It really just means what it sounds like. The chip can run touring complete software. You can code an application in Java card and deploy it to the chip over NFC. Those applications will run on the chip autonomously and separately from any online platform like VivoKey. This means the applications you deploy to the chip are entirely separate from anything to do with us. It also means if something doesn’t exist that you want to run on the chip, it can be created by you or someone else.
A great example is the Tesla keycard applet. It didn’t exist, until someone reverse engineered the key card application, then it did.
Another example is storage of public-private key pairs and on-chip encryption algorithms. By generating these key pairs in the chip, and never releasing the private key from the chip, and performing encryption and decryption functions in the chip, you can rest assured that no third party has the private key. This is useful for everything from Bitcoin wallets to U2F and Fido authentication applications.