — product release ready for all customersRelease milestoneBeta, RC
GAMPGood Automated Manufacturing Practice — ISPE guidelines for pharmaceutical system validation (GAMP 5)Validation methodologyIQ/OQ/PQ, CSV
GCPGoogle Cloud Platform — cloud provider; CODITECT primary deployment target via Google AI AcceleratorCloud infrastructureAWS, Azure
GDPRGeneral Data Protection Regulation — EU data privacy regulation affecting data handling and consentInternational complianceHIPAA, PIPEDA, CCPA
GKEGoogle Kubernetes Engine — managed Kubernetes service on GCP; CODITECT uses GKE Autopilot with multi-zone deployment for production workloadsContainer orchestrationEKS (AWS), AKS (Azure)
GLBAGramm-Leach-Bliley Act — US law requiring financial institutions to protect consumer financial informationFintech regulatorySOC 2, PCI-DSS
GLPGood Laboratory Practice — quality standards for non-clinical laboratory studiesRegulatory standardGMP, GCP (clinical)
GMGross Margin — revenue minus COGS divided by revenue; target 78%Financial metric
GMPGood Manufacturing Practice — quality standards for manufacturing regulated productsRegulatory standardGLP, ISO 13485
Golden ImageVerified, compliant system state captured after approved change; used as rollback baselineWO completion artifactSystem snapshot, Checkpoint
GRCGovernance, Risk, and Compliance — integrated approach to organizational governanceIntegration domainRSA Archer, ServiceNow GRC
GTMGo-to-Market — strategy for launching products; CODITECT uses 3-phase GTM (Lighthouse→Vertical→Enterprise)Business strategy

H

TermDefinitionCODITECT EquivalentEcosystem Analogs
HACCPHazard Analysis and Critical Control Points — food safety management system based on risk analysisAdjacent regulatoryFSMA, GMP
HAZOPHazard and Operability Study — structured risk analysis examining process deviationsRisk management toolFMEA, FTA
HCIHuman-Computer Interface — design discipline for human-system interaction; ACI is the agent equivalentDesign disciplineUX, UI
HIPAAHealth Insurance Portability and Accountability Act — US healthcare data privacy and security lawCompliance frameworkGDPR, PIPEDA
HL7Health Level Seven — healthcare interoperability standards organization and protocol familyIntegration protocolFHIR, DICOM
HLDHigh-Level Design — architectural overview document before detailed designDesign artifactSDD, C4 Context
HPLCHigh Performance Liquid Chromatography — analytical technique requiring calibrated instruments tracked in WO systemInstrument type (Tool entity)GC, Mass Spec
HMACHash-based Message Authentication Code — cryptographic method for webhook signature verification using shared secret keysWebhook securityJWT, API key
HPAHorizontal Pod Autoscaler — Kubernetes resource automatically scaling pod replicas based on CPU, memory, or custom metricsGKE autoscalingAWS Auto Scaling
Human CheckpointMandatory point where agent execution pauses for human decision; non-negotiable for Part 11 approvalsCheckpoint Manager componentTemporal Human-in-the-Loop

I

TermDefinitionCODITECT EquivalentEcosystem Analogs
IAMIdentity and Access Management — framework for managing digital identities and access rightsSecurity infrastructureAWS IAM, Azure AD, Okta
ICHInternational Council for Harmonisation — harmonizes pharmaceutical regulatory guidelines globallyRegulatory frameworkICH Q7 (GMP), Q9 (Risk)
IaCInfrastructure as Code — managing and provisioning infrastructure through machine-readable configuration files rather than interactive toolsTerraform modulesPulumi, CloudFormation, CDK
ICU MessageFormatInternational Components for Unicode message formatting standard for pluralization, gender, and locale-aware string interpolationi18n string externalizationFormatJS, react-intl
IdempotencyProperty where an operation produces the same result regardless of how many times it is applied; enforced via X-Request-ID header preventing duplicate WO operationsAPI design principleIdempotency key, exactly-once
IDEIntegrated Development Environment — software development workspace; CODITECT uses Eclipse TheiaIDE Shell containerVS Code, JetBrains
IdPIdentity Provider — external authentication service providing identity assertionsSSO integrationAuth0, Okta, Azure AD
IPOInitial Public Offering — first sale of stock to public; relevant to market trajectory analysisFinancial milestoneVC, Series funding
IQInstallation Qualification — validation proving system installed correctly per specificationsValidation phase (IQ/OQ/PQ)GAMP 5
IQ/OQ/PQInstallation/Operational/Performance Qualification — three-phase validation methodology for regulated systemsValidation protocol suiteGAMP 5, CSV
IQVIAGlobal CRO and health information technology company — market data sourceMarket referenceVeeva, ICON
IRInvestor Relations — communication between company and investment communityBusiness function
IRRInternal Rate of Return — discount rate making NPV of investment zeroFinancial metricNPV, ROI
ISOInternational Organization for Standardization — publishes quality and safety standards (13485, 27001, 9001)Compliance standardsAICPA, FDA
ISPEInternational Society for Pharmaceutical Engineering — publishes GAMP guidelinesIndustry bodyPDA, AICPA
ITILInformation Technology Infrastructure Library — IT service management best practices frameworkProcess frameworkCOBIT, ISO 20000
ITSMIT Service Management — managing IT services lifecycle; ITIL-basedProcess domainServiceNow ITSM, BMC
IVDIn Vitro Diagnostic — medical device for testing specimens outside the bodyDevice classificationIVDR (EU regulation)
IVDRIn Vitro Diagnostic Regulation — EU regulation for IVD medical devices (2017/746)EU regulatoryFDA 21 CFR 809

J

TermDefinitionCODITECT EquivalentEcosystem Analogs
JobPlanExecution blueprint for a Work Order — defines steps, skills, tools, materials, and work instructionsJobPlan entityMaximo Job Plan
JSONBJSON Binary — PostgreSQL binary JSON data type enabling indexed queries on semi-structured dataDatabase column typeMongoDB BSON
JSXJavaScript XML — React syntax extension for describing UI components; used for all dashboard artifactsDashboard file formatTSX (TypeScript variant)
JWTJSON Web Token — compact, signed token for API authentication and authorizationAPI Gateway authOAuth 2.0 access tokens

K

TermDefinitionCODITECT EquivalentEcosystem Analogs
KPIKey Performance Indicator — measurable value demonstrating operational effectivenessBusiness metricOKR (complementary)
KustomizeKubernetes-native configuration management tool using overlays to customize base manifests per environment without templatingK8s manifest managementHelm, jsonnet

L

TermDefinitionCODITECT EquivalentEcosystem Analogs
LangGraphLangChain framework for building stateful multi-agent workflows with graph-based orchestrationAgent orchestration analogTemporal, Prefect
LGPDLei Geral de Proteção de Dados — Brazil's general data protection law, analogous to GDPR; relevant for CODITECT's Brazil market entry (Y3)Regulatory jurisdiction mappingGDPR, CCPA, APPI
LIMSLaboratory Information Management System — manages lab samples, tests, and workflowsAdjacent QMS systemLabVantage, STARLIMS
LLMLarge Language Model — AI model architecture powering CODITECT agents (Claude Opus/Sonnet/Haiku)Agent intelligence layerGPT, Gemini, Llama
LTVLifetime Value — projected total revenue from a customer; target $840K (3.5 years × $240K ACV)Revenue metricSaaS LTV

M

TermDefinitionCODITECT EquivalentEcosystem Analogs
MADRMarkdown ADR format — standardized template for Architecture Decision RecordsADR template formatNygard ADR
Master WOParent Work Order coordinating multiple child WOs; uses DAG hierarchy with aggregation rulesWorkOrder with childrenMaximo Master WO
MDRMedical Device Regulation — EU regulation for medical devices (2017/745) replacing MDDEU regulatoryFDA 21 CFR 820
MESManufacturing Execution System — controls and monitors manufacturing processes in real-timeIntegration targetSiemens Opcenter, Rockwell
MFAMulti-Factor Authentication — authentication requiring 2+ verification factors; required for e-signaturesSignature securityTOTP, FIDO2, SMS
MHRAMedicines and Healthcare products Regulatory Agency — UK pharmaceutical regulatory authorityInternational regulatoryFDA, EMA, TGA
Model RouterCODITECT component selecting optimal AI model per task segment based on complexity and regulatory flagsOrchestrator componentCODITECT differentiator
MRRMonthly Recurring Revenue — ARR divided by 12; Y3 target $2.4M/monthRevenue metricSaaS MRR
MQLMarketing Qualified Lead — prospect who has engaged with marketing content and meets firmographic criteria; feeds sales pipeline in GTM strategyGTM funnel stagePQL, SQL (Sales)
mTLSMutual TLS — bidirectional certificate authentication between servicesInter-service securityService mesh, Istio
MVPMinimum Viable Product — smallest feature set validating core value propositionProduct milestonePOC, Pilot

N

TermDefinitionCODITECT EquivalentEcosystem Analogs
NATSNeural Autonomic Transport System — high-performance messaging system for event busEvent Bus optionRedis Streams, RabbitMQ
NDANon-Disclosure Agreement — legal contract protecting confidential information; required for auditor access, customer demonstrations, and enterprise salesLegal/compliance documentMutual NDA, CNDA
NCRNon-Conformance Report — document recording deviation from specifications or proceduresQMS document typeCAPA, SCAR
NPVNet Present Value — present value of future cash flows minus initial investmentFinancial metricIRR, ROI
NRRNet Revenue Retention — revenue from existing customers including expansion minus churn; target 140%Revenue metricSaaS NRR, NDR

O

TermDefinitionCODITECT EquivalentEcosystem Analogs
OIDCOpenID Connect — identity layer on OAuth 2.0 for SSO authenticationSSO protocolSAML, OAuth 2.0
OKRObjectives and Key Results — goal-setting framework for measuring outcomesBusiness planningKPI (complementary)
OOTBOut of the Box — functionality available without customizationFeature classificationCustom, Configurable
OQOperational Qualification — validation proving system operates correctly under expected conditionsValidation phase (IQ/OQ/PQ)GAMP 5
ORMObject-Relational Mapping — abstraction layer mapping objects to database tables; Prisma in CODITECTData access layerTypeORM, Sequelize, SQLAlchemy
OTELOpenTelemetry — observability framework for traces, metrics, and logs across distributed systemsObservability stackJaeger, Zipkin, Datadog
OTPOne-Time Password — single-use authentication code for MFA; used in e-signature re-authenticationAuthentication mechanismTOTP, HOTP
OWASPOpen Worldwide Application Security Project — nonprofit producing security tools, standards, and the OWASP Top 10 vulnerability list; referenced in security architecture threat modelingSecurity standardsCWE, NIST CSF

P

TermDefinitionCODITECT EquivalentEcosystem Analogs
PCI-DSSPayment Card Industry Data Security Standard — security standard for handling credit card dataFintech complianceSOC 2, GLBA
PDAParenteral Drug Association — global pharmaceutical and biopharmaceutical science organizationIndustry bodyISPE, ICH
PHIProtected Health Information — individually identifiable health data regulated under HIPAAData classificationePHI (electronic form), PII
PIC/SPharmaceutical Inspection Co-operation Scheme — international GMP harmonization bodyRegulatory bodyICH, ISPE
PIIPersonally Identifiable Information — data that can identify an individualData classificationPHI (health-specific)
PIPEDAPersonal Information Protection and Electronic Documents Act — Canadian privacy lawInternational complianceGDPR, CCPA
PKIPublic Key Infrastructure — framework for managing digital certificates and encryption keysSecurity infrastructureCertificate Authority, mTLS
PLMProduct Lifecycle Management — managing entire lifecycle of a product from inception to disposalIntegration domainSiemens Teamcenter, PTC
PMProduct Manager or Project Manager — role responsible for product/project directionBusiness rolePMM, PO
PMAPre-Market Approval — FDA's most rigorous device marketing pathway for Class III devicesRegulatory pathway510(k), De Novo
PMFProduct-Market Fit — degree to which a product satisfies strong market demandBusiness milestoneMVP validation
PMMProduct Marketing Manager — role bridging product development and go-to-marketBusiness rolePM, GTM lead
POCProof of Concept — minimal implementation validating technical feasibilityDevelopment milestoneMVP, Pilot
PQPerformance Qualification — validation proving system performs consistently under real-world conditionsValidation phase (IQ/OQ/PQ)GAMP 5
PRDProduct Requirements Document — detailed product feature and behavior specificationPlanning artifactBRD, FRS
PagerDutyIncident management platform for on-call alerting, escalation, and incident response automationAlert routing destinationOpsgenie, VictorOps
PIRPost-Incident Review — structured analysis of an incident after resolution covering timeline, root cause, impact, and corrective actions; P0 requires PIR within 5 business daysIncident response artifactPostmortem, RCA, blameless retro
Poka-yokeError-proofing design principle from manufacturing; in CODITECT, applied to tool design so AI agents cannot make common mistakes (Anthropic ACI Principle 3)Tool Engineering principleDefensive design, guardrails
PactConsumer-driven contract testing framework verifying API compatibility between service providers and consumers; used in CI pipeline for agent and API contract testsContract testing toolSpring Cloud Contract, Specmatic
PITRPoint-in-Time Recovery — PostgreSQL capability to restore a database to any specific moment using base backups + WAL replay; Tier 3 RPO strategy for agent logsDatabase recovery mechanismWAL replay, flashback
PLGProduct-Led Growth — GTM strategy where the product itself drives acquisition, activation, and expansion; contrasted with sales-led and marketing-led motionsGTM strategy optionSales-led, marketing-led
PQLProduct Qualified Lead — user who has demonstrated meaningful product engagement (e.g., completed onboarding, created 5+ WOs) qualifying them for sales outreachGTM funnel stageMQL, SQL (Sales)
PrismaTypeScript ORM and schema definition tool; used for CODITECT data model definitionData access layerTypeORM, Drizzle

Q

TermDefinitionCODITECT EquivalentEcosystem Analogs
QAQuality Assurance — role ensuring quality standards; in WO system, QA approves regulatory changes with e-signatureRBAC roleQuality Manager
QMSQuality Management System — organizational system for quality policies, objectives, and processesDomain contextISO 9001, ISO 13485
QSRQuality System Regulation — FDA 21 CFR 820 requirements for medical device quality systemsRegulatory standardISO 13485, EU MDR

R

TermDefinitionCODITECT EquivalentEcosystem Analogs
RBACRole-Based Access Control — access model with 8 roles: Originator, Assigner, Assignee, System Owner, QA, Vendor, Admin, AuditorAccess control modelABAC, ACL
RESTRepresentational State Transfer — architectural style for web APIs; CODITECT API Gateway uses RESTAPI stylegRPC, GraphQL
RFC 7807Problem Details for HTTP APIs — standard format for machine-readable error responses; used for all WO API error responsesAPI error formatGraphQL errors, gRPC status
Risk Matrix5×5 grid (likelihood × impact) producing risk scores 1–25; determines CAPA priority, approval escalation, and timeline requirementsRisk assessment toolFMEA severity × occurrence
Risk ScoreNumerical product of likelihood (1–5) × impact (1–5); scores ≤6 Low, 7–12 Medium, 13–19 High, 20–25 CriticalCAPA prioritizationRisk Priority Number (RPN)
RLSRow-Level Security — PostgreSQL feature filtering rows by tenant_id; enforces multi-tenant isolationData isolation mechanismOracle VPD, SQL Server RLS
ROIReturn on Investment — gain from investment relative to cost; compliance automation delivers 300-500% ROIFinancial metricNPV, IRR
Root CauseFundamental reason why a non-conformance occurred; determined via Five Whys, Fishbone, or Fault Tree analysis during CAPA workflowCAPA root cause analysisRCA (Root Cause Analysis)
RPCRemote Procedure Call — protocol for executing functions on remote systemsCommunication patterngRPC, JSON-RPC
RPORecovery Point Objective — maximum acceptable data loss measured in timeDisaster recovery metricRTO
RTORecovery Time Objective — maximum acceptable downtime after failureDisaster recovery metricRPO
RaftDistributed consensus algorithm used by NATS JetStream and HashiCorp Vault for leader election and data replication across cluster nodesCluster consensusPaxos, ZAB (ZooKeeper)

S

TermDefinitionCODITECT EquivalentEcosystem Analogs
SAGADistributed transaction pattern using compensating transactions for multi-step workflowsEvent-driven coordinationTemporal Workflow, Cadence
SAMServiceable Addressable Market — portion of TAM reachable with current product; $1.9B across 6 segmentsMarket metricTAM, SOM
SAMLSecurity Assertion Markup Language — XML-based SSO protocol for enterprise authenticationSSO protocolOIDC, OAuth 2.0
SATSite Acceptance Testing — post-delivery testing at customer site; maps to OQ validationValidation phaseFAT, OQ
SBOMSoftware Bill of Materials — inventory of all software components, dependencies, and versions in a delivered artifact; generated by Syft in SPDX format per supply chain securitySupply chain securityCycloneDX, SWID
SCARSupplier Corrective Action Request — formal request to supplier to address quality issueQMS document typeNCR, CAPA
SDDSystem Design Document — high-level system architecture with context diagrams, components, scaling modelArchitecture artifactHLD, C4 model
SDKSoftware Development Kit — tools and libraries for building applications on a platformDeveloper toolingAPI, CLI
SDLCSoftware Development Lifecycle — phases of software creation from planning to maintenanceDevelopment processAgile, Waterfall
Seed DataSynthetic, reproducible dataset used to populate non-production environments; in regulated systems, must never contain real PHI/PII and must cover all state machine pathsTest data managementFixtures, factories, faker
SHA-256Secure Hash Algorithm (256-bit) — cryptographic hash function for audit trail checksums and integrity verificationData integrity mechanismMD5 (deprecated), SHA-3
SIEMSecurity Information and Event Management — security monitoring with log correlation and alertingSecurity integrationSplunk, QRadar, Sentinel
SLAService Level Agreement — contractual performance commitments (uptime, response time)Operational metricSLI, SLO
SLIService Level Indicator — measured metric feeding SLO calculations (latency, error rate, throughput)Observability metricSLA, SLO
SLOService Level Objective — target value for an SLI; internal goal informing SLAOperational targetSLI, SLA
Smoke TestMinimal post-deployment verification that critical paths function; run after every production deployment before full traffic shiftPost-deploy validationCanary test, health check
SemgrepLightweight static analysis tool using pattern-matching rules for security scanning, code quality, and policy enforcement in CI pipelinesSecurity scanning (CI)ESLint, SonarQube, CodeQL
Service MeshInfrastructure layer handling service-to-service communication with features like mTLS, load balancing, and observability; referenced in zero-trust network architectureNetwork security optionIstio, Linkerd, Envoy
SnykDeveloper-first security platform for vulnerability scanning of dependencies, containers, and IaC; used alongside Trivy in CI pipelineDependency scanning (CI)Dependabot, Grype, Renovate
SOC 2Service Organization Control Type 2 — AICPA trust service criteria audit for security, availability, integrityCompliance frameworkISO 27001, SOC 1
SODSeparation of Duties — control principle preventing one person from completing conflicting tasks; 6 rules enforcedSecurity constraintDual control, four-eyes
SOMServiceable Obtainable Market — realistic market capture; Y3 target $28.8M ARR (120 customers)Market metricTAM, SAM
SOPStandard Operating Procedure — documented step-by-step instructions for routine operationsQMS document typeWI, Work Instruction
SPDXSoftware Package Data Exchange — Linux Foundation standard format for communicating SBOM component informationSBOM output formatCycloneDX, SWID
SQLStructured Query Language — standard language for relational database operationsDatabase interface
SRSSoftware Requirements Specification — detailed technical requirements documentPlanning artifactFRS, URS
SSLSecure Sockets Layer — predecessor to TLS; deprecated but term still commonly usedLegacy security protocolTLS 1.3 (current)
SSOSingle Sign-On — one login grants access to multiple systems; OIDC/SAML-basedAPI Gateway integrationOkta, Azure AD
State Machine9-state lifecycle engine with composable guards (DRAFT→PLANNED→SCHEDULED→IN_PROGRESS→PENDING_REVIEW→APPROVED/REJECTED→COMPLETED/CANCELLED)WO Lifecycle EngineXState, Spring SM
STRIDESpoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege — Microsoft's threat modeling methodology used in security architectureThreat model frameworkPASTA, DREAD, LINDDUN
SyftOpen-source SBOM generation tool from Anchore; produces SPDX or CycloneDX output from container images and source codeCI/CD SBOM generationTrivy (also generates SBOM)

T

TermDefinitionCODITECT EquivalentEcosystem Analogs
TAMTotal Addressable Market — total demand; primary $3.5B (Change Control $2.1B + CSV $1.4B by 2028)Market metricSAM, SOM
TCOTotal Cost of Ownership — complete cost including purchase, deploy, operate, maintainBusiness metricROI
TDDTechnical Design Document — implementation spec with APIs, data models, deployment. Also: Test-Driven DevelopmentArchitecture artifact / Test methodology
TDETransparent Data Encryption — database-level encryption for data at rest (AES-256)PostgreSQL encryptionOracle TDE
TemporalDurable execution platform for long-running workflows with built-in retry and state persistenceAgent orchestration analogLangGraph, Prefect
TenantIsolated customer organization; all data partitioned by tenant_id with PostgreSQL RLSPlatform tenant modelSaaS multi-tenancy
TerraformHashiCorp Infrastructure as Code tool for defining and provisioning cloud resources declaratively; CODITECT uses modular structure with environment overlaysIaC frameworkPulumi, CloudFormation, CDK
TGATherapeutic Goods Administration — Australian pharmaceutical and medical device regulatory authorityInternational regulatoryFDA, EMA, MHRA
TheiaEclipse Theia — open-source IDE framework with InversifyJS DI; CODITECT developer interfaceIDE Shell containerVS Code, JetBrains
Time EntryActual work record — person, vendor, hours, rate type, cost center for WO execution trackingTimeEntry entityMaximo Labor
TLSTransport Layer Security (v1.3) — cryptographic protocol securing network communicationsNetwork securitymTLS, SSL (deprecated)
Token BudgetPre-allocated token limit per agent; warning at 80%, hard stop at 95% to control AI costsBudget ControllerCODITECT differentiator
ToolPhysical equipment for WO execution — tracked with calibration status and availability windowsTool entityMaximo Tool
Transactional OutboxEvents written to outbox table in same database transaction as state change, then published to event busEvent Bus integration patternDebezium CDC
TrivyOpen-source container vulnerability scanner by Aqua Security; blocks CI builds with Critical/High CVEs; also generates SBOMsContainer security scanningSnyk, Grype, Clair
TSCTrust Service Criteria — AICPA framework defining SOC 2 audit categories (Security, Availability, Processing Integrity, Confidentiality, Privacy)SOC 2 compliance frameworkISO 27001 controls
TSXTypeScript JSX — TypeScript variant of JSX for type-safe React componentsCode file formatJSX (JavaScript)
TTLTime To Live — expiration duration for cached data, tokens, session, or signature delegationConfiguration parameterCache TTL
Two-Phase SignaturePhase 1: create ElectronicSignature record, Phase 2: bind to Approval — consumed flag prevents reuseSignature Service patternCODITECT innovation

U

TermDefinitionCODITECT EquivalentEcosystem Analogs
UATUser Acceptance Testing — end users validate system meets requirements before production deploymentValidation phasePQ
ULIDUniversally Unique Lexicographically Sortable Identifier — time-ordered alternative to UUIDID generation optionUUID, CUID
UMLUnified Modeling Language — standardized visual modeling notation for software systemsDocumentation formatC4, BPMN
URSUser Requirements Specification — document capturing user needs and expectationsPlanning artifactFRS, SRS
UUIDUniversally Unique Identifier — 128-bit globally unique ID used as primary key for all entitiesPrimary key formatULID, CUID
UUID v7Time-ordered UUID variant (RFC 9562) — embeds Unix timestamp for natural chronological ordering; used for event IDs and idempotency keysEvent and request ID formatULID, CUID, UUID v4
UXUser Experience — design discipline focused on user interaction quality and satisfactionDesign practiceUI, HCI

V

TermDefinitionCODITECT EquivalentEcosystem Analogs
Validation StatusAsset classification: VALIDATED, PENDING_VALIDATION, NOT_APPLICABLE — determines regulatory controls appliedAsset.validationStatusGxP validation state
VCVenture Capital — private equity investment in early-stage companies; relevant to funding strategyFunding sourceAngel, Series A/B/C

W

TermDefinitionCODITECT EquivalentEcosystem Analogs
WALWrite-Ahead Log — PostgreSQL mechanism writing changes to log before data pages; basis for CDC and replicationDatabase mechanismRedo log, Binlog
WASMWebAssembly — binary instruction format for browser-native code execution at near-native speedIDE terminal option
WCAGWeb Content Accessibility Guidelines — W3C standard for web accessibility; WO system targets WCAG 2.1 AA compliance for all user-facing interfacesAccessibility standardSection 508, ARIA, ADA
WebhookHTTP callback delivering real-time event notifications to external systems; WO system supports 8+ subscribable event types with HMAC signature verificationIntegration patternPolling, WebSocket, SSE
WIWork Instruction — controlled step-by-step execution document referenced by JobPlanJobPlan.workInstructionRefSOP, Maximo WI
WOWork Order — atomic change control record; fundamental unit of regulated change management in QMSWorkOrder entityMaximo WO, ServiceNow Change
WOMSWork Order Management System — complete system managing WO lifecycle from creation to completionWO EngineMaximo, ServiceNow
Workload IdentityGKE mechanism binding Kubernetes service accounts to GCP IAM service accounts; eliminates need for exported key files in containersGKE IAM integrationAWS IRSA, Azure Workload Identity
WTPWillingness To Pay — maximum price a customer will pay for a solution; used in pricing analysisPricing metricPrice sensitivity

X

TermDefinitionCODITECT EquivalentEcosystem Analogs
XStateJavaScript/TypeScript state machine and statechart library — analog for WO state machineState machine analogSpring SM, Akka FSM

Y–Z

TermDefinitionCODITECT EquivalentEcosystem Analogs
Zero TrustSecurity model assuming no implicit trust for any entity inside or outside the network; every request is authenticated, authorized, and encrypted regardless of originNetwork security architectureBeyondCorp, ZTNA, SASE

No additional terms currently defined for Y.


Total terms: 400+
Coverage: All 79+ artifacts (markdown + JSX + ADRs + meta-prompts), system prompt v8.0, specification documents, and gap closure series
Last updated: 2026-02-13


Copyright 2026 AZ1.AI Inc. All rights reserved. Developer: Hal Casteel, CEO/CTO Product: CODITECT-BIO-QMS | Part of the CODITECT Product Suite Classification: Internal - Confidential